<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Defense &amp; Security &#8212; Global Security Review Archive &#8212; Defense &amp; Security %</title>
	<atom:link href="https://globalsecurityreview.com/archive/defense-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://globalsecurityreview.com/archive/defense-security/</link>
	<description>A division of the National Institute for Deterrence Studies (NIDS)</description>
	<lastBuildDate>Mon, 11 May 2026 10:49:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://globalsecurityreview.com/wp-content/uploads/2026/05/cropped-GSR-Chrome-Logo-2026-1-32x32.png</url>
	<title>Defense &amp; Security &#8212; Global Security Review Archive &#8212; Defense &amp; Security %</title>
	<link>https://globalsecurityreview.com/archive/defense-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Hollow Ranks &#038; Ghost Soldiers: Nigeria&#8217;s Corruption-Fueled Security Collapse</title>
		<link>https://globalsecurityreview.com/hollow-ranks-ghost-soldiers-nigerias-corruption-fueled-security-collapse/</link>
					<comments>https://globalsecurityreview.com/hollow-ranks-ghost-soldiers-nigerias-corruption-fueled-security-collapse/#respond</comments>
		
		<dc:creator><![CDATA[Arman Sidhu]]></dc:creator>
		<pubDate>Mon, 11 May 2026 12:15:09 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Government & Politics]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[air power deficit]]></category>
		<category><![CDATA[alternative governments]]></category>
		<category><![CDATA[Arman Sidhu.]]></category>
		<category><![CDATA[armed drones]]></category>
		<category><![CDATA[bandit networks]]></category>
		<category><![CDATA[Boko Haram]]></category>
		<category><![CDATA[Borno State]]></category>
		<category><![CDATA[Burkina Faso]]></category>
		<category><![CDATA[civilian casualties]]></category>
		<category><![CDATA[coup risk]]></category>
		<category><![CDATA[defense budget]]></category>
		<category><![CDATA[defense sector]]></category>
		<category><![CDATA[drone warfare]]></category>
		<category><![CDATA[economic collapse]]></category>
		<category><![CDATA[external intervention]]></category>
		<category><![CDATA[fingerprint-based verification]]></category>
		<category><![CDATA[ghost soldiers]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[insurgency]]></category>
		<category><![CDATA[intelligence gap]]></category>
		<category><![CDATA[international assistance]]></category>
		<category><![CDATA[ISWAP]]></category>
		<category><![CDATA[JNIM]]></category>
		<category><![CDATA[Kebbi]]></category>
		<category><![CDATA[Lake Chad Basin]]></category>
		<category><![CDATA[Lakurawa]]></category>
		<category><![CDATA[maintenance]]></category>
		<category><![CDATA[Mali]]></category>
		<category><![CDATA[military base overruns]]></category>
		<category><![CDATA[military corruption]]></category>
		<category><![CDATA[military desertion]]></category>
		<category><![CDATA[military procurement]]></category>
		<category><![CDATA[Multinational Joint Task Force]]></category>
		<category><![CDATA[Niger]]></category>
		<category><![CDATA[Nigeria]]></category>
		<category><![CDATA[night-vision gear]]></category>
		<category><![CDATA[organizational failure]]></category>
		<category><![CDATA[personnel costs]]></category>
		<category><![CDATA[President Tinubu]]></category>
		<category><![CDATA[public trust]]></category>
		<category><![CDATA[ransom economy]]></category>
		<category><![CDATA[reform]]></category>
		<category><![CDATA[Sahel]]></category>
		<category><![CDATA[security crisis]]></category>
		<category><![CDATA[security emergency]]></category>
		<category><![CDATA[Sokoto]]></category>
		<category><![CDATA[state legitimacy]]></category>
		<category><![CDATA[Sudan]]></category>
		<category><![CDATA[Tomahawk missile strikes]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[U.S. Military]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32674</guid>

					<description><![CDATA[<p>Published: May 11, 2026 Nigeria’s worsening security crisis is, at its core, a story of military breakdown. The Islamic State West Africa Province (ISWAP) overran at least 15 military bases in 2025, captured and executed a brigadier general, and deployed armed drones that outmatched the defending units. The pattern of base overruns, mass desertions, and [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/hollow-ranks-ghost-soldiers-nigerias-corruption-fueled-security-collapse/">Hollow Ranks &#038; Ghost Soldiers: Nigeria&#8217;s Corruption-Fueled Security Collapse</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Published: May 11, 2026</em></p>
<p>Nigeria’s worsening security crisis is, at its core, a story of military breakdown. The Islamic State West Africa Province (ISWAP) <a href="https://issafrica.org/iss-today/lake-chad-basin-s-military-bases-in-iswap-s-crosshairs">overran</a> at least 15 military bases in 2025, captured and executed a brigadier general, and deployed armed drones that outmatched the defending units. The pattern of base overruns, mass desertions, and failure to reinforce troops under attack points to deep organizational failure.</p>
<p>Events like the February 2026 Kwara massacre, in which jihadists killed over 200 people as well as the December 2025 <a href="https://www.africom.mil/pressrelease/36158/us-africa-command-conducts-strike-against-isis-in-nigeria">U.S. Tomahawk cruise missile strikes</a> on Nigerian soil and the <a href="https://www.africanews.com/2026/03/22/us-troops-in-nigeria-using-drones-to-detect-and-disrupt-terrorist-activity/">deployment</a> of American troops amount to the clearest sign yet that Africa’s most populous nation can no longer secure itself.</p>
<p><strong>The Mosul Parallel</strong></p>
<p>Iraq, before the fall of Mosul in 2014, offers the closest comparison. When 1,500 ISIS fighters routed 60,000 Iraqi soldiers, the collapse came not from lack of firepower but from corruption. The Iraqi military had roughly <a href="https://www.aljazeera.com/news/2014/12/11/how-iraqs-ghost-soldiers-helped-isil">50,000 ghost soldiers</a> on its payroll, troops who existed only on paper so commanders could pocket their salaries. Nigeria faces the same problem. <a href="https://www.declassifieduk.org/ghost-soldiers-britains-shadow-war-in-west-africa/">Leaked</a> UK diplomatic cables found that of the 20,000 troops Nigeria claims to deploy in the northeast, the real number is significantly lower, with thousands of ghost soldiers generating salaries collected by officers. The corruption is not incidental; it is systemic. <a href="https://ti-defence.org/gdi/">Transparency International</a> gave Nigeria’s defense sector an ‘E’ rating for “very high” corruption risk.</p>
<p>The human cost falls on ordinary soldiers. A Nigerian private earns $31 to $38 per month. Soldiers spend three to five years <a href="https://www.genocidewatch.com/single-post/documentary-reveals-low-morale-in-nigerian-army">deployed</a> without rotation, creating conditions for mass desertion. Iraq’s military eventually reformed after Mosul through fingerprint-based troop verification and coalition mentoring, but that reform only happened because Mosul was a shock too large to ignore. Nigeria faces a harder problem, a slow bleed rather than a single catastrophe, which gives political leaders room to delay action indefinitely.</p>
<p><strong>ISWAP’s Tactical Evolution and the Sahel Corridor</strong></p>
<p>ISWAP’s 2025 “Camp Holocaust” campaign has been the most successful in the group’s history. ISWAP systematically <a href="https://adf-magazine.com/2025/08/iswap-assaults-target-military-bases-in-lake-chad-region/">destroyed</a> forward operating bases across the Lake Chad Basin using drones, night-vision gear, and coordinated swarm attacks. The capture and execution of Brigadier General Musa Uba in November 2025 was not simply a battlefield loss. It revealed that ISWAP now operates with better intelligence than the forces it fights. ISWAP <a href="https://saharareporters.com/2025/11/17/nigerian-army-commander-brig-gen-uba-killed-iswap-after-terrorists-intercepted-his">intercepted</a> his communications and tracked his position after his convoy was ambushed 88 kilometers from regional military headquarters in Maiduguri. A force with 230,000 troops and a multibillion-dollar budget could not locate its own brigade commander.</p>
<p>The broader Sahel security framework has collapsed around Nigeria, and the timing could not be worse. Niger’s <a href="https://www.military.africa/2025/03/niger-withdraws-from-mnjtf-counter-terror-coalition/">withdrawal</a> from the Multinational Joint Task Force in March 2025 ended joint border patrols along a vast open frontier. Into this gap has moved <a href="https://thesoufancenter.org/intelbrief-2026-february-6/">Lakurawa</a>, an Islamic State Sahel Province subgroup operating across Sokoto and Kebbi states with surveillance drones. Al-Qaeda affiliate JNIM launched its first recorded <a href="https://www.counterextremism.com/blog/sahel-monitoring-may-2025">attack</a> on Nigerian soil in 2025.</p>
<p><strong>The Air Power Deficit</strong></p>
<p>The Nigerian Air Force shows what happens when procurement runs ahead of maintenance capacity. Three JF-17 fighters from Pakistan were delivered in 2021. By May 2023, only one could still fly. The result is an air force that cannot protect civilians or support ground troops. SBM Intelligence estimates over 400 Nigerian civilians <a href="https://impactpolicies.org/news/483/zamfara-airstrike-tragedy-understanding-civilian-casualties-and-security-challenges-in-nigeria">killed</a> in erroneous military airstrikes between 2017 and 2025. The <a href="https://www.crisisgroup.org/anb/africa/nigeria/massacre-kwara-state-heightens-nigerias-security-challenges">February 2026 Woro massacre</a> showed what this means in practice. A military aircraft appeared overhead during a ten-hour attack that killed at least 162 civilians but did not engage.</p>
<p><strong>External Partners and the Limits of Assistance</strong></p>
<p>The United States launched <a href="https://www.cnn.com/2025/12/25/politics/us-strikes-isis-nigeria">16 Tomahawk cruise missiles</a> against Lakurawa camps in Sokoto State on Christmas Day 2025 and deployed troops to Bauchi Airfield. <a href="https://www.csis.org/analysis/why-did-united-states-conduct-strikes-nigeria">CSIS assessed</a> that one-off strikes are unlikely to reduce the terrorist threat significantly. The pattern is familiar: outside firepower treats the symptoms while the underlying disease, institutional corruption, goes unaddressed. Nigeria’s own Defense Minister Christopher Musa has acknowledged that military action addresses only 30 percent of the conflict. The <a href="https://reliefweb.int/report/nigeria/africa-report-n-237-nigeria-challenge-military-reform">International Crisis Group’s 2016 reform blueprint</a> called for fingerprint-based troop verification and open defense spending records. It remains unimplemented a decade later.</p>
<p><strong>The Coup Question and the Criminal-Terror Nexus</strong></p>
<p>Recent history across the Sahel makes this risk real. In Burkina Faso and Mali, troops who felt abandoned by civilian leaders seized power. Nigeria shows each of these warning signs. Soldiers earn $31 a month while generals oversee billions in unchecked spending. The Nigerian Armed Forces mostly ruled the country between 1966 and 1999, and the memory of military government has not faded.</p>
<p>A second risk deepens the picture. ISWAP brings in an <a href="https://www.thenewhumanitarian.org/analysis/2025/07/24/when-rebels-rule-iswap-formula-winning-support-nigeria-northeast-tax-control">estimated</a> $191 million per year by taxing trade across the Lake Chad Basin, ten times what the Borno State government collects. Furthermore northwest bandit networks took in an estimated <a href="https://thesoufancenter.org/intelbrief-2025-november-25/">$1.42 billion in ransom</a> in a single year.</p>
<p>Every overrun  base sends vehicles, weapons, and ammunition to ISWAP and other groups, fortifying their governance with economic and military assets. This is the critical danger: the longer reform is delayed, the more these groups entrench themselves as alternative governments with independent revenue. Once that happens, as Sudan’s civil war has shown, the window for reversing the trend narrows sharply.</p>
<p><strong>Outlook</strong></p>
<p>The 2026 Nigerian defense budget includes <a href="https://statehouse.gov.ng/president-tinubu-presents-%E2%82%A658-18-trillion-2026-appropriation-bill-vows-stronger-discipline-in-budget-execution/#:~:text=%E2%80%9CThese%20outcomes%20are%20not%20accidental,revenue%20of%20%E2%82%A634.33%20trillion.">5.41 trillion naira ($3.9 billion)</a>. However, 62 percent goes to personnel costs and the naira’s collapse has cut real spending power by two-thirds since 2023. Nigerian President Tinubu’s security emergency declaration has not changed the picture. At least 316 civilians were killed across 15 states in the 71 days that followed.</p>
<p>Three patterns deserve attention: the self-arming cycle, where weapons from overrun bases fuel the next attack; the intelligence gap, where ISWAP knows more about the military than the military knows about ISWAP; and the governing contest, where ISWAP’s services undercut public trust in the state. Until the corruption at the heart of Nigeria’s military is confronted, no amount of outside help will change the course. The question facing Abuja is whether reform comes through deliberate action or through the kind of devastating loss that forced Iraq’s hand after Mosul.</p>
<p><em>Arman Sidhu is an American geopolitical analyst and writer. He regularly covers the commodities market, international trade, and foreign investment. He is a regular contributor to Geopolitical Monitor and his work has previously appeared in The Diplomat, Eurasia Review, Economic &amp; Political Weekly, and RealClearWorld, among several other outlets. The views expressed in this article are the author’s own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/05/Hollow-RanksGhost-Soldiers-Nigerias-Corruption-Fueled-Security-Collapse-.pdf"><img decoding="async" class="alignnone wp-image-32606" src="http://globalsecurityreview.com/wp-content/uploads/2026/04/2026-Download-Button26.png" alt="" width="202" height="56" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/04/2026-Download-Button26.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/04/2026-Download-Button26-300x83.png 300w" sizes="(max-width: 202px) 100vw, 202px" /></a></p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/hollow-ranks-ghost-soldiers-nigerias-corruption-fueled-security-collapse/">Hollow Ranks &#038; Ghost Soldiers: Nigeria&#8217;s Corruption-Fueled Security Collapse</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/hollow-ranks-ghost-soldiers-nigerias-corruption-fueled-security-collapse/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Trumping NATO</title>
		<link>https://globalsecurityreview.com/trumping-nato/</link>
					<comments>https://globalsecurityreview.com/trumping-nato/#comments</comments>
		
		<dc:creator><![CDATA[Stephen Cimbala]]></dc:creator>
		<pubDate>Tue, 28 Apr 2026 12:17:33 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Economics & Trade]]></category>
		<category><![CDATA[Geopolitics in Deterrence]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[aggression]]></category>
		<category><![CDATA[Arms Control]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[conventional war-fighting]]></category>
		<category><![CDATA[Crimea]]></category>
		<category><![CDATA[crinks]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[drone warfare]]></category>
		<category><![CDATA[European allies]]></category>
		<category><![CDATA[European Security]]></category>
		<category><![CDATA[Finland]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[gas prices]]></category>
		<category><![CDATA[global stability]]></category>
		<category><![CDATA[Here is a comma separated list of keywords extracted from the paper:Trump]]></category>
		<category><![CDATA[Iran war]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Ivo Daalder]]></category>
		<category><![CDATA[Macron]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[Military Strategy]]></category>
		<category><![CDATA[Military support]]></category>
		<category><![CDATA[military-industrial complex]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[nuclear deterrent]]></category>
		<category><![CDATA[oil prices]]></category>
		<category><![CDATA[Operation Epic Fury]]></category>
		<category><![CDATA[public opinion]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[shipping]]></category>
		<category><![CDATA[Strait of Hormuz]]></category>
		<category><![CDATA[Sweden]]></category>
		<category><![CDATA[Truth Social]]></category>
		<category><![CDATA[U.S. withdrawal]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[Vladimir Putin]]></category>
		<category><![CDATA[Volodymyr Zelensky]]></category>
		<category><![CDATA[world peace]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32629</guid>

					<description><![CDATA[<p>Published: April 28, 2026 Amid U.S. involvement in a war against Iran, President Donald J. Trump has decided to double down on previous public expressions of disregard and distrust toward NATO. President Trump has threatened to withdraw the United States from NATO several times since his reelection. His repeated jibes at the alliance have raised [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/trumping-nato/">Trumping NATO</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Published: April 28, 2026</em></p>
<p>Amid U.S. involvement in a war against Iran, President Donald J. Trump has decided to double down on previous public expressions of disregard and distrust toward NATO. President Trump has threatened to withdraw the United States from NATO several times since his reelection. His repeated jibes at the alliance have raised concern among European defense experts and government officials. Former U.S. Ambassador to NATO Ivo Daalder recently noted that “It’s hard to see how any European country will now be able and willing to trust the United States to come to its defense.” And French President Macron <a href="https://www.euronews.com/2026/04/02/trump-undermining-nato-by-creating-doubt-about-us-commitment-macron-says">indicated on April 2nd</a> that, in his view, U.S. President Trump was undermining NATO through his repeated threats to withdraw from the alliance. Raising new fears of American abandonment on the part of European leaders, Trump, in various interviews and social media posts within a few days, said that the United States “will remember” France’s refusal to assist in the war against Iran; that <a href="https://www.cnbc.com/2026/04/01/trump-says-hes-considering-pulling-us-out-of-paper-tiger-nato.html?msockid=1510934c8249606b0f658525835f61ab">NATO was a “paper tiger”</a>; and that “Putin knows that, too, by the way.”</p>
<p>The most recent Presidential broadsides against NATO reflected Trump’s frustration with European allies who chose not to involve themselves in the war against Iran and/or denied their political and military support for the actions taken under Operation EPIC FURY—an effort that Secretary of War, Hegseth <a href="https://www.war.gov/Spotlights/Operation-Epic-Fury/">describes as</a> “laser-focused [to] destroy Iranian offensive missiles, destroy Iranian missile production, destroy their navy and other security infrastructure – and they will never have nuclear weapons.&#8221; But this hesitancy among European allies should not have surprised U.S. leadership. Neither NATO as an alliance nor individual European governments were consulted before the decision to go to war, nor were they fully informed until the operation was already in progress. Further to the issue of NATO support, Trump’s address to the nation on April 1st simply assumed that the United States would wind up its military operations within several weeks and would turn the problem of unblocking shipping in the Strait of Hormuz over to European countries and others. In addition, Western European governments have strong public support for putting distance between themselves and the war in Iran. Popular majorities in every country oppose the U.S. and Israeli campaign, and European opposition to the war is enhanced by Trump’s personal unpopularity on that side of the Atlantic.</p>
<p>An additional element in the split between Trump and NATO was the Russian interpretation of its implications for the war in Ukraine, and more broadly, for Russia’s national security strategy writ large. Prolonged U.S. commitment to war in the Middle East could deplete the availability of military assets that would otherwise be available to sustain Ukrainian forces in their fight against Russia. The global spike in gas and oil prices was an obvious boon to the Russian economy and, from the standpoint of Ukrainian President Volodymyr Zelensky, an unwelcome distraction for European leaders from the priority of supporting Ukraine. Russia also took advantage of Epic Fury to reinforce its support for Iran by providing targeting information for Iranian missile attacks against Israel and other regional states. Russia and Iran had already been sharing technology and knowledge with respect to drone warfare even prior to the launch of military operations against Tehran.</p>
<p>To some extent, the volatility in the Trump administration’s approach to NATO reflected the President’s frustration at his inability to broker a peace agreement between Ukraine and Russia. Vladimir Putin viewed Russia’s war as existential and refused to acknowledge that there was any distinction between Ukrainian and Russian civilizations, let alone sovereignties. The Ukrainians responded in kind, resisting Russia’s invasion and occupation of Ukrainian territory with creative use of drone technology and edgy defensive strategizing that put at risk a variety of targets in Russian territory, including bomber bases and critical infrastructure. Worse for Putin, his invasion in 2022, preceded by Russia’s annexation of Crimea in 2014, refocused NATO on its primary mission of deterrence and defense in Europe as opposed to “out of the area” operations such as Iraq and Afghanistan. Even the formerly Cold War neutral states, Sweden and Finland, were added to NATO’s membership because of Russia’s attempted coup de main against Kiev that turned into the longest and most destructive war in Europe since World War II. Caught in a trap of his own making, Putin continued to pour troops and material into the battlefields of Donbas and elsewhere in eastern Ukraine to support a more favorable negotiating position, should productive negotiations ever materialize.</p>
<p>Given Trump’s propensity for rearranging the deck chairs on foreign policy via Truth Social memoranda, it is conceivable that he will tone down the anti–NATO rhetoric once he has decided on a strategy for winding down the U.S. military campaign in Iran. The process of deconflicting the Strait of Hormuz will likely involve participation from European nations and other countries. Almost nobody benefits from continued bottlenecks in global shipping of oil and other vital commodities. Regardless of the outcome in Iran, the United States needs NATO, and NATO needs the United States. Without the U.S. as the indispensable leading partner, NATO Europe has insufficient nuclear or conventional deterrence against further Russian aggression. This assertion implies no disregard for the steps that the U.S. European allies have already taken since 2022 to improve the quality of their armed forces and military–industrial complexes. It is instead a recognition that the unique American nuclear deterrent and conventional war-fighting capabilities, supported by European determination to resist further Russian aggression, create a global as well as a regional deterrent for Russia and its partners (The CRINKs – China, Russia, Iran, and North Korea) that benefits not only NATO but also world peace. On the other hand, a divided and internally fractious NATO invites further aggression within and beyond Europe.</p>
<p><em>Stephen J. Cimbala is Distinguished Professor of Political Science at Penn State Brandywine and the author of numerous works on nuclear deterrence, arms control, and military strategy. He is a senior fellow at NIDS and a recent contributor to the Routledge Handbook of Soviet and Russian Military Studies edited by Dr. Alexander Hill (Routledge: 2025). The views of the author are his own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/04/Trumping-NATO.pdf"><img decoding="async" class="alignnone wp-image-32606" src="http://globalsecurityreview.com/wp-content/uploads/2026/04/2026-Download-Button26.png" alt="" width="198" height="55" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/04/2026-Download-Button26.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/04/2026-Download-Button26-300x83.png 300w" sizes="(max-width: 198px) 100vw, 198px" /></a></p>
<p><a href="https://globalsecurityreview.com/trumping-nato/">Trumping NATO</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/trumping-nato/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Nuclear Deterrence in the Age of Emerging Technologies</title>
		<link>https://globalsecurityreview.com/nuclear-deterrence-in-the-age-of-emerging-technologies/</link>
					<comments>https://globalsecurityreview.com/nuclear-deterrence-in-the-age-of-emerging-technologies/#respond</comments>
		
		<dc:creator><![CDATA[Muhammad Usama Khalid]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 12:16:11 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[action/reaction time]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[algorithmic escalation]]></category>
		<category><![CDATA[Arms Race]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[automated retaliatory strike]]></category>
		<category><![CDATA[conventional prompt strike]]></category>
		<category><![CDATA[CPS]]></category>
		<category><![CDATA[cyber deterrence]]></category>
		<category><![CDATA[cyber operations]]></category>
		<category><![CDATA[cyber warfare]]></category>
		<category><![CDATA[dual-use]]></category>
		<category><![CDATA[emerging technologies]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Fatah series missiles]]></category>
		<category><![CDATA[Fattah-2 hypersonic missile]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Here is a comma-separated list of keywords extracted from the article:Nuclear deterrence]]></category>
		<category><![CDATA[HGV]]></category>
		<category><![CDATA[human-centric control.]]></category>
		<category><![CDATA[human-in-the-loop]]></category>
		<category><![CDATA[hypersonic glide vehicle]]></category>
		<category><![CDATA[hypersonics]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[NC3 modernization]]></category>
		<category><![CDATA[nuclear escalation]]></category>
		<category><![CDATA[quantum computing]]></category>
		<category><![CDATA[quantum sensing]]></category>
		<category><![CDATA[Quantum SQUID]]></category>
		<category><![CDATA[radiation sensors]]></category>
		<category><![CDATA[Russian hackers]]></category>
		<category><![CDATA[seismic sensors]]></category>
		<category><![CDATA[South Asia]]></category>
		<category><![CDATA[strategic stability]]></category>
		<category><![CDATA[Stuxnet]]></category>
		<category><![CDATA[submarine detection]]></category>
		<category><![CDATA[Superconducting Quantum Interference Device]]></category>
		<category><![CDATA[Ukrainian energy infrastructure]]></category>
		<category><![CDATA[US Ohio-class submarines]]></category>
		<category><![CDATA[warhead ambiguity]]></category>
		<category><![CDATA[Zumwalt-class destroyers]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32605</guid>

					<description><![CDATA[<p>Published: April 21, 2026 The amalgamation of emerging technologies and nuclear weapons systems is significantly impacting the landscape of strategic stability. The primary problem associated with such technologies is their dual-use nature, such as Artificial Intelligence (AI), hyper sonics, quantum computing, and cyber warfare. These technologies are evolving more rapidly than the treaties meant to [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/nuclear-deterrence-in-the-age-of-emerging-technologies/">Nuclear Deterrence in the Age of Emerging Technologies</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Published: April 21, 2026</em></p>
<p>The amalgamation of emerging technologies and nuclear weapons systems is significantly impacting the landscape of strategic stability. The primary problem associated with such technologies is their dual-use nature, such as Artificial Intelligence (AI), hyper sonics, quantum computing, and cyber warfare. These technologies are evolving more rapidly than the <a href="https://jqas.org/modernizing-arms-control-the-case-for-codifying-oversight-in-ai-and-nuclear-command-policy-marcellus-policy-analysis/">treaties meant to regulate them</a>.</p>
<p>The most significant emerging technology is Artificial Intelligence (AI), a prominent dual-use disruptor. In the civilian domain, it can help process large amounts of data based on its training. Meanwhile, in the nuclear domain, it affects among other things, the <a href="https://media.nti.org/documents/NTI_Paper_AI_r4.pdf">nuclear decision making</a> process.</p>
<p>The U.S. is currently considering <a href="https://jqas.org/modernizing-arms-control-the-case-for-codifying-oversight-in-ai-and-nuclear-command-policy-marcellus-policy-analysis/">incorporating AI into its NC3 modernization</a> process while maintaining a human-in-the-loop policy for launches, using AI to monitor abnormal patterns in adversary movements. Russia, on the other hand, is developing AI-driven upgrades to its <a href="https://www.csis.org/analysis/how-russia-reshaping-command-and-control-ai-enabled-warfare">automated retaliatory strike system</a> to ensure that if the country’s leadership is decapitated, the system can autonomously verify a nuclear strike via seismic and radiation sensors before launching a retaliatory strike. These change decision timing and the deterrence dynamic.</p>
<p>The incorporation of hypersonic technology into delivery vehicles has revolutionized the exchange of weapons in warfare. The speed at which hypersonic systems travel can exceed Mach 5 (five times the speed of sound), potentially inducing miscalculation for an adversary, since it compresses the time window to clearly assess whether a missile is conventional or nuclear. In late 2024 and early 2025, India tested its <a href="https://vajiramandravi.com/current-affairs/drdos-hypersonic-missile/">Hypersonic Glide Vehicle (HGV) technology</a>. Since these vehicles travel at such high speeds and at low altitudes with the ability to maneuver, it impacts the deterrence strategy between two nuclear countries. In response, Pakistan accelerated the <a href="https://www.gids.com.pk/land">Fatah series</a> missiles, which are designed as flat-trajectory rockets. The geographical proximity of India and Pakistan compresses the decision-making window during a crisis.</p>
<p>The world&#8217;s largest naval force, the U.S. navy, is currently integrating the Conventional Prompt Strike (CPS) hypersonic system onto Zumwalt-class destroyers. A Zumwalt-class ship may appear as a nuclear threat on radar but carries conventional weapons, risking warhead ambiguity for an adversary who might launch a nuclear strike if provoked. The recent exchange of delivery vehicles during the <a href="https://www.britannica.com/event/Israel-Iran-conflict">Iran and Israel conflict of 2024-2025</a> has shown the effect of hypersonic missiles in military operations. Iran used the <a href="https://mylibrarianship.wordpress.com/2025/06/15/irans-fattah-2-hypersonic-missile-a-game-changer-in-regional-military-power/">Fattah-2 hypersonic missile</a>, capable of Mach 5+ speeds with mid-flight maneuverability. Such weapon-delivery systems create strategic ambiguity for the adversary because they provide only a few seconds&#8217; window to decide whether to retaliate with conventional or nuclear missiles.</p>
<p>Advancements in quantum computing change warfare by providing more powerful algorithms producing vulnerabilities in secure systems. Nuclear launch codes, for example, are considered among the most secure encryption systems, which cannot be broken by classical computer methods. However, with advanced quantum computing methods, they become more vulnerable to hacking.</p>
<p>Additionally, <a href="https://www.9dashline.com/article/quantum-sensors-and-submarine-invulnerability">Quantum sensing</a>, which is facilitated with quantum electronic systems, allow for detection of minute changes in gravity or magnetic fields, which could produce systems that detect submarines, reducing their element of surprise. For example, China has made a huge leap by developing <a href="https://nationalsecurityjournal.org/is-the-stealth-submarine-era-over/">Quantum SQUID (Superconducting Quantum Interference Device) sensors</a>. These devices may be able to detect the magnetic signature of US Ohio-class stealth submarines from miles away, threatening the ultimate nuclear deterrent.</p>
<p>Cyber warfare has recently moved to the forefront of modern warfare tactics with potential impacts on nuclear deterrence. Cyber warfare may produce uncertainties due to disruption of detection mechanisms and nuclear command and control that could produce unstable strategic situations. The classic Cold War model of Mutually Assured Destruction (MAD) was based on the visible, slow-moving, threat of nuclear weapons exchange. Cyber warfare introduces complexity and confusion. Thus, the deliberate nature of threats; instead, may instigate miscalculations driven by algorithms or false cyber signals.</p>
<p>A good example of how cyber operations can offset traditional military operations was the venture to physically damage Iranian nuclear centrifuges using malicious software (malware). The operation was carried out using Stuxnet malware installed from a USB drive that destroyed centrifuges without a single kinetic device. Similarly, Russian hackers have been carrying out <a href="https://jsis.washington.edu/news/cyberattack-critical-infrastructure-russia-ukrainian-power-grid-attacks/">cyber-attacks against Ukrainian energy infrastructure</a> and government agencies since 2015. Vis-à-vis in 2025, during the ongoing Russia-Ukraine war, Ukrainian intelligence conducted a <a href="https://www.csis.org/analysis/unpacking-ukraines-future-cyber-and-space-forces">cyber-operation shutting down the Russian railway</a> and affecting digital infrastructure.</p>
<p>A major problem lies with warhead ambiguity (conventional vs. nuclear), which poses a huge risk for accidental nuclear escalation. During the height of the May 2025 crisis between the two South Asian rivals, cyber operations were at their peak. Consequently, in the post-crisis scenario, India is enhancing its cyber deterrence. In future conflicts, any state’s cyber space will be one of the primary targets; in a scenario where lines are already blurred, a single attempt to disrupt the cyber space of NC3 could be the initiating point of nuclear escalation.</p>
<p>The evolution of dual-use emerging technologies is fundamentally changing the traditional pillars of nuclear deterrence by compressing the action/reaction time required for rational decision-making. A major problem lies with warhead ambiguity (conventional vs. nuclear), which poses a huge risk for accidental nuclear escalation. In the volatile context of South Asia, dual-use technologies appear to destabilize a fragile strategic stability.</p>
<p>Ultimately, as machines outpace human thought in the decision loop, there is a danger that the resulting disruption is not just a technological arms race but the erosion of human-centric control, creating the risk of an accidental, algorithmically driven nuclear escalation as the defining strategic challenge of the future.</p>
<p><em>Muhammad Usama Khalid is a Research Officer at the Balochistan Think Tank Network (BTTN), BUITEMS, Quetta. He can be reached at: </em><a href="mailto:usama.khalid.uk456@gmail.com"><em>usama.khalid.uk456@gmail.com</em></a><em>. The views of the author are his own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/04/Nuclear-Deterrence-in-the-Age-of-Emerging-Technologies.pdf"><img decoding="async" class="alignnone wp-image-32606" src="http://globalsecurityreview.com/wp-content/uploads/2026/04/2026-Download-Button26.png" alt="" width="205" height="57" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/04/2026-Download-Button26.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/04/2026-Download-Button26-300x83.png 300w" sizes="(max-width: 205px) 100vw, 205px" /></a></p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/nuclear-deterrence-in-the-age-of-emerging-technologies/">Nuclear Deterrence in the Age of Emerging Technologies</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/nuclear-deterrence-in-the-age-of-emerging-technologies/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Iran’s Missile-Drone Campaign and Its Implications for the United States’ Deterrence</title>
		<link>https://globalsecurityreview.com/irans-missile-drone-campaign-and-its-implications-for-the-united-states-deterrence/</link>
					<comments>https://globalsecurityreview.com/irans-missile-drone-campaign-and-its-implications-for-the-united-states-deterrence/#respond</comments>
		
		<dc:creator><![CDATA[Tahir Mahmood Azad]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 12:14:53 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Deterrence & Foreign Policy]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Air Defense]]></category>
		<category><![CDATA[air superiority]]></category>
		<category><![CDATA[alliance management]]></category>
		<category><![CDATA[Arms Control]]></category>
		<category><![CDATA[asymmetric capabilities]]></category>
		<category><![CDATA[Attrition]]></category>
		<category><![CDATA[ballistic missiles]]></category>
		<category><![CDATA[Campaign]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cost-effective interception]]></category>
		<category><![CDATA[cost-exchange dilemma]]></category>
		<category><![CDATA[crisis stability]]></category>
		<category><![CDATA[cruise missiles]]></category>
		<category><![CDATA[defensive inventories]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[Diplomacy]]></category>
		<category><![CDATA[directed energy]]></category>
		<category><![CDATA[directed energy weapons]]></category>
		<category><![CDATA[Doctrine]]></category>
		<category><![CDATA[drone]]></category>
		<category><![CDATA[electronic warfare]]></category>
		<category><![CDATA[extended deterrence]]></category>
		<category><![CDATA[Golden Dome]]></category>
		<category><![CDATA[Indo-Pacific]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Iron Dome]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[missile]]></category>
		<category><![CDATA[non-state actors]]></category>
		<category><![CDATA[nonproliferation]]></category>
		<category><![CDATA[Patriot]]></category>
		<category><![CDATA[precision strike]]></category>
		<category><![CDATA[procurement]]></category>
		<category><![CDATA[proliferation]]></category>
		<category><![CDATA[resource allocation]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[saturation attacks]]></category>
		<category><![CDATA[South Asia]]></category>
		<category><![CDATA[strategic adaptation]]></category>
		<category><![CDATA[strategic attrition]]></category>
		<category><![CDATA[THAAD]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[unmanned aerial systems]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32585</guid>

					<description><![CDATA[<p>Published: April 16, 2026 The ongoing conflict involving Iran, the United States, and Israel has produced one of the most significant case studies in the evolution of contemporary warfare. Iran, a state that lacks a competitive air force and possesses limited naval power, has demonstrated that ballistic missiles, cruise missiles, and unmanned aerial systems can [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/irans-missile-drone-campaign-and-its-implications-for-the-united-states-deterrence/">Iran’s Missile-Drone Campaign and Its Implications for the United States’ Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Published: April 16, 2026</em></p>
<p>The ongoing conflict involving Iran, the United States, and Israel has produced one of the most significant case studies in the evolution of contemporary warfare. Iran, a state that lacks a competitive air force and possesses limited naval power, has demonstrated that ballistic missiles, cruise missiles, and unmanned aerial systems can offset some conventional disadvantages and impose serious costs on technologically superior adversaries. This development is not confined to the battlefield. It represents a doctrinal shift with lasting implications for American deterrence strategy, allied defense planning, and the long-term viability of current U.S. force structures. Understanding what Iran has and has not achieved is essential for making sound policy going forward.</p>
<p><strong>The Cost-Exchange Problem</strong><strong> </strong></p>
<p>At the operational level, Iran&#8217;s most consequential contribution has been exposing a structural vulnerability in layered air defense: the cost-exchange dilemma. Systems such as Patriot, THAAD, and Iron Dome were engineered to intercept high-value ballistic and cruise missile threats. When deployed against coordinated waves of low-cost drones and short-range missiles, these systems are forced to expend interceptors valued at hundreds of thousands or millions of dollars per shot against threats that cost a fraction of that amount. The arithmetic is unsustainable at scale. As analysts at the Center for Strategic and International Studies have <a href="https://www.csis.org/analysis/air-and-missile-defense-crossroads">noted</a>, saturation attacks can exhaust defensive inventories faster than replenishment is possible, creating windows of vulnerability that adversaries are quick to exploit. For the United States, this is not merely a technical problem, it is a strategic one that requires urgent attention in both procurement and doctrine.</p>
<p>The <a href="https://www.defense.gov/News/News-Stories/Article/Article/4086300/">development</a> of the Golden Dome missile defense architecture and expanded investment in directed energy and electronic warfare systems reflect growing official awareness that current interception models are not cost-competitive. These are necessary steps. However, technology alone cannot resolve a dilemma that is fundamentally about the economics of offense versus defense. Adversaries will adapt their tactics faster than procurement cycles can respond unless the U.S. also changes the strategic logic driving their calculations.</p>
<p><strong>Attrition Without Decision: The Limits of the Iranian Model</strong></p>
<p>The Iranian approach has imposed genuine costs on its adversaries, but it has not produced decisive military outcomes. This distinction is critical. Iran&#8217;s missile and drone campaigns have disrupted logistics, strained defensive inventories, and created operational uncertainty. They have not, however, defeated U.S. or Israeli military power, seized or held territory, or forced a negotiated settlement on Iranian terms. The model is one of strategic attrition, not strategic victory. Survivability and persistence are not equivalent to effectiveness, and the broader narrative of a drone revolution rendering conventional military power obsolete requires significant qualification.</p>
<p>The claim that air superiority is no longer a necessary condition for strategic effectiveness also warrants scrutiny. Air superiority remains essential for intelligence, surveillance, and reconnaissance; for close air support of ground operations; and for denying adversaries freedom of movement. What Iran&#8217;s campaign demonstrates is that a state without air superiority can still impose costs and delay adversary operations—not that air power has been rendered irrelevant. The bar for what air superiority can guarantee has been raised. Its strategic value, however, has not disappeared. Policymakers and analysts should resist the temptation to draw sweeping conclusions from a conflict that remains ongoing and whose full operational record is still emerging.</p>
<p><strong>Implications for American Deterrence</strong></p>
<p>The proliferation of precision strike capabilities across state and non-state actors undermines the assumption that technological overmatch alone is sufficient to deter conflict. When adversaries can field asymmetric capabilities that challenge U.S. and allied defenses at an acceptable cost to themselves, deterrence by denial becomes increasingly difficult to guarantee. The U.S. must prioritize cost-effective interception technologies, particularly directed energy weapons, that can neutralize mass drone and missile attacks without depleting high-value interceptor stocks. This is a resource allocation problem as much as it is an engineering one, and it demands serious engagement at the budgetary and strategic planning levels.</p>
<p>The Iranian model is also exportable, and this may prove to be its most consequential long-term dimension. States with limited defense budgets that are aligned with China or Russia can observe the operational lessons from this conflict and apply them in their own regional contexts. The proliferation of domestically produced or externally transferred missile and drone capabilities across the Middle East, South Asia, and the Indo-Pacific represents a compounding deterrence challenge. American extended deterrence commitments to allies in these regions will become harder to sustain if the cost-exchange problem is not structurally resolved. As Defense News <a href="https://cepa.org/article/how-are-drones-changing-war-the-future-of-the-battlefield/#:~:text=Real%2Dtime%20video%20feeds%20from,NATO%20and%20the%20Strategic%20Imperative">reported</a>, the proliferation of drone technology is already forcing militaries worldwide to reconsider their approach to air and missile defense.</p>
<p>There is also a crisis stability dimension that deserves serious attention. Rapid, sustained missile and drone strikes compress decision-making timelines and increase pressure for early, and potentially disproportionate, responses. In a multipolar environment where multiple actors possess similar strike capabilities, the risk of miscalculation is elevated. The U.S. should pursue updated arms control frameworks and diplomatic mechanisms to manage the proliferation of these systems alongside its technical and procurement investments. Deterrence cannot be reduced to hardware alone.</p>
<p><strong>Conclusion</strong></p>
<p>Iran&#8217;s missile and drone campaign has not rewritten the principles of warfare, but it has exposed critical assumptions underpinning American deterrence in ways that cannot be ignored. Distributed, low-cost, high-impact systems are now accessible to a wider range of actors and the gap between offensive capability and defensive cost is widening. The United States requires a</p>
<p>deterrence posture that integrates cost-effective defense, credible offensive options, active non-proliferation diplomacy, and sustained alliance management. Meeting this challenge demands strategic adaptation across doctrine, procurement, and diplomacy, not simply an incremental increase in interceptor production.</p>
<p><em>Dr. Tahir Mahmood Azad is currently a research scholar at the Department of Politics &amp; International Relations, the University of Reading, UK. Views expressed in this article are the author’s own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/04/Irans-Missile-Drone-Campaign-and-Its-Implications-for-the-United-States-Deterrence.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-32091" src="http://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png" alt="" width="194" height="54" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button-300x83.png 300w" sizes="(max-width: 194px) 100vw, 194px" /></a></p>
<p><a href="https://globalsecurityreview.com/irans-missile-drone-campaign-and-its-implications-for-the-united-states-deterrence/">Iran’s Missile-Drone Campaign and Its Implications for the United States’ Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/irans-missile-drone-campaign-and-its-implications-for-the-united-states-deterrence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Deterrence on Layaway: A Shutdown’s Quiet Assault on American Security</title>
		<link>https://globalsecurityreview.com/deterrence-on-layaway-a-shutdowns-quiet-assault-on-american-security/</link>
					<comments>https://globalsecurityreview.com/deterrence-on-layaway-a-shutdowns-quiet-assault-on-american-security/#respond</comments>
		
		<dc:creator><![CDATA[Brandon Toliver]]></dc:creator>
		<pubDate>Mon, 30 Mar 2026 12:15:05 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[adversaries]]></category>
		<category><![CDATA[allies]]></category>
		<category><![CDATA[Artemis II]]></category>
		<category><![CDATA[aviation]]></category>
		<category><![CDATA[biodefense]]></category>
		<category><![CDATA[budget]]></category>
		<category><![CDATA[congress]]></category>
		<category><![CDATA[continuity]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[deterrence studies ​]]></category>
		<category><![CDATA[disruption]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[health]]></category>
		<category><![CDATA[HHS]]></category>
		<category><![CDATA[morale]]></category>
		<category><![CDATA[nation]]></category>
		<category><![CDATA[preparedness]]></category>
		<category><![CDATA[Public Health]]></category>
		<category><![CDATA[readiness]]></category>
		<category><![CDATA[resilience]]></category>
		<category><![CDATA[screening]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Shutdown]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[TSA]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[workforce]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32498</guid>

					<description><![CDATA[<p>Published: March 30, 2026 A nation does not need to lose a battle to look weak. Sometimes it only needs to miss a paycheck. Washington often treats budget shutdowns as partisan spectacle, but America’s adversaries see something far more useful: a live demonstration of self-inflicted fragility. When the federal government allows frontline security personnel to [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/deterrence-on-layaway-a-shutdowns-quiet-assault-on-american-security/">Deterrence on Layaway: A Shutdown’s Quiet Assault on American Security</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Published: March 30, 2026</em></p>
<p>A nation does not need to lose a battle to look weak. Sometimes it only needs to miss a paycheck.</p>
<p>Washington often treats budget shutdowns as partisan spectacle, but America’s adversaries see something far more useful: a live demonstration of self-inflicted fragility. When the federal government allows frontline security personnel to work unpaid it interrupts critical security and health functions and publicly advertises institutional dysfunction. It weakens more than morale, it weakens deterrence. That is the real national security cost of a prolonged budget lapse.</p>
<p>Deterrence rests on more than missiles, submarines, and strategic doctrine. It also depends on the visible reliability of state capacity. Allies and adversaries alike measure whether the U.S. can sustain operations under pressure, protect its population, and maintain continuity during disruption. A shutdown tells them the opposite. It signals that even absent enemy action; the U.S. is willing to degrade its own readiness through political dysfunction. <a href="https://www.csis.org/analysis/what-government-shutdown-would-mean-defense-funding-fy-2026">Even short lapses in appropriations</a> disrupt defense planning, contract execution, and the broader machinery that underwrites operational readiness.</p>
<p>The most immediate damage appears in aviation security. The Transportation Security Administration (TSA) is not simply a travel inconvenience buffer. It is part of the nation’s daily homeland defense posture. Every checkpoint, screening lane, and visible officer contributes to deterrence by signaling that attacks or probes are likely to be detected and disrupted. That visible consistency matters because deterrence at the tactical level often begins with routine friction imposed on hostile actors.</p>
<p>Friction weakens when the workforce begins to crack. <a href="https://www.reuters.com/business/world-at-work/us-says-more-than-450-tsa-officers-have-quit-since-funding-standoff-2026-03-24/">More than 460 TSA officers</a> have already quit during the current standoff, while absentee rates have climbed to 10 to 11 percent nationally. <a href="https://www.govexec.com/management/2026/02/5-things-to-watch-with-the-dhs-shutdown/411655">Repeated funding disruptions</a> are damaging morale, retention, and long-term staffing stability across the Department of Homeland Security. That is not merely a workforce problem. It is a deterrence problem.</p>
<p><a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC9240146/">Fatigue</a> measurably degrades visual search performance, which is directly relevant to screening-intensive environments such as aviation security. TSA screening is not just procedural. It is cognitive work performed under repetitive, high-stakes conditions. When officers are exhausted, financially strained, or distracted by uncertainty, the quality of that work can decline even if the checkpoint remains technically operational.</p>
<p>Equally important, deterrence at the checkpoint depends not only on actual performance but on what potential attackers believe about the system. Airport security screening is <a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC8612824/">perceived as a stronger deterrent</a> when it appears visible, universal, and credible. That matters because deterrence is partly psychological. A security system that appears chaotic, understaffed, and politically neglected may still function, but it no longer projects the same confidence.</p>
<p>This erosion has consequences beyond the checkpoint itself. Long lines spilling into terminal lobbies and pre-screening corridors create soft-target conditions that sophisticated attackers have historically exploited overseas. <a href="https://www.reuters.com/world/us/us-airports-implore-congress-end-tsa-funding-standoff-2026-03-23/">U.S. airports have warned</a> Congress that the current operational strain is serious, worsening, and potentially long-lasting. In practical terms, a shutdown does not just reduce security throughput. It redistributes risk into large, dense, unsecured public spaces and creates opportunity.</p>
<p>More troubling still is that recurring shutdowns create patterns. Adversaries watch for patterns. If hostile actors can reliably anticipate periods when U.S. aviation security is underpaid, understaffed, and politically distracted, then Washington has unintentionally handed them a calendar of vulnerability. Strategic competitors, transnational terrorist networks, and opportunistic lone actors all benefit when a defender repeatedly broadcasts when its systems are under stress.</p>
<p>The same logic applies beyond airports. Health security is often treated separately from deterrence, but that is a categorical error. In an era defined by pandemics, synthetic biology, fragile supply chains, and the weaponization of disruption, public health capacity is national security capacity. A country that cannot sustain surveillance, biodefense coordination, and health system continuity under fiscal pressure is not demonstrating resilience. It demonstrates exploitable weaknesses.</p>
<p>That is precisely why the shutdown’s impact on the Department of Health and Human Services (HHS) should concern strategists as much as its effect on TSA. HHS’s own <a href="https://www.hhs.gov/about/budget/fy-2026-hhs-contingency-staffing-plan/index.html">FY 2026 contingency staffing plan</a> states that 23,128 employees, roughly 31 percent of its workforce, would be furloughed during a lapse in appropriations. The plan further notes that numerous non-excepted functions would be paused or curtailed, including elements of grant oversight, data collection, validation, analysis, and portions of public communication. That may sound bureaucratic, but it is not.</p>
<p>Health system functions form the connective tissue of national preparedness. Surveillance, analytics, research oversight, and continuity of clinical and administrative operations are what allow the U.S. to detect biological threats early, understand cascading risks, and sustain resilience under stress. <a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC9253437/">Public health emergency management</a> is foundational to biodefense capacity, particularly in areas such as interagency coordination, situational awareness, testing, surveillance, and surge resilience. When those systems are interrupted, the country does not simply lose paperwork, it loses awareness, agility, and recovery capacity.</p>
<p>This point is reinforced by broader preparedness of scholarship. <a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC5594396">Public health emergency preparedness</a> in the U.S. has long suffered from uneven and declining support, leaving critical state and local response systems more vulnerable to disruption. In deterrence terms, disruptions lower the cost for an adversary seeking to exploit a biological event, amplify public panic, or overload institutional response capacity.</p>
<p>System disruption and deterrence is where budget shutdowns become strategically self-defeating. The U.S. invests heavily in advanced military capability, but periodically undermining the civilian systems that make that capability credible is defeatist. No adversary needs to destroy American resilience if Washington is willing to suspend parts of it on its own. That contradiction sends a damaging signal to both allies and competitors.</p>
<p>For adversaries such as China and Russia, recurring shutdowns offer a useful strategic readout. They reveal domestic political brittleness, weak continuity discipline, and a governing system vulnerable to self-imposed paralysis. That does not automatically invite direct confrontation, but it does encourage gray-zone opportunism. Cyber probing, disinformation, infrastructure stress campaigns, and strategic influence operations all become more attractive when the target appears distracted and internally divided. <a href="https://www.brookings.edu/articles/avoiding-the-self-inflicted-wound-of-a-federal-shutdown-isnt-hard/">Shutdowns are self-inflicted wounds</a>. In a deterrence environment, self-inflicted wounds are still wounds.</p>
<p>For U.S. allies, the signal is quieter but equally corrosive. Extended deterrence relies not only on military capability but also in the confidence of American competence and continuity. Partners want to know that the U.S. can manage crises at home while sustaining commitments abroad. A federal government that struggles to keep airport screening and health preparedness stable during a budget fight risk is undermining that confidence at exactly the wrong moment.</p>
<p>For these reasons, shutdowns should no longer be treated as routine political leverage when they affect core homeland security and resilience institutions. Congress should establish automatic continuing resolution mechanisms for agencies and functions that are central to deterrence. This includes transportation security, emergency preparedness, biodefense, and public health surveillance. Political disagreement is unavoidable; however, institutional self-sabotage is not.</p>
<p>Deterrence is often discussed in the language of force posture, strategic messaging, and escalation dominance. This all matters. Yet, deterrence lives in the ordinary machinery of a functioning state: an airport screening lane that stays open, a health surveillance system that keeps collecting data, and a workforce that knows the government will not ask it to defend the nation for free. When that machinery stalls, deterrence does not collapse overnight. It thins. It flickers. It becomes easier to stress. That is the danger of a shutdown. It does not merely interrupt government. It advertises vulnerability.</p>
<p><em>Brandon Toliver is a Senior Fellow at the National Institute for Deterrence Studies. The views of the author are his own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/03/Deterrence-on-Layaway-A-Shutdowns-Quiet-Assault-on-American-Security.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-32091" src="http://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png" alt="" width="223" height="62" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button-300x83.png 300w" sizes="(max-width: 223px) 100vw, 223px" /></a></p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/deterrence-on-layaway-a-shutdowns-quiet-assault-on-american-security/">Deterrence on Layaway: A Shutdown’s Quiet Assault on American Security</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/deterrence-on-layaway-a-shutdowns-quiet-assault-on-american-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Why Ideology Matters in Irregular Warfare</title>
		<link>https://globalsecurityreview.com/why-ideology-matters-in-irregular-warfare/</link>
					<comments>https://globalsecurityreview.com/why-ideology-matters-in-irregular-warfare/#respond</comments>
		
		<dc:creator><![CDATA[David Guenni]]></dc:creator>
		<pubDate>Tue, 17 Mar 2026 12:27:50 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[Al Qaeda]]></category>
		<category><![CDATA[al-Shabaab]]></category>
		<category><![CDATA[allies]]></category>
		<category><![CDATA[anti-Western coalition]]></category>
		<category><![CDATA[atrocities]]></category>
		<category><![CDATA[authoritarianism]]></category>
		<category><![CDATA[Beijing]]></category>
		<category><![CDATA[Boko Haram]]></category>
		<category><![CDATA[Caracas]]></category>
		<category><![CDATA[Chavista regime]]></category>
		<category><![CDATA[David Guenni]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[domestic constituencies]]></category>
		<category><![CDATA[ELN]]></category>
		<category><![CDATA[extremists]]></category>
		<category><![CDATA[FARC]]></category>
		<category><![CDATA[Geopolitics]]></category>
		<category><![CDATA[Global War on Terror]]></category>
		<category><![CDATA[gray zone]]></category>
		<category><![CDATA[Great Power Competition]]></category>
		<category><![CDATA[Havana]]></category>
		<category><![CDATA[Hezbollah]]></category>
		<category><![CDATA[Ideology]]></category>
		<category><![CDATA[Iraq]]></category>
		<category><![CDATA[irregular warfare]]></category>
		<category><![CDATA[irregular warfare doctrines]]></category>
		<category><![CDATA[ISIS]]></category>
		<category><![CDATA[Marxism]]></category>
		<category><![CDATA[Missouri State University]]></category>
		<category><![CDATA[Moscow]]></category>
		<category><![CDATA[narcotrafficking]]></category>
		<category><![CDATA[political asylum seeker]]></category>
		<category><![CDATA[Pyongyang. ​]]></category>
		<category><![CDATA[religion]]></category>
		<category><![CDATA[revanchism]]></category>
		<category><![CDATA[stability]]></category>
		<category><![CDATA[strategic cultures]]></category>
		<category><![CDATA[strategic-ideological struggle]]></category>
		<category><![CDATA[Taliban]]></category>
		<category><![CDATA[Tehran]]></category>
		<category><![CDATA[territorial expansion]]></category>
		<category><![CDATA[theory of victory]]></category>
		<category><![CDATA[totalitarianism]]></category>
		<category><![CDATA[U.S. foreign policy]]></category>
		<category><![CDATA[unipolar moment]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[USSOUTHCOM]]></category>
		<category><![CDATA[Venezuela]]></category>
		<category><![CDATA[whole-of-government efforts]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32444</guid>

					<description><![CDATA[<p>Published: March 17, 2026 Ideology matters, as I learned from surviving 18 years under the Chavista regime in Venezuela. The United States pretended otherwise for three decades, clinging to the “end of history” and similar dreams. Today, with ideologically driven conflicts simmering around the world, it is time for America to integrate deterrence, defense, and [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/why-ideology-matters-in-irregular-warfare/">Why Ideology Matters in Irregular Warfare</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Published: March 17, 2026</em></p>
<p>Ideology matters, as I learned from surviving 18 years under the Chavista regime in Venezuela. The United States pretended otherwise for three decades, clinging to the “<a href="https://theconversation.com/the-end-of-history-francis-fukuyamas-controversial-idea-explained-193225">end of history</a>” and similar dreams. Today, with ideologically driven conflicts simmering around the world, it is time for America to integrate deterrence, defense, and a theory of victory across the so-called <a href="https://www.militarytimes.com/opinion/commentary/2021/12/08/integrating-deterrence-across-the-gray-making-it-more-than-words/">gray zone</a> of geopolitics. Doing so will require policymakers to start listening to what America’s enemies have been saying for years about their ideological designs.</p>
<p>In 2004, when questioned about whether a Venezuela-<a href="https://www.whitehouse.gov/presidential-actions/2026/01/addressing-threats-to-the-united-states-by-the-government-of-cuba/">Cuba</a> alliance was exporting communist revolution throughout the Western Hemisphere, the Venezuelan ambassador to the United States <a href="https://www.latinamericanstudies.org/farc/farc-chavez-04.htm">averred</a>: “It is a thing outdated in time and it is not understanding the relationships that exist between the countries.” That was a backhanded ‘yes,’ if there ever was one. The message was meant to assuage the busy, post-9/11 national security community, diverting attention away from the <a href="https://www.cato.org/commentary/corruption-democracy-venezuela">problems brewing</a> south of the U.S. border. More than two decades later, the <a href="https://www.southcom.mil/Media/Special-Coverage/SOUTHCOMs-2025-Posture-Statement-to-Congress/">annual warnings</a> of USSOUTHCOM Combatant Commanders before Congress have finally been <a href="https://www.csis.org/analysis/going-war-cartels-military-implications">heeded</a> by the <a href="https://www.whitehouse.gov/presidential-actions/2025/01/designating-cartels-and-other-organizations-as-foreign-terrorist-organizations-and-specially-designated-global-terrorists/">White House</a>.</p>
<p>Ideology has been slapping America in the face since the late 1990s. For this era of refocusing on state-based threats, it comes in these forms and many others: Beijing’s obsession with employing “<a href="https://selectcommitteeontheccp.house.gov/sites/evo-subsites/selectcommitteeontheccp.house.gov/files/evo-media-document/uf-101-memo-final-pdf-version.pdf">united front</a>” organizations to silence dissidents overseas; Moscow’s <a href="https://alexanderdugin.substack.com/p/sovereignty-and-war">obsession with Ukraine</a>, kicking off a murky war in 2014 that is now sustained conventionally; Tehran’s obsession with <a href="https://globalinitiative.net/analysis/irans-criminal-statecraft-how-teheran-weaponizes-illicit-markets/">aiding and abetting</a> proxy martyrs of the Islamic Revolution; Havana’s and Caracas’ <a href="https://dallasexpress.com/national/exclusive-former-maduro-spy-chiefs-letter-to-trump-seeks-to-expose-narco-terrorist-war-against-u-s/">shared obsession</a> with waging “<a href="https://www.elindependiente.com/politica/2019/02/06/guerra-asimetrica-chavismo-venezuela-jorge-verstrynge/">asymmetric war</a>” on Western powers (which included flooding the American homeland with <a href="https://archive.org/details/narcotraficoytar0000fuen">illicit narcotics</a>); and Pyongyang’s obsession with <a href="https://www.businessinsider.com/north-korea-could-seek-to-exploit-south-korean-turmoil-2024-12">subverting</a> Seoul’s political processes and civic life. All these gray-zone efforts have an ideology at the heart. Their ideologies, variously rooted in Marxism, religion, and revanchism, drive the leaders of these states to employ irregular warfare tactics without any remorse and at any cost to civilians in the West or anywhere else. You will not find high degrees of intellectual coherence between these <a href="https://www.washingtontimes.com/news/2024/jul/2/jihadi-leftist-convergence/">constructs</a>; <a href="https://www.amazon.com/Contra-Occidente-emergente-alianza-antisistema/dp/8497347811">shared hatreds</a> and collectivist doctrines and dogmas are cohesive enough for what now amounts to an anti-Western coalition.</p>
<p>Anti-Western adversaries became <a href="https://a.co/d/0fdhvu5A">sneakier</a> when strategizing and aligning with those espousing similar worldviews. They also became more convinced of their moral superiority. The U.S. national security community makes arbitrary distinctions between geopolitics and ideology. These distinctions obfuscate reality, which is already tough to comprehend, and lead to poor policymaking. Nowhere is this weakness more prominent than in the domain of <a href="https://interpopulum.org/many-ways-to-be-irregular-the-real-definition-of-irregular-warfare-and-how-it-helps-us/">irregular warfare</a>. How did ISIS carve out its domain between Iraq and Syria, for instance, if not through the aid of its <a href="https://www.brookings.edu/books/the-terrorist-argument/">ideology</a>?</p>
<p>Discussing rival-state ideology in the Departments of State, Defense, and Homeland Security seems to generate discomfort despite some strides to understand <a href="https://ssi.armywarcollege.edu/SSI-Media/Recent-Publications/Article/3944078/exploring-strategic-culture/">strategic cultures</a>. It started with the spectacular triumphs of 1991. After Saddam Hussein’s defeat in the First Gulf War and the dissolution of the Soviet Union, international relations’ ideological variables have been marginalized in the Federal Government. The American bureaucrat could finally put ‘Sovietology’ to rest, and, with it, anything to do with alternatives to liberal internationalism. The term ‘Great-Power Competition’ continues the delusion; ‘strategic-ideological struggle’ captures reality much better.</p>
<p>Disclaimer: Ideologies are messy. Their study requires incredible levels of nuance, subtlety, cultural awareness, philosophical skill, and extensive interpretive room. It is not a field of expertise attuned nor prone to engineering solutions or <a href="https://a.co/d/07EsIV4F">linear responses</a>, making it politically dangerous to confront ideological challengers. Bringing up ideology always risks alienating a group and hurting its feelings. Hence, American political leaders and senior officials have scarcely breathed a word about state-centric ideological conflict since the demise of the USSR.</p>
<p>This problematic approach is a vestige of America’s long-gone “unipolar moment.” Through mirror imaging, it takes our attention away from elements that the Western world’s rivals thrive on. Several foes of the West have developed highly complex <a href="https://www.jstor.org/stable/j.ctv3142v29">irregular warfare doctrines</a>, intelligently focusing on the types of operations that some of these actors can excel in, and backing off from the type of war that they know they cannot win. Because <a href="https://interpopulum.org/for-want-of-a-nail-the-kingdom-was-lost-the-struggle-to-understand-irregular-warfare/">illegality</a> is the common denominator to all irregular warfare activities coming from any type of challenger, ideological zeal and fervor are absolute strategic imperatives to the leaders of these revanchist entities. Indeed, during the Global War on Terror, we recognized it as an essential enemy <a href="https://www.fpri.org/article/2024/11/fighting-ideologies-global-war-on-terror/">warfighting capability</a>. Ideology is the glue that authoritarians, totalitarians, and other extremists apply to bind together the domestic constituencies that they rely on for control and aggression. In ideology, those leaders find the corpus of thought and the narratives required to <a href="https://archive.org/details/douglass-red-cocaine-the-drugging-of-america-and-the-west-1999_202012">morally justify</a> atrocities committed in pursuit of greed, territorial expansion, or a simple clinging to power.</p>
<p>Acknowledgement is growing that defeating mere symptoms of its rivals’ irregular warfare campaigns cannot bring American <a href="https://www.jstor.org/stable/48743425?seq=1">strategic victory</a> or even achieve deterrence in the “gray zone.” Looking back at the U.S.-led quagmires of Afghanistan and Iraq, more observers have called for defeating root ideologies, rather than just crushing the fighters who currently espouse a certain ideology’s flavor-of-the-moment (e.g., Taliban, al-Qaeda, ISIS, Hezbollah, Boko Haram, al-Shabaab, FARC, ELN, etc.).</p>
<p>Defeating our enemies must include defeating their ideologies. This no longer <a href="https://press.armywarcollege.edu/cgi/viewcontent.cgi?article=1675&amp;context=monographs">demands</a> global wars in the traditional (conventional) military sense. To defeat regime ideologies, whole-of-government efforts require dusting off forgotten or atrophied competencies that America <a href="https://www.jstor.org/stable/j.ctv270kvpm">used to cultivate</a>, including the ‘<a href="https://irregularwarfare.org/articles/sneaky-war-how-to-win-the-world-without-fighting/">dark arts’</a> of U.S. foreign policy. Washington needs to articulate once again what it believes in, beyond vague notions of stability, and bring like-minded allies to our side.</p>
<p><em>David Guenni is completing his doctorate with Missouri State University&#8217;s Graduate School of Defense &amp; Strategic Studies. His research focuses on nation-states&#8217; employment of narcotrafficking as an irregular warfare modality. He is a Venezuelan political asylum seeker in the United States, having spent many years in the struggle against the Chavista regime in Caracas. His opinions are his own and no one else&#8217;s.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/03/Why-Ideology-Matters-in-Irregular-Warfare.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-32091" src="http://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png" alt="" width="227" height="63" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button-300x83.png 300w" sizes="(max-width: 227px) 100vw, 227px" /></a></p>
<p><a href="https://globalsecurityreview.com/why-ideology-matters-in-irregular-warfare/">Why Ideology Matters in Irregular Warfare</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/why-ideology-matters-in-irregular-warfare/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Is The Air Campaign Against Iran an Illegal Use of Force?</title>
		<link>https://globalsecurityreview.com/is-the-air-campaign-against-iran-an-illegal-use-of-force/</link>
					<comments>https://globalsecurityreview.com/is-the-air-campaign-against-iran-an-illegal-use-of-force/#respond</comments>
		
		<dc:creator><![CDATA[Michael Fincher]]></dc:creator>
		<pubDate>Thu, 12 Mar 2026 12:13:12 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Deterrence & Foreign Policy]]></category>
		<category><![CDATA[Government & Politics]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Article I]]></category>
		<category><![CDATA[Article II]]></category>
		<category><![CDATA[authority]]></category>
		<category><![CDATA[commander in chief]]></category>
		<category><![CDATA[conflict]]></category>
		<category><![CDATA[congress]]></category>
		<category><![CDATA[Constitution]]></category>
		<category><![CDATA[declaration of war]]></category>
		<category><![CDATA[election year ​]]></category>
		<category><![CDATA[imminent danger]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[justification]]></category>
		<category><![CDATA[legislation]]></category>
		<category><![CDATA[military]]></category>
		<category><![CDATA[National defense]]></category>
		<category><![CDATA[partisan]]></category>
		<category><![CDATA[passive consent]]></category>
		<category><![CDATA[preemption doctrine]]></category>
		<category><![CDATA[president]]></category>
		<category><![CDATA[public defense]]></category>
		<category><![CDATA[public opinion]]></category>
		<category><![CDATA[strikes]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[war]]></category>
		<category><![CDATA[War Powers Act]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32432</guid>

					<description><![CDATA[<p>Published: March 12, 2026 Whenever the United States resorts to military force, the same question echoes through Washington and beyond: Did President Trump act within the law? Recent controversies surrounding the War Powers Resolution—especially the requirement to notify Congress—have only intensified that debate. This article steps aside from that familiar battleground. Instead, it asks a [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/is-the-air-campaign-against-iran-an-illegal-use-of-force/">Is The Air Campaign Against Iran an Illegal Use of Force?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Published: March 12, 2026</em></p>
<p>Whenever the United States resorts to military force, the same question echoes through Washington and beyond: Did President Trump act within the law? Recent controversies surrounding the War Powers Resolution—especially the requirement to notify Congress—have only intensified that debate. This article steps aside from that familiar battleground. Instead, it asks a more fundamental constitutional question: would an air campaign against Iran be lawful under the United States Constitution? A careful reading suggests that the answer may well be yes.</p>
<p>There are two sections in Article I of the Constitution that address the authority to declare war. Clause 11 of Section 8 grants Congress the power to declare war, grant Letters of Marque and Reprisal, and make rules concerning capture on land and water. It is not the only provision that discusses war-making authority.</p>
<p>Clause 3 of Section 10, which is rarely mentioned in war powers discussions, deprives the states of the authority to maintain a standing army or navy, or to engage in war. It is the federal government’s responsibility to provide for the nation&#8217;s common defense, with two exceptions. First, Congress may permit states to possess these powers. Second, states may go to war if they are “actually invaded, or in such imminent danger as will not admit of delay.”</p>
<p><strong>War Powers Act of 1973</strong></p>
<p>Using general legislative authority, as well as power granted to it from Article I, Section 8, Congress passed the <a href="https://www.nixonlibrary.gov/news/war-powers-resolution-1973">War Powers Act</a> in 1973. The Act came after frustration over the Korean War and the bombing campaign over Cambodia during the Vietnam War.</p>
<p>The Act creates several limitations on the President’s abilities to make war and requires: 1) a declaration of war, 2) specific statutory authorization, or 3) a national emergency created by an attack upon the United States, its territories or possessions, or its armed forces.</p>
<p>“In every possible instance,” the President is required to consult with Congress prior to beginning hostilities and do so within 48 hours. Congressional approval is needed if hostilities are to continue beyond 60 days.</p>
<p>From a prescriptivist perspective, there are compelling arguments that certain provisions of the Act may be unconstitutional. While some argue that Congress cannot delegate its authority to make war, others argue that the Act infringes on the President’s duties as Commander in Chief. Article I, Section 10, creates exceptional circumstances for the exercise of war-making powers. Moreover, there is a strong textual argument that those powers expressly granted to the states inherently apply to the President.</p>
<p><strong>Principles of Presidential War Powers</strong></p>
<p>Using the two clauses of the Constitution referenced above, we can extract two principles regarding war-making authority: Consent of Congress and Imminent Danger.</p>
<ol>
<li><strong> Consent of Congress</strong></li>
</ol>
<p>Congress can consent in three ways. It can issue a formal declaration of war. It can also pass legislation to create conditions for the use of force. And it can give the Commander in Chief limited flexibility, as they did with the War Powers Act.</p>
<p>Alternatively, Congress can signal passive approval by not responding to the Presidential action at all. This last approach is controversial, but common sense and Supreme Court precedent suggest it is lawful. Moreover, Congress is the only body that can legally correct an unauthorized or undesired war. They can pass laws to restrict war-making authority, end a war, or use their impeachment power. When Congress chooses not to use these options, it is effectively granting passive consent.</p>
<ol start="2">
<li><strong> Imminent Danger Exception</strong></li>
</ol>
<p>As stated in the preamble to the Constitution, the purpose of creating a constitution is to provide for the common defense of the people, among other goals. While Congress has the Article I power to declare war or legislate how the President can wage war, responsibilities are commingled. The President is the Commander in Chief per Article II, Section 2. One of the implied duties of heading the armed forces is directing them in a defensive attack or addressing imminent danger, which <a href="https://legal-resources.uslegalforms.com/i/imminent-danger">refers</a> to an immediate threat that poses a risk of harm without prompt intervention. This is not a tangential power of the President, but a core constitutional power as well.</p>
<p>It would be ludicrous to suggest that the initial response to the War of 1812 was unauthorized because Congress could not meet to deliberate on a declaration. While it is clearly the primary duty of the federal government to repel invasion, it is also in the purview of the states to act when “actually invaded” or placed in “imminent danger.” The Founding Fathers clearly recognized the need for flexibility in responding to threats, especially in an era when communication delays were the norm. If the states are given such power in exceptional circumstances, certainly the Commander in Chief would have these powers.</p>
<p>What is peculiar is that the flexibility afforded to states is not restricted to times of invasion. An invasion is already an imminent danger. Neither is the exception in Section 10, Clause 3 restricted to actions on the sea for events such as intercepting a flotilla attempting to invade. It is easy to believe the Founders contemplated threats from their immediate borders with France, Britain, and Spain.</p>
<p>If a state had a border along a river, and an enemy nation started concentrating forces on the other bank of the river, one could argue the existence of imminent danger, especially in historic times where standing armies were statements in and of themselves.</p>
<p><strong>How This Applies to Iran</strong></p>
<p>There is clearly some lawful justification for offensive use of force when Congress does not provide express consent. Just War Theory and the preemption doctrine can be discussed all day long until we are blue in the face, without concluding whether the current use of force is theoretically justified. The answer is truly a matter of prudence and congressional will.</p>
<p>Using threats of imminent danger as justification <em>seems </em>to be a stretch in this scenario, particularly because many in positions of authority <a href="https://nypost.com/2026/03/02/us-news/rubio-claims-us-knew-israel-would-attack-iran-acted-to-protect-american-troops/">have hinted the imminence</a> originates with Israel’s decision to carry out strikes and the retaliation that would bring upon American forces within the region.</p>
<p>One can argue that the intent of the imminent danger exception in the Constitution is limited to public defense. The War Powers Act considers imminent danger to military forces. Say that the military came across evidence of a nation trying to repeat a USS Cole-style bombing. Retaliating against that nation or striking first to reduce their capability would be the prudent thing to do, and it would be a lawful use of force under the Constitution alone, regardless of what acts of Congress say.</p>
<p>It is also important to consider the specific moment used to assess whether the actions are lawful. At the start of a conflict, one might not actually be in immediate danger or have given consent. Nevertheless, arguing imminent danger becomes easier in the chaos of war, especially after the first shot is fired.</p>
<p>It is unknown what the actual intelligence is behind the scenes, nor is it known the veracity of public comments by members of the Administration and Congress. Some say it is about nuclear weapon production, preempting retaliation that would stem from Israel’s strikes against Iran, retaliation for the <a href="https://nypost.com/2026/01/25/world-news/more-than-36500-killed-in-deadliest-two-days-in-iran-protest-crackdown-report/">alleged</a> killings of thousands of Iranian civilians, or regime change. Others who are just as authoritative contradict these claims.</p>
<p>While there may be classified intelligence to the contrary, this is a rare instance in which the justification for the strikes has not been communicated to the public. Normally, the public is aware of escalating tensions and seeing the President or other officials give warnings or make demands before we see strikes. On the evening of March 3, 2026, many members of Congress took to social media to discuss their briefing on the conflict. Representatives Seth Magaziner and Stephen Lynch, Senator Richard Blumenthal, among others, indicated that the administration failed to articulate any justification, while most <a href="https://abcnews.com/US/moment-reactions-pour-congress-after-trump-strikes-iran/story?id=130596800">republicans stated support</a> for the strikes.</p>
<p>Just as there is a fog of war, there is a fog of politics. Commentary is often on partisan lines; it is an election year, and members often vote against public statements, and to the chagrin of public opinion. It is also common for members to offer support privately and behind the scenes while publicly posturing against matters. What matters is what Congress does as a body. Congress has not yet revoked the President’s war-making ability. Until they do so, they are at least providing passive consent for the President to use force against Iran. While some may find the prudence of this conflict distasteful, until Congress votes otherwise, the war and that the President’s actions are lawful per the Constitution itself.</p>
<p><em>Michael Fincher is a Fellow at the National Institute for Deterrence Studies. The views expressed in this article are the author’s own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/03/Is-The-Air-Campaign-Against-Iran-an-Illegal-Use-of-Force.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-32091" src="http://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png" alt="" width="227" height="63" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button-300x83.png 300w" sizes="(max-width: 227px) 100vw, 227px" /></a></p>
<p><a href="https://globalsecurityreview.com/is-the-air-campaign-against-iran-an-illegal-use-of-force/">Is The Air Campaign Against Iran an Illegal Use of Force?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/is-the-air-campaign-against-iran-an-illegal-use-of-force/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CARRIER, CHOKEPOINT, AND COERCION: THE DYNAMICS OF IRAN-US CONFLICT</title>
		<link>https://globalsecurityreview.com/carrier-chokepoint-and-coercion-the-dynamics-of-iran-us-conflict/</link>
					<comments>https://globalsecurityreview.com/carrier-chokepoint-and-coercion-the-dynamics-of-iran-us-conflict/#respond</comments>
		
		<dc:creator><![CDATA[Ahmad Ibrahim]]></dc:creator>
		<pubDate>Mon, 09 Mar 2026 12:12:47 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Deterrence & Foreign Policy]]></category>
		<category><![CDATA[Government & Politics]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[air defense systems]]></category>
		<category><![CDATA[Arabian Sea]]></category>
		<category><![CDATA[asymmetrical warfare]]></category>
		<category><![CDATA[Carrier Battle Group]]></category>
		<category><![CDATA[coastal missiles]]></category>
		<category><![CDATA[coercion]]></category>
		<category><![CDATA[conflict studies]]></category>
		<category><![CDATA[F-35C]]></category>
		<category><![CDATA[fast-attack crafts]]></category>
		<category><![CDATA[global oil consumption]]></category>
		<category><![CDATA[Iran-US conflict]]></category>
		<category><![CDATA[Iranian Revolutionary Guard Corps Navy]]></category>
		<category><![CDATA[maritime domain]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[Military Technology]]></category>
		<category><![CDATA[naval armada]]></category>
		<category><![CDATA[nuclear deterrent]]></category>
		<category><![CDATA[nuclear strategy]]></category>
		<category><![CDATA[Ohio class SSGNs]]></category>
		<category><![CDATA[oil tankers]]></category>
		<category><![CDATA[Patriot air-defense system]]></category>
		<category><![CDATA[regime change]]></category>
		<category><![CDATA[sea control]]></category>
		<category><![CDATA[sea denial]]></category>
		<category><![CDATA[short-range ballistic missiles]]></category>
		<category><![CDATA[Strait of Hormuz]]></category>
		<category><![CDATA[suicide drones]]></category>
		<category><![CDATA[THAAD missile defense systems]]></category>
		<category><![CDATA[Tomahawk cruise missiles]]></category>
		<category><![CDATA[US military assets]]></category>
		<category><![CDATA[USS Abraham Lincoln]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32411</guid>

					<description><![CDATA[<p>Published: March 9, 2026 (Editor’s Note: This article was submitted before the U.S.-Iran conflict began. We intentionally left the article as “forward looking” to signify the value of the analysis.)  After successful US regime-change operations in Venezuela, Washington is aiming for similar endeavor again, this time in Middle East against Iran. Mass mobilization of US [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/carrier-chokepoint-and-coercion-the-dynamics-of-iran-us-conflict/">CARRIER, CHOKEPOINT, AND COERCION: THE DYNAMICS OF IRAN-US CONFLICT</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Published: March 9, 2026</em></p>
<p><em>(Editor’s Note: This article was submitted before the U.S.-Iran conflict began. We intentionally left the article as “forward looking” to signify the value of the analysis.)</em><strong> </strong></p>
<p>After successful US regime-change operations in Venezuela, Washington is aiming for similar endeavor again, this time in Middle East against Iran. Mass mobilization of US military assets—most notably the deployment of naval armada in the Arabia Sea, the forward deployment of Patriot air-defense system and THAAD missile defense systems, and the sudden evacuation of non-essential personnel from regional military bases, were among advanced preparatory measures by Washington for kinetic action against Iran. Amid heightening tension, few incidents preceded US military actions. Iran <a href="https://wfin.com/fox-world-news/iran-seizes-oil-tankers-threatens-massacre-in-strait-of-hormuz-hours-before-us-talks/">seized two foreign oil-tankers</a> allegedly smuggling oil and had <a href="https://www.cbsnews.com/news/us-tanker-stena-imperative-approached-iran-gunboats-strait-of-hormuz/#:~:text=Dubai%20%E2%80%94%20British%20maritime%20security%20firm,CENTCOM%20spokesman%20Capt.">attempted to approach</a> US flagged tankers. And a US Navy F-35C shot down a <a href="https://www.forbes.com/sites/petersuciu/2026/02/05/the-abraham-lincoln-carrier-strike-group-is-operating-near-iran/">Shahed-139 MALE UAV</a> in the Arabian Sea.</p>
<p>Amid growing tensions, <a href="../../01_Drafts/bloomberg.com/news/articles/2026-02-06/tankers-speed-through-hormuz-chokepoint-on-rising-iran-tensions#:~:text=Takeaways%20by%20Bloomberg%20AI,long%20and%20cumbersome%20to%20maneuver.">hurried</a> to leave the Persian Gulf. The US Department of Transportation Maritime Administration <a href="https://www.maritime.dot.gov/msci/2026-001-persian-gulf-strait-hormuz-and-gulf-oman-iranian-illegal-boarding-detention-seizure">issued guidelines</a> to US flagged commercial ships to keep distance from Iran’s territorial waters and reject Iranian forces permission to board ship.</p>
<p>It is apparent that Trump Administration does not want a prolonged war, rather a quick precise and decisive operation to facilitate regime change. The US Navy was expected to take the lead using carrier-based airpower and cruise-missile strikes from guided missile destroyers (DDGs) and nuclear guided missile attack submarines (SSGNs), followed by bombardment by US Air Force bombers flying from US mainland or from Diego Garcia.</p>
<p>But unlike the Venezuela operation, which was conducted in American backyard, Washington has limited territorial room available for military action against Tehran given limited territorial support by Gulf nations. Therefore, it is likely kinetic operations will be highly dependent on naval forces.</p>
<p>This makes complete sense. At sea, the US enjoys overwhelming technological superiority. The US Navy has an estimated <a href="https://www.youtube.com/watch?v=1xowraSeCkY">nine warships in the region</a>. Three Independence class Littoral Combat Ships (LCS) stationed in the Persian Gulf but of limited value as these vessels have little  offensive capability.</p>
<p>The Most prominent formation is the Carrier Battle Group led by the nuclear-powered aircraft carrier <a href="https://www.forbes.com/sites/petersuciu/2026/02/05/the-abraham-lincoln-carrier-strike-group-is-operating-near-iran/">USS Abraham Lincoln</a> (CVN-72), with embarked <a href="https://www.seaforces.org/usnair/CVW/Carrier-Air-Wing-9.htm">Carrier Air-Wing Nine</a> (CVW-9). CVW-9 boasts F-35C Lightening-II stealth fighters, F/A-18 E/F Super Hornets attack aircraft, E/A-18G “Growler” electronic warfare jets, E-2D “Hawkeye” Airborne Early Warning Aircraft and MH-60R Sea Hawk Anti-Submarine Warfare helicopters. The Lincoln is accompanied by three Aegis-equipped Arleigh Burke class DDGs &#8211; each armed with Tomahawk cruise missiles for offensive missions and an arsenal of air-defense missiles for multi-layer defense.</p>
<p>Two additional Arleigh Burke class DDGs are deployed in Strait of Hormuz. Besides surface combatants, an unknown number of Ohio class SSGNs –equipped with a formidable payload of <a href="https://www.csp.navy.mil/SUBPAC-Commands/Submarines/Guided-Missile-Submarines/">154 land attack Tomahawk cruise missiles</a> – are also patrolling in the area.</p>
<p>In theory, this naval armada is an instrument of coercion at sea, capable of projecting power against Iran and establishing local sea-control in the Arabian Sea. The employment of force through the maritime domain against various types of targets including: military targets like air-defense systems, nuclear enrichment facilities, and missile sites; high visibility targets like economic infrastructure; and high value targets like Iran’s political leadership itself, complicate Iran’s defensive measures as US Navy can launch from multiple vectors and over vast oceanic distances.</p>
<p>Any Iranian retaliation will mirror this logic. In a low-level response, Tehran has in the past attempted assertive signaling in the maritime domain, i.e., harassing merchant shipping and <a href="https://www.aljazeera.com/news/liveblog/2026/1/31/live-iran-announces-live-fire-naval-drills-near-us-warships-amid-tensions">conducting naval exercises</a> with Russian and Chinese partners.</p>
<p>A mid-level escalation includes counterstrikes on military assets of US and its allies in the Gulf. Facing an existential threat Iran is attempting maritime escalation, such as closing the Strait of Hormuz. Such a move represents a strategic gamble with global consequences and risks overwhelming US retaliation.</p>
<p>Iran, for its part, understands this asymmetry well. Iranian Navy, with obsolete surface and sub-surface fleet, stands no chance against US Navy in a traditional conflict. However, Iran has structured its naval strategy on sea denial rather than sea control. Iranian Revolutionary Guard Corps Navy (IRGC-N) operates hundreds of fast-attack crafts (FACs) equipped with missiles and rockets for saturated strikes against surface vessels. In addition, hundreds of coastal missiles and suicide drones have been dispersed and concealed along the Iranian coast.</p>
<p>Additionally, Iran has commissioned rudimentary specialized vessels, like <a href="https://en.wikipedia.org/wiki/IRIS_Shahid_Bagheri"><em>Shahid Bagheri</em></a>, <a href="https://en.wikipedia.org/wiki/IRIS_Shahid_Roudaki"><em>Shahid Roudaki</em></a> and <a href="https://en.wikipedia.org/wiki/IRIS_Shahid_Mahdavi"><em>Shahid Mahdavi</em></a>, which have the capability to launch swarms of drones and containerized missiles at floating targets. Together, these assets manifest Iran’s <a href="https://www.frstrategie.org/en/publications/notes/irgc-navy-s-long-term-strategy-asymmetrical-warfare-2024">asymmetrical warfare strategy</a> in the maritime domain through which it seeks to overcome US defenses through overwhelming numbers.</p>
<p>Geography facilitates Iran’s strategy. The Strait of Hormuz remains Tehran’s most potent political leverage. At its narrowest point between the Omani Musandam Peninsula and Iran, merely <a href="https://www.reuters.com/world/middle-east/what-is-strait-hormuz-why-is-it-so-important-oil-2026-01-23/">33 kms wide</a> with the shipping lane just 3 kms wide in either direction. Iran’s ability to block this channel using coastal missile batteries, FACs, naval mines, midget submarines, and unmanned systems provide its greatest capability to counter any major aggression.</p>
<p>The US understands this very well. Therefore, instead of venturing in close waters, the US Navy is likely to operate mostly outside the Persian Gulf while relying on Over-The-Horizon (OTH) precision strikes using distance as a buffer.</p>
<p>A blockade of Strait of Hormuz, by Iran will have immediate ramifications at the global scale. Oil tankers carry more than <a href="https://www.strausscenter.org/strait-of-hormuz-about-the-strait/">17 million barrels of oil</a> each day through this strait which accounts for approximately 20% of global net oil consumption.  Saudi Arabia and UAE have alterative pipelines operational which can transit about <a href="https://www.eia.gov/todayinenergy/detail.php?id=65504">2.6 million barrels per day</a>. However, compared to the net volume passing through Start of Hormuz, these pipelines can carry 15.29% at maximum capacity and cannot overcome the economic spillover of any disruption at the Strait of Hormuz.</p>
<p>Yet, for Iran this leverage of Strait of Hormuz is fragile and unsustainable in longer run. Israel’s comprehensive air-campaign against Iranian high value assets and subsequent <a href="https://www.bbc.com/news/articles/cvg9r4q99g4o">Operations Epic Fury and Midnight Hammer</a> have already exposed major capability voids in Iranian air-defense capability. The Iranian Air Force is obsolete, and its air-defense systems – including domestic as well as Russian and Chinese systems – are mediocre at best.</p>
<p>Against a well-coordinated multi-domain offense, Iran lacks a credible and workable retaliatory option at its disposal. Yes, a large stockpile of short-range ballistic missiles and drones pose a threat, but again, Israel’s precise targeting of Iran’s ballistic missile launchers during Iran-Israel conflict indicates that US can also undertake a similar campaign at a much greater scale employing far more robust options.</p>
<p>But the central question remains: what is Washington’s endgame with Iran? Can limited air strikes realistically cripple the Iranian political regime or permanently degrade its nuclear ambitions, or are they more likely to reinforce the regime’s ideological narrative and deepen Tehran’s perceived necessity for a nuclear deterrent? There are no clear answers.</p>
<p><em>Mr. Ahmad Ibrahim is research associate at Maritime Centre of Excellence (MCE), Pakistan Navy War College (PNWC), Lahore. His areas of research include Modern Warfare, Military Technology, Conflict Studies, and Nuclear Strategy. Views expressed in this article are the author’s own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/03/Carrier-Choke-Point-and-Coercion-The-Growing-Risk-of-Iran-US-Conflict.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-32091" src="http://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png" alt="" width="248" height="69" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button-300x83.png 300w" sizes="(max-width: 248px) 100vw, 248px" /></a></p>
<p><a href="https://globalsecurityreview.com/carrier-chokepoint-and-coercion-the-dynamics-of-iran-us-conflict/">CARRIER, CHOKEPOINT, AND COERCION: THE DYNAMICS OF IRAN-US CONFLICT</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/carrier-chokepoint-and-coercion-the-dynamics-of-iran-us-conflict/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Beyond a Pacific Defense Pact: Why the Indo-Pacific Requires a Nuclear Alliance</title>
		<link>https://globalsecurityreview.com/beyond-a-pacific-defense-pact-why-the-indo-pacific-requires-a-nuclear-alliance/</link>
					<comments>https://globalsecurityreview.com/beyond-a-pacific-defense-pact-why-the-indo-pacific-requires-a-nuclear-alliance/#respond</comments>
		
		<dc:creator><![CDATA[Natalie Treloar]]></dc:creator>
		<pubDate>Thu, 05 Mar 2026 12:53:51 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Deterrence & Foreign Policy]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[alliance cohesion]]></category>
		<category><![CDATA[AUKUS]]></category>
		<category><![CDATA[burden sharing]]></category>
		<category><![CDATA[catastrophic war]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[declaratory policy]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[escalation management]]></category>
		<category><![CDATA[extended deterrence]]></category>
		<category><![CDATA[grey-zone coercion]]></category>
		<category><![CDATA[Indo-Pacific]]></category>
		<category><![CDATA[large-scale conventional war]]></category>
		<category><![CDATA[military modernization]]></category>
		<category><![CDATA[multi-nuclear dynamics]]></category>
		<category><![CDATA[nuclear alliance]]></category>
		<category><![CDATA[nuclear attack]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[nuclear expansion]]></category>
		<category><![CDATA[nuclear sharing]]></category>
		<category><![CDATA[Pacific Defense Pact]]></category>
		<category><![CDATA[Quad]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[strategic competition]]></category>
		<category><![CDATA[strategic consultation]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32399</guid>

					<description><![CDATA[<p>Published: March 5, 2026 The Indo-Pacific is entering a far more dangerous strategic era. Military modernization, grey-zone coercion, and rapid nuclear expansion are reshaping the regional balance of power. Most notably, China is undertaking a historic expansion of its nuclear arsenal, investing in silo fields, road-mobile intercontinental ballistic missiles, ballistic missile submarines, and dual-capable systems. [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/beyond-a-pacific-defense-pact-why-the-indo-pacific-requires-a-nuclear-alliance/">Beyond a Pacific Defense Pact: Why the Indo-Pacific Requires a Nuclear Alliance</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong><em>Published: March 5, 2026</em></strong></p>
<p>The Indo-Pacific is entering a far more dangerous strategic era. Military modernization, grey-zone coercion, and rapid nuclear expansion are reshaping the regional balance of power. Most notably, China is undertaking a historic expansion of its <a href="https://media.defense.gov/2025/Dec/23/2003849070/-1/-1/1/ANNUAL-REPORT-TO-CONGRESS-MILITARY-AND-SECURITY-DEVELOPMENTS-INVOLVING-THE-PEOPLES-REPUBLIC-OF-CHINA-2025.PDF">nuclear arsenal</a>, investing in silo fields, road-mobile intercontinental ballistic missiles, ballistic missile submarines, and dual-capable systems. Simultaneously, Russia’s willingness to use nuclear threats in Europe demonstrates that nuclear coercion is once again central to great-power competition.</p>
<p>In Washington, proposals such as Ely Ratner’s <a href="https://www.foreignaffairs.com/china/case-pacific-defense-pact-ely-ratner">Pacific Defense Pact</a> reflect recognition that the current security architecture is insufficient. A more formalized collective defense structure in the Indo-Pacific is necessary.</p>
<p>However, this is not sufficient. A conventional Pacific Defense Pact does not fully address the most dangerous level of escalation to large-scale conventional war or nuclear attack. What the region now requires is a narrowly defined Indo-Pacific nuclear alliance.</p>
<p><strong>A Narrow, Explicit Purpose</strong></p>
<p>This would not be a sweeping defense pact covering every <a href="https://youtu.be/XfqFUjpOrLE?si=6preOnAgMDUbiKXW">maritime incident</a>, border clash, cyber intrusion, or grey-zone coercive act. It would have a clear and carefully delimited purpose. That is to deter large-scale conventional war or nuclear attack against member states.</p>
<p>Its clarity would be its strength. That clarity performs a second vital function. It minimizes the risk of entrapment by ensuring member states are <a href="https://www.reuters.com/world/china/australia-will-not-commit-troops-advance-any-conflict-minister-says-2025-07-13/">not dragged into escalation</a> over actions below the threshold of war. By explicitly excluding grey-zone coercion and limited crises from its nuclear remit, the alliance would reassure leaders that only truly existential threats trigger its highest-level commitments.</p>
<p>Participation becomes politically sustainable and strategically credible because it avoids automatic escalation over incremental provocations. The alliance would draw a line at catastrophic strategic aggression.</p>
<p><strong>The Historical Record: Why Nuclear Deterrence Matters</strong></p>
<p>The case for a nuclear alliance is not theoretical. It is grounded in historical experience. During the Cold War, nuclear parity between the United States and the Soviet Union prevented direct large-scale war and nuclear attack in Europe. Despite ideological confrontation and proxy conflicts, neither side attempted a conventional war or nuclear attack on the other’s core territories. Nuclear weapons <a href="https://nipp.org/wp-content/uploads/2023/07/OP-Vol.-3-No.-7.pdf">imposed restraint</a>. They deterred not just nuclear use, but overwhelming conventional assault.</p>
<p>Similarly, within NATO, the presence of U.S. nuclear guarantees has prevented full-scale Russian conventional attack on Alliance territory. Moscow has tested boundaries through</p>
<p>hybrid tactics and coercive signaling, but it has <a href="https://defence24.com/geopolitics/natos-nuclear-deterrence-against-russia-interview">not launched a large-scale attack on NATO</a> soil. Nuclear deterrence at the alliance level raised the costs to an unacceptable threshold.</p>
<p>The 1969 Sino-Soviet border conflict further illustrates how nuclear capability constrains escalation. The Soviet Union’s nuclear superiority allowed it to signal credible threats, while China’s emerging nuclear capability and mobilization signaled resolve. Mutual fear of escalation compelled negotiation, including intervention through <a href="https://nsarchive2.gwu.edu/NSAEBB/NSAEBB49/">U.S. triangular diplomacy</a>. Nuclear weapons shaped behaviors without being used.</p>
<p>The India–Pakistan experience is equally instructive. Prior to overt nuclearization, the two states fought multiple full-scale wars. Since their nuclear tests in 1998, crises have erupted, but they have remained limited. Missile strikes, cross-border skirmishes, and <a href="https://carnegieendowment.org/russia-eurasia/events/2026/01/nuclear-flashpoint-how-pakistan-and-india-manage-escalation">periods of great tension</a> have not escalated into all-out conventional war or nuclear attack. Nuclear deterrence imposed a ceiling on the conflicts.</p>
<p>Contrast this with the Russia–Ukraine war. Ukraine <a href="https://www.youtube.com/watch?v=bffQqrPYe8A">relinquished its nuclear arsenal</a> in the 1990s and now confronts a nuclear-armed Russia without possessing its own nuclear deterrent. The result has been a prolonged and costly conventional war of attrition. The absence of mutual nuclear deterrence has made sustained large-scale conventional war possible. By comparison, Russia has not launched a direct assault on NATO territory precisely because nuclear deterrence underwrites NATO’s collective defense.</p>
<p>The pattern is clear. Where credible nuclear deterrence exists between adversaries, large-scale conventional war and nuclear attack is sharply constrained or avoided. Where it does not, prolonged and devastating large-scale conventional war and nuclear attack becomes more likely.</p>
<p><strong>The Indo-Pacific Strategic Gap</strong></p>
<p>The Indo-Pacific currently relies on a <a href="https://www.csis.org/analysis/harnessing-progress-strengthening-indo-pacific-through-alliances-and-partnerships">patchwork of bilateral extended deterrence arrangements</a> centered primarily on Washington. These remain essential, but they are increasingly strained or at risk of being fractured by China.</p>
<p>China’s expanding nuclear arsenal complicates escalation management. A larger and more survivable force reduces the credibility of assumptions that escalation will remain controlled or asymmetrical. Meanwhile, the region contains multiple flashpoints, including Taiwan, the South China Sea, the Korean Peninsula, and the India–China border where conventional conflict could rapidly climb the escalation ladder.</p>
<p>Frameworks like AUKUS and the Quad strengthen capabilities and coordination, while the proposed Pacific Defense Pact aims to guarantee that the U.S. and its allies can act in concert during crises or conflicts. But they are <a href="https://www.internationalaffairs.org.au/australianoutlook/what-is-the-future-of-strategic-minilateralism-in-the-indo-pacific-the-quad-aukus-and-the-us-japan-australia-trilateral/">not structured as nuclear deterrence mechanisms</a>. They do not institutionalize shared nuclear declaratory policy, crisis consultation at the strategic level, or joint planning for high-end escalation management. A nuclear alliance would fill that gap.</p>
<p><strong>Beyond a Pacific Defense Pact</strong></p>
<p>A Pacific Defense Pact, as envisioned in conventional terms, strengthens interoperability and signals unity. But without an explicit nuclear dimension, it leaves ambiguity at the highest rung of escalation. That ambiguity can invite miscalculation.</p>
<p>A nuclear alliance would not broaden commitments; it would sharpen them. It would: (1) establish shared declaratory policy on deterrence of large-scale war and nuclear attack, (2) institutionalize strategic consultation mechanisms during crises, (3) coordinate planning to ensure credible escalation management, and (4) reinforce extended deterrence while discouraging independent nuclear proliferation.</p>
<p>Importantly, such an alliance need not require additional states to acquire nuclear weapons. Like NATO, it could rely on extended deterrence commitments and nuclear-sharing with structured burden-sharing and planning arrangements. Nuclear forces may remain nationally controlled, but alliance cohesion amplifies deterrent credibility.<strong> </strong></p>
<p><strong>Clarity as Stability</strong></p>
<p>The objective is not confrontation. It is clarity. By defining a narrow and explicit threshold—large-scale conventional war or nuclear attack—the alliance reduces the risk of catastrophic miscalculation. It signals to potential aggressors that existential aggression will trigger unified strategic consequences.</p>
<p>Simultaneously, it reassures members that lower-level competition will not automatically escalate to nuclear commitments. This dual clarity strengthens deterrence at the top end and stabilizes politics at the lower end.</p>
<p><strong>A Necessary Evolution</strong></p>
<p>The Indo-Pacific is now the central arena of 21st-century strategic competition. Nuclear modernization is accelerating. Multi-nuclear dynamics are emerging. Escalation timelines are compressing.</p>
<p>History shows that nuclear weapons, and when embedded within credible alliance structures, deter catastrophic war. They prevent large-scale conventional war and nuclear attacks not because they are desirable tools of war, but because they impose unacceptable costs on those who contemplate it.</p>
<p>A Pacific Defense Pact is a step forward, but in the current strategic environment, it is not enough. To deter large-scale conventional war and nuclear attack in the Indo-Pacific, the region must move beyond a Pacific Defense Pact. It must build a nuclear alliance.</p>
<p><em>Natalie Treloar is the Australian Company Director of Alpha-India Consultancy, a Senior Fellow at the Indo-Pacific Studies Center (IPSC), a Senior Analyst at the National Institute for Deterrence Studies (NIDS), and a member of the Open Nuclear Network. Views expressed in this article are the author’s own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/03/Beyond-a-Pacific-Defense-Pact-Why-the-Indo-Pacific-Requires-a-Nuclear-Alliance.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-32091" src="http://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png" alt="" width="238" height="66" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button-300x83.png 300w" sizes="(max-width: 238px) 100vw, 238px" /></a></p>
<p><a href="https://globalsecurityreview.com/beyond-a-pacific-defense-pact-why-the-indo-pacific-requires-a-nuclear-alliance/">Beyond a Pacific Defense Pact: Why the Indo-Pacific Requires a Nuclear Alliance</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/beyond-a-pacific-defense-pact-why-the-indo-pacific-requires-a-nuclear-alliance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Learning to Love the Atom Again: Why the Future of Artificial Intelligence is Nuclear</title>
		<link>https://globalsecurityreview.com/learning-to-love-the-atom-again-why-the-future-of-artificial-intelligence-is-nuclear/</link>
					<comments>https://globalsecurityreview.com/learning-to-love-the-atom-again-why-the-future-of-artificial-intelligence-is-nuclear/#comments</comments>
		
		<dc:creator><![CDATA[Michael Ferguson]]></dc:creator>
		<pubDate>Mon, 23 Feb 2026 13:13:59 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Deterrence & Foreign Policy]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI data facilities]]></category>
		<category><![CDATA[AI race]]></category>
		<category><![CDATA[AI strategy]]></category>
		<category><![CDATA[American optimism]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Atom]]></category>
		<category><![CDATA[Atoms for Peace]]></category>
		<category><![CDATA[atoms for war]]></category>
		<category><![CDATA[cold war]]></category>
		<category><![CDATA[Dwight Eisenhower]]></category>
		<category><![CDATA[energy consumption]]></category>
		<category><![CDATA[energy costs]]></category>
		<category><![CDATA[energy demands]]></category>
		<category><![CDATA[energy generation]]></category>
		<category><![CDATA[energy requirements]]></category>
		<category><![CDATA[nuclear energy]]></category>
		<category><![CDATA[nuclear renaissance]]></category>
		<category><![CDATA[nuclear sector]]></category>
		<category><![CDATA[nuclear strategy]]></category>
		<category><![CDATA[nuclear waste disposal]]></category>
		<category><![CDATA[power grid]]></category>
		<category><![CDATA[pressurized water reactors]]></category>
		<category><![CDATA[small modular reactors]]></category>
		<category><![CDATA[SMRs]]></category>
		<category><![CDATA[sustainable solutions]]></category>
		<category><![CDATA[U.S. citizenship]]></category>
		<category><![CDATA[Yucca Mountain]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32341</guid>

					<description><![CDATA[<p>Published: February 23, 2026 In his speech before the United Nations General Assembly on 8 December 1953, President Dwight Eisenhower proposed &#8211; in paraphrased terms- that the atom bomb be given to those who can “strip its military casing and adapt it to the arts of peace.” Commonly referred to as the ‘Atoms for Peace’ [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/learning-to-love-the-atom-again-why-the-future-of-artificial-intelligence-is-nuclear/">Learning to Love the Atom Again: Why the Future of Artificial Intelligence is Nuclear</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Published: February 23, 2026</p>
<p>In his <a href="https://www.congress.gov/crs-product/R42853">speech</a> before the United Nations General Assembly on 8 December 1953, President Dwight Eisenhower <a href="https://tnsr.org/2025/03/ghost-in-the-machine-coming-to-terms-with-the-human-core-of-unmanned-war/">proposed</a> &#8211; in paraphrased terms- that the atom bomb be given to those who can “strip its military casing and adapt it to the arts of peace.” Commonly referred to as the ‘Atoms for Peace’ speech, Eisenhower’s words launched an International Atomic Energy Agency and a generation of research into nuclear energy. Since the Cold War’s end, America’s relationship with nuclear power has attracted less attention, but the artificial intelligence (AI) revolution is forcing the United States to take a “new look” at its power grid.</p>
<p>Throughout 2025, <a href="https://www.msn.com/en-us/news/technology/ai-s-ballooning-energy-consumption-puts-spotlight-on-data-center-efficiency/ar-AA1LPdmS">senators</a>, <a href="https://www.rand.org/pubs/commentary/2025/04/beyond-a-manhattan-project-for-artificial-general-intelligence.html">think tanks</a>, and federal <a href="https://www.whitehouse.gov/presidential-actions/2025/12/eliminating-state-law-obstruction-of-national-artificial-intelligence-policy/">commissions</a> likened the pursuit of better AI to the Manhattan Project that built the bomb. The vast sums of energy required to fuel such a task, however, may need its own project. Although President Donald Trump issued an <a href="https://www.eisenhowerlibrary.gov/sites/default/files/file/atoms_Binder13.pdf">executive order</a> to reinvigorate the nuclear industrial base last May, these energy demands have been overshadowed by mounting <a href="https://www.ft.com/content/9b3d179e-129c-4aa1-a5c0-1cc1703b0234">fascination</a> with the need to <a href="https://www.detroitnews.com/story/news/politics/2025/09/05/elissa-slotkin-calls-manhattan-project-like-effort-win-ai-tech-race-with-china-trump/85992522007/">win</a> a technology <a href="https://www.reuters.com/technology/artificial-intelligence/us-government-commission-pushes-manhattan-project-style-ai-initiative-2024-11-19/">race</a> with China. Considering U.S. public opinion toward atomic energy reached a near <a href="https://news.gallup.com/poll/659180/nuclear-energy-support-near-record-high.aspx">record</a> high last year, there is no better time to expand the atom’s role in support of a coherent AI <a href="https://www.whitehouse.gov/presidential-actions/2025/05/reinvigorating-the-nuclear-industrial-base/">strategy</a>.</p>
<p><strong>The Dawn of a Nuclear Renaissance</strong></p>
<p>During the early Cold War, nuclear technology drove a revolution in energy <em>generation</em>, powering everything from American cities to aircraft carriers. The <a href="https://www.eisenhowerlibrary.gov/research/online-documents/atoms-peace?msockid=2e169c8684cb6777181b8a9a85d06652">skyrocketing</a> number of AI data facilities in the United States, on the other hand, represents a potential crisis in energy <em>consumption</em>. When asked if the country can support the growing demands of its data centers, former President of Energy at Microsoft Brian Janous <a href="https://www.goldmansachs.com/insights/top-of-mind/gen-ai-too-much-spend-too-little-benefit">responded</a>: “No. Utilities have not experienced a period of load growth in almost two decades and are not prepared for—or even capable of matching—the speed at which AI technology is developing.” The White House is <a href="https://www.whitehouse.gov/presidential-actions/2025/12/eliminating-state-law-obstruction-of-national-artificial-intelligence-policy/">exploring</a> nuclear options to meet this challenge, yet its AI strategy released last July only <a href="https://www.whitehouse.gov/wp-content/uploads/2025/07/Americas-AI-Action-Plan.pdf">mentions</a> nuclear power briefly on page sixteen. This point deserves more attention.</p>
<p>America’s 94 reactors currently <a href="https://defensescoop.com/2025/09/10/gen-caine-joint-chiefs-chairman-ai-global-risk-algorithm-measure-threats/?id=65104">supply</a> twenty percent of its energy with 97 gigawatts (GW), and the largest of them—located in Georgia—has a generating capacity of 4.5 GW. A recent Goldman Sachs <a href="https://news.gallup.com/poll/659180/nuclear-energy-support-near-record-high.aspx">report</a> projected that the United States needs 47 GW of additional energy to power its AI centers through 2030—the equivalent of half the country’s nuclear capacity. Meta CEO Mark Zuckerberg has taken notice. In January, he secured a series of nuclear energy <a href="https://www.usnews.com/news/best-states/ohio/articles/2026-01-09/meta-signs-three-nuclear-power-deals-to-help-support-its-ai-data-centers">deals</a> to power his 6.6 GW AI compound under development in Ohio. Companies that did not exist twenty years ago, such as Meta and OpenAI, could soon demand more than ten percent of the nation’s power grid, and the needs are only increasing.</p>
<p>Professor Joohyun Moon of Dankook University <a href="https://www.whitehouse.gov/wp-content/uploads/2025/07/Americas-AI-Action-Plan.pdf">suggested</a> recently that small modular reactors (SMRs)—automobile-sized nuclear batteries—could offer energy solutions for national security purposes in forward areas, such as the Indo-Pacific. Although the United States <a href="https://www.cnbc.com/2025/12/31/ai-data-centers-debt-sam-altman-elon-musk-mark-zuckerberg.html">approved</a> its first SMR design in 2022, it will not be operational until 2029, and only three SMRs are currently <a href="https://media.defense.gov/2026/Jan/12/2003855671/-1/-1/0/ARTIFICIAL-INTELLIGENCE-STRATEGY-FOR-THE-DEPARTMENT-OF-WAR.PDF?details=true">active</a> in Japan, China, and Russia. Some studies cast <a href="https://www.csis.org/analysis/pitting-nuclear-modernization-against-powering-ai-trumps-plans-us-plutonium-stockpile">doubt</a> on the affordability of SMRs and question whether they would increase the risk of proliferation given the enriched uranium they need to operate. Moreover, these reactors only generate up to 300 megawatts, so while they could be useful in certain military contingencies, their output pales in comparison to the forecasted energy demands of AI.</p>
<p>Microsoft alone <a href="https://www.expressnews.com/hill-country/article/data-centers-medina-county-microsoft-rowan-water-20239617.php">plans</a> to build at least six data centers in Texas, each of which might consume enough energy to power more than 100,000 homes. Once Meta completes its Ohio facilities, it will have at its disposal energy reserves capable of <a href="https://nationalinterest.org/blog/energy-world/why-big-tech-and-the-pentagon-both-need-micro-nuclear-reactors">powering</a> roughly five million homes. Data centers in the United States could therefore devour nearly <a href="https://www.energy.gov/ne/articles/nrc-certifies-first-us-small-modular-reactor-design">one quarter</a> of the energy used by all American households before 2030. Without tighter integration between a national AI strategy and America’s nuclear sector, these numbers appear <a href="https://www.goldmansachs.com/insights/top-of-mind/gen-ai-too-much-spend-too-little-benefit?ocid=BingNewsSerp">unsustainable</a>.</p>
<p><strong>Reversing the Ship</strong></p>
<p>Going all in on nuclear energy also requires sustainable solutions to disposing of spent nuclear fuel and investing in high-capacity pressurized water reactors, but such solutions have not been forthcoming. President Barack Obama’s administration <a href="https://www.usnews.com/news/best-states/ohio/articles/2026-01-09/meta-signs-three-nuclear-power-deals-to-help-support-its-ai-data-centers">slashed</a> funding for Nevada’s Yucca Mountain disposal facility in 2009 and suspended development of a nuclear waste repository there. Despite the first Trump administration’s requests to fund the disposal program between 2018 and 2020, Congress has yet to <a href="https://www.eia.gov/todayinenergy/detail.php">approve</a> a plan. Any rapid increase in nuclear energy must be accompanied by a commensurate spike in disposal capacity.</p>
<p>In addition to these concerns, the United States <a href="https://www.oecd-nea.org/jcms/pl_90816/the-nea-small-modular-reactor-dashboard-second-edition">closed</a> thirteen reactors between 2013 and 2022, which has encouraged the current administration to reverse course. Last year, the Department of Energy <a href="https://www.globsec.org/what-we-do/commentaries/faster-cheaper-smarter-promise-and-pitfalls-small-modular-reactors">pledged</a> to <a href="https://www.energy.gov/articles/fact-sheet-energy-department-delivering-accelerating-deployment-nuclear-power">quadruple</a> America’s nuclear output from 100 GW to 400 GW by 2050. President Trump also issued an <a href="https://www.npr.org/2009/03/11/101689489/obama-cuts-funds-to-nuclear-waste-repository">executive order</a> to unburden AI companies of federal regulations and requested that they <a href="https://www.technologyreview.com/2025/09/09/1123408/three-big-things-we-still-dont-know-about-ais-energy-burden/">shoulder</a> the burden of energy costs. The next step is to fuse these developments with a theory of success that explains what “winning” the AI race looks like and then align that vision with the energy requirements needed to support it—much of which will be nuclear.</p>
<p><strong>The Long Shadow of 1945</strong></p>
<p>In her <a href="https://www.congress.gov/crs-product/R42853#bookTabs=1">historical account</a> of U.S. citizenship during the early atomic age, Sarah Robey explains how “American culture has never truly partitioned the difference between ‘atoms for peace’ and ‘atoms for war.’” Over the last eighty years, these blurred lines generated both hyperbolic and apathetic responses to the nation’s relationship with nuclear power. The atom became equal parts provider and destroyer, but these conversations disappeared once public fears of a Cold War going hot subsided. With American <a href="https://world-nuclear.org/information-library/country-profiles/countries-t-z/usa-nuclear-power">optimism</a> toward nuclear energy now sitting at 61 percent, there is no better time to reignite the discussion about the atom’s role in American society.</p>
<p>Despite the Trump administrations’ efforts to break ground on new nuclear plants over the last ten years, AI theory has outpaced the long-term realities of AI application, especially regarding the energy equation. Advancing AI research will force western societies to embrace the atom for the purpose of sustaining life rather than destroying it much as Eisenhower theorized in 1953. Accepting this reality by establishing deeper connections between energy generation and AI strategy is the first step toward finding sustainable solutions to AI’s role in war and peace.</p>
<p><em>MAJ Michael P. Ferguson, U.S. Army, is an instructor in the Department of History and War Studies at the United States Military Academy and a Ph.D. student at the University of North Carolina at Chapel Hill. Specializing in early Cold War history and nuclear strategy, he has published several dozen articles and columns on a wide range of topics. His latest research appeared in the </em><a href="https://brill.com/view/journals/ijmh/aop/article-10.1163-24683302-bja10104/article-10.1163-24683302-bja10104.xml">International Journal of Military History and Historiography</a><em> and </em><a href="https://www.cornellpress.cornell.edu/book/9781501762093/atomic-americans/">Texas National Security Review</a><em>. The views expressed here are those of the author and do not reflect the policies or position of the U.S. Army, the U.S. Department of War, or the U.S. Government.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/03/Learning-to-Love-the-Atom-Again-Why-the-Future-of-Artificial-Intelligence-is-Nuclear.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-32091" src="http://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png" alt="" width="198" height="55" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button-300x83.png 300w" sizes="(max-width: 198px) 100vw, 198px" /></a></p>
<p><a href="https://globalsecurityreview.com/learning-to-love-the-atom-again-why-the-future-of-artificial-intelligence-is-nuclear/">Learning to Love the Atom Again: Why the Future of Artificial Intelligence is Nuclear</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/learning-to-love-the-atom-again-why-the-future-of-artificial-intelligence-is-nuclear/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>An Identity Crisis in Europe’s Russian Frontier</title>
		<link>https://globalsecurityreview.com/an-identity-crisis-in-europes-russian-frontier/</link>
					<comments>https://globalsecurityreview.com/an-identity-crisis-in-europes-russian-frontier/#respond</comments>
		
		<dc:creator><![CDATA[Chris Sproesser]]></dc:creator>
		<pubDate>Thu, 19 Feb 2026 13:14:00 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Baltic Defense Line]]></category>
		<category><![CDATA[Baltic Sea]]></category>
		<category><![CDATA[border violations]]></category>
		<category><![CDATA[Bronze Night]]></category>
		<category><![CDATA[Bronze Soldier]]></category>
		<category><![CDATA[Chris Sproesser]]></category>
		<category><![CDATA[cultural divide]]></category>
		<category><![CDATA[economics]]></category>
		<category><![CDATA[Estonia]]></category>
		<category><![CDATA[Great Patriotic War]]></category>
		<category><![CDATA[Heritage]]></category>
		<category><![CDATA[identity crisis]]></category>
		<category><![CDATA[internet cables]]></category>
		<category><![CDATA[Iron Curtain]]></category>
		<category><![CDATA[Ivangorod]]></category>
		<category><![CDATA[Kremlin]]></category>
		<category><![CDATA[marginalization]]></category>
		<category><![CDATA[McCausland College of Arts and Sciences]]></category>
		<category><![CDATA[Narva]]></category>
		<category><![CDATA[Narva Castle]]></category>
		<category><![CDATA[Narva River]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Putin]]></category>
		<category><![CDATA[reconciliation]]></category>
		<category><![CDATA[refugees]]></category>
		<category><![CDATA[Riigikogu]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Russian minority]]></category>
		<category><![CDATA[Russian studies]]></category>
		<category><![CDATA[Russian-language schools]]></category>
		<category><![CDATA[social cohesion]]></category>
		<category><![CDATA[sovereignty]]></category>
		<category><![CDATA[Soviet monuments]]></category>
		<category><![CDATA[Soviet occupation]]></category>
		<category><![CDATA[stability]]></category>
		<category><![CDATA[T-34 tank]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[Ulysses S. Grant]]></category>
		<category><![CDATA[University of South Carolina]]></category>
		<category><![CDATA[Victory Day]]></category>
		<category><![CDATA[Yale Review of International Studies.]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32323</guid>

					<description><![CDATA[<p>A cultural feud over the legacy of the American Civil War has raged in the United States for over 150 years, pitting sympathizers of the Lost Cause against their opponents over historical monuments and symbols. A similar but lesser-known war over a different chapter in history has been raging in the city of Narva, in [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/an-identity-crisis-in-europes-russian-frontier/">An Identity Crisis in Europe’s Russian Frontier</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A cultural feud over the legacy of the American Civil War has raged in the United States for over 150 years, pitting sympathizers of the Lost Cause against their opponents over historical monuments and symbols. A similar but lesser-known war over a different chapter in history has been raging in the city of Narva, in the tiny Baltic nation of Estonia. Like the controversy over Confederate monuments in Richmond, Virginia, Estonia has been grappling with its Russian minority over how to handle monuments installed under the grip of the Iron Curtain.</p>
<p>The Narva River separates Narva from the Russian city of Ivangorod, where a historic Swedish castle faces a Russian fortress built by Ivan III in 1492. Walking through the streets of Narva, one might easily believe they were in Russia, were it not for the Estonian street signs breaking the facade. Here, many Russian residents from the Soviet era, known as “grey passport” holders, still live <a href="https://news.err.ee/1609656446/what-do-gray-passport-holders-russian-citizens-think-about-voting-rights-bans">without</a> Estonian citizenship. Efforts to remove Soviet monuments have fueled anger amongst the local population in what remains an overwhelmingly Russian-speaking area.</p>
<p>Many in the Riigikogu (Estonia’s parliamentary body) view efforts to remove monuments across the country as a way of moving on from painful symbols of oppression. Tens of thousands of Estonians were imprisoned or <a href="https://uca.edu/politicalscience/home/research-projects/dadm-project/europerussiacentral-asia-region/soviet-unionestonia-1940-1991/">deported</a> to Siberia during the Soviet occupation, many of whom died in captivity. Many community members of Russian descent consider this to be an unnecessary cleansing of history, especially concerning monuments dedicated to Soviet soldiers killed in the “Great Patriotic War” of WWII.</p>
<p>A Soviet T-34 tank that stood in honor of fallen Soviet casualties was controversially removed in August of 2022. The monument, which stood against the banks of the Narva River, was left covered in flowers by residents and eventually <a href="https://news.err.ee/1608685888/estonian-government-relocates-narva-tank-monument">relocated</a> to the Estonian War Museum. I was in Narva during the months leading up to the removal of the tank and heard the Russian perspective firsthand from the people I lived with. This, however, was not the first-time parts of Estonia had struggled with identity issues.</p>
<p>Riots swept through the capital city of Tallinn in 2007 over the relocation of a Soviet monument known as the Bronze Soldier. Now known as <a href="https://www.nytimes.com/2007/04/27/world/europe/27iht-estonia.4.5477141.html">Bronze Night</a>, the unrest led to over 100 injuries and the deadly stabbing of an ethnic Russian, as well as Russian <a href="https://www.nytimes.com/2007/05/29/technology/29estonia.html">cyberattacks</a> that brought Estonian government, banking, and news sites offline.</p>
<p>Events like these placed Estonia directly in the Kremlin&#8217;s sights, where it has remained ever since. While I was living in Narva in the summer of 2022, Putin <a href="https://www.chathamhouse.org/publications/the-world-today/2025-06/narva-next-putins-sights">remarked</a> that Narva, Estonia’s third-largest city, was historically Russian and “would need to be ‘taken back’.” These comments drew immediate ire from many politicians, but more importantly, they preceded a series of provocations by the Kremlin against Estonian sovereignty that intensified through 2025.</p>
<p>On an early morning in May 2024, nearly half of Russia’s buoys marking the border in the Narva River <a href="https://www.bbc.com/news/articles/c899844ypj2o">disappeared</a> after their unexpected removal by Russian border guards. Estonian officials and media interpreted this as a threat against their statehood. This incident led to an increase in <a href="https://news.err.ee/1609471447/removal-by-russia-of-narva-river-buoys-leads-to-surge-in-border-violations">accidental border crossings</a> by fishermen in the Narva River, particularly in sections where buoys had been removed. Later, on December 17th, 2025, Russian border guards themselves <a href="https://www.independent.co.uk/news/world/europe/russia-estonia-border-guards-nato-b2887037.html">crossed</a> the border near Narva, perhaps accidentally. Moreover, Russian aircraft breached Estonian airspace for 12 minutes in September 2025, prompting NATO to quickly <a href="https://www.cnn.com/2025/09/19/europe/estonia-airspace-russia-jets-latam-intl">scramble aircraft</a> in response. This was consistent with the common Russian tactic of testing NATO’s response times and military capabilities while also making a strong statement toward their adversaries. Earlier in the same month, Estonia’s Baltic neighbor, Latvia, reported that a Russian military drone had <a href="https://www.themoscowtimes.com/2024/09/08/latvia-reports-russian-drone-crash-on-nato-territory-a86301">crash-landed</a> in Latvian territory.</p>
<p>If a pattern of recurrent airspace violations is not enough, Russia has adopted a new tactic of unorthodox warfare by using shipping vessels to cut internet cables in the Baltic Sea. These incidents <a href="https://nypost.com/2024/12/30/world-news/natos-estonia-deploys-warship-to-baltic-sea-after-russia-allegedly-cut-another-undersea-cable/">made headlines</a> around the world and have continued to plague EU and NATO officials to this day. As recently as December 31st, 2025, a vessel was <a href="https://www.nytimes.com/2025/12/31/world/europe/underwater-cable-damaged-sabotage-finland-estonia.html">seized</a> by the Finnish Border Guard after dragging its anchor across the Baltic seafloor, cutting a cable between Helsinki and Tallinn.</p>
<p>It is unsurprising that Putin has held a special grudge against Estonia, considering the nation’s unwavering support for Ukraine after Russia’s 2022 invasion. Adjusted for GDP, Estonia has been among the most dedicated providers of <a href="https://news.err.ee/1609396207/estonia-contributes-three-times-more-than-agreed-in-nato-to-support-ukraine">military aid</a> to Ukraine. The country has also handled many refugees, some of whom, by my own experience, include military-aged males fleeing the war. These refugees have been somewhat successfully encouraged to <a href="https://news.postimees.ee/8223061/survey-refugees-from-ukraine-showing-progress-in-integration-in-estonia">assimilate</a> into host communities and learn the Estonian language.</p>
<p>After multiple tumultuous years in a row, Narva highlights the contrast in opinion between ethnic Estonians and many of their fellow ethnic Russian citizens. On the banks of the Narva River, the celebrations of Victory Day on May 9th set the stage for one of the more bizarre scenes of 2025. A Russian holiday celebrating the defeat of Nazi Germany in 1945 <a href="https://novayagazeta.eu/articles/2025/05/10/duelling-on-the-narva-en">drew crowds</a> on both sides of the river for the third straight year.</p>
<p>Supportive cheers erupted from many in Narva’s crowd during the celebrations in Ivangorod across the river, despite a massive banner protesting Putin hanging in the background on the walls of Narva Castle. Estonia may not support Putin, but feelings of identity in this Russian-speaking city are undeniably complicated. Just months after Narva residents gathered on the riverbank to celebrate with their neighbors across the border, Estonia began work on concrete <a href="https://www.defensenews.com/global/europe/2025/12/12/estonia-erects-first-of-600-strong-baltic-bunker-wall-on-russia-border/">defensive bunkers</a> near the Russian border in December 2025, as part of the planned Baltic Defense Line to prepare for armed conflict.</p>
<p>Given Estonia’s cultural divide, which benefits Kremlin propaganda, it is vital the EU and Tallinn prevent Russian claims of marginalization from gaining credibility. Policies phasing out Russian-language schools have strained relations in Narva, but Estonia’s efforts to protect its heritage are legitimate. To enhance social cohesion and ensure security and human rights, Estonia should invest in inclusive initiatives that value Russian communities, recognizing that descendants of Soviet-era immigrants are not responsible for Estonia&#8217;s colonization.</p>
<p>After the American Civil War, Ulysses S. Grant took steps to address past wrongs but recognized that former Confederate states must rejoin American democracy for lasting peace. Estonia has made significant efforts to redress past injustices by gaining independence. The new generation of Russians must assimilate, but more initiatives are needed. The Kremlin has used the situation to foster a narrative of marginalization, resonating with frustrated Russian Estonians. The government must reconcile with young Russian speakers to ensure peace, sovereignty, and stability for Estonia.</p>
<p><em>Chris Sproesser is a student at the University of South Carolina’s McCausland College of Arts and Sciences, focusing on economics and Russian studies. He has previously been published by The Yale Review of International Studies. The views expressed in this article are the author’s own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/02/An-Identity-Crisis-in-Europes-Russian-Frontier.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-32091" src="http://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png" alt="" width="220" height="61" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button-300x83.png 300w" sizes="(max-width: 220px) 100vw, 220px" /></a></p>
<p><a href="https://globalsecurityreview.com/an-identity-crisis-in-europes-russian-frontier/">An Identity Crisis in Europe’s Russian Frontier</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/an-identity-crisis-in-europes-russian-frontier/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Role of Counterintelligence in Protecting Economic and Corporate Interests</title>
		<link>https://globalsecurityreview.com/the-role-of-counterintelligence-in-protecting-economic-and-corporate-interests/</link>
					<comments>https://globalsecurityreview.com/the-role-of-counterintelligence-in-protecting-economic-and-corporate-interests/#respond</comments>
		
		<dc:creator><![CDATA[Joshua Thibert]]></dc:creator>
		<pubDate>Mon, 22 Dec 2025 13:32:28 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[actionable warnings]]></category>
		<category><![CDATA[advanced computing]]></category>
		<category><![CDATA[advanced malware]]></category>
		<category><![CDATA[aerospace]]></category>
		<category><![CDATA[anomalous network activity]]></category>
		<category><![CDATA[behavioral indicators]]></category>
		<category><![CDATA[blackmail]]></category>
		<category><![CDATA[bureaucratic processes]]></category>
		<category><![CDATA[business strategies]]></category>
		<category><![CDATA[clarified legal authorities]]></category>
		<category><![CDATA[classified information handling]]></category>
		<category><![CDATA[commercial espionage consequences]]></category>
		<category><![CDATA[competitiveness]]></category>
		<category><![CDATA[compromised hardware]]></category>
		<category><![CDATA[compromised software]]></category>
		<category><![CDATA[corporate espionage]]></category>
		<category><![CDATA[counterintelligence]]></category>
		<category><![CDATA[covert collection]]></category>
		<category><![CDATA[cyber techniques]]></category>
		<category><![CDATA[cyber-enabled espionage]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[deterrence and detection]]></category>
		<category><![CDATA[early intervention]]></category>
		<category><![CDATA[economic espionage]]></category>
		<category><![CDATA[energy sector]]></category>
		<category><![CDATA[ethical constraints]]></category>
		<category><![CDATA[financial incentives]]></category>
		<category><![CDATA[foreign connections]]></category>
		<category><![CDATA[foreign intelligence services]]></category>
		<category><![CDATA[global power dynamics]]></category>
		<category><![CDATA[global visibility]]></category>
		<category><![CDATA[government authorities]]></category>
		<category><![CDATA[human intelligence (HUMINT)]]></category>
		<category><![CDATA[ideological persuasion]]></category>
		<category><![CDATA[innovation base]]></category>
		<category><![CDATA[insider recruitment]]></category>
		<category><![CDATA[insider risk]]></category>
		<category><![CDATA[insider threat]]></category>
		<category><![CDATA[intellectual property (IP)]]></category>
		<category><![CDATA[intelligence-sharing portals]]></category>
		<category><![CDATA[investor confidence]]></category>
		<category><![CDATA[joint task forces]]></category>
		<category><![CDATA[key industries]]></category>
		<category><![CDATA[legal constraints]]></category>
		<category><![CDATA[legal liability]]></category>
		<category><![CDATA[long-term economic prosperity]]></category>
		<category><![CDATA[manufacturing compromise]]></category>
		<category><![CDATA[national economic security]]></category>
		<category><![CDATA[personal stress indicators]]></category>
		<category><![CDATA[pharmaceuticals]]></category>
		<category><![CDATA[physical infiltration]]></category>
		<category><![CDATA[privacy protections]]></category>
		<category><![CDATA[private sector vulnerability]]></category>
		<category><![CDATA[public–private partnership]]></category>
		<category><![CDATA[reputational harm]]></category>
		<category><![CDATA[research and development (R&D)]]></category>
		<category><![CDATA[resilient collaboration]]></category>
		<category><![CDATA[risk-based approach]]></category>
		<category><![CDATA[spear-phishing]]></category>
		<category><![CDATA[state-sponsored actors]]></category>
		<category><![CDATA[statecraft]]></category>
		<category><![CDATA[strategic advantage]]></category>
		<category><![CDATA[streamlined information-sharing mechanisms]]></category>
		<category><![CDATA[supply chain infiltration]]></category>
		<category><![CDATA[supply-chain attacks]]></category>
		<category><![CDATA[technological proliferation]]></category>
		<category><![CDATA[technological superiority]]></category>
		<category><![CDATA[threat intelligence sharing]]></category>
		<category><![CDATA[trade secrets]]></category>
		<category><![CDATA[unexplained affluence]]></category>
		<category><![CDATA[unified national strategy]]></category>
		<category><![CDATA[unusual data downloads]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32022</guid>

					<description><![CDATA[<p>The traditional purview of counterintelligence has long been associated with protecting state secrets and military capabilities from foreign adversaries. While this function remains paramount, a profound shift in global power dynamics and technological proliferation has expanded the scope of counterintelligence to include the protection of a nation&#8217;s economic and corporate interests. The rise of economic [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-role-of-counterintelligence-in-protecting-economic-and-corporate-interests/">The Role of Counterintelligence in Protecting Economic and Corporate Interests</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The traditional purview of counterintelligence has long been associated with protecting state secrets and military capabilities from foreign adversaries. While this function remains paramount, a profound shift in global power dynamics and technological proliferation has expanded the scope of counterintelligence to include the protection of a nation&#8217;s economic and corporate interests. The rise of <a href="https://www.govinfo.gov/content/pkg/USCODE-2011-title18/html/USCODE-2011-title18-partI-chap90.htm">economic espionage</a> as a primary instrument of statecraft has made corporate intellectual property and trade secrets as valuable, if not more so, than classified government documents. The challenge for modern counterintelligence is to adapt its strategies and forge new <a href="https://www.cisa.gov/topics/partnerships-and-collaboration">partnerships</a> to combat these sophisticated threats, which endanger not only individual companies but also national economic security and competitiveness.</p>
<p>The methods of modern economic espionage are a complex mix of traditional human intelligence operations and cutting-edge cyber techniques. Foreign intelligence services, often with government support, actively seek to illicitly acquire sensitive information from key industries, including advanced computing, pharmaceutical, aerospace, and energy.</p>
<p>Traditional methods include recruiting corporate insiders who, through financial incentives, ideological persuasion, or blackmail, gain access to a company’s most sensitive data. These operations may also involve physical infiltration of a company&#8217;s facilities, such as placing an agent in a surreptitious role within the supply chain to obtain proprietary information. On the cyber front, the threat is even more pervasive. Adversaries employ sophisticated spear-phishing attacks to access corporate networks, deploy advanced malware to exfiltrate data covertly, and conduct supply-chain attacks that compromise software or hardware during manufacturing. This combination of physical and digital tradecraft allows foreign intelligence services to bypass traditional security measures and access vital research and development data, manufacturing processes, and business strategies at a fraction of the time and cost it would usually take to develop them organically.</p>
<p>In this context, the role of counterintelligence in managing and executing insider threat mitigation programs is a critical element of national security in the burgeoning era of global great-power competition. These programs move beyond simple security protocols to adopt a holistic, risk-based approach to deterring, detecting, and mitigating threats posed by a company&#8217;s employees. Rather than focusing solely on a small number of spies, modern programs are designed to identify individuals on a &#8220;critical pathway&#8221; to becoming a threat by using both technical indicators (e.g., unusual data downloads, anomalous network activity) and non-technical, behavioral cues (e.g., unexplained affluence, foreign connections, or indicators of personal stress). The goal is to intervene early, assisting at-risk employees before a foreign intelligence service can exploit their vulnerabilities. This proactive stance is essential because, in an environment where state-sponsored actors relentlessly target a nation&#8217;s innovation base, the greatest risk often comes from within.</p>
<p>A robust insider threat program serves as the first line of defense against the human element of foreign espionage, thereby preserving a company&#8217;s competitive edge and, by extension, a nation&#8217;s technological superiority.</p>
<p>To counter this multifaceted threat effectively, a robust public–private partnership is no longer a luxury but a necessity. Government counterintelligence agencies possess unique authorities and global visibility that enable them to identify the motives, capabilities, and tactics of foreign intelligence services. Yet most sensitive intellectual property resides in the private sector, which lacks the legal mandate, resources, and authority to conduct proactive counterintelligence operations. This asymmetry creates a critical national vulnerability. An effective public–private partnership seeks to close this gap by enabling the secure, timely sharing of threat intelligence from government agencies to at-risk corporate firms. Collaborative successes have included joint task forces and intelligence-sharing portals that provide companies with actionable warnings about specific foreign threats.</p>
<p>Despite these actions, significant challenges remain. Legal and ethical constraints, particularly those related to privacy protections and the handling of classified information, often impede intelligence flows. Firms may also hesitate to report breaches due to concerns over reputational harm, investor confidence, and legal liability. Compounding these issues, the speed and scale of cyber-enabled espionage frequently outpace the bureaucratic processes governing efficient and practical cooperation. Addressing these gaps requires a unified national strategy that streamlines information-sharing mechanisms, clarifies legal authorities, and directly confronts insider threats and commercial espionage to mitigate their economic and national security <a href="https://www.insaonline.org/docs/default-source/default-document-library/2022-white-papers/insa-wp-espionage-fin-1.pdf?sfvrsn=132d0a1b_4">consequences</a>.</p>
<p>The protection of economic and corporate interests has become a core mission of modern counterintelligence. The convergence of traditional espionage and cyber operations has produced a complex threat environment that state security services cannot confront alone. As a result, the future of national security and economic prosperity hinges on resilient public–private collaboration, particularly through the implementation of robust insider-threat mitigation programs. By fostering trust, establishing clear and reliable communication channels, and adopting a unified national strategy, governments and industry together can build the defenses necessary to protect innovation, preserve strategic advantage, and sustain long-term economic competitiveness in an increasingly contested global environment.</p>
<p><em>Joshua Thibert is a Contributing Senior Analyst at the </em><a href="https://thinkdeterrence.com/"><em>National Institute for Deterrence Studies (NIDS)</em></a><em> with over 30 years of comprehensive expertise, his background encompasses roles as a former counterintelligence special agent within the Department of Defense and as a practitioner in compliance, security, and insider risk management in the private sector. His extensive academic and practitioner experience spans strategic intelligence, multiple domains within defense and strategic studies, and critical infrastructure protection. Views expressed in this article are the author’s own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/12/The-Role-of-Counterintelligence-in-Protecting-Economic-and-Corporate-Interests.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="220" height="61" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 220px) 100vw, 220px" /></a></p>
<p><a href="https://globalsecurityreview.com/the-role-of-counterintelligence-in-protecting-economic-and-corporate-interests/">The Role of Counterintelligence in Protecting Economic and Corporate Interests</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-role-of-counterintelligence-in-protecting-economic-and-corporate-interests/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Points, Counterpoints, and Starting Points</title>
		<link>https://globalsecurityreview.com/points-counterpoints-and-starting-points/</link>
					<comments>https://globalsecurityreview.com/points-counterpoints-and-starting-points/#respond</comments>
		
		<dc:creator><![CDATA[Alan Dowd]]></dc:creator>
		<pubDate>Tue, 16 Dec 2025 13:27:00 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Deterrence & Foreign Policy]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[1997 Russia–Ukraine treaty]]></category>
		<category><![CDATA[abducted Ukrainian children]]></category>
		<category><![CDATA[Arms Control]]></category>
		<category><![CDATA[Board of Peace]]></category>
		<category><![CDATA[Budapest Memorandum (1994)]]></category>
		<category><![CDATA[ceasefire terms]]></category>
		<category><![CDATA[constitutional neutrality (no NATO)]]></category>
		<category><![CDATA[demilitarized buffer zone]]></category>
		<category><![CDATA[deterrence in Europe]]></category>
		<category><![CDATA[deterrent value of nuclear weapons]]></category>
		<category><![CDATA[Dnieper River access]]></category>
		<category><![CDATA[drone attacks]]></category>
		<category><![CDATA[education programs and “Nazi ideology” claims]]></category>
		<category><![CDATA[elections within 100 days]]></category>
		<category><![CDATA[European fighter jets in Poland]]></category>
		<category><![CDATA[filtration camps]]></category>
		<category><![CDATA[force and coercion]]></category>
		<category><![CDATA[forced transfers]]></category>
		<category><![CDATA[G8 invitation]]></category>
		<category><![CDATA[global economy]]></category>
		<category><![CDATA[Helsinki Final Act]]></category>
		<category><![CDATA[humanitarian committee]]></category>
		<category><![CDATA[missile strikes and escalation clauses]]></category>
		<category><![CDATA[multinational force in Ukraine]]></category>
		<category><![CDATA[NATO expansion]]></category>
		<category><![CDATA[NATO open-door policy]]></category>
		<category><![CDATA[NATO security assistance and training]]></category>
		<category><![CDATA[NATO troop basing in Ukraine]]></category>
		<category><![CDATA[NATO unity]]></category>
		<category><![CDATA[non-aggression agreement]]></category>
		<category><![CDATA[non-nuclear state status]]></category>
		<category><![CDATA[nuclear nonproliferation]]></category>
		<category><![CDATA[occupied territories]]></category>
		<category><![CDATA[OSCE monitoring]]></category>
		<category><![CDATA[partition]]></category>
		<category><![CDATA[prisoners and hostages]]></category>
		<category><![CDATA[reintegration of Russia]]></category>
		<category><![CDATA[Reuters]]></category>
		<category><![CDATA[Russian aggression]]></category>
		<category><![CDATA[sabotage operations]]></category>
		<category><![CDATA[security guarantees]]></category>
		<category><![CDATA[stable and peaceful Europe]]></category>
		<category><![CDATA[START Treaty]]></category>
		<category><![CDATA[territorial integrity]]></category>
		<category><![CDATA[transatlantic bond]]></category>
		<category><![CDATA[Trump administration]]></category>
		<category><![CDATA[Ukraine peace plan (28-point)]]></category>
		<category><![CDATA[Ukraine sovereignty]]></category>
		<category><![CDATA[Ukrainian Armed Forces cap (600]]></category>
		<category><![CDATA[UN Charter]]></category>
		<category><![CDATA[US–Europe compromise plan]]></category>
		<category><![CDATA[US–NATO role]]></category>
		<category><![CDATA[US–Russian security taskforce]]></category>
		<category><![CDATA[war crimes]]></category>
		<category><![CDATA[wartime amnesty]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31986</guid>

					<description><![CDATA[<p>The 28-point Ukraine peace plan the Trump administration recently delivered is highly problematic for a number of reasons. The document’s starting point, endpoint, and very premise raise concern for anyone sympathetic to Ukraine.</p>
<p><a href="https://globalsecurityreview.com/points-counterpoints-and-starting-points/">Points, Counterpoints, and Starting Points</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The 28-point Ukraine peace plan the <a href="https://www.wsj.com/world/trump-administration-pushes-new-plan-for-ending-ukraine-war-cade0ea1?gaa_at=eafs&amp;gaa_n=AWEtsqdJkznfmA4EGkgSLjCbzLY33ZFAXTBOO6iEjMk0WRQG2Ut5N00VFnZfcXFjUTY%3D&amp;gaa_ts=69235108&amp;gaa_sig=_Sitv2UGsa3YShcsgk4SrSN15Wvpz_obnKbsRHllf1uoOLYnQZtkmVyMUewrvfEC830T7tV1mLhf3mqQIKiE2A%3D%3D">Trump administration recently delivered</a> is highly problematic for a number of reasons. The document’s starting point, endpoint, and very premise raise concern for anyone sympathetic to Ukraine. The plan’s bias toward Russia explains why a <a href="https://www.reuters.com/business/finance/full-text-european-counter-proposal-us-ukraine-peace-plan-2025-11-23/">counterproposal</a> was drafted by Britain, France, and Germany. The following review of the original plan serves to underscore why these nations responded so rapidly.</p>
<p>According to <a href="https://www.reuters.com/world/europe/draft-us-backed-peace-proposal-ukraine-2025-11-21/">Reuters</a>, the first point calls for “Ukraine&#8217;s sovereignty to be reconfirmed.” It does this by partitioning a sovereign state victimized by unprovoked aggression. Equally odd is the fact that the agreement would be signed by a regime in Moscow that does not recognize Ukraine as a sovereign state.</p>
<p>The second point suggests, “There will be a total and complete comprehensive non-aggression agreement between Russia, Ukraine and Europe.” However, such agreements were in force in 2014 when Russian President Vladimir Putin launched his first invasion of Ukraine.</p>
<p>In 1994, Russia <a href="https://nsarchive.gwu.edu/sites/default/files/documents/semon9-giki0/1994-12-05-Budapest-Memorandum.pdf">pledged</a> to “refrain from the threat or use of force against the territorial integrity or political independence of Ukraine.” In 1997, Russia signed a <a href="https://treaties.un.org/doc/Publication/UNTS/Volume%203007/Part/volume-3007-I-52240.pdf">treaty</a> with Ukraine pledging “mutual respect, sovereign equality, territorial integrity, the inviolability of borders, the peaceful settlement of disputes, [and] the non-use of force or threat of force.” Russia violated all of these pledges.</p>
<p>The third point suggests “There will be the expectation that Russia will not invade its neighbors, and NATO will not expand further.” In addition to the 1994 and 1997 agreements, the United Nations Charter and Helsinki Final Act include the “expectation” that Russia does not invade its neighbors. Russia currently occupies parts of Ukraine, Georgia, and Moldova.</p>
<p>The North Atlantic Treaty Organization (NATO) embraces an open-door policy. Any external limitation on this policy impinges upon NATO’s independence, encroaches on the sovereignty of 32 member-states, sentences NATO aspirants to Russian vassalage, and serves as a green light to further Russian aggression.</p>
<p>Putin and his defenders believe Russia invaded Ukraine in 2022 because Ukraine wanted to join NATO, but they have it precisely backwards; Ukraine wanted to join NATO because Putin invaded in 2014. Sovereign nations seek NATO membership because they distrust Moscow and view NATO as the surest route to security in Europe.</p>
<p>The fourth point stipulates, “A dialogue between Russia and NATO, moderated by the United States, will convene to address all security concerns and create a de-escalatory environment.” The US is a founding member of NATO—not a disinterested third party. To suggest the US could be a moderator between NATO’s chief adversary and NATO’s members is to undermine NATO’s unity.</p>
<p>The fifth point states, “Ukraine will receive robust security guarantees.” The guarantees are not robust by any reasonable definition of the term. They are limited and conditional.</p>
<p>To make matters worse, point six stipulates that, “The size of the Ukrainian Armed Forces will be capped at 600,000.” This undermines Ukraine’s sovereignty. Given Russia’s size, capabilities, actions, and aims, agreeing to this would jeopardize Ukraine’s future security.</p>
<p>The seventh point requires that “Ukraine agrees to enshrine in its constitution that it will not join NATO, and NATO agrees to pass in its bylaws not to accept Ukraine at any point in the future.” Not only did Putin make these <a href="https://www.theguardian.com/world/2021/dec/17/russia-issues-list-demands-tensions-europe-ukraine-nato">demands</a> before his 2022 assault on Ukraine, but it is now known that this 28-point plan is based on Russian <a href="https://www.reuters.com/world/europe/us-peace-plan-ukraine-drew-russian-document-sources-say-2025-11-26/">proposals</a>.</p>
<p>The eighth point guarantees that “NATO agrees not to station any troops in Ukraine.” This obliterates the notion of robust security guarantees and would leave Ukraine exposed to further Russian aggression. NATO members, if not NATO itself, will need to play a role in postwar Ukraine’s security.</p>
<p>The ninth point states that “European fighter-jets will be stationed in Poland.”<br />The use of “European” here, rather than “NATO,” raises further questions about the transatlantic bond, which has ensured deterrence in Europe since NATO’s founding. Are we to infer that US fighter-jets will not be stationed in <a href="https://www.usafe.af.mil/News/Tag/860/poland/">Poland</a>? They are there now on a <a href="https://ac.nato.int/archive/2024/USA_POL_bilat_tng">rotational basis</a>.</p>
<p>The tenth point states that American security guarantees are forfeit “if Ukraine invades Russia” or “fires a missile at Moscow or St. Petersburg.” This is gratuitous. Ukraine did not invade Russia in 2014 or 2022. Ukraine’s incursions and missile-strikes in Russia are a response to Russian aggression.</p>
<p>The thirteenth point states that Russia will be “re-integrated into the global economy” and “invited back into the G8.” Russia was expelled from the G8 because it invaded Ukraine in 2014. It is important to remember that the G7 was founded as a club of wealthy, industrialized, free-market democracies. Yeltsin’s Russia was none of those when it was invited into the G7 in 1998. Putin’s Russia is none of those today.</p>
<p>The fifteenth point says, “A joint US-Russian security taskforce will be established to promote and enforce compliance with all of the provisions of this agreement.” Elevating Russia to the status of American security partner ignores the fact that Russia is the main threat to the security of Ukraine and the rest of Europe. Sidelining NATO from any role in postwar security shows a disregard for the transatlantic community, for NATO’s capabilities in peacekeeping operations, and for NATO’s postwar planning.</p>
<p>The drafters of the 28-point plan are oblivious of the fact that NATO has an entire <a href="https://shape.nato.int/nsatu#:~:text=NATO%20Security%20Assistance%20and%20Training%20for%20Ukraine,partnership%20with%20Ukrainian%20military%20representatives.%20More%20Biographies.">command</a> focused on security assistance and training for Ukraine and that the British army developed plans to lead a <a href="https://ukdefencejournal.org.uk/uk-to-lead-headquarters-of-multinational-force-ukraine/">multinational force in Ukraine</a>. Are they opposed to NATO playing those roles?</p>
<p>The seventeenth point stipulates that “The United States and Russia will agree to extend nuclear non-proliferation control treaties, including the START I Treaty. This is fine in theory, but Russia is in violation of numerous arms-control treaties that served as the foundation of post-Cold War stability and security in Europe.</p>
<p>The eighteenth point is particularly troublesome for Ukraine. It requires, “Ukraine agrees to be a non-nuclear state.” In 1994, Ukraine surrendered its entire nuclear arsenal in exchange for Russia’s commitment to respect Ukraine’s “sovereignty” and “existing borders.” The free world’s failure to back up those words after Putin’s 2014 invasion not only set the stage for 2022, it crippled the cause of nuclear nonproliferation.</p>
<p>Russia’s war on Ukraine serves as an object lesson of the deterrent power of nuclear weapons—and the danger of not having them. <a href="https://www.iiss.org/online-analysis/online-analysis/2025/02/are-nuclear-weapons-an-option-for-ukraine/">Ukraine</a>, <a href="https://www.usatoday.com/story/news/world/2025/03/13/trump-concerns-lead-south-korea-to-say-developing-nukes-not-off-table/80837029007/">South Korea</a>, <a href="https://www.nytimes.com/2025/03/07/world/europe/poland-nuclear-trump-tusk.html">Poland</a>, and others are pondering that lesson.</p>
<p>The twentieth point calls on Ukraine and Russia to “commit to education programs in schools and throughout their society that promote the understanding and tolerance of different cultures” and for “all Nazi ideology…renounced and forbidden.” Of course, Putin has <a href="http://en.kremlin.ru/events/president/news/67828">pushed</a> the lie that Ukraine is “not a real country,” that Ukraine was “entirely created by Russia,” and that Ukraine is <a href="https://archive.ph/uLb3n#selection-1039.277-1039.311">governed</a> by “a gang of drug addicts and neo-Nazis.” The irony about “Nazi ideology” is that by concocting phantom enemies, rewriting history, trying to rebuild a dead empire, and waging aggressive war, Putin is the one who is imitating the Nazis.</p>
<p>The twenty-first point recognizes Russian control over the territories it currently occupies; requires Ukrainian forces to withdraw from their own territory, which “they currently control;” and calls for that territory to be turned into a “demilitarized buffer zone.”</p>
<p>The twenty-second point calls on Russia and Ukraine “not to change these arrangements by force.” Force is the only language Putin understands. He has employed military force in Ukraine and Georgia and is probing NATO with <a href="https://www.abc.net.au/news/2025-11-06/drone-defence-system-poland-and-romania/105981642">drone attacks</a> and <a href="https://www.iiss.org/research-paper/2025/08/the-scale-of-russian--sabotage-operations--against-europes-critical--infrastructure/">sabotage operations</a>.</p>
<p>The twenty-third point stipulates that “Russia shall not obstruct Ukraine&#8217;s use of the Dnieper River.” This underscores the perverse nature of this document. Russia should have no role, no say, and no ability to obstruct Ukraine’s use of the hundreds of miles of the Dnieper River that run through the heart of Ukraine.</p>
<p>The twenty-fourth point establishes “a humanitarian committee” to deal with issues related to prisoners, hostages, and “family reunification.” Such initiatives are only necessary because Russia abducted <a href="https://apnews.com/article/ukrainian-children-russia-7493cb22c9086c6293c1ac7986d85ef6">Ukrainian children</a>; imprisoned Ukrainian civilians in “<a href="https://abcnews.go.com/International/ukrainians-forcibly-deported-russian-filtration-camps/story?id=86898080">filtration camps</a>;” and forcibly transferred <a href="https://www.state.gov/russias-filtration-operations-forced-disappearances-and-mass-deportations-of-ukrainian-citizens/">thousands of Ukrainians</a> to Russia.</p>
<p>Point twenty-five demands that Ukraine hold elections within 100 days. This echoes <a href="https://www.reuters.com/world/europe/putin-queries-political-legitimacy-ukrainian-president-zelenskiy-absence-2024-05-17/">Putin’s talking points</a>. The only way Ukraine and its NATO partners should agree to this is if Russia also holds OSCE-monitored elections within 100 days.</p>
<p>The twenty-sixth point declares that “All parties involved in this conflict will receive full amnesty for wartime actions.” This is another bonus for bad behavior. There would be no need for amnesty were it not for Putin’s <a href="https://www.pbs.org/wgbh/frontline/interactive/ap-russia-war-crimes-ukraine/">war crimes</a>.</p>
<p>The first of these crimes is the very way the war started; the 2014 assault on Crimea and the 2022 full-scale invasion of Ukraine constitute a war of aggression. However, that was only the beginning of Putin’s war crimes, which include targeting <a href="https://reliefweb.int/report/ukraine/russian-bombings-hospitals-and-healthcare">hospitals</a>, <a href="https://www.wsj.com/articles/putin-russia-mariupol-rebuilding-showcase-ukraine-war-11662559449">population centers</a>, and <a href="https://www.npr.org/2022/12/06/1140527715/russia-ukraine-war-ukrainian-energy-system-russian-strikes">energy</a>, <a href="https://www.forbes.com/sites/chloesorvino/2022/06/16/russia-widens-attack-on-food-with-bombing-of-train-bound-for-jos-andrs-world-central-kitchen/?sh=70181bd852e2">food</a>, and <a href="https://www.cnn.com/2022/09/15/europe/russia-ukraine-kryvyi-rih-dam-strike-intl/index.html">water</a> supplies; destroying <a href="https://www.pbs.org/newshour/world/evidence-of-russian-war-crimes-mounts-as-invasion-of-ukraine-drags-on">schools</a> and <a href="https://www.independent.co.uk/news/world/europe/makariv-russian-orthodox-church-bombed-ukraine-b2035571.html">places of worship</a>; <a href="https://www.pbs.org/wgbh/frontline/article/russian-soldiers-cleansing-operation-bucha-ukraine/">torturing and massacring</a> civilians; and conducting a campaign of <a href="https://www.ohchr.org/en/press-releases/2025/08/evidence-mounting-about-russian-tactics-sexual-torture-against-ukrainian">sexual violence</a>.</p>
<p>Point twenty-seven declares the agreement will be “monitored and guaranteed by a Board of Peace, chaired by President Donald J. Trump.” The president of the United States has plenty of responsibilities to occupy his attention. Proconsul of postwar Ukraine should not be added to that list.</p>
<p>Finally, point twenty-eight calls for a ceasefire once the parties agree to the plan. The good news is that the plan presented by Washington is a dead letter. The better news is that European leaders used it as a starting point for a <a href="https://www.reuters.com/business/finance/full-text-european-counter-proposal-us-ukraine-peace-plan-2025-11-23/">peace initiative</a> that focuses on Ukraine’s sovereignty, Europe’s security, and NATO’s unity. Let’s hope a US-Europe compromise plan will emerge that brings Ukraine a step closer to an endpoint all people of goodwill can agree on, a sovereign and secure Ukraine in a stable and peaceful Europe.</p>
<p><em>Alan Dowd is director of the </em><a href="https://sagamoreinstitute.org/policy-2-2/defense/cap/"><em>Sagamore Institute</em></a><em> Center for America’s Purpose.  Views expressed are his own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/12/Points-Counterpoints-and-Starting-Points.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="223" height="62" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 223px) 100vw, 223px" /></a></p>


<p></p>
<p><a href="https://globalsecurityreview.com/points-counterpoints-and-starting-points/">Points, Counterpoints, and Starting Points</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/points-counterpoints-and-starting-points/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Beyond the Next Administration: Building Enduring Tech–Government Alliances for National Power</title>
		<link>https://globalsecurityreview.com/beyond-the-next-administration-building-enduring-tech-government-alliances-for-national-power/</link>
					<comments>https://globalsecurityreview.com/beyond-the-next-administration-building-enduring-tech-government-alliances-for-national-power/#respond</comments>
		
		<dc:creator><![CDATA[Greg Sharpe]]></dc:creator>
		<pubDate>Mon, 15 Dec 2025 13:14:00 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[accountability]]></category>
		<category><![CDATA[advanced analytics]]></category>
		<category><![CDATA[advisory councils]]></category>
		<category><![CDATA[AI safety frameworks]]></category>
		<category><![CDATA[AI-enabled national preparedness]]></category>
		<category><![CDATA[Air Force Research Laboratory (AFRL)]]></category>
		<category><![CDATA[biosecurity infrastructure]]></category>
		<category><![CDATA[bipartisan engagement]]></category>
		<category><![CDATA[co-stewardship of national resilience]]></category>
		<category><![CDATA[codifying capabilities in law]]></category>
		<category><![CDATA[Congress as strategic partner]]></category>
		<category><![CDATA[continuity across administrations]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[defense planning ​]]></category>
		<category><![CDATA[democratic oversight]]></category>
		<category><![CDATA[Department of Energy (DOE) quantum networks]]></category>
		<category><![CDATA[disaster response]]></category>
		<category><![CDATA[distributed quantum networking testbed]]></category>
		<category><![CDATA[economic competitiveness]]></category>
		<category><![CDATA[Economic Security]]></category>
		<category><![CDATA[entanglement distribution]]></category>
		<category><![CDATA[ethics]]></category>
		<category><![CDATA[experimental infrastructure]]></category>
		<category><![CDATA[federal guidance]]></category>
		<category><![CDATA[intellectual property protections]]></category>
		<category><![CDATA[international norms]]></category>
		<category><![CDATA[ion-trap quantum computer]]></category>
		<category><![CDATA[mission-driven portfolios]]></category>
		<category><![CDATA[multi-stakeholder governance]]></category>
		<category><![CDATA[multi-year funding]]></category>
		<category><![CDATA[National Defense Authorization Act (NDAA)]]></category>
		<category><![CDATA[national power]]></category>
		<category><![CDATA[National Quantum Initiative (NQI)]]></category>
		<category><![CDATA[national resilience]]></category>
		<category><![CDATA[Navy quantum RDT&E]]></category>
		<category><![CDATA[near-term use cases]]></category>
		<category><![CDATA[nontraditional vendors]]></category>
		<category><![CDATA[Other Transaction Authority (OTA)]]></category>
		<category><![CDATA[oversight boards]]></category>
		<category><![CDATA[pilot programs]]></category>
		<category><![CDATA[public trust]]></category>
		<category><![CDATA[public-private partnerships]]></category>
		<category><![CDATA[quantum communications]]></category>
		<category><![CDATA[quantum communications corridor]]></category>
		<category><![CDATA[quantum networking testbeds]]></category>
		<category><![CDATA[quantum-resilient communications]]></category>
		<category><![CDATA[quantum-resistant secure transmission]]></category>
		<category><![CDATA[RDT&E portfolio]]></category>
		<category><![CDATA[responsible technology use]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[stable appropriations]]></category>
		<category><![CDATA[statutory roles for key technologies]]></category>
		<category><![CDATA[strategic competitiveness]]></category>
		<category><![CDATA[streamlined oversight]]></category>
		<category><![CDATA[supply-chain monitoring]]></category>
		<category><![CDATA[supply-chain security]]></category>
		<category><![CDATA[tech–government alliances]]></category>
		<category><![CDATA[threat detection]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[Trust in government]]></category>
		<category><![CDATA[workforce opportunity]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31969</guid>

					<description><![CDATA[<p>The tech industry can increase the nation’s trust in government by becoming a reliable and visibly accountable partner for securing America’s technological edge. Specifically, the tech industry can help Congress codify critical capabilities in law and funding provisions that outlast political cycles. Doing so successfully will require long-term relationships with legislators, bipartisan support, and clear [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/beyond-the-next-administration-building-enduring-tech-government-alliances-for-national-power/">Beyond the Next Administration: Building Enduring Tech–Government Alliances for National Power</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The tech industry can increase the nation’s trust in government by becoming a reliable and visibly accountable partner for securing America’s technological edge. Specifically, the tech industry can help Congress codify critical capabilities in law and funding provisions that outlast political cycles. Doing so successfully will require long-term relationships with legislators, bipartisan support, and clear safeguards that reassure the public that powerful technologies are used in the best interest of the nation.<a href="https://www.edelman.com/trust/2025/trust-barometer">[1</a>]​</p>
<p><strong>Why Trust and Continuity Matter</strong></p>
<p>Recent trust surveys show that public confidence in both government and business has declined, with many people believing institutional leaders are not honest with them. The 2025 Edelman Trust Barometer, for example, highlights a “crisis of grievance,” in which large segments of the population feel left behind and are more inclined to distrust complex policy and technology initiatives.<a href="https://cooleypubco.com/2025/02/11/2025-edelman-trust-barometer-grievance/">[2</a>]​</p>
<p>This erosion of trust is particularly dangerous at a time when artificial intelligence, quantum technologies, and advanced biotechnologies are central to economic and military competition. A report submitted to Congress by U.S.–China policy experts emphasizes that both countries now treat these technologies as strategic industries, tying them directly to national power and long-term security.[<u>4]</u>​</p>
<p><strong>Building Durable Relationships with Legislators</strong></p>
<p>For technology companies, increasing national trust starts with treating Congress as a long‑term strategic partner, not simply as an annual budget gatekeeper.<a href="https://www.uscc.gov/sites/default/files/2024-11/2024_Annual_Report_to_Congress.pdf">[4]</a>​</p>
<ul>
<li>Institutionalize bipartisan technology engagement: Firms can create recurring, nonpartisan briefings and workshops with relevant committees to explain how artificial intelligence (AI), quantum, cyber, and bio tools affect national resilience, economic competitiveness, and workforce opportunity. By engaging members and staff from both parties, companies reduce the perception that emerging technologies are aligned with a single political faction.<a href="https://www.uscc.gov/sites/default/files/2024-11/2024_Annual_Report_to_Congress.pdf">[5]</a>​</li>
<li>Lead with ethics, safety, and security: Research on public attitudes toward AI suggests people are more supportive when they see clear safeguards, transparency, and accountability mechanisms within the tech industry. Companies can build trust by proactively presenting their AI safety frameworks, data-protection policies, and supply‑chain security measures, aligning them with federal guidance and international norms on responsible technology use.<a href="https://www.edelman.com/sites/g/files/aatuss191/files/2025-01/Global%20Top%2010%202025%20Trust%20Barometer.pdf">[6]</a>​</li>
</ul>
<p><strong>Securing Sustained Funding for Critical Technology</strong></p>
<p>Trust is reinforced when technology programs are clearly tied to enduring strategic missions and supported through stable, multi‑year funding rather than fragile pilots.<a href="https://www.uscc.gov/sites/default/files/2024-11/2024_Annual_Report_to_Congress.pdf">[5]</a>​</p>
<ul>
<li>Connect capabilities to mission portfolios: Instead of scattered line items, technology programs can be organized into mission‑driven portfolios—such as quantum‑resilient communications, AI‑enabled national preparedness, or biosecurity infrastructure—that span research, prototyping, and deployment over several years. Multi‑year authorizations and appropriations make it harder for any single administration to abruptly cancel essential capabilities.<a href="https://www.uscc.gov/sites/default/files/2024-11/Chapter_3--U.S.-China_Competition_in_Emerging_Technologies.pdf">[4]</a>​</li>
<li>Use innovation tools that protect both government and industry: Policy analyses highlight the value of mechanisms like Other Transaction Authority and structured public‑private partnerships to bring nontraditional vendors into national security and infrastructure work more quickly. By pairing these tools with clearer intellectual property protections and streamlined oversight, legislators can encourage top-tier tech firms to stay engaged in sensitive missions over the long term.<a href="https://ptacts.uspto.gov/ptacts/public-informations/petitions/1558121/download-documents?artifactId=z4DLuAiI8FBq5qxTCRlq-VPk-yx0lU4p_Mou2oSkOWL2OdIfZr8DAG4">[8]</a>​</li>
</ul>
<p><strong>Embedding Technology in Law, Not Just Budgets</strong></p>
<p>To prevent critical technologies from being swapped out with each political shift, their roles must be written into statute and tied to democratic oversight.<a href="https://www.jdsupra.com/legalnews/white-house-releases-2025-national-7517228/">[9]</a>​</p>
<ul>
<li>Statutory roles for key technologies: Laws governing defense planning, critical infrastructure, and economic security should explicitly call for the use of AI, secure digital infrastructure, and advanced analytics in defined mission areas, such as threat detection, disaster response, and supply‑chain monitoring. Once these roles are codified, dismantling them requires visible legislative action rather than quiet executive changes.<a href="https://www.jdsupra.com/legalnews/white-house-releases-2025-national-7517228/">[9]</a>​</li>
<li>Multi-stakeholder governance in legislation: Legislated advisory councils and oversight boards that include government, industry, academia, and civil society should supervise high-impact technologies and publish regular reports. This structure signals that powerful tools are subject to ongoing, pluralistic scrutiny rather than being controlled solely by political appointees or corporate executives.<a href="https://www.biotech.senate.gov/wp-content/uploads/2025/04/NSCEB-Full-Report-%E2%80%93-Digital-%E2%80%934.28.pdf">[10]</a>​</li>
</ul>
<p><strong>Quantum Networking Testbed Infrastructure</strong></p>
<p>The National Defense Authorization Act (NDAA) put forth by Congress each year does not typically use a single, generic phrase like “quantum networking testbeds” in isolation; instead, it authorizes and directs specific programs and experiments that collectively constitute quantum networking testbed infrastructure. Several provisions and related authoritative documents are especially relevant to the future of quantum technology growth.</p>
<p>A Senate Armed Services Committee fact sheet on the fiscal year 2024 NDAA highlights language that “authorizes increased funding for a distributed quantum networking testbed” and the development of a next-generation ion‑trap quantum computer at the Air Force Research Laboratory (AFRL). While the fact sheet summarizes rather than reproduces the statutory text, it makes clear that Congress explicitly authorized a distributed quantum networking testbed as part of the defense Research, Development, Test, and Evaluation (RDT&amp;E) portfolio.<a href="https://defensescoop.com/2024/01/08/ndaa-2024-quantum-provisions/">[12]</a>​</p>
<p>Within the fiscal year 2025 NDAA, Congress, “authorizes funding to create a ‘quantum communications corridor’ as part of Navy research, development, test, and evaluation.” This is an explicit description of support for a testbed or network to advance quantum communication research so the Navy and the Department of Defense (DoD) can securely transmit information resistant to quantum computer decryption.<a href="https://www.emergingtechnologiesinstitute.org/publications/insights/fy2025ndaa">[15]</a>​</p>
<p>Other recent NDAA cycles also include broader direction that reinforces these testbed authorizations, such as requirements for DoD to establish pilot programs for promising quantum computing capabilities and to identify near‑term use cases that can be fielded within two years. These provisions do not always use the word “testbed” in the operative clause, but they direct the department to stand up experimental infrastructure and pilots that, in practice, operate as quantum networking and computing testbeds for defense applications.<a href="https://www.nextgov.com/emerging-tech/2024/12/fy2025-ndaa-angles-enhance-dods-ai-and-quantum-sciences-capabilities/401545/">[16]</a>​</p>
<p>In parallel, the National Quantum Initiative framework and associated Department of Energy (DOE) efforts describe quantum networking testbeds as shared infrastructure for entanglement distribution and quantum communications, and Congressional action has repeatedly referenced these federal testbeds and network efforts as part of the broader quantum information science ecosystem that the DoD can leverage.<a href="https://www.quantum.gov/wp-content/uploads/2022/08/NQIA2018-NDAA2022-CHIPS2022.pdf">[13]</a>​</p>
<p>Ensuring key technologies not only protect the nation but are also provided with substantial investment and economic promise is a necessity for companies to further their developmental efforts. Demonstrating that quantum technologies are viable for multiple applications—within internal defense and external partnerships—is one possible solution as tech companies become increasingly concerned with the long-term payoff of their test bed programs. For now, defense authorization bills appear to be the most forward leaning avenue supported by government, but the long-term stability of this method has yet to be validated.</p>
<p><strong>How This Approach Builds Public Trust</strong></p>
<p>When the tech industry engages both parties and chambers in Congress, supports multi-year statutory programs, and accepts meaningful oversight, it demonstrates that emerging technologies are being developed within a framework of law, ethics, and long-term national interest. In such a system, citizens can see that AI, quantum computing, and other advanced capabilities are not partisan experiments or purely profit-driven ventures, but part of a durable national strategy subject to democratic control.<a href="https://www.edelman.com/news-awards/2025-edelman-trust-barometer-reveals-high-level-grievance">[2]</a>​</p>
<p>The tech sector can both strengthen U.S. strategic competitiveness and contribute tangibly to rebuilding public trust in government by positioning itself as a co-steward of national resilience, helping design governance mechanisms, committing to transparency, and working with legislators to hard‑wire critical technologies into law and funding.<a href="https://www.uscc.gov/sites/default/files/2024-11/Chapter_3--U.S.-China_Competition_in_Emerging_Technologies.pdf">[5]</a>​</p>
<p>Sources:</p>
<ol>
<li><a href="https://www.edelman.com/trust/2025/trust-barometer">https://www.edelman.com/trust/2025/trust-barometer</a></li>
<li><a href="https://cooleypubco.com/2025/02/11/2025-edelman-trust-barometer-grievance/">https://cooleypubco.com/2025/02/11/2025-edelman-trust-barometer-grievance/</a></li>
<li><a href="https://www.edelman.com/news-awards/2025-edelman-trust-barometer-reveals-high-level-grievance">https://www.edelman.com/news-awards/2025-edelman-trust-barometer-reveals-high-level-grievance</a></li>
<li><a href="https://www.uscc.gov/sites/default/files/2024-11/Chapter_3--U.S.-China_Competition_in_Emerging_Technologies.pdf">https://www.uscc.gov/sites/default/files/2024-11/Chapter_3&#8211;U.S.-China_Competition_in_Emerging_Technologies.pdf</a></li>
<li><a href="https://www.uscc.gov/sites/default/files/2024-11/2024_Annual_Report_to_Congress.pdf">https://www.uscc.gov/sites/default/files/2024-11/2024_Annual_Report_to_Congress.pdf</a></li>
<li><a href="https://www.edelman.com/sites/g/files/aatuss191/files/2025-01/Global%20Top%2010%202025%20Trust%20Barometer.pdf">https://www.edelman.com/sites/g/files/aatuss191/files/2025-01/Global%20Top%2010%202025%20Trust%20Barometer.pdf</a></li>
<li><a href="https://www.nationalsecurity.ai/chapter/executive-summary">https://www.nationalsecurity.ai/chapter/executive-summary</a></li>
<li><a href="https://ptacts.uspto.gov/ptacts/public-informations/petitions/1558121/download-documents?artifactId=z4DLuAiI8FBq5qxTCRlq-VPk-yx0lU4p_Mou2oSkOWL2OdIfZr8DAG4">https://ptacts.uspto.gov/ptacts/public-informations/petitions/1558121/download-documents?artifactId=z4DLuAiI8FBq5qxTCRlq-VPk-yx0lU4p_Mou2oSkOWL2OdIfZr8DAG4</a></li>
<li><a href="https://www.jdsupra.com/legalnews/white-house-releases-2025-national-7517228/">https://www.jdsupra.com/legalnews/white-house-releases-2025-national-7517228/</a></li>
<li><a href="https://www.biotech.senate.gov/wp-content/uploads/2025/04/NSCEB-Full-Report-%E2%80%93-Digital-%E2%80%934.28.pdf">https://www.biotech.senate.gov/wp-content/uploads/2025/04/NSCEB-Full-Report-%E2%80%93-Digital-%E2%80%934.28.pdf</a></li>
<li><a href="https://www.imd.org/ibyimd/audio-articles/restoring-faith-in-leadership-in-the-age-of-grievance/">https://www.imd.org/ibyimd/audio-articles/restoring-faith-in-leadership-in-the-age-of-grievance/</a></li>
<li><a href="https://defensescoop.com/2024/01/08/ndaa-2024-quantum-provisions/">https://defensescoop.com/2024/01/08/ndaa-2024-quantum-provisions/</a></li>
<li><a href="https://www.quantum.gov/wp-content/uploads/2022/08/NQIA2018-NDAA2022-CHIPS2022.pdf">https://www.quantum.gov/wp-content/uploads/2022/08/NQIA2018-NDAA2022-CHIPS2022.pdf</a></li>
<li><a href="https://www.quantum.gov/wp-content/uploads/2024/12/NQI-Annual-Report-FY2025.pdf">https://www.quantum.gov/wp-content/uploads/2024/12/NQI-Annual-Report-FY2025.pdf</a></li>
<li><a href="https://www.emergingtechnologiesinstitute.org/publications/insights/fy2025ndaa">https://www.emergingtechnologiesinstitute.org/publications/insights/fy2025ndaa</a></li>
<li><a href="https://www.nextgov.com/emerging-tech/2024/12/fy2025-ndaa-angles-enhance-dods-ai-and-quantum-sciences-capabilities/401545/">https://www.nextgov.com/emerging-tech/2024/12/fy2025-ndaa-angles-enhance-dods-ai-and-quantum-sciences-capabilities/401545/</a></li>
</ol>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/12/Beyond-the-Next-Administration-Building-Enduring-TechGovernment-Alliances-for-National-Power.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="256" height="71" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 256px) 100vw, 256px" /></a></p>
<p><a href="https://globalsecurityreview.com/beyond-the-next-administration-building-enduring-tech-government-alliances-for-national-power/">Beyond the Next Administration: Building Enduring Tech–Government Alliances for National Power</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/beyond-the-next-administration-building-enduring-tech-government-alliances-for-national-power/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Meet the Human in Nuclear Deterrence</title>
		<link>https://globalsecurityreview.com/meet-the-human-in-nuclear-deterrence/</link>
					<comments>https://globalsecurityreview.com/meet-the-human-in-nuclear-deterrence/#respond</comments>
		
		<dc:creator><![CDATA[Robert Kittinger]]></dc:creator>
		<pubDate>Thu, 04 Dec 2025 12:55:00 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[acquired color vision deficiency]]></category>
		<category><![CDATA[Air Force 711th Human Performance Wing]]></category>
		<category><![CDATA[always/never reliability]]></category>
		<category><![CDATA[CAD color vision test]]></category>
		<category><![CDATA[cognitive psychology]]></category>
		<category><![CDATA[color blindness]]></category>
		<category><![CDATA[color vision]]></category>
		<category><![CDATA[D-15 test]]></category>
		<category><![CDATA[delivery platforms]]></category>
		<category><![CDATA[demon core incident]]></category>
		<category><![CDATA[Deterrence Posture]]></category>
		<category><![CDATA[engineers]]></category>
		<category><![CDATA[FAA standards]]></category>
		<category><![CDATA[fallible humans]]></category>
		<category><![CDATA[high-consequence systems]]></category>
		<category><![CDATA[human element]]></category>
		<category><![CDATA[human error]]></category>
		<category><![CDATA[human factors]]></category>
		<category><![CDATA[human performance]]></category>
		<category><![CDATA[human reliability]]></category>
		<category><![CDATA[industrial-organizational psychology]]></category>
		<category><![CDATA[Ishihara test]]></category>
		<category><![CDATA[national laboratories]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[Pantex Plant]]></category>
		<category><![CDATA[physicists]]></category>
		<category><![CDATA[psychology]]></category>
		<category><![CDATA[QMU]]></category>
		<category><![CDATA[quantification of margins and uncertainty]]></category>
		<category><![CDATA[Rabin test]]></category>
		<category><![CDATA[red-green deficiency]]></category>
		<category><![CDATA[sabotage]]></category>
		<category><![CDATA[Sandia National Laboratories]]></category>
		<category><![CDATA[Titan II missile explosion]]></category>
		<category><![CDATA[tool slips]]></category>
		<category><![CDATA[Tritan defect]]></category>
		<category><![CDATA[Waggoner Computerized Color Vision Test]]></category>
		<category><![CDATA[WCCVT]]></category>
		<category><![CDATA[weakest link]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31925</guid>

					<description><![CDATA[<p>Not long ago, uttering words like “human element” or “psychology” at a physics or engineering national laboratory would make scientists’ eyes roll. Their silence was a clear “does not compute” message.  It was as if Oppenheimer, Ernest Lawrence, or Edward Teller had forbidden the “soft sciences” from entering those hallowed laboratory grounds. Those days are [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/meet-the-human-in-nuclear-deterrence/">Meet the Human in Nuclear Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Not long ago, uttering words like “human element” or “psychology” at a physics or engineering national laboratory would make scientists’ eyes roll. Their silence was a clear “does not compute” message.  It was as if Oppenheimer, Ernest Lawrence, or Edward Teller had forbidden the “soft sciences” from entering those hallowed laboratory grounds. Those days are over.</p>
<p>Physicists and engineers now realize that just as most car crashes stem from driver error rather than mechanical failure, the same logic applies to nuclear weapons, their platforms, and their potential use. Whether Americans like it or not, humans are in the system and humans are, almost certainly, the weakest link.</p>
<p>Humans are the weakest component in the quantification of margins and uncertainty (QMU) sense. Engineers often test individual components and larger systems of nuclear weapons to a 1-in-1,000 certainty that they will function correctly. There has long been a view that nuclear weapons should always detonate when employed and never when they are not. To achieve this “always/never” goal, systems are engineered to perfection while largely ignoring sources of human error.</p>
<p>Humans design and manufacture the components, assemble the weapons, complete the wiring, and install systems onto delivery platforms (i.e., subs, silos, and bombers). Humans verify satellite signals of potential attacks from US Strategic Command, communicate those findings to the President, and, depending on the response, draft and transmit emergency action messages (EAMs). This is a gross simplification because fragile humans play a much larger role, but it illustrates the embeddedness of the human element in the system.</p>
<p>One example of human fragility that took place in September 2023 at the <a href="https://www.exchangemonitor.com/report-crossed-wires-inside-nuke-make-it-past-pantex-quality-control-inspection/">Pantex Plant</a> is instructive. It appears a worker mistakenly cross-connected color-coded electrical wires inside a nuclear weapon.</p>
<p>Across the world this very task might be performed by a civilian or by an Air Force 2W2X1 Nuclear Weapons Specialist. At first glance, it seems simple; connect the red wire to the red wire and the green wire to the green wire. But around 8 percent of men are born with red-green color vision deficiency (color blindness) that makes it difficult for them to differentiate between red and green (and many other color combinations. The US Air Force correctly requires normal color vision for this role.</p>
<p>Not all color tests are created equal. Some vision tests catch 99 percent of people with colorblindness and others catch 90 or even 50 percent of colorblind individuals. An analogy may be useful in illustrating this point.</p>
<p>If, for example, a worker was testing a component and needed to detect 14MeV neutrons, a detector that simply says “between 2 and 20 MeV neutrons were detected” would be unacceptable. A tester with adequate sensitivity is required to test critical components. Detectors that verify the specific reading may even be required. Sensitive tests for humans who work on nuclear weapons is also required.</p>
<p>The Federal Aviation Administration (FAA) recently updated its <a href="https://www.faa.gov/ame_guide/app_process/exam_tech/item52/et">standards</a>, rejecting the century-old Ishihara color vision test and the D-15 test due to known shortcomings. The Ishihara test is fairly good at detecting red-green defects but will miss 100 percent of blue (Tritan) defects. Humans have red, green, and blue light sensitive cones in their eyes, and the Ishihara only tests two cones and ignores blue vision entirely. The D-15 test can <a href="https://onlinelibrary.wiley.com/doi/10.1002/col.22596">pass up to half of individuals</a> with color blindness, depending on how its administered (a test commonly used by police departments).</p>
<p><strong>Figure 1. Simulated Color Vision Defects and Wire Color</strong></p>
<p><strong> <img loading="lazy" decoding="async" class="alignnone size-full wp-image-31932" src="http://globalsecurityreview.com/wp-content/uploads/2025/12/color-vision-defects.png" alt="" width="271" height="286" /></strong></p>
<p>Even if Pantex adopted one of the FAA’s “best in class” tests, such as the CAD, Rabin, or Waggoner Computerized Color Vision Test (WCCVT), there is still another issue—test frequency. Color vision should be tested periodically, not just once.</p>
<p>While 8 percent of men and 0.5 percent of women) are born with color blindness, it is expected that <a href="https://pubmed.ncbi.nlm.nih.gov/15742829/">15 percent of all people</a> will develop an acquired color vision deficiency during their lifetime, most often affecting blue vision. Most people assume color vision is a static ability, but it is more like hearing loss, which is impacted by age and environmental factors.</p>
<p>Changes in color vision ability can occur rapidly due to medications, diseases, or environmental conditions. For critical roles, annual color vision testing should be a minimum standard.</p>
<p>Finally, different color vision tests examine different axes within the visible spectrum of light, meaning that a person could pass the Rabin but fail the WCCVT based on individual differences and the specific axis tested by each test. This is truer for mild vision defects but mild defects can still cause sub-par performance on real world tasks (i.e., <a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC12568436/">reacting to red traffic lights</a>).</p>
<p>Across the United States, teams are working to quantify this human element in complex, high-consequence systems. These include the Air Force’s 711th Human Performance Wing and the social scientists at Sandia National Laboratories.</p>
<p>The next time you hear about a cognitive psychologist, industrial-organizational psychologist, or human factors researcher at a national lab, do not assume they’re experimenting with LSD and goats to perfect psychic warfare. They’re far more likely to be studying how humans interact with technology—quantifying behavior, limitations, cognition, and the human’s reliability within critical systems.</p>
<p>Organizations should, whenever possible, bring these human-focused professionals into projects. They will identify issues most engineers never consider across a variety of scales, “from neurons to nations.” Factors like color vision, tool slips, (as in the Louis Slotin “demon core” incident), dropped sockets (as in the Titan II missile explosion in Damascus, Arkansas), mismatched job abilities, fatigue, attention lapses, and even intentional sabotage can all impact the nation’s deterrence posture. When processes are optimized to include the human, overall risk is minimized.</p>
<p>In the end, deterrence is not just about weapons. It is about the humans behind the weapons, the fallible, unpredictable, indispensable human element that remains both our greatest strength and our greatest risk.</p>
<p><em>Rob Kittenger, PhD, is a Senior Fellow at the National Institute for Deterrence Studies. The views expressed are his own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/12/Meet-the-Human-in-Nuclear-Deterrence.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="230" height="64" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 230px) 100vw, 230px" /></a></p>
<p><a href="https://globalsecurityreview.com/meet-the-human-in-nuclear-deterrence/">Meet the Human in Nuclear Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/meet-the-human-in-nuclear-deterrence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>30 HS Rebuilding Lethality: Conservative Priorities for U.S. Nuclear and Missile Defense FY 2027 with Robert Peters</title>
		<link>https://globalsecurityreview.com/30-hs-rebuilding-lethality-conservative-priorities-for-u-s-nuclear-and-missile-defense-fy-2027-with-robert-peters/</link>
					<comments>https://globalsecurityreview.com/30-hs-rebuilding-lethality-conservative-priorities-for-u-s-nuclear-and-missile-defense-fy-2027-with-robert-peters/#respond</comments>
		
		<dc:creator><![CDATA[Robert Peters]]></dc:creator>
		<pubDate>Thu, 20 Nov 2025 13:14:29 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Engage]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[America’s nuclear priorities]]></category>
		<category><![CDATA[Bob Peters]]></category>
		<category><![CDATA[bomber modernization]]></category>
		<category><![CDATA[congressional recommendations]]></category>
		<category><![CDATA[defense allocations]]></category>
		<category><![CDATA[defense industrial base]]></category>
		<category><![CDATA[deterrence strategy]]></category>
		<category><![CDATA[expert insights.]]></category>
		<category><![CDATA[force posture]]></category>
		<category><![CDATA[funding gaps]]></category>
		<category><![CDATA[future challenges]]></category>
		<category><![CDATA[FY 2027 budget]]></category>
		<category><![CDATA[global deterrence posture]]></category>
		<category><![CDATA[Great Power Competition]]></category>
		<category><![CDATA[Heritage Foundation]]></category>
		<category><![CDATA[Heritage Foundation report]]></category>
		<category><![CDATA[ICBM modernization]]></category>
		<category><![CDATA[in-depth discussion]]></category>
		<category><![CDATA[Indo-Pacific priorities]]></category>
		<category><![CDATA[integrated air and missile defense]]></category>
		<category><![CDATA[key wins]]></category>
		<category><![CDATA[missile defense priorities]]></category>
		<category><![CDATA[missile defense systems]]></category>
		<category><![CDATA[modernization funding]]></category>
		<category><![CDATA[National Institute for Deterrence Studies (NIDS)]]></category>
		<category><![CDATA[national security budgeting]]></category>
		<category><![CDATA[nuclear triad modernization]]></category>
		<category><![CDATA[readiness and resilience]]></category>
		<category><![CDATA[seminar]]></category>
		<category><![CDATA[SLBM modernization]]></category>
		<category><![CDATA[strategic deterrence]]></category>
		<category><![CDATA[strategic edge]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31848</guid>

					<description><![CDATA[<p>Join the National Institute for Deterrence Studies (NIDS) for an in-depth discussion on The Heritage Foundation&#8217;s report on America’s nuclear and missile defense priorities for the FY 2027 budget. Our featured speaker, Bob Peters of The Heritage Foundation, shares expert insights on: Key wins and gaps in recent defense allocations, Modernization of the nuclear triad [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/30-hs-rebuilding-lethality-conservative-priorities-for-u-s-nuclear-and-missile-defense-fy-2027-with-robert-peters/">30 HS Rebuilding Lethality: Conservative Priorities for U.S. Nuclear and Missile Defense FY 2027 with Robert Peters</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Join the National Institute for Deterrence Studies (NIDS) for an in-depth discussion on The Heritage Foundation&#8217;s report on America’s nuclear and missile defense priorities for the FY 2027 budget. Our featured speaker, Bob Peters of The Heritage Foundation, shares expert insights on: Key wins and gaps in recent defense allocations, Modernization of the nuclear triad and missile defense systems, Strategic priorities for the Indo-Pacific and global deterrence posture, Recommendations for Congress and the defense industrial base This seminar explores how the U.S. can maintain its strategic edge and prepare for future challenges.</p>
<p><a href="https://youtu.be/KEO0Y0AwGgc"><img loading="lazy" decoding="async" class="alignnone wp-image-29130 size-full" src="http://globalsecurityreview.com/wp-content/uploads/2024/10/@Watch.png" alt="" width="156" height="88" /></a></p>
<p><a href="https://globalsecurityreview.com/30-hs-rebuilding-lethality-conservative-priorities-for-u-s-nuclear-and-missile-defense-fy-2027-with-robert-peters/">30 HS Rebuilding Lethality: Conservative Priorities for U.S. Nuclear and Missile Defense FY 2027 with Robert Peters</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/30-hs-rebuilding-lethality-conservative-priorities-for-u-s-nuclear-and-missile-defense-fy-2027-with-robert-peters/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Understanding President Trump’s Truth Social Post on Nuclear Testing?</title>
		<link>https://globalsecurityreview.com/understanding-president-trumps-truth-social-post-on-nuclear-testing/</link>
					<comments>https://globalsecurityreview.com/understanding-president-trumps-truth-social-post-on-nuclear-testing/#respond</comments>
		
		<dc:creator><![CDATA[Adam Lowther]]></dc:creator>
		<pubDate>Tue, 18 Nov 2025 13:13:00 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[aggression]]></category>
		<category><![CDATA[American resolve]]></category>
		<category><![CDATA[Arms Control]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Comprehensive Test Ban Treaty]]></category>
		<category><![CDATA[CTBT]]></category>
		<category><![CDATA[Department of Energy]]></category>
		<category><![CDATA[Department of War]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[hydrostatic tests]]></category>
		<category><![CDATA[multilateral negotiations]]></category>
		<category><![CDATA[National Nuclear Security Agency]]></category>
		<category><![CDATA[New START]]></category>
		<category><![CDATA[nuclear arsenal]]></category>
		<category><![CDATA[nuclear modernization]]></category>
		<category><![CDATA[nuclear testing]]></category>
		<category><![CDATA[nuclear weapons policy]]></category>
		<category><![CDATA[nuclear yield]]></category>
		<category><![CDATA[President Trump]]></category>
		<category><![CDATA[reciprocal measures]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[strategic competition]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[Truth Social]]></category>
		<category><![CDATA[Ukraine war]]></category>
		<category><![CDATA[zero yield]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31838</guid>

					<description><![CDATA[<p>On October 30, 2025, President Donald Trump posted to Truth Social, “The United States has more nuclear weapons than any other country. This was accomplished, including a complete update and renovation of existing weapons, during my first term in office. Because of the tremendous destructive power, I HATED to do it but had no choice! [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/understanding-president-trumps-truth-social-post-on-nuclear-testing/">Understanding President Trump’s Truth Social Post on Nuclear Testing?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>On October 30, 2025, President Donald Trump posted to Truth Social, “The United States has more nuclear weapons than any other country. This was accomplished, including a complete update and renovation of existing weapons, during my first term in office. Because of the tremendous destructive power, I HATED to do it but had no choice! Russia is second, and China is a distant third, but will be even within 5 years. Because of other countries’ testing programs, I have instructed the Department of War to start testing our nuclear weapons on an equal basis. That process will begin immediately. Thank you for your attention to this matter!”</p>
<p>The challenge with all such posts is that they never tell the whole story. Yes, Russia and China are refusing to enter arms control negotiations with the United States and Russia is believed to be conducting hydronuclear tests that produce a nuclear yield, but the President’s post does not mean what you may think.</p>
<p>Contrary to the <a href="https://thebulletin.org/2025/10/the-experts-respond-to-trumps-proposal-to-start-testing-our-nuclear-weapons-on-an-equal-basis/">wailing and gnashing of teeth</a> of arms control advocates after Trump’s post, he is not calling for a return to detonating nuclear warheads under the Nevada desert. He is calling for something much different, which is why his post included, “…on an equal basis.” This point is important and was seemingly lost on many.</p>
<p>What many Americans may not know is that the United States last tested a nuclear weapon in 1992 and has, since at least 1996, interpreted the Comprehensive Test Ban Treaty (CTBT) to mean that nuclear testing cannot produce a nuclear yield. Thus, the United States, has voluntarily followed the CTBT and produced “zero yield” in the many tests it has conducted over the past three decades. American scientists were able to verify the continued safety, security, and effectiveness of the nation’s nuclear arsenal without producing an explosive yield.</p>
<p>President Trump is simply enabling American scientists to conduct hydronuclear tests that can provide higher fidelity results as the nation modernizes its existing nuclear warheads and begins building the first new nuclear warhead in more than a generation. This is a very important distinction.</p>
<p>The President, who often speaks in generalities, can be faulted for not offering a level of detail that explained his post more clearly, but articles claiming he does not understand nuclear testing may be less accurate than the President’s critics believe. The relationship between the Department of War and the Department of Energy, when it comes to nuclear weapons, is symbiotic. The Department of Energy designs and builds the weapons at its federally funded and privately operated labs, under the management of the National Nuclear Security Agency, but the Department of War drives the demand for capabilities. Thus, criticizing the President for saying the Department of War will do the testing is a bit of a hollow victory.</p>
<p>With Russia unwilling to extend New START and China’s continuing unwillingness to join multilateral arms control negotiations, President Trump’s statement was an attempt at demonstrating American resolve in the face of America’s declining nuclear position. The reality is that Russia understands its strength is in its nuclear forces, not its conventional capabilities.</p>
<p>If President Trump deserves criticism for anything, it is incorrectly suggesting that the American nuclear arsenal is superior to that of Russia; it is not. Russia’s arsenal is both newer and larger than that of the United States.</p>
<p>Russia may also breakout of New START limits upon the treaty’s expiration, which is a worrying prospect for the United States. Russia’s <a href="https://www.armscontrol.org/blog/2023-11/nuclear-disarmament-monitor">abrogation</a> the Comprehensive Test Ban Treaty (CTBT) in 2023, in retaliation for Western support of Ukraine, is also concerning. It is, however, unsurprising. Before, Russia at least tried to ensure any violations of the “zero yield” understanding was hidden from the global public. That may cease if the Ukraine war continues. Although, President Trump’s announcement may have contained Russian ambitions.</p>
<p>Russia may have announced “<a href="https://www.aljazeera.com/news/2025/11/6/putin-says-russia-to-take-reciprocal-measures-if-us-resumes-nuclear-tests">reciprocal measures</a>” if the United States begins testing, but Vladimir Putin knows the US is looking to conduct tests at the same level as Russia’s existing tests. <a href="https://www.aljazeera.com/news/2025/11/3/china-denies-nuclear-testing-calls-on-us-to-maintain-moratorium">China</a> called on the US to uphold the moratorium on nuclear testing, but China may have also violated the “zero yield” threshold in its effort to build advanced nuclear weapons. Unfortunately, neither the Chinese nor Russian programs is particularly visible to Western monitoring efforts.</p>
<p>The prospects for Russo-American cooperation are low, but this should come as no surprise considering nuclear weapons are Russia’s trump card, no pun intended, when it comes to limiting Western support to Ukraine. Putin cannot afford to lose in Ukraine. His head, quite literally, is on the line.</p>
<p>Chinese nuclear forces are still inferior to American nuclear forces, but not for long. Thus, joining multilateral negotiations are not in China’s core interests as the Chinese Communist Party builds a nuclear arsenal fit for deterring American intervention with Chinese plans to seize Taiwan and perhaps other disputed territories. Of course China responded to President Trump’s post by calling it “<a href="https://www.reuters.com/world/china/china-says-trilateral-nuclear-disarmament-talks-with-us-russia-unreasonable-2025-08-27/">unreasonable and unrealistic</a>.” Hypocrisy on nuclear issues will not, however, stop Chinese communists from expanding their arsenal.</p>
<p>President Trump’s post is understandable given the world in which he finds himself. The President must try to deter continued Chinese and Russian aggression. If resuming nuclear testing helps, it is well worth the effort. What the President’s words will not do is start an arms race. That would require the United States to be a participant, and the Chinese and Russians left the starting blocks long ago.</p>
<p><em>Adam Lowther is the Co-founder and VP for Research at the National Institute for Deterrence Studies.  Views expressed in this article are the author’s own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/11/Why-is-the-US-Testing-Again-.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="238" height="66" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 238px) 100vw, 238px" /></a></p>
<p><a href="https://globalsecurityreview.com/understanding-president-trumps-truth-social-post-on-nuclear-testing/">Understanding President Trump’s Truth Social Post on Nuclear Testing?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/understanding-president-trumps-truth-social-post-on-nuclear-testing/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>“Resumption of Nuclear Testing”—Not So Fast!</title>
		<link>https://globalsecurityreview.com/resumption-of-nuclear-testing-not-so-fast/</link>
					<comments>https://globalsecurityreview.com/resumption-of-nuclear-testing-not-so-fast/#respond</comments>
		
		<dc:creator><![CDATA[James Petrosky]]></dc:creator>
		<pubDate>Thu, 13 Nov 2025 13:16:00 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Arms Control Association]]></category>
		<category><![CDATA[capability]]></category>
		<category><![CDATA[Comprehensive Nuclear Test Ban Treaty]]></category>
		<category><![CDATA[computational simulation]]></category>
		<category><![CDATA[containment preparations]]></category>
		<category><![CDATA[deterrence theory]]></category>
		<category><![CDATA[dynamic parity]]></category>
		<category><![CDATA[explosive testing]]></category>
		<category><![CDATA[modernization]]></category>
		<category><![CDATA[moratorium]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[national strategy]]></category>
		<category><![CDATA[Nevada National Security Sites]]></category>
		<category><![CDATA[nuclear arsenal]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[nuclear policy]]></category>
		<category><![CDATA[nuclear testing]]></category>
		<category><![CDATA[physics-based modeling]]></category>
		<category><![CDATA[proxy testing]]></category>
		<category><![CDATA[resolve]]></category>
		<category><![CDATA[simulation]]></category>
		<category><![CDATA[strategic clarity]]></category>
		<category><![CDATA[strategic signaling]]></category>
		<category><![CDATA[underground detonations]]></category>
		<category><![CDATA[underground testing]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31813</guid>

					<description><![CDATA[<p>On October 29, 2025, President Donald Trump announced on Truth Social that he “instructed the Department of War to start testing our Nuclear Weapons on an equal basis.” This statement, made just before a high stakes meeting with Chinese President Xi Jinping, marked a dramatic shift in American nuclear policy and raised immediate questions about [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/resumption-of-nuclear-testing-not-so-fast/">“Resumption of Nuclear Testing”—Not So Fast!</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>On October 29, 2025, President Donald Trump announced on Truth Social that he “instructed the Department of War to start testing our Nuclear Weapons on an equal basis.” This statement, made just before a high stakes meeting with Chinese President Xi Jinping, marked a dramatic shift in American nuclear policy and raised immediate questions about intent, capability, and strategic signaling.</p>
<p>For advocates of renewed nuclear weapons testing, stop packing for the journey to the Nevada National Security Sites (NNSS). No mushroom cloud or subterranean detonation is soon to take place. Anti-nuclear protestors should also stay home.</p>
<p>The truth is less exciting. No real changes will happen “immediately” that “light up the sky and shake the ground.” This is not to say that the announcement had no effect. In fact, the statement was indeed monumental and incredibly significant.</p>
<p>Contrary to public perception, the US has never ceased testing its nuclear weapon systems. What has changed since the 1992 self-imposed moratorium on high-yield explosive testing is the nature of those tests.</p>
<p>Before 1992, the US conducted 1,054 nuclear weapon test explosions. The country detonated 839 of those warheads <a href="https://www.dtra.mil/Portals/125/Documents/NTPR/newDocs/22-Underground%20Testing%20-%202015.pdf">underground</a>, mostly at the then-named Nevada Test Site, where the last halted test, <a href="https://nnss.gov/wp-content/uploads/2023/04/NNSS-ICEC-U-0046-Rev01.pdf">Icecap</a>, still stands as a memorial to the explosive testing days.</p>
<p>Several scientists involved in Icecap acknowledge that, owing to the extensive preparations undertaken, such as instrumentation, computational simulation, analysis, and test rigging, the most significant insights were gained from the limited number of unsuccessful tests. In other words, there is still great confidence in the performance and reliability of the American nuclear arsenal. It is this kind of “testing” to which President Trump’s declaration is likely referring.</p>
<p>Since 1992, testing has been through proxy systems that simulate a nuclear explosion’s unique energy output and then uses the results to validate physics models on advanced computer systems, known as physics-based modeling. This approach provides a way to validate the physics and predict the performance of a nuclear explosion under conditions that were never known in an underground test.</p>
<p>Scientists continuously conduct these tests, improving and refining them as added details are learned. They often report that scientists know much more now than possible from explosive testing.</p>
<p>Despite the president’s directive that testing “will begin immediately,” experts agree that resuming full-scale nuclear explosive testing is a complex and time-consuming endeavor. According to the Arms Control Association, it would take at least 36 months to prepare the Nevada Test Site for contained underground detonations.</p>
<p>This includes environmental assessments, infrastructure upgrades, and political approvals. This does not mean that explosive testing is impossible, but it represents a clear change in policy and a national effort to move nuclear weapons to the forefront of national strategy through an active nuclear explosive testing program.</p>
<p>The phrase “on an equal basis” is particularly provocative. It implies that nations like Russia and China may already be conducting nuclear explosive tests or at least advancing their capabilities in ways that challenge the spirit of the <a href="https://www.ctbto.org/our-mission/the-treaty">Comprehensive Nuclear Test Ban Treaty</a> (CTBT). Either of these should sound alarms and rightly must elicit a response.</p>
<p>The president has chosen precisely the response as outlined in the National Institute for Deterrence Studies’ (NIDS) <a href="https://thinkdeterrence.com/dynamic-parity/">Dynamic Parity report</a>, where a response matches the activities of adversaries, giving them the option to continue expanding their nuclear capabilities, knowing how America will respond, or cease and return to the table to negotiate for a more stable relationship.</p>
<p>The announcement of an “immediate” resumption of (explosive) testing is monumental because of its effect on deterrence. In his international policy book, <a href="https://archive.org/details/necessityforchoi0000henr/page/n9/mode/2up"><em>The Necessity of Choice</em></a>, Henry Kissinger writes that deterrence is the (mathematical) product of will and capability. Few would question that the US has a nuclear arsenal and delivery systems that can cause incredible damage and harm. However, there is <a href="https://www.state.gov/wp-content/uploads/2023/11/ISAB-Report-on-Deterrence-in-a-World-of-Nuclear-Multipolarity_Final-Accessible.pdf">growing criticism</a> and concern that the US lacks resolve to deploy its nuclear weapons even if an existential crisis arises.</p>
<p>Without clear signals of resolve, adversaries may doubt American willingness to act, weakening deterrence. This declaration supports that resolve without making a direct threat to any adversary. It simply puts them on notice.</p>
<p>Whether President Trump’s message leads to actual detonations or remains symbolic, it marks a turning point in American nuclear policy. It also aligns with the <em>Dynamic Parity</em> framework advocated by Curtis McGiffin and Adam Lowther, which calls for symmetrical deterrence and strategic clarity.</p>
<p>President Trump is demonstrating resolve, assuring allies, and highlighting American commitment to nuclear deterrence. The path forward should prioritize modernization, transparency, and diplomacy—not a return to the destructive rituals of past decades.</p>
<p><em>James C. Petrosky, PhD, is the President and Co-founder of the National Institute for Deterrence Studies and Professor Emeritus of the Air Force Institute of Technology. Views expressed in this article are the authors own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/11/Resumption-of-Nuclear-Testing-Not-So-Fast.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="212" height="59" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 212px) 100vw, 212px" /></a></p>
<p><a href="https://globalsecurityreview.com/resumption-of-nuclear-testing-not-so-fast/">“Resumption of Nuclear Testing”—Not So Fast!</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/resumption-of-nuclear-testing-not-so-fast/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How Taiwan Could Earn Trump a Nobel Peace Prize</title>
		<link>https://globalsecurityreview.com/how-taiwan-could-earn-trump-a-nobel-peace-prize/</link>
					<comments>https://globalsecurityreview.com/how-taiwan-could-earn-trump-a-nobel-peace-prize/#respond</comments>
		
		<dc:creator><![CDATA[Lindell Lucy]]></dc:creator>
		<pubDate>Mon, 10 Nov 2025 13:02:37 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Deterrence & Foreign Policy]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31796</guid>

					<description><![CDATA[<p>“Words matter,” explained Secretary of War Pete Hegseth, while delivering a statement on why President Donald Trump rebranded the Department of Defense the Department of War. Trump’s executive order states that the new name signals American resolve and better “ensures peace through strength.” Earlier this year, Trump signed another executive order, “Restoring Names that Honor [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/how-taiwan-could-earn-trump-a-nobel-peace-prize/">How Taiwan Could Earn Trump a Nobel Peace Prize</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>“Words matter,” <a href="https://www.bbc.com/news/articles/cgr9r4qr0ppo">explained</a> Secretary of War Pete Hegseth, while delivering a statement on why President Donald Trump rebranded the Department of Defense the Department of War. Trump’s <a href="https://www.whitehouse.gov/presidential-actions/2025/09/restoring-the-united-states-department-of-war/">executive order</a> states that the new name signals American resolve and better “ensures peace through strength.” Earlier this year, Trump signed another executive order, “<a href="https://www.whitehouse.gov/presidential-actions/2025/01/restoring-names-that-honor-american-greatness/">Restoring Names that Honor American Greatness</a>,” which changed the name of the Gulf of Mexico to the Gulf of America.</p>
<p>During his first term, Trump engaged in other symbolic actions that upended the status quo, such as when he moved the US embassy in Israel from Tel Aviv to Jerusalem, <a href="https://trumpwhitehouse.archives.gov/briefings-statements/president-donald-j-trump-keeps-promise-open-u-s-embassy-jerusalem-israel/?utm_source=chatgpt.com">declaring</a>, “We finally acknowledge the obvious: that Jerusalem is Israel’s capital.” He also became the first sitting US president to <a href="https://www.cnn.com/interactive/2018/06/politics/trump-kim-summit-cnnphotos/">meet</a> with a North Korean leader, smashing decades of diplomatic norms.</p>
<p>Given Trump’s willingness to talk to anyone, to call it like he sees it, and to use symbolism to project American strength, it should come as no surprise that he is unafraid of reconsidering policies related to China and Taiwan. He has already done so.</p>
<p>By almost every measure, Taiwan is an independent and sovereign country. Thus, upgrading the American Institute in Taiwan (AIT), the de facto embassy, to an official US embassy is worthy of consideration, even if it would mean a fundamental change to American Taiwan policy.</p>
<p>Such a move would undoubtedly cause a Chinese backlash, but it would likely make it harder for China to claim that Taiwan is a rebellious province—a position unsupported by history. Taiwan is Taiwanese. Eliminating names like Chinese Taipei at the 2028 Los Angeles Olympics is a good idea and recognizes Taiwan for what it is—an independent country.</p>
<p>If shaking hands with a North Korean dictator is okay, then shaking hands with a Taiwanese president should also be acceptable. Kowtowing to China is the wrong answer. The truth is, the US is preparing to militarily defend Taiwan. Restoring the formal alliance with Taiwan is a natural step. Sacrificing Taiwan for cheap Chinese goods and a more powerful China is a bad idea.</p>
<p>Trump once famously <a href="https://www.usatoday.com/story/news/politics/elections/2016/07/21/donald-trump-republican-convention-acceptance-speech/87385658/">claimed</a>, “I alone can fix it,” referring to America’s broken system of governance. In the special case of US-Taiwan relations, he may be correct.</p>
<p>As part of his quest to “make America great again,” Trump could begin reversing the damage done by former President Jimmy Carter, who abrogated the alliance with Taiwan in 1979. That was a mistake that deserves correcting.</p>
<p>Taiwanese President Lai Ching-te (賴清德) recently <a href="https://www.reuters.com/world/china/china-takeover-taiwan-would-threaten-us-too-taiwan-president-says-2025-10-07/">argued</a> that Trump would deserve a Nobel Peace Prize if he could convince Chinese President Xi Jinping (習近平) to renounce the use of force to annex Taiwan. This would presumably entail the repeal of China’s 2005 <a href="https://www.csis.org/analysis/employing-non-peaceful-means-against-taiwan">Anti-Secession Law</a>, if not China’s formal recognition of Taiwan’s sovereignty.</p>
<p>To have any chance of success, Trump would need to give Xi a compelling reason for choosing peace. He would need to give Taiwan a credible way to deter an invasion, at least until China proved trustworthy.</p>
<p>Nuclear weapons are currently the only weapons terrifying enough to accomplish these objectives. This is a fact <a href="https://www.politico.eu/article/nato-nukes-volodymyr-zelenskyy-war-ukraine-aid-russia/">underscored</a> by Ukrainian President Volodymyr Zelenskyy, who last year told a European Council summit, “Either Ukraine will have nuclear weapons and that will be our protection or we should have some sort of alliance [such as NATO].”</p>
<p>One thing that Trump and Xi have in common is that they both wish to go down in history as the greatest leaders of their respective countries. Until now, Xi has aimed to achieve greatness by conquering Taiwan—something no previous Chinese communist leader did.</p>
<p>Invading Taiwan would be a costly gamble, risking trillions of dollars and millions of lives, with an uncertain chance of success. On the other hand, committing to peace is simple and costs nothing. Finding a way for China to preserve “face” is the critical hurdle for the US.</p>
<p>President Lai did not mention it, but if the Nobel Peace Prize were awarded to Trump, then Xi would be a co-recipient. That may be a point worth considering.</p>
<p>Imagine two versions of the future, one in which Xi orders the invasion of Taiwan and one in which he wins the Nobel Peace Prize for recognizing Taiwan’s independence. It is the latter scenario that would ensure both Xi and Trump go down in history as great leaders.</p>
<p>That is a conversation worth having in future meetings between Trump and Xi. China is fundamentally an aggressive nation, but that aggression can be checked while still ensuring that the Chinese Communist Party maintains international respect.</p>
<p><em>Lindell Lucy lives in Honolulu. He has a bachelor’s degree in philosophy from Stanford University and a master’s degree in international relations from the Harvard Extension School. Views expressed in this article are the author&#8217;s own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/11/How-Taiwan-Could-Earn-Trump-a-Nobel-Prize.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="256" height="71" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 256px) 100vw, 256px" /></a></p>
<p><a href="https://globalsecurityreview.com/how-taiwan-could-earn-trump-a-nobel-peace-prize/">How Taiwan Could Earn Trump a Nobel Peace Prize</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/how-taiwan-could-earn-trump-a-nobel-peace-prize/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Deterrence of North Korea and Iran: Interests-Objectives-Analysis Framework</title>
		<link>https://globalsecurityreview.com/extended-deterrence-of-north-korea-and-iran-interests-objectives-analysis-framework/</link>
					<comments>https://globalsecurityreview.com/extended-deterrence-of-north-korea-and-iran-interests-objectives-analysis-framework/#respond</comments>
		
		<dc:creator><![CDATA[Nathan Heath]]></dc:creator>
		<pubDate>Tue, 07 Oct 2025 12:05:00 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[activities]]></category>
		<category><![CDATA[aggression containment]]></category>
		<category><![CDATA[alliance cooperation]]></category>
		<category><![CDATA[allies]]></category>
		<category><![CDATA[American warfighter]]></category>
		<category><![CDATA[burden sharing]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[comparative analysis]]></category>
		<category><![CDATA[counterterrorism]]></category>
		<category><![CDATA[credible deterrence]]></category>
		<category><![CDATA[decision analysis]]></category>
		<category><![CDATA[Defense Spending]]></category>
		<category><![CDATA[deterrence framework]]></category>
		<category><![CDATA[deterrence strategy]]></category>
		<category><![CDATA[DPRK]]></category>
		<category><![CDATA[Energy Security]]></category>
		<category><![CDATA[extended deterrence]]></category>
		<category><![CDATA[global engagement]]></category>
		<category><![CDATA[Gulf States]]></category>
		<category><![CDATA[hamas]]></category>
		<category><![CDATA[homeland defense]]></category>
		<category><![CDATA[Indo-Pacific]]></category>
		<category><![CDATA[industrial base]]></category>
		<category><![CDATA[interests]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[kinetic operations]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[military assets]]></category>
		<category><![CDATA[military strikes]]></category>
		<category><![CDATA[mutual defense treaties]]></category>
		<category><![CDATA[National defense]]></category>
		<category><![CDATA[national defense strategy]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[nonproliferation]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[nuclear proliferation]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[objectives]]></category>
		<category><![CDATA[Partners]]></category>
		<category><![CDATA[proliferation control]]></category>
		<category><![CDATA[proxy networks]]></category>
		<category><![CDATA[regional deterrence]]></category>
		<category><![CDATA[regional stability]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[sanctions]]></category>
		<category><![CDATA[security cooperation]]></category>
		<category><![CDATA[sovereignty]]></category>
		<category><![CDATA[Straits of Hormuz]]></category>
		<category><![CDATA[strategic shifts]]></category>
		<category><![CDATA[threat scenarios]]></category>
		<category><![CDATA[transnational threats]]></category>
		<category><![CDATA[two-front war]]></category>
		<category><![CDATA[U.S. military power]]></category>
		<category><![CDATA[U.S. policy]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[uranium enrichment]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31642</guid>

					<description><![CDATA[<p>On June 22, the United States struck multiple Iranian nuclear sites, marking a tipping point in its deterrence of the Islamic Republic’s nuclear ambitions. It was no longer enough to institute unilateral or multilateral sanctions against the regime, carry out strikes against its proxies, or support Israel’s own military action; direct American military power was [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/extended-deterrence-of-north-korea-and-iran-interests-objectives-analysis-framework/">Deterrence of North Korea and Iran: Interests-Objectives-Analysis Framework</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>On June 22, the United States <a href="https://www.nytimes.com/live/2025/06/21/world/iran-israel-trump">struck</a> multiple Iranian nuclear sites, marking a tipping point in its deterrence of the Islamic Republic’s nuclear ambitions. It was no longer enough to institute unilateral or multilateral sanctions against the regime, carry out strikes against its proxies, or support Israel’s own military action; direct American military power was needed against Iran itself. After all, Iran was <a href="https://www.timesofisrael.com/mossad-says-iran-15-days-from-bomb-us-agencies-still-say-up-to-a-year-report/">dangerously close</a> to producing a nuclear weapon.</p>
<p>The near completion of Iran’s nuclear weapon brings to mind another rogue state’s activities. In 2006, after years of global efforts aimed at preventing the Kim regime from obtaining nuclear weapons, North Korea (DPRK) conducted its first nuclear test. Today, the DPRK has an <a href="https://www.armscontrol.org/factsheets/arms-control-and-proliferation-profile-north-korea">estimated</a> 50 nuclear weapons and fissile material for 6 or 7 more.</p>
<p>An in-depth comparison of US engagement with Iran and the DPRK’s nuclear programs requires a much longer paper. However, a brief comparative analysis of American deterrence of these adversaries is possible. Applying national interests, objectives, and activities, a methodology employed by decision analysis experts yields interesting results.</p>
<p>Globally, the United States has an enduring interest in safeguarding its national security and sovereignty. Underneath this enduring interest, it has a core objective of defending allies and partners, including through credible deterrence (e.g., preventing conventional and/or nuclear attacks on allies and partners by the DPRK, China, Russia, and Iran). Other <a href="https://www.mei.edu/publications/us-policy-middle-east-second-quarter-2025-report-card">major American objectives</a> include <a href="https://nationalinterest.org/feature/the-five-keys-of-donald-trumps-grand-strategy">safeguarding</a> the free flow of commerce, countering <a href="https://www.dni.gov/files/ODNI/documents/assessments/ATA-2025-Unclassified-Report.pdf">transnational threats</a>, preventing <a href="https://armedservices.house.gov/uploadedfiles/indopacom_posture_statement_2025.pdf">regional domination or aggression</a>, and <a href="https://breakingdefense.com/2025/08/trump-wants-to-stop-nuclear-proliferation-stratcom-could-play-a-major-role/">advancing nonproliferation</a>.</p>
<p>The United States advances deterrence through a range of activities, including the presence of its own military assets and security cooperation with allies and partners. In the Indo-Pacific, this includes mutual defense treaties with Australia, the Philippines; South Korea, and Japan (the latter two of which are explicitly covered by the US nuclear umbrella); <a href="https://www.taipeitimes.com/News/front/archives/2025/05/31/2003837800#:~:text=The%20US%20plans%20to%20ramp%20up%20weapons%20sales,two%20US%20officials%20said%20on%20condition%20of%20anonymity.">arms</a> sales to Taiwan; and <a href="https://www.army.mil/article/286395/exercise_talisman_sabre_2025_to_showcase_us_australia_alliance">military exercises</a> with allies.</p>
<p>More recently, the Trump administration emphasized <a href="https://uscnpm.org/2025/06/24/the-trump-administrations-indo-pacific-strategy/">increased allied defense spending</a> to support “burden-sharing.” Given the limitations of the American industrial base, this is necessary even as the US <a href="https://www.koreatimes.co.kr/foreignaffairs/20250131/hegseth-reaffirms-strong-alliance-with-s-korea-during-1st-phone-talks-with-seouls-defense-chief">maintains</a> efforts to prevent Chinese and North Korean aggression.</p>
<p>Deterrence against North Korea is successful insofar as it keeps the North from invading the South or launching nuclear strikes on US Indo-Pacific allies. However, this deterrence is increasingly complicated by Chinese and Russian <a href="https://www.fpri.org/article/2025/03/russia-china-north-korea-relations-obstacles-to-a-trilateral-axis/">protection</a> of the DPRK through mutual defense treaties.</p>
<p>This lends greater urgency to the American call for allies to increase defense spending, as there is a real risk of <a href="https://www.atlanticcouncil.org/in-depth-research-reports/report/the-united-states-and-its-allies-must-be-ready-to-deter-a-two-front-war-and-nuclear-attacks-in-east-asia/">simultaneous conflict</a> with China and North Korea, a scenario requiring substantial military assets in the region. Fulfilling the objective of regional deterrence also requires containing aggression from adversaries and bolstering security cooperation with allies and partners.</p>
<p>The United States supports deterrence in the Middle East by deploying its military forces and cooperating with allies and partners. However, regional deterrence, which <a href="https://cgsr.llnl.gov/sites/cgsr/files/2025-05/Extended%20Deterrence%20in%20a%20Multipolar-Nuclear-World-Workshop-Summary.pdf">does not</a> formally extend the US nuclear umbrella to regional allies and partners (including Israel), often manifests as kinetic operations against adversaries, whether through security assistance or direct attacks. Thus, in the Middle East, deterrence also means advancing the goals of counter proliferation and degrading terror groups who threaten allies.</p>
<p>Unlike in the Indo-Pacific, where the United States <a href="https://www.war.gov/News/News-Stories/Article/Article/4202504/hegseth-outlines-us-vision-for-indo-pacific-addresses-china-threat/">prefers</a> to contain aggression and expansion from nuclear-armed adversaries without firing a shot, in the Middle East, it will <a href="https://instituteofgeoeconomics.org/en/research/2025040904/">employ</a> kinetic means to fulfill its objectives. For decades, the United States deterred Iran through sanctions, negotiations, and the threat of military action. It was when President Trump believed Iran’s uranium enrichment program was “<a href="https://www.politifact.com/article/2025/jun/23/Tulsi-Gabbard-Iran-nuclear-weapon-Donald-Trump/">at its highest levels and…unprecedented for a state without nuclear weapons</a>” that the US conducted kinetic attack.</p>
<p>The deep rifts in Middle East politics complicates the activities needed to maintain deterrence in the region. Prospects for security cooperation between Israel and the Gulf states, for example, are <a href="https://theconversation.com/israeli-strike-in-doha-crosses-a-new-line-from-which-relations-with-gulf-may-not-recover-264954">challenging</a> given the history of the Arab-Israeli conflict, including Israel’s recent strike against Hamas in Qatar.</p>
<p>Deterrence must also account for energy security concerns, given that US attempts to contain a nuclear-armed Iran may lead the regime to weaponize its <a href="https://www.atlanticcouncil.org/blogs/new-atlanticist/four-questions-and-expert-answers-about-irans-threats-to-close-the-strait-of-hormuz/">control</a> over the Straits of Hormuz. It is also <a href="https://www.cfr.org/article/assessing-effect-us-strikes-iran">unclear</a> how far back American strikes set Iran’s nuclear program. If Iran’s proxy network <a href="https://www.fdd.org/analysis/2025/06/28/iran-is-severely-weakened-but-remains-a-regional-threat/">persists</a>, they can also commit further violence against the United States, its allies, and partners through attacks on military, commercial, and civilian targets.</p>
<p>None of these challenges are simple. In the coming years American deterrence guarantees to allies and partners may look very different as the nation <a href="https://www.fdd.org/analysis/policy_briefs/2025/02/14/stark-strategic-realities-hegseth-tells-nato-u-s-must-prioritize-pacific-deterrence/">shifts focus</a> to the homeland and the Indo-Pacific. It remains to be seen how this imperative is realized in the forthcoming <em>National Defense Strategy</em>. Some critics <a href="https://breakingdefense.com/2025/09/analysts-await-forthcoming-nds-to-clear-up-defense-policy-contradictions/">note</a> that, in practice, the United States remains heavily focused on the Middle East and Europe. Much of the ability to deter Iran and North Korea will be determined by these larger strategic shifts.</p>
<p>As American decision-makers face questions about effectively deploying American power across the globe, analyzing national interests, objectives, and activities can provide a helpful framework. Assessing the requirements needed to advance larger regional goals brings trade-offs into focus, better preparing the American warfighter for multiple threat scenarios. In short, this approach can yield meaningful results for those in the decision-making chair at critical moments when faced with complex problems, including maintaining credible deterrence.</p>
<p><em>Nathan Heath is an analyst at NSI. Views expressed are his own.</em></p>
<p><em><a href="http://globalsecurityreview.com/wp-content/uploads/2025/10/Extended-Deterrence-of-North-Korea-and-Iran-Interests-Objectives-Analysis-Framework.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="238" height="66" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 238px) 100vw, 238px" /></a></em></p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/extended-deterrence-of-north-korea-and-iran-interests-objectives-analysis-framework/">Deterrence of North Korea and Iran: Interests-Objectives-Analysis Framework</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/extended-deterrence-of-north-korea-and-iran-interests-objectives-analysis-framework/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Deterring Nuclear Terrorism in the Era of Great Power Competition</title>
		<link>https://globalsecurityreview.com/deterring-nuclear-terrorism-in-the-era-of-great-power-competition/</link>
					<comments>https://globalsecurityreview.com/deterring-nuclear-terrorism-in-the-era-of-great-power-competition/#respond</comments>
		
		<dc:creator><![CDATA[Alexis Schlotterback]]></dc:creator>
		<pubDate>Thu, 11 Sep 2025 12:10:13 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Deterrence & Foreign Policy]]></category>
		<category><![CDATA[Diplomacy]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[Arms Control]]></category>
		<category><![CDATA[Atomic]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cold war]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[global security]]></category>
		<category><![CDATA[Hezbollah]]></category>
		<category><![CDATA[ICBM]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[Taliban]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[Title 22]]></category>
		<category><![CDATA[UN]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31498</guid>

					<description><![CDATA[<p>As the Cold War ended and new counterterrorism priorities took root in the 2000s, the threat of nuclear terrorism cemented itself as the ultimate catastrophic scenario. Dick Cheney famously stated shortly after September 11, 2001, “If there was even a [one] percent chance of terrorists getting a weapon of mass destruction, and there has been [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/deterring-nuclear-terrorism-in-the-era-of-great-power-competition/">Deterring Nuclear Terrorism in the Era of Great Power Competition</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As the Cold War ended and new counterterrorism priorities took root in the 2000s, the threat of nuclear terrorism cemented itself as the ultimate catastrophic scenario. Dick Cheney famously <a href="https://www.rutlandherald.com/news/a-dangerous-new-doctrine/article_d3f0ec56-ed87-578c-b2ae-db58c7929d9c.html">stated</a> shortly after September 11, 2001, “If there was even a [one] percent chance of terrorists getting a weapon of mass destruction, and there has been a small probability of such an occurrence for some time, the United States must now act as if it were a certainty.”</p>
<p>Great care was taken to <a href="https://armscontrolcenter.org/fact-sheet-the-nunn-lugar-cooperative-threat-reduction-program-2/">secure</a> the Soviet Union’s nuclear weapons following the collapse of the state for this very purpose. The Obama administration later <a href="https://obamawhitehouse.archives.gov/the-press-office/2016/03/29/fact-sheet-nuclear-security-summits-securing-world-nuclear-terrorism">held </a>four nuclear security summits to inspire international cooperation for increasing physical security at nuclear facilities. Today, the National Nuclear Security Administration’s (NNSA) Office of Material Management and Minimization leads the effort to <a href="https://www.energy.gov/nnsa/qualification-new-leu-fuels-research-reactors">convert</a> the fuel in various international civilian reactors from weapons-usable highly enriched uranium (HEU) to less risky low enriched uranium (LEU).</p>
<p>Despite these successes, it remains difficult to definitively discern whether specific action prevented and deterred nuclear terrorism or if other factors are at play for why such an event never materialized. It is a fact that no terrorist group has yet successfully pursued a strategy to develop a nuclear device. Yet, it may very well be the case that no group has ever legitimately tried. Terrorism as a strategy of targeted political violence may be largely incompatible with the consequences of acquiring and detonating an improvised nuclear device.</p>
<p>In 2004, US President George W. Bush received unanimous support from the UN for a resolution calling on countries to enact stronger controls to block terrorists from acquiring biological, chemical, and nuclear weapons. Since then, American policy turned away from the global war on terror and back to the strategic competition found in the Cold War. The fourth International Conference on Nuclear Security (<a href="https://www.armscontrol.org/act/2024-06/news/states-discuss-nuclear-security-iaea">ICONS</a>) held in May 2024 was the first of its kind to conclude without a ministerial declaration. Yet, the risk of nuclear terrorism has arguably not grown despite a shift in national security priorities.</p>
<p>In a 2019 <a href="https://thebulletin.org/2019/11/would-terrorists-set-off-a-nuclear-weapon-if-they-had-one-we-shouldnt-assume-so/">piece</a> written for the <em>Bulletin of Atomic Scientists</em>, authors Christopher McIntosh and Ian Storey argue that there are four main options for a terrorist group that acquires a nuclear weapon: blackmail, opacity, latency, and dormancy. These options fall on a spectrum from overt threats of nuclear use to keeping the existence of a nuclear device a secret until its detonation. In all of these strategies, however, deterring a nuclear attack is possible as the outcome for use is the same: guaranteed massive retaliation from state governments.</p>
<p>As outlined by Keith Payne in a National Institute of Public Policy <a href="https://www.tandfonline.com/doi/pdf/10.1080/01495933.2012.647528">report</a>, some scholars incorrectly assume that terrorist groups are undeterrable because they are irrational and possess no territory to hold at risk for assured retaliation. Terrorism is a fundamentally <a href="https://thesoufancenter.org/intelbrief-the-state-of-global-terrorism-remains-intensely-local/">local</a> endeavor and maintaining the <a href="https://www.pewresearch.org/global/2006/05/23/where-terrorism-finds-support-in-the-muslim-world/">support</a> from the surrounding populations is key to preserving the cause. A deterrence by punishment scenario therefore also involves inciting local communities to turn on the terrorists they harbor.</p>
<p>Title 22 of the United States Code, Section 2656f(d) defines terrorism as “premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups or clandestine agents, usually intended to influence an audience.” The key word is “premeditated” and supports the argument that groups employing terrorism are indeed rational actors, with their decisions about <a href="https://www.journals.uchicago.edu/doi/abs/10.1017/S0022381608080419?journalCode=jop">organizational structure</a>, <a href="https://financialservices.house.gov/news/documentsingle.aspx?DocumentID=403893">monitoring of funds</a>, and <a href="https://www.washingtoninstitute.org/policy-analysis/digital-battlefield-how-terrorists-use-internet-and-online-networks-recruitment-and">selection of recruits</a> providing evidence to support this statement. As with any rational actor, deterrence is possible.</p>
<p>A deterrence-by-denial strategy, although more difficult, is also legitimate. Ensuring states make it as difficult as possible for groups to acquire material aims to deter groups from even trying. Convincing states to do this may then require assured retaliation from other states. Perhaps there is a reason why former Secretary of Defense William Perry’s <a href="https://www.brookings.edu/events/crisis-on-the-korean-peninsula-implications-for-u-s-policy-in-northeast-asia/">fears</a> of North Korea selling plutonium to the highest bidder never materialized. For a regime already well-familiar with the international community’s condemnation of its nuclear program, giving others another reason to take out its nuclear facilities by selling material to a group would be strategically unwise.</p>
<p>However, for a nuclear peer of the United States, such as Russia, holding it responsible for lax security is more difficult. In 2011, a Moldovan lawyer was <a href="https://www.vice.com/en/article/an-unknown-black-marketeer-from-russia-may-have-the-fuel-for-a-nuclear-bomb/">caught</a> attempting to sell HEU on the black market. Forensic analysis confirmed the material very likely originated from Russia. This is not the first time weapon-usable nuclear material has gone <a href="https://bellona.org/news/nuclear-issues/radioactive-waste-and-spent-nuclear-fuel/2002-11-gan-says-nuclear-materials-have-been-disappearing-from-russian-plants-for-10-years">missing</a> from Russia. Still, Russia, like any other state, is motivated to prevent nuclear terrorism within its borders; the likeliest place for such an attack to happen is near the facility where material goes missing.</p>
<p>In physicist Michael Levi’s <a href="https://issues.org/levi-2/">opinion</a>, deterrence credibility is better served with certain attribution following an attack. Going further than assessing a relationship between a state program and a terrorist group, nuclear forensics attempts to identify exactly which country interdicted material originated. At best, a state would be forced to admit poor security practices that led to the theft of material. If used in a terror device, this excuse may not hold up to international scrutiny with any community affected still demanding its pound of flesh.</p>
<p>Neither a strategy of deterrence by punishment or by denial requires the level of explicit policy that was seen in the early 2000s. While not unhelpful, it is rather the continued existence of nuclear-armed states with massive conventional superiority over terror groups that may be the most successful tool in combating the risk of nuclear terrorism. Deterrence against nuclear terrorism, for now, is holding.</p>
<p><em>Alexis Schlotterback is a Senior Analyst at the National Institute for Deterrence Studies. Views expressed are the author&#8217;s own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/09/Nuclear-Terrorism-Deterrence.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="263" height="73" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 263px) 100vw, 263px" /></a></p>
<p><a href="https://globalsecurityreview.com/deterring-nuclear-terrorism-in-the-era-of-great-power-competition/">Deterring Nuclear Terrorism in the Era of Great Power Competition</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/deterring-nuclear-terrorism-in-the-era-of-great-power-competition/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Failed Deterrence and Misplaced Compellence in Gaza</title>
		<link>https://globalsecurityreview.com/failed-deterrence-and-misplaced-compellence-in-gaza/</link>
					<comments>https://globalsecurityreview.com/failed-deterrence-and-misplaced-compellence-in-gaza/#comments</comments>
		
		<dc:creator><![CDATA[Justin Leopold-Cohen]]></dc:creator>
		<pubDate>Thu, 04 Sep 2025 12:03:45 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Deterrence & Foreign Policy]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[ceasefire]]></category>
		<category><![CDATA[civilians]]></category>
		<category><![CDATA[compellence]]></category>
		<category><![CDATA[deterred]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[endured]]></category>
		<category><![CDATA[first]]></category>
		<category><![CDATA[Gaza]]></category>
		<category><![CDATA[hamas]]></category>
		<category><![CDATA[Here is the comma-separated list of the top 30 keywords from the article: **israel]]></category>
		<category><![CDATA[Hezbollah]]></category>
		<category><![CDATA[hope]]></category>
		<category><![CDATA[houthis]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[military]]></category>
		<category><![CDATA[nuclear]]></category>
		<category><![CDATA[october]]></category>
		<category><![CDATA[offensive]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[state]]></category>
		<category><![CDATA[they]]></category>
		<category><![CDATA[two]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[while]]></category>
		<category><![CDATA[would]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31470</guid>

					<description><![CDATA[<p>The October 7, 2023, Hamas surprise attack on Israel proved that Israel’s strategy of deterrence was a failure. After two destructive wars in Gaza, in 2014 and 2021, the hope that Hamas endured enough was proven wrong. In reality, it was biding time as Israel’s security apparatus grew overconfident and pivoted toward other threats: Hezbollah, militancy in [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/failed-deterrence-and-misplaced-compellence-in-gaza/">Failed Deterrence and Misplaced Compellence in Gaza</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The October 7, 2023, Hamas surprise attack on Israel proved that Israel’s strategy of deterrence was a failure. After <a href="https://israelpolicyforum.org/brief-history-of-israel-hamas-ceasefire-agreements/">two destructive wars</a> in Gaza, in 2014 and 2021, the hope that Hamas endured enough was proven wrong. In reality, it was <a href="https://ctc.westpoint.edu/the-road-to-october-7-hamas-long-game-clarified/">biding time</a> as Israel’s security apparatus grew overconfident and pivoted toward <a href="https://warontherocks.com/2024/02/how-was-israel-caught-off-guard/">other threats</a>: Hezbollah, militancy in the West Bank, and the Iran nuclear program.</p>
<p>So sure was Israel in its southern security that intelligence reports were downplayed; the military even<a href="https://www.timesofisrael.com/2-commando-companies-said-diverted-from-gaza-border-to-west-bank-days-before-oct-7/"> redeployed</a> troops from Gaza prior to the October 7. The brutality of the attack and horror at the hostage crisis left Israel so shocked that it delayed a ground invasion for <a href="https://www.reuters.com/world/middle-east/major-moments-israel-gaza-war-2025-01-15/">20 days</a>.</p>
<p>Despite the delay, calls for <a href="https://www.intersos.org/en/ceasefirenow-open-call-for-an-immediate-ceasefire-in-the-gaza-strip-and-israel/">ceasefire</a> and accusations of <a href="https://www.newsweek.com/holocaust-historian-israel-committing-genocide-raz-segal-1835346">genocide</a> existed before Israel’s offensive began. All the same, every first-semester international relations student knew what would happen next: with Hamas no longer deterred, Israel’s only recourse was <a href="https://tnsr.org/2020/02/coercion-theory-a-basic-introduction-for-practitioners/">compellence</a>.</p>
<p>Compellence theory is simply acting on the threat that keeps your adversary deterred. Israel needed to compel Hamas to surrender the hostages, disarm, and realize that attacking Israel is a bad idea—<a href="https://www.washingtoninstitute.org/policy-analysis/israels-war-aims-and-principles-post-hamas-administration-gaza">restoring deterrence</a>. For nearly two years since, Israel has tested compellence theory; at best, with mixed results, not only with Hamas, but across the region.</p>
<p>The Lebanese terror group Hezbollah launched its <a href="https://www.aljazeera.com/news/2023/10/8/israel-hezbollah-exchange-fire-raising-regional-tensions">own attack</a> on October 8, 2023, which by the end saw the <a href="https://www.jpost.com/middle-east/article-831050">launch</a> of approximately 10,000–15,000 rockets and 2,500 drone attacks that displaced at least <a href="https://thehill.com/policy/defense/4893654-hezbollah-has-fired-more-than-8000-rockets-toward-israel-since-october-7-ambassador/">70,000</a> Israelis and killed 75 soldiers and 45 civilians. Israel’s effort to restore deterrence devastated Hezbollah, killing 2,500–3,000 fighters, eliminating the <a href="https://www.understandingwar.org/sites/default/files/Israel%20Lebanon%20Victory%20PDF.pdf">majority</a> of its leadership, through an exploding beeper attack in advance of a ground invasion. <a href="https://www.understandingwar.org/sites/default/files/Israel%20Lebanon%20Victory%20PDF.pdf">Seeing</a> their losses, the group agreed to partially <a href="https://www.understandingwar.org/sites/default/files/Israel%20Lebanon%20Victory%20PDF.pdf">disarm</a> and <a href="https://www.nytimes.com/2025/06/17/world/middleeast/lebanon-israel-iran-war-hezbollah.html">stay out</a> of further hostilities, being effectively compelled.</p>
<p>In Yemen, the <a href="https://arabcenterdc.org/resource/a-timeline-of-the-yemen-crisis-from-the-1990s-to-the-present/">Houthis</a> likewise joined the attack on Israel with rocket and drone attacks, as well as targeting ships off its coast, causing significant <a href="https://www.cfr.org/in-brief/how-houthi-attacks-red-sea-threaten-global-shipping">supply-chain</a> disruptions. The attacks prompted the United States (US) to designate them a terrorist group and launch an aerial campaign alongside the United Kingdom—on top of Israel’s responses.</p>
<p>The Houthis endured <a href="https://gulfnews.com/world/gulf/yemen/red-sea-erupts-again-houthis-sink-two-ships-defy-trump-truce-will-us-strike-back-1.500194427">severe damage</a> to its offensive infrastructure and lost hundreds of fighters but still managed to occasionally launch limited attacks. The Houthis are more weakened than compelled.</p>
<p>Iran, the <a href="https://www.usatoday.com/story/news/world/israel-hamas/2024/01/30/iran-backed-groups-middle-east/72405584007/">financier</a> of Hamas, Hezbollah, and the Houthis, for the first time acted against Israel directly. Retaliating against Israeli strikes, Iran <a href="https://apnews.com/article/israel-iran-timeline-tensions-conflict-66764c2843d62757d83e4a486946bcb8">launched</a> ballistic missile and drone salvos against Israel in April and October of 2024. The tit-for-tat came to a head over <a href="https://www.timesofisrael.com/the-israel-iran-war-by-the-numbers-after-12-days-of-fighting/">12 days</a> in June 2025, as the two exchanged strikes while Israel tried to destroy Iran’s nuclear weapons program.</p>
<p>Though the damage Iran’s nuclear capability took is <a href="https://www.israelhayom.com/2025/07/17/report-following-mixed-results-israel-us-pondering-additional-strikes-on-iran/">debated</a>, what is known is Israel’s <a href="https://taskandpurpose.com/news/iran-israel-air-defense-rising-lion/">air superiority</a> destroyed nearly all of Iran’s defense framework and eliminated several <a href="https://www.bbc.com/news/articles/c2lk5j18k4vo">senior military staff</a>.</p>
<p>Israel endured significant damage as Iran managed to breach its defenses on a few occasions, and the two have since agreed to a <a href="https://www.bbc.com/news/articles/czjk3kxr3zno">ceasefire</a>, while simultaneously pledging readiness to attack in the future. So perhaps, they are mutually deterred for now.</p>
<p>Syria recently entered a new phase of its <a href="https://www.cfr.org/global-conflict-tracker/conflict/conflict-syria">civil war</a> following the downfall of Assad, an Israeli push to expand its buffer region, and the emergence of the Hayat Tahrir al-Sham (HTS) faction. HTS is led by Abu Mohammed al-Julani, an Islamic State affiliate who recently began targeting members of Syria’s minority populations, largely the Druze.</p>
<p>Israel <a href="https://edition.cnn.com/2025/07/15/middleeast/israel-strikes-syria-sectarian-clashes-druze-intl">intervened</a> to protect the Druze, striking HTS sites until Julani quickly <a href="https://www.reuters.com/world/middle-east/israel-syria-agree-ceasefire-israel-allows-syrian-troops-limited-access-sweida-2025-07-18/">agreed to</a> withdraw his troops from the Druze-populated areas. Prior to that intervention, there were rumors of Syria joining the <a href="https://www.jpost.com/middle-east/abraham-accords/article-859223">Abraham Accords</a>. While compellence worked to protect the Druze in the short term, it may have derailed a long-term peace deal.</p>
<p>Hamas remains the outlier. Ceasefire talks are again looking to <a href="https://www.bbc.com/news/articles/cqjq9p87vdvo">collapse</a>. The message is that despite the <a href="https://www.al-monitor.com/originals/2025/01/gazas-destruction-numbers">devastation</a>, loss of <a href="https://www.bbc.com/news/world-middle-east-67103298">leadership</a>, approximately <a href="https://acleddata.com/2024/10/06/after-a-year-of-war-hamas-is-militarily-weakened-but-far-from-eliminated/">17,000</a> lost fighters, and thousands of civilians killed in the crossfire, it can endure more. Israel’s attempt at compellence was so intense, that it sparked worldwide protests and allegations of <a href="https://www.reuters.com/world/middle-east/key-takeaways-world-court-decision-israei-genocide-case-2024-01-26/">genocide</a>. Yet, rather than agree to Israel’s terms, Hamas continues to hold out, giving a statement that they will <a href="https://www.bbc.com/news/articles/ce35nx49reko">continue to fight</a> until a Palestinian state is established.</p>
<p>The US attempted to broker multiple ceasefires, with some success in <a href="https://www.jpost.com/israel-news/article-776293">November 2023</a> and <a href="https://www.newsweek.com/full-list-israeli-hostages-released-hamas-ceasefire-2017393">January 2025</a>, but a deal to end the conflict remains elusive. If the US wants real results, compellence should target Hamas’ hosts and financiers, <a href="https://www.ynetnews.com/article/syd4200lake">Turkey and Qatar</a>.</p>
<p>While publicly <a href="https://www.fdd.org/analysis/op_eds/2024/05/02/how-hamas-balances-qatar-turkey-and-the-west/">on good terms</a> with the US, the argument that Turkey and Qatar are state sponsors of terrorism would <a href="https://www.fdd.org/analysis/policy_briefs/2025/03/20/following-launch-of-october-7-task-force-turkey-and-qatar-should-feel-the-heat/">not be difficult</a> to make given the support and protection they have offered Hamas. President Trump could threaten to add Turkey and Qatar to the list of state sponsors of terror unless Hamas agrees to Israel’s terms of ending the war.</p>
<p>There are indications that this could work. At least publicly, the two countries recently joined with Saudi Arabia and Egypt in a <a href="https://www.independent.co.uk/news/world/middle-east/palestine-israel-gaza-hamas-qatar-egypt-saudi-arabia-b2799343.html">call</a> on Hamas to disarm and relinquish control of Gaza to the Palestinian Authority. This is a good first step, but the call has no “or else”–type clause that would actually pressure Hamas.</p>
<p>With that support gone, Hamas’ political leadership’s only choice would be deportation from its hosts which would likely jeopardize their finances and potentially put them within Mossad’s reach or accede to Israel’s conditions. Ever self-interested, the hope is they would be compelled to the latter. This type of diplomatic pressure directed at Hamas’ sponsors could trickle down to Hamas’ leadership and potentially be the last best hope for Gazan civilians as Israeli Prime Minister Benjamin Netanyahu signals plans for a renewed military offensive in the enclave.</p>
<p>Whether deterrence is restored by Israel is yet to be determined. For the sake of civilians on both sides, let us hope it is restored and soon.</p>
<p><em>Justin Leopold-Cohen is a homeland security analyst in Washington, DC. He has written widely on national and international security issues for outlets including </em>Small Wars Journal<em>, the Wavell Room, and Inkstick Media. Any views expressed in the article are his own and not representative of, or endorsed by, any organization or government.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/09/Israel-Gaza_Compellence.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="176" height="49" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 176px) 100vw, 176px" /></a></p>
<p><a href="https://globalsecurityreview.com/failed-deterrence-and-misplaced-compellence-in-gaza/">Failed Deterrence and Misplaced Compellence in Gaza</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/failed-deterrence-and-misplaced-compellence-in-gaza/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>America’s Silent Shield: How Domestic Strength Sustains Nuclear Power</title>
		<link>https://globalsecurityreview.com/americas-silent-shield-how-domestic-strength-sustains-nuclear-power/</link>
					<comments>https://globalsecurityreview.com/americas-silent-shield-how-domestic-strength-sustains-nuclear-power/#respond</comments>
		
		<dc:creator><![CDATA[Brandon Toliver]]></dc:creator>
		<pubDate>Mon, 18 Aug 2025 12:11:18 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[adversaries]]></category>
		<category><![CDATA[allies]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[American]]></category>
		<category><![CDATA[americans]]></category>
		<category><![CDATA[budgets]]></category>
		<category><![CDATA[challenge]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cohesion]]></category>
		<category><![CDATA[control]]></category>
		<category><![CDATA[credibility]]></category>
		<category><![CDATA[critical]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[deterrent]]></category>
		<category><![CDATA[domestic]]></category>
		<category><![CDATA[economic]]></category>
		<category><![CDATA[front]]></category>
		<category><![CDATA[global]]></category>
		<category><![CDATA[health]]></category>
		<category><![CDATA[home]]></category>
		<category><![CDATA[nation]]></category>
		<category><![CDATA[national]]></category>
		<category><![CDATA[nuclear]]></category>
		<category><![CDATA[political]]></category>
		<category><![CDATA[power]]></category>
		<category><![CDATA[Prosperity]]></category>
		<category><![CDATA[prosperous]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[shield]]></category>
		<category><![CDATA[silent]]></category>
		<category><![CDATA[social]]></category>
		<category><![CDATA[societal]]></category>
		<category><![CDATA[society]]></category>
		<category><![CDATA[states]]></category>
		<category><![CDATA[stealth]]></category>
		<category><![CDATA[strategic]]></category>
		<category><![CDATA[strength]]></category>
		<category><![CDATA[Triad]]></category>
		<category><![CDATA[trust]]></category>
		<category><![CDATA[unified]]></category>
		<category><![CDATA[united]]></category>
		<category><![CDATA[well-being]]></category>
		<category><![CDATA[world]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31380</guid>

					<description><![CDATA[<p>When Americans picture national security, they conjure images of hypersonic missiles, stealth bombers, and aircraft carriers patrolling global hotspots. They measure strength in megatons and defense budgets. Yet, the most critical and increasingly vulnerable pillar of national security may not be found in a silo or a shipyard but in the health of society itself. [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/americas-silent-shield-how-domestic-strength-sustains-nuclear-power/">America’s Silent Shield: How Domestic Strength Sustains Nuclear Power</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>When Americans picture national security, they conjure images of hypersonic missiles, stealth bombers, and aircraft carriers patrolling global hotspots. They measure strength in megatons and defense budgets. Yet, the most critical and increasingly vulnerable pillar of national security may not be found in a silo or a shipyard but in the health of society itself.</p>
<p>The credibility of the nation’s nuclear deterrent, the ultimate guarantor of sovereignty, is inextricably linked to <a href="https://www.tandfonline.com/doi/pdf/10.1080/01402391003603581">domestic well-being</a>. Economic prosperity, social cohesion, and the trust citizens have in their institutions are all part of that amorphous concept. Adversaries like Russia and China understand that it is in their interest to undermine American societal health; it is time Americans realize the challenge facing the nation.</p>
<p>For decades, the logic of nuclear deterrence rested on a <a href="https://sms.onlinelibrary.wiley.com/doi/abs/10.1002/smj.640">triad of capabilities</a>, credibility, and communication. The United States fielded the world’s most advanced nuclear arsenal and communicated credibility effectively. But credibility—the unwavering belief in America’s will to act—is the lynchpin.</p>
<p>This is where the home front becomes the front line. A nation that is prosperous, unified, and optimistic possesses the strategic endurance to maintain its commitments. Societal well-being is not a “soft” issue separate from “hard” power; it is a foundational strategic asset that fuels long-term political resolve.</p>
<p>The mechanisms connecting a healthy society to a credible deterrent are not merely theoretical. They are etched into recent history. Consider the <a href="https://facultyshare.liberty.edu/en/publications/a-position-of-strength-the-reagan-military-buildup-and-the-conven">1980s under President Reagan</a>. An economic resurgence and a renewed sense of national confidence provided the political capital and financial resources for a sweeping modernization of nuclear forces that saw the Peacekeeper ICBM and the B-2 stealth bomber enter service.</p>
<p>This was not just a military build-up; it was a clear signal to the Soviet Union, born from a nation that had the resources and the will to compete over the long haul. High public trust, buoyed by economic stability, sustained the political commitment for these massive, multi-decade investments.</p>
<p>Contrast this with the period following the 2008 financial crisis. The ensuing economic pain, political polarization, and public discontent led directly to the <a href="https://calhoun.nps.edu/bitstreams/396ed8e6-2b97-42ce-bad6-1aab0201ea25/download">Budget Control Act</a> and sequestration, which imposed punishing cuts on the defense budget. Allies and adversaries alike watched as Americans debated whether they could afford to modernize an aging nuclear triad. The signal was one of constraint and introspection, raising quiet questions in foreign capitals about the long-term reliability of America’s security guarantees. A nation struggling with internal economic and social crises inevitably projects an image of distraction and dwindling resolve.</p>
<p>Adversaries did not miss this lesson. They astutely integrated America’s domestic vulnerabilities into their national security strategies. China and Russia are engaged in a <a href="https://www.marshallcenter.org/en/publications/clock-tower-security-series/strategic-competition-seminar-series/russia-and-chinas-intelligence-and-information-operations-nexus">relentless campaign of information warfare</a> designed to exacerbate our societal fissures. State-controlled media outlets like CGTN (Chinese) and RT (Russian), amplified by armies of bots and trolls on social media, relentlessly spotlight American inequality, racial tensions, and political gridlock.</p>
<p>Their goal is twofold: erode the confidence of Americans in their own democratic system and persuade the world that the United States is a chaotic, declining power whose deterrence is brittle and promises are hollow. By turning societal metrics into weapons against Americans, adversaries aim to achieve strategic gains without firing a shot.</p>
<p>Of course, the relationship between societal health and defense is not without its complexities. A valid counterargument holds that a society enjoying high well-being might become complacent, preferring to <a href="https://www.jstor.org/stable/4621671">spend its “peace dividend</a>” on social programs rather than defense. The post–Cold War era saw this exact debate, as calls to shift funding from “guns to butter” grew louder.</p>
<p>This presents a genuine leadership challenge that requires articulating why investments in national security are essential to protecting the very prosperity and stability Americans enjoy. The choice is not always between a new healthcare program and a new submarine. A strong, healthy, and educated populace, free from economic precarity, is the very foundation that allows a nation to project power and afford the tools of its own defense. A robust social safety net and a powerful military are not mutually exclusive—they are mutually reinforcing pillars of a resilient state.</p>
<p>This calculus extends to the nation’s most critical strategic advantage: America’s network of alliances. The <a href="https://www.jstor.org/stable/48652065">strength of the North Atlantic Treaty Organization (NATO)</a>, for instance, is not purely a measure of its combined military hardware. It is rooted in a collective commitment to democratic values and the shared societal well-being of its members.</p>
<p>A stable, prosperous, and unified America reassures allies and strengthens collective deterrence. Conversely, an America seen as internally fractured and unreliable invites doubt, weakening the very alliances that magnify American power. When allied societies are confident in American leadership, <a href="https://journals.sagepub.com/doi/pdf/10.1177/2053168019858047?download=true">collective credibility soars</a>.</p>
<p>Therefore, Americans must rethink national security for the twenty-first century by placing American well-being at the very heart of our strategic imperatives. Bridging the economic divide not only broadens our tax base but also strengthens social cohesion, enabling sustainable defense budgets without overburdening taxpayers. Revitalizing education fuels scientific breakthroughs and cultivates the skilled workforce needed to modernize our nuclear command, control, and delivery systems. Upgrading infrastructure, from critical ports and highways to resilient cybersecurity networks, enhances our logistical agility, accelerates force deployment, and bolsters the credibility of our deterrent. By fostering political unity, we project resolve to allies and adversaries alike, inoculating our society against foreign information warfare and ensuring decisive, coordinated responses in times of crisis.</p>
<p>The defining contest of this century will not be waged on traditional battlefields but in a struggle of systems: our free, prosperous, and cohesive society versus an authoritarian model of centralized control. To secure our peace, we must fortify America’s Silent Shield at home. The credibility of our nuclear deterrent, and, by extension, our global leadership, will always mirror the resilience and unity of the nation it protects.</p>
<p><em>Brandon Toliver, PhD, serves on the A4 staff of Headquarters Air Force. The views expressed are those of the author and do not reflect the official guidance or position of the United States government, the Department of Defense, the United States Air Force, or the United States Space Force.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/08/Americas-Silent-Shield_How-Domestic-Strength-Sustains-Nuclear-Power.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="259" height="72" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 259px) 100vw, 259px" /></a></p>
<p><a href="https://globalsecurityreview.com/americas-silent-shield-how-domestic-strength-sustains-nuclear-power/">America’s Silent Shield: How Domestic Strength Sustains Nuclear Power</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/americas-silent-shield-how-domestic-strength-sustains-nuclear-power/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Campaign to End Nuclear Deterrence</title>
		<link>https://globalsecurityreview.com/the-campaign-to-end-nuclear-deterrence/</link>
					<comments>https://globalsecurityreview.com/the-campaign-to-end-nuclear-deterrence/#respond</comments>
		
		<dc:creator><![CDATA[Peter Huessy]]></dc:creator>
		<pubDate>Tue, 12 Aug 2025 12:14:44 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Campaign]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[civilian populations]]></category>
		<category><![CDATA[commander in chief]]></category>
		<category><![CDATA[deterrence credibility]]></category>
		<category><![CDATA[deterrence strategy]]></category>
		<category><![CDATA[disarmament campaign]]></category>
		<category><![CDATA[extended deterrence]]></category>
		<category><![CDATA[hair trigger alert]]></category>
		<category><![CDATA[Human Security Lab]]></category>
		<category><![CDATA[impetuous]]></category>
		<category><![CDATA[Law of War Manual]]></category>
		<category><![CDATA[legality]]></category>
		<category><![CDATA[NFU strategy]]></category>
		<category><![CDATA[No First Use]]></category>
		<category><![CDATA[nuclear abolitionists]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[nuclear modernization]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[Peter Huessy]]></category>
		<category><![CDATA[president's authority]]></category>
		<category><![CDATA[recklessness]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[sole authority]]></category>
		<category><![CDATA[targeting cities]]></category>
		<category><![CDATA[United Nations treaty]]></category>
		<category><![CDATA[University of Massachusetts]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31330</guid>

					<description><![CDATA[<p>The campaign to prevent the US from deploying nuclear weapons as a deterrent is in full swing. It expanded from opposing the first use of nuclear weapons to opposing all uses of nuclear weapons. This, despite all presidential administrations over the past 80 years rejecting pressure to adopt what is often referenced as a no [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-campaign-to-end-nuclear-deterrence/">The Campaign to End Nuclear Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The campaign to prevent the US from deploying nuclear weapons as a deterrent is in full swing. It expanded from opposing the first use of nuclear weapons to opposing all uses of nuclear weapons. This, despite all presidential administrations over the past 80 years rejecting pressure to adopt what is often referenced as a no first use (NFU) strategy, to say nothing of the recklessness of abandoning nuclear weapons as a deterrent.</p>
<p>American allies are unanimous in rejecting extended deterrence that does not include the potential use of nuclear weapons. NFU would give a nuclear-armed adversary, such as Russia, a sanctuary from which to use or threaten to use nuclear weapons. Removing American nuclear forces as a credible deterrent cedes all bargaining power to Moscow, China, and any other would-be nuclear or conventional adversary.</p>
<p>Associated with this campaign is an effort to remove the president’s authority to employ nuclear weapons without at least two additional officials supporting such a decision. They also claim the president would have very little time to decide to retaliate with nuclear weapons, should the US face a nuclear first strike. Of course, ending the president’s “sole authority” would only exacerbate the challenge.</p>
<p>There is a false argument often repeated that American nuclear weapons are on “hair trigger alert” and the president might make a reckless decision to launch, given the assumed minimal time available to determine whether a nuclear response is warranted. It is of course clear how such a decision-making process is significantly impeded if the president must receive concurrence from other officials to make a decision. Such a move reduces the credibility of American deterrence in the minds of adversaries.</p>
<p>Three other factors are also being brought to bear in this campaign to adopt a NFU strategy. First, there is an assertion that the president could be reckless and impetuous and might unnecessarily order the use of nuclear weapons. Second, there is an assertion that a president’s order may be illegal and thus having a “second confirmation authority/opinion” is a good thing. Third, there is an assertion that American deterrence strategy requires the use of nuclear weapons against cities and urban areas—with the objective of killing millions of civilians.</p>
<p>All three assertions are false. The first assertion is belied by the fact that every president understands the dangers of nuclear war. President Donald Trump made several statements to this effect, so the notion he, or any president, would be “reckless and impetuous” does not bear scrutiny. His administration’s major investments in deterrence illustrate the seriousness with which the country seeks to prevent any use of nuclear weapons.</p>
<p>The second assertion on the “illegality” of ordering nuclear use ignores the constitutional role of the president as commander in chief. States wage war regardless of whether the United Nations says it is illegal. Nuclear weapons are merely tools of war. They are not special. They simply pack more explosive energy in a smaller package than a conventional weapon.</p>
<p>The third assertion ignores the <em>Department of Defense Law of War Manual</em>, which explicitly states that attacks against unarmed civilians and non-combatants violate just war principles and are prohibited. American nuclear deterrence strategy explicitly rules out the purposeful targeting of civilian populations and cities, a posture many nuclear abolitionists oppose as they advocate city busting.</p>
<p>Given US deterrence strategy strictly forbids the targeting of cities and civilian populations, there is no basis for believing that carrying out the president’s order to employ weapons will be or be seen as illegal by either civilian or military officials. Thus, there is no need for multiple individuals involved in releasing weapons, all while the president is working through an already compressed and stressful timeline.</p>
<p>A recent “study” by the University of Massachusetts and the Human Security Lab cooked the books by asking both military and civilian officials whether they would oppose an “illegal” presidential order requiring the US to launch nuclear weapons against civilians. Many respondents, having been coached to believe such orders were realistically probable, said they would oppose such orders or at least seek to question the orders. These results were then hijacked to create a false narrative that even military officials now doubt President Trump’s leadership and would not obey the commander in chief if ordered to employ nuclear weapons. Given the survey was conducted during the Israel and US military strikes against Iran, the results were designed to call into question the reasonableness of conventional strikes on Iran.</p>
<p>The campaign to call into question American deterrence policy is based on a willful misrepresentation of states policy and strategic reality. Annie Jacobsen dramatized this misinformation in her book <em>Nuclear War: A Scenario</em>, in which she described US nuclear deterrence strategy as crazy. She proposed jettisoning the use of nuclear weapons for deterrence, whether used first or second, and taking such capability completely off the table. When asked what replacement she recommended, Jacobsen claimed such a question was beyond her expertise.</p>
<p>Leaving the nuclear deterrent off the table is part of a concerted disarmament campaign pushed by nuclear abolitionists. These groups were able to ensure the United Nations passed a treaty that bans nuclear weapons, which is as valuable as a treaty which bans war. While 73 nations signed the treaty, none are nuclear weapons states.</p>
<p>The International Campaign to Abolish Nuclear Weapons is seeking to stop nuclear modernization in the United States, which is strange considering Russia and China are in the midst of major modernization programs. There is nothing less effective than taking a knife to a gunfight, which is exactly what advocates of nuclear disarmament would impose on the free world. For nearly 80 years the US has made sure the nation fields the systems needed to ensure deterrence works. Now is not the time to abandon a successful strategy for the sake of feel-good activism.</p>
<p><em>Peter Huessy is a Senior Fellow at the National Institute for Deterrence Studies.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/08/The-Campaign-to-End-US-Nuclear-Deterrence.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="209" height="58" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 209px) 100vw, 209px" /></a></p>
<p><a href="https://globalsecurityreview.com/the-campaign-to-end-nuclear-deterrence/">The Campaign to End Nuclear Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-campaign-to-end-nuclear-deterrence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How the World Is Ignoring a New Nuclear Trajectory in South Asia</title>
		<link>https://globalsecurityreview.com/how-the-world-is-ignoring-a-new-nuclear-trajectory-in-south-asia/</link>
					<comments>https://globalsecurityreview.com/how-the-world-is-ignoring-a-new-nuclear-trajectory-in-south-asia/#comments</comments>
		
		<dc:creator><![CDATA[Sher Ali Kakar&nbsp;&&nbsp;Musavir Hameed Barech]]></dc:creator>
		<pubDate>Mon, 11 Aug 2025 12:13:13 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31318</guid>

					<description><![CDATA[<p>Amidst rising nuclear tensions, another missile race is unfolding in South Asia. In recent years, a substantial expansion of India’s missile program, primarily focusing on long-range missiles, has taken place. India’s missile expansion signifies a major shift in its military posturing, evolving from deterrence against China and Pakistan towards achieving global reach. These developments complicate [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/how-the-world-is-ignoring-a-new-nuclear-trajectory-in-south-asia/">How the World Is Ignoring a New Nuclear Trajectory in South Asia</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Amidst rising nuclear tensions, another missile race is unfolding in South Asia. In recent years, a substantial expansion of India’s missile program, primarily focusing on long-range missiles, has taken place. India’s missile expansion signifies a major shift in its military posturing, evolving from deterrence against China and Pakistan towards achieving global reach. These developments complicate security dynamics in South Asia, further undermine international nuclear frameworks, and could pose a threat to United States’ interests.</p>
<p>India’s missile development began in <a href="https://www.issi.org.pk/wp-content/uploads/2020/05/3-SS_Ghazala_Yasmin_Jalil_No-1_2020.pdf">1988</a> with the short-range Prithvi (150–350 kilometers), followed by the medium-range Agni in 1989 (1,200–2,400 kilometers, nuclear-capable). By 1997, India deployed 24 Prithvi missiles near the Pakistan border—remarkably, without facing US sanctions.</p>
<p>India’s missile arsenal comprises ballistic, cruise, and anti-ballistic systems across all ranges. While its short- and medium-range missiles primarily target Pakistan, India can already reach all of China. India’s development of longer-range systems includes the <a href="https://issi.org.pk/wp-content/uploads/2024/09/IB_Khalid_Khan_Sept_5_2024.pdf">Agni-V</a> (5,000–7,500 kilometers) and the <a href="https://issi.org.pk/wp-content/uploads/2024/09/IB_Khalid_Khan_Sept_5_2024.pdf">Agni-VI</a>, which has a potential range <a href="https://www.tandfonline.com/doi/full/10.1080/00963402.2024.2388470#d1e741">up to 10,000 kilometers</a> and is <a href="https://www.indiatoday.in/india/story/agni-vi-missile-nuclear-capable-force-multiplier-for-india-2428231-2023-08-29">reported</a> to carry multiple independently targetable re-entry vehicles (MIRV) and is usable as a fractional orbital bombardment system. It also has sea-based options like the <a href="https://asiatimes.com/2024/12/indias-k-4-missile-a-nuclear-shot-across-chinas-bow/">K-4</a> and <a href="https://asiatimes.com/2024/12/indias-k-4-missile-a-nuclear-shot-across-chinas-bow/">K-5</a> submarine-launched ballistic missiles (SLBM).</p>
<p>These capabilities signal India’s broader ambitions for global power projection and prestige. Its capabilities now include operational intercontinental ballistic missiles, multiple independently targetable re-entry vehicles, submarine-launched ballistic missiles, and <a href="https://aerospace.csis.org/wp-content/uploads/2021/04/India_ASAT.pdf">anti-satellite weapons</a>, marking a shift from regional defense to strategic reach.</p>
<p>Since the formation of the Indo-US strategic partnership in the early 2000s, convergence of strategic interests between Washington and New Delhi has allowed India to benefit from the global nuclear framework, mainly, the Nuclear Suppliers Group and the Missile Technology Control Regime. India, like Pakistan, is not a signatory to the Treaty on the Non-Proliferation of Nuclear Weapons and has developed its nuclear capabilities independently.</p>
<p>While Pakistan is not a member of the Missile Technology Control Regime, <a href="https://www.state.gov/bureau-of-international-security-and-nonproliferation/releases/2025/01/missile-technology-control-regime-mtcr-frequently-asked-questions">India has been since 2016</a>. Through an exemption to non-nuclear-weapon states under the Treaty on the Non-Proliferation of Nuclear Weapons, the <a href="https://issi.org.pk/wp-content/uploads/2017/10/3-SS_Ghazala_Yasmin_Jalil_No-3_2017.pdf">Missile Technology Control Regime </a>membership is helping India to advance its missile program by providing access to advanced missile technology. Similarly, in 2008, through the <a href="https://www.tandfonline.com/doi/full/10.1080/14781158.2015.998992">Nuclear Suppliers Group waiver</a>, India increased its nuclear production capacity.</p>
<p>The world powers, especially the US, continue to turn a blind eye toward these perilous developments in the region and beyond. Overlooking New Delhi’s global reach with nuclear-capable missiles could be a strategic mistake by Washington. India may, at some point in the future, reassess its strategic alignment with the United States and determine that the partnership no longer aligns with its national interests, raising the possibility that India could emerge as a challenger to American interests, or worse, align with China.</p>
<p>In retrospect, the US and <a href="https://thediplomat.com/2018/09/how-the-1980-laid-the-groundwork-for-chinas-major-foreign-policy-challenges/">China supported the mujahideen</a> resistance to the Soviet Union’s invasion of Afghanistan, though they did not coordinate their efforts. Later, China would emerge as a competitor to the US globally. Similarly, supporting India against the Chinese threat in the future could become a threat to the US.</p>
<p>The same blind eye on the development of India’s missile programs might hit American interests in the region hard. To give credence to these facts, a plethora of credible think tanks, including <a href="https://www.goldmansachs.com/insights/articles/how-india-could-rise-to-the-worlds-second-biggest-economy">Goldman Sachs</a>, the world’s second-largest investment bank, predict that India will have the world’s second-largest economy by 2075. As a result, India will emerge as a direct economic threat to the US, which could translate into a future military challenge.</p>
<p>Checking India’s missile program is not only in the interest of the US but, more importantly, good for global nuclear governance. It is currently marked by ineffectiveness due to the discord between nuclear “haves and have-nots.”</p>
<p>American policy on South Asia continues to overlook key regional developments, focusing instead on Pakistan’s missile program despite broader nuclear trends. Former Biden administration officials like <a href="https://www.foreignaffairs.com/united-states/how-survive-new-nuclear-age-narang-vaddi">Vipin Narang, Pranay Vaddi</a>, and <a href="https://www.armscontrol.org/act/2025-01/news/us-says-pakistan-developing-long-range-missiles">Jon Finer</a> raised alarms about Pakistan’s pursuit of a long-range missile, labeling it an emerging threat—despite Pakistan’s India-centric military posture and lack of global targeting ambitions.</p>
<p>It is important to investigate the historical and security dynamics in South Asia. Pakistan’s missile program began in the late 1980s after India began to demonstrate its missile capabilities. Pakistan’s missile program represents the country’s India-centric and defense-oriented approach.</p>
<p>For instance, the short-to-medium-range systems (70–2,750 kilometers) are capable of targeting India from within Pakistani territory. The development of <a href="https://www.iiss.org/online-analysis/missile-dialogue-initiative/2023/10/pakistan-missile-test-confirms-its-mirv-ambitions/">multiple independently targetable re-entry vehicle</a> capability by Pakistan aims to penetrate India’s advanced missile defenses, thereby strengthening deterrence. The <a href="https://ispr.gov.pk/press-release-detail.php?id=6383">Shaheen-III</a> missile, with a range of 2,750 kilometers, meets Islamabad’s requirement to have full coverage of India, including the Andaman and Nicobar Islands.</p>
<p>In the same way, the development of tactical nuclear weapons was in response to India’s Cold-Start Doctrine. This aims to deter conventional incursions with battlefield nuclear use. Thus, acquiring an intercontinental ballistic missile capability is not in Pakistan’s strategic interests.</p>
<p>The silence of the international community on this urgent matter is resulting in the erosion of global nuclear governance. Amidst rising tensions between nuclear states, the world is seeing recurring violations of established rules and international norms. The international community cannot move toward effective arms control arrangements that are aligned with evolving threats, disarmament, and strategic restraint under these conditions. Efforts for global peace and security can never be meaningful until threat perceptions and security challenges are addressed, including the resolution of long-standing disputes between archrivals.</p>
<p><em>Sher Ali Kakar is the Associate Director Research at Balochistan Think Tank Network (BTTN), and Musavir Hameed Barech is a Research Officer at Balochistan Think Tank Network (BTTN).</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/08/Analysis-India-ICBM-18-July-Final.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="241" height="67" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 241px) 100vw, 241px" /></a></p>
<p><a href="https://globalsecurityreview.com/how-the-world-is-ignoring-a-new-nuclear-trajectory-in-south-asia/">How the World Is Ignoring a New Nuclear Trajectory in South Asia</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/how-the-world-is-ignoring-a-new-nuclear-trajectory-in-south-asia/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Invest, Don’t Spend, Peace Dividends</title>
		<link>https://globalsecurityreview.com/invest-dont-spend-peace-dividends/</link>
					<comments>https://globalsecurityreview.com/invest-dont-spend-peace-dividends/#respond</comments>
		
		<dc:creator><![CDATA[Peter Huessy]]></dc:creator>
		<pubDate>Mon, 04 Aug 2025 12:45:49 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Government & Politics]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[aerospace industry]]></category>
		<category><![CDATA[Arms Control Deals]]></category>
		<category><![CDATA[B-52]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Columbia-class submarine]]></category>
		<category><![CDATA[command-and-control systems]]></category>
		<category><![CDATA[Conventional Forces Europe Treaty]]></category>
		<category><![CDATA[defense budget]]></category>
		<category><![CDATA[Defense Spending]]></category>
		<category><![CDATA[deterrence studies ​]]></category>
		<category><![CDATA[Hard Sciences]]></category>
		<category><![CDATA[ICBM]]></category>
		<category><![CDATA[INF Treaty]]></category>
		<category><![CDATA[Invest]]></category>
		<category><![CDATA[Military Advances]]></category>
		<category><![CDATA[Minuteman III]]></category>
		<category><![CDATA[Modernization Shortfalls]]></category>
		<category><![CDATA[Nation Building]]></category>
		<category><![CDATA[nuclear forces]]></category>
		<category><![CDATA[nuclear modernization]]></category>
		<category><![CDATA[Ohio-class submarines]]></category>
		<category><![CDATA[Peace Dividends]]></category>
		<category><![CDATA[Peacekeeper Production Line]]></category>
		<category><![CDATA[Procurement Holiday]]></category>
		<category><![CDATA[Readiness Shortfalls]]></category>
		<category><![CDATA[Reagan Economic War]]></category>
		<category><![CDATA[Roger Wicker]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Senate Armed Services Committee]]></category>
		<category><![CDATA[Sentinel ICBM]]></category>
		<category><![CDATA[Soviet Union]]></category>
		<category><![CDATA[START Treaties]]></category>
		<category><![CDATA[Workforce Shortage]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31287</guid>

					<description><![CDATA[<p>After the collapse of the Soviet Union, it was assumed that the US no longer needed a robust defense budget. As a result, the nation went on what Lt. Gen. Garret Harencak called a procurement holiday or a “holiday from history.” Many assumed it was indeed the end of history. After all, between 1987–1993, Washington [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/invest-dont-spend-peace-dividends/">Invest, Don’t Spend, Peace Dividends</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>After the collapse of the Soviet Union, it was assumed that the US no longer needed a robust defense budget. As a result, the nation went on what Lt. Gen. Garret Harencak called a procurement holiday or a “holiday from history.”</p>
<p>Many assumed it was indeed the end of history. After all, between 1987–1993, Washington and Moscow signed four notable arms control deals: the Intermediate-Range Nuclear Forces Treaty (INF), the Strategic Arms Reduction Treaties I and II (START), the Treaty on the Prohibition of Nuclear Weapons in Outer Space, and the Conventional Forces Europe (CFE) treaty.</p>
<p>Russian strategic nuclear weapons were scheduled to drop from over 10,000 deployed to 3,500 by the year 2000. The INF treaty banned shorter range missiles altogether. And Warsaw Pact conventional forces in central Europe and Russia dropped precipitously.</p>
<p>President Reagan’s economic war against Moscow was successful. It ended the Soviet empire by pushing Moscow to the brink of insolvency. Russia could not financially maintain its formidable Cold War nuclear and conventional force levels.</p>
<p>From 1993–2001, the US did not enjoy the promised “end of history.” State sponsors of terror in Iran, Libya, Afghanistan, and Iraq took the fight to the US, albeit in a different mode than threatening to send massive tank armies through the Fulda Gap into Western Europe.</p>
<p>The US responded with a war that would last more than a decade and cost Americans an estimated $7 trillion. It was all for naught and accomplished very little.</p>
<p><strong>Readiness and Modernization Shortfalls</strong></p>
<p>While spending trillions on nation-building in Iraq and Afghanistan, the US Department of Defense (DoD) suffered from severe readiness and modernization shortfalls. The defense budget was roughly $305 billion in 1991 when the Soviet Union collapsed and almost exactly that in 2001 before 9/11. In the interim the budget dropped to as low as $250 billion and it was only after 1996 that the budget gradually increased to $300 billion.</p>
<p>When adjusted for inflation (1991–2011), the defense budget of $300 billion (1991), aside from “overseas contingency operations,” should have grown to $480 billion by 2011, assuming a 3 percent growth rate. That did not happen. The shortfall in defense spending reached $1.25 trillion during the two decades following the Soviet Union’s collapse.</p>
<p>The base defense budget in 2011 was roughly $500 billion, and at first glance equal to that expected. Out of a defense budget of $656 billion, $160 billion was allocated for the wars in Afghanistan and Iraq. In the two decades from 2001–2021, the Department of Defense spent $1.56 trillion on nation building—an average of $80 billion annually.</p>
<p>Over three decades after the Cold War’s end, the US did not invest in the modernization of the military. The three-decade peace dividend, which saw $2.8 trillion fewer defense dollars spent, was instead spent domestically and on nation building. As a result, the modernization and recapitalization of the armed forces, especially nuclear forces, were postponed.</p>
<p>By September 11, 2001, the US nuclear forces were already in the field for two decades (<em>Ohio</em>-class submarines), three decades (Minuteman III), and five decades (B-52). The nuclear budget, $77 billion at the end of the Cold War, dropped to less about $25 billion, with most of those funds simply maintaining legacy nuclear forces.</p>
<p>It was not until 2009–2010 that the Obama administration and Congress agreed on a plan for upgrading and replacing nuclear forces—three decades after President Ronald Reagan rolled out his nuclear modernization and sustainment plans in late 1981. New systems are projected to begin fielding in 2031 with completion by 2050.</p>
<p>The failure to prioritize the planning and implementation for replacing aging systems included nuclear command-and-control systems, warheads, and all three legs of the nuclear triad. The belief that the world was safer was a fool’s errand.</p>
<p>By shifting federal dollars from defense to social spending, the US also ensured the workforce needed to build nuclear weapons, space and missile defenses, and cyber systems are no longer there. Vendors associated with the building of <em>Ohio</em>-class submarines and the Minuteman III intercontinental ballistic missiles (ICBM) numbered in the hundreds once. Now, the nation is starting from scratch. The submarine industry lost 14,000 workers and now lacks the manpower to meet demand.</p>
<p>As for ICBMs, with the shutdown of the Peacekeeper production line, the US Air Force was left with a guidance and propulsion replacement program that over a period of more than a decade invested $8 billion in making sure the Minuteman III (1970) would stay in the force “through 2030.” Again, many hundreds of vendors no longer exist to make ICBM parts. Even worse is the current state of the available workforce. American universities grant more PhDs in the hard sciences to Chinese students than to American students. Across the board, the US has fewer workers in the hard sciences than needed, although industry is now reaching into the schools to bring students along a planned program of education that leads them to careers in the aerospace business.</p>
<p><strong>The Challenge Ahead</strong></p>
<p>The nation now finds itself in a precarious position at a time when China and Russia are at their most aggressive. The <em>Columbia</em>-class submarine, which will replace the <em>Ohio</em>-class submarine, was recently delayed two years, further increasing costs. And the herculean task of building 450 new ICBM silos armed with 400 missiles will prove costly. The US will maintain the current 400 ICBMs while simultaneously deploying 400 new missiles in new silos. The Sentinel ICBM, a technological marvel, is progressing toward production. It is a highly capable weapon that is planned for initial deployment in 2033.</p>
<p>Chairmen of the Senate Armed Services Committee, Roger Wicker (R–MS) recently concluded, “It will take several years of sustained investment and real growth beyond this down payment to keep pace with China’s military advances…. But to be clear: The cost of deterring war will always be dwarfed by the cost of fighting one.” This could not be more true. It is time the American people understand the challenge facing the nation and what it will take to overcome it.</p>
<p><em>Peter Huessy is a Senior Fellow at the National Institute for Deterrence Studies.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/08/The-Consequences-of-Spending-the-Peace-Dividend-II.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="248" height="69" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 248px) 100vw, 248px" /></a></p>
<p><a href="https://globalsecurityreview.com/invest-dont-spend-peace-dividends/">Invest, Don’t Spend, Peace Dividends</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/invest-dont-spend-peace-dividends/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Return of the United States Primacy</title>
		<link>https://globalsecurityreview.com/the-return-of-the-united-states-primacy/</link>
					<comments>https://globalsecurityreview.com/the-return-of-the-united-states-primacy/#respond</comments>
		
		<dc:creator><![CDATA[Todd Clawson]]></dc:creator>
		<pubDate>Thu, 24 Jul 2025 11:56:27 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Abraham Accords]]></category>
		<category><![CDATA[Africa]]></category>
		<category><![CDATA[air strikes]]></category>
		<category><![CDATA[alliances]]></category>
		<category><![CDATA[allies]]></category>
		<category><![CDATA[belt and road initiative]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Defense Spending]]></category>
		<category><![CDATA[Democratic Republic of Congo]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[Donald Trump]]></category>
		<category><![CDATA[Foreign Policy]]></category>
		<category><![CDATA[Gaza]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[military power]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[nuclear facilities]]></category>
		<category><![CDATA[Operation Midnight Hammer]]></category>
		<category><![CDATA[peace deal]]></category>
		<category><![CDATA[peace through strength]]></category>
		<category><![CDATA[peacemaker]]></category>
		<category><![CDATA[primacy]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Rwanda]]></category>
		<category><![CDATA[Todd Clawson]]></category>
		<category><![CDATA[Trump Doctrine]]></category>
		<category><![CDATA[two-state solution]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[unipolar moment]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Washington]]></category>
		<category><![CDATA[world power broker]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31239</guid>

					<description><![CDATA[<p>The death of the United States’ unipolar moment is exaggerated. Foreign policy experts claiming the United States is on the decline and international relations are headed to multipolarity are less than accurate. Pundits insist that China’s economic and military rise will allow the country to eclipse the United States and lead to the creation of [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-return-of-the-united-states-primacy/">The Return of the United States Primacy</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The death of the United States’ unipolar moment is exaggerated. Foreign policy experts claiming the United States is on the decline and international relations are headed to multipolarity are less than accurate. Pundits insist that China’s economic and military rise will allow the country to eclipse the United States and lead to the creation of new international institutions led by Beijing.</p>
<p>The results of the American air strikes on Iran’s nuclear facilities serves as a harsh reminder to those who believe multipolarity is the future of the world order. American military power is still unmatched.</p>
<p><a href="https://breakingdefense.com/2025/06/operation-midnight-hammer-how-the-us-conducted-surprise-strikes-on-iran/">Operation Midnight Hammer</a> demonstrated the remarkable military power of the United States and President Donald Trump’s willingness to use it when an adversary crosses American red lines. The surgical strikes of American stealth aircraft and cruise missiles expertly showcased the awesome power of the American military.</p>
<p>The strikes were more than a display of power. They left no doubt that President Trump is laser focused and committed to protecting American vital interests. The strikes were also a message to allies and foes alike that the United States will stand by its allies when facing an existential threat, especially when that ally demonstrates a willingness to defend itself.</p>
<p>Even though the Trump administration used limited strikes against the nuclear facilities, the underlying message is clear. Red lines, deadlines, and ally support are back. Through the masterful use of deception, stealth, and precision, the American strike was unseen. Tehran’s subsequent retaliatory strikes were nothing more than preplanned and face-saving missile launches to placate domestic audiences.</p>
<p>The follow-on <a href="https://www.nytimes.com/live/2025/06/23/world/iran-israel-ceasefire-trump">ceasefire agreement</a> stands to put an end to Iran’s regional and nuclear ambitions and forces Iran and Israel to tamp down their hostilities to allow for a negotiated settlement. Interestingly, Iran’s allies effectively abandoned Tehran as the Ayatollah and the Iranian Revolutionary Guard Corps (IRGC) looked feckless and weak compared to the combined strength of Israel and the US.</p>
<p>China, Russia, and Iran’s Middle East proxies were nowhere to be found. The so-called “<a href="https://www.straitstimes.com/world/middle-east/why-iran-faced-israel-and-the-us-alone-as-its-friends-stood-by">Axis of Resistance</a>” is in tatters as the result of Israeli and American action. Whether or not Iran takes the opportunity to deescalate and seek a peaceful resolution remains to be seen.  Regardless, Operation Midnight Hammer should be seen as a return to deterrence with Tehran and in the capitals of America’s adversaries worldwide.</p>
<p><strong>Bolstering Alliances</strong></p>
<p><strong> </strong>On the heels of successful air strikes, President Trump received another geostrategic win as the North Atlantic Treaty Organization’s (<a href="https://www.whitehouse.gov/articles/2025/06/president-trumps-leadership-vision-drives-nato-breakthrough/">NATO</a>) member states agreed to spend 5 percent of gross domestic product on defense spending. NATO members, with the goading of President Trump, realized that Russian aggression necessitated greater commitment to defense.</p>
<p>Trump’s goal for increased defense spending is not to weaken NATO but to strengthen it. By requiring all members to carry a proportional share of collective defense, American leadership will only strengthen a once great alliance. Russia must reconsider its desire to once again expand its sphere of influence and control by force.</p>
<p>Alliances are based on shared values and commitments. President Trump made it clear that free riding is no longer an option. A strong NATO, with the needed capabilities and political will, can confront aggression and serve as a stabilizing force.</p>
<p><strong>The Dealmaker</strong></p>
<p><strong> </strong>Finally, President Trump made it clear that he desires to be a peacemaker rather than a war maker. Thus, he is seeking to negotiate the end to conflicts around the globe.</p>
<p>First, the administration brokered a peace deal between the <a href="https://www.msn.com/en-us/news/world/rwanda-congo-sign-us-brokered-peace-deal-to-end-fighting-that-killed-thousands/ar-AA1HAP8e?ocid=BingNewsVerp">Democratic Republic of Congo and Rwanda</a> to end decades of fighting. The administration states that the peace deal will include mechanisms that address the <a href="https://abcnews.go.com/Politics/trump-heralds-us-brokered-peace-deal-drc-rwanda/story?id=123277316">underlying causes of the conflict</a> and pathways for reconciliation.</p>
<p>Second, Trump continues to work toward the resolution of conflict between Ukraine and Russia. While negotiating peace is proving more difficult than expected, the president continues to work toward an acceptable option.</p>
<p>In another significant turn of events, Trump’s dealmakers made overtures to Israel in pursuit of an end to the conflict in Gaza—hoping to end the conflict in the <a href="https://www.msn.com/en-xl/politics/government/trump-netanyahu-agree-to-end-gaza-war-in-two-weeks/ar-AA1Hvc9Y?ocid=BingNewsSerp">next few weeks</a>. As part of ending the conflict, several Arab neighbors agreed to allow Gazans to immigrate to their countries.</p>
<p>Additionally, the Trump administration also plans to <a href="https://www.msn.com/en-us/news/world/trump-s-crown-jewel-abraham-accords-may-expand-to-normalize-ties-between-israel-and-other-nations/ar-AA1HtI4v?ocid=BingNewsVerp">expand the Abraham Accords</a> so that more Arab nations commit to resolving decades of conflict. Trump’s dealmaking goals are aspirational considering that much work remains to fulfill these goals. After decades of animosity, a two-state solution for the Arabs in Israel would be a welcome step toward a lasting peace.</p>
<p>Russia and China failed to provide any resolution to conflict in the Middle East and Africa. Russia has no ability to negotiate a peace deal considering its continued war on Ukraine.  China’s domestic troubles coupled with its questionable usage of the Belt and Road Initiative are backfiring. Russia and China were unwilling to support their friends in need, whereas Washington sought to end conflict. So much for multipolarity.</p>
<p>The past few weeks show a marked contrast to years of wishful thinking and kicking the proverbial can down the road. Peace through strength, President Trump’s foreign policy agenda, seeks to deter adversaries and assure allies while avoiding new conflicts. Ending protracted conflicts through negotiated settlements may also prove a critical element of the Trump Doctrine. The combination of peace and military power may prove a winning combination.</p>
<p>Russia and China cannot achieve these goals. They lack the standing to do so. It should come as no surprise that all eyes are returning to Washington as the world’s leading power broker. Mark Twain once said in response to news stories he was dead, “The rumors of my demise are greatly exaggerated.” Much the same is true of America’s unipolar moment.</p>
<p><em>Todd Clawson is a retired naval officer with 28 years of service and combat tours in the Middle East, Horn of Africa, and South Asia. He holds a doctorate in defense and strategic studies from Missouri State University. The views expressed are his own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/07/The-Return-of-the-United-States-Primacy.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="172" height="48" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 172px) 100vw, 172px" /></a></p>
<p><a href="https://globalsecurityreview.com/the-return-of-the-united-states-primacy/">The Return of the United States Primacy</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-return-of-the-united-states-primacy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Exposing Willful Blindness: American Strength Is Nonnegotiable</title>
		<link>https://globalsecurityreview.com/exposing-willful-blindness-american-strength-is-nonnegotiable/</link>
					<comments>https://globalsecurityreview.com/exposing-willful-blindness-american-strength-is-nonnegotiable/#comments</comments>
		
		<dc:creator><![CDATA[Brandon Toliver]]></dc:creator>
		<pubDate>Mon, 21 Jul 2025 12:16:50 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[American nuclear posture]]></category>
		<category><![CDATA[Arms Race]]></category>
		<category><![CDATA[ballistic missiles]]></category>
		<category><![CDATA[Berlin]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cold war]]></category>
		<category><![CDATA[Cuba]]></category>
		<category><![CDATA[Defense Spending]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[Diplomacy]]></category>
		<category><![CDATA[escalation risks]]></category>
		<category><![CDATA[extended deterrence]]></category>
		<category><![CDATA[global stability]]></category>
		<category><![CDATA[humanitarian impacts]]></category>
		<category><![CDATA[INF Treaty]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Katerina Canyon]]></category>
		<category><![CDATA[mutually assured destruction]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[nonproliferation]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Nuclear dominance]]></category>
		<category><![CDATA[nuclear modernization]]></category>
		<category><![CDATA[public opinion]]></category>
		<category><![CDATA[Quds Force]]></category>
		<category><![CDATA[RAND study]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[slcm-n]]></category>
		<category><![CDATA[space-based interceptors]]></category>
		<category><![CDATA[START Treaty]]></category>
		<category><![CDATA[strategic stability]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31205</guid>

					<description><![CDATA[<p>Katerina Canyon’s op-ed, “From Deterrence to Diplomacy: Why Nuclear Dominance Is a Dangerous Illusion,” calls for restraint and diplomacy rather than a robust nuclear arsenal. While her concerns over escalation risks and humanitarian impacts have merit, her critique mischaracterizes the robust, empirical arguments in “From Deterrence to Dominance: Strengthening US Nuclear Posture in a Shifting [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/exposing-willful-blindness-american-strength-is-nonnegotiable/">Exposing Willful Blindness: American Strength Is Nonnegotiable</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Katerina Canyon’s op-ed, “From Deterrence to Diplomacy: Why Nuclear Dominance Is a Dangerous Illusion,” calls for restraint and diplomacy rather than a robust nuclear arsenal. While her concerns over escalation risks and humanitarian impacts have merit, her critique mischaracterizes the robust, empirical arguments in “<a href="https://globalsecurityreview.com/from-deterrence-to-dominance-strengthening-us-nuclear-posture-in-a-shifting-world/">From Deterrence to Dominance: Strengthening US Nuclear Posture in a Shifting World</a>.”</p>
<p>Peace in international affairs is not a natural state; it is actively maintained through strength. As <a href="https://daily.jstor.org/reconsidering-appeasement/">Winston Churchill</a> famously noted, true peace is achieved not by retreating from power, but by wielding it wisely.</p>
<p>Today, with China rapidly modernizing its conventional and nuclear forces and Russia pursuing territorial ambitions backed by nuclear threats, a kinder and gentler approach risks inviting greater aggression. Only a credible deterrence posture—grounded in empirical evidence and historical lessons—can secure strategic stability.</p>
<p>Reinforcing American nuclear dominance is not about favoring conflict over diplomacy; it is about ensuring that American deterrence is strong enough to compel respect and maintain global order in an increasingly volatile world.</p>
<p><strong>First Things First</strong></p>
<p>American nuclear weapons serve as a cornerstone of deterrence, preventing strategic attack and reassuring allies. This element of deterrence is under pressure as China and Russia rapidly expand their arsenals, and North Korea advances its capabilities, creating a complex, multipolar threat environment.</p>
<p>The primary point in the original article was the need to reestablish American nuclear dominance—not as a provocation but as a stabilizing force. In an era of rising threats and eroding deterrence, a more robust and flexible nuclear posture is essential to prevent conflict, assure allies, and preserve global security.</p>
<p><strong>Misreading the Nature of Nuclear Dominance</strong></p>
<p>A primary claim presented by Canyon is that advocating for nuclear dominance is tantamount to seeking advantage through expansion, thereby increasing the risk of catastrophe. This is a misrepresentation of evidence. The call for dominance is not about reckless arms racing or seeking victory in nuclear war. Rather, it is about ensuring that the United States’ nuclear posture is credible, flexible, and resilient enough to deter adversaries in a world where the old rules no longer apply.</p>
<p>The Cold War’s doctrine of <a href="https://core.ac.uk/download/pdf/348671812.pdf">mutually assured destruction (MAD)</a> worked because both sides fielded survivable second-strike capabilities and clearly communicated those capabilities to the other. Today, China and Russia are modernizing and diversifying their arsenals at a pace not seen since the 1980s. <a href="https://www.sipri.org/media/press-release/2025/nuclear-risks-grow-new-arms-race-looms-new-sipri-yearbook-out-now">China’s warhead stockpile</a> surpassed 600 in 2025 and is projected to double by 2030. Russia, meanwhile, maintains the world’s largest <a href="https://fas.org/initiative/status-world-nuclear-forces/">inventory of non-strategic nuclear weapons</a>—estimated at 2,000 warheads—many of which are integrated into conventional military operations, as seen in Ukraine.</p>
<p>Dominance in this context means closing critical gaps—like the absence of credible theater-range nuclear options—and ensuring that American extended deterrence is not just theoretical, but practical and adaptable to new threats.</p>
<p><strong>Historical Lessons: Arms Races and Escalation</strong></p>
<p>Invocation of the Cold War arms race is erroneously used as a cautionary tale, suggesting that any move toward dominance will inevitably provoke adversaries and increase the risk of miscalculation. History is more nuanced.</p>
<p>The most dangerous moments of the Cold War—Berlin (1961) and Cuba (1962)—were not the result of American dominance but of <a href="https://www.taylorfrancis.com/chapters/edit/10.4324/9781315633039-22/power-weakness-robert-kagan">perceived weakness, ambiguity, and miscommunication</a>. The 1980s nuclear buildup, while expensive, ultimately contributed to the Soviet Union’s willingness to negotiate arms reductions (Intermediate-Range Nuclear Forces Treaty (INF) and Strategic Arms Reduction Treaty (START)) from a position of mutual strength. As former Secretary of Defense James Schlesinger noted, “<a href="https://www.bing.com/ck/a?!&amp;&amp;p=a3fac9e88c000058ee85484ecbc89fdcf1fa74b76d9705f6e87846a5dbba38cfJmltdHM9MTc1MDcyMzIwMA&amp;ptn=3&amp;ver=2&amp;hsh=4&amp;fclid=0a79bb16-1a35-60c1-3402-af001b7a6139&amp;psq=Deterrence+is+not+about+parity%3b+it%e2%80%99s+about+credibility+and+resolve.&amp;u=a1aHR0cHM6Ly9wcmVzcy51bWljaC5lZHUvcGRmLzA0NzIxMTI4NzItY2g4LnBkZg&amp;ntb=1">Deterrence is not about parity; it’s about credibility and resolve.</a>”</p>
<p>Moreover, the post–Cold War era of American nuclear restraint did not prevent Russia’s annexation of Crimea, China’s militarization of the South China Sea, or North Korea’s nuclear breakout. A senior research professor at Johns Hopkins School of Advanced International Studies testified before the Senate Armed Services Committee, asserting that “<a href="https://www.armed-services.senate.gov/imo/media/doc/Mahnken_10-22-15.pdf">adversaries exploit perceived gaps</a> in US resolve and capability, not its strength.”</p>
<p><strong>The Risks of a Passive Posture</strong></p>
<p>Canyon argues that modernizing or expanding American nuclear capabilities—such as the SLCM-N or space-based interceptors—will only accelerate a global arms race. Yet, the data show that adversaries are already racing ahead, regardless of American action.</p>
<p><a href="https://www.google.com/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwiR7dbzlYqOAxXKEVkFHVzDEh8QFnoECBkQAQ&amp;url=https%3A%2F%2Fcarnegieendowment.org%2Frussia-eurasia%2Fpolitika%2F2024%2F01%2Frussias-nuclear-modernization-drive-is-only-a-success-on-paper%3Flang%3Den&amp;usg=AOvVaw0xSFTrjP2MUHZL-LkRW0WX&amp;opi=89978449">Nearly 95 percent of Russia’s nuclear triad is modernized,</a> with new hypersonic and dual-capable systems. <a href="https://www.google.com/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwjIxbmRloqOAxXdEFkFHbZ0OpIQFnoECBcQAQ&amp;url=https%3A%2F%2Fchinapower.csis.org%2Fchina-nuclear-weapons%2F&amp;usg=AOvVaw146oe4HqpAgeuNTp3UL7Zx&amp;opi=89978449">China</a> is rapidly fielding road-mobile intercontinental ballistic missiles (ICBM), ballistic missile submarines, and hypersonic glide vehicles. <a href="https://www.google.com/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwiCoN2nloqOAxXtFFkFHf1LC24QFnoECCMQAQ&amp;url=https%3A%2F%2Fwww.armscontrol.org%2Fact%2F2025-04%2Fnews%2Fnorth-korea-justifies-nuclear-weapons-expansion&amp;usg=AOvVaw2bN4ozw670jepNgZx88RAk&amp;opi=89978449">North Korea bolsters over 50 nuclear weapons</a> with growing missile survivability and regional reach.</p>
<p>Iran was advancing toward a nuclear threshold, with uranium-enrichment activities previously nearing weapons-grade levels. In response, the United States launched a preemptive strike targeting Iran’s key nuclear facilities at Fordow, Natanz, and Isfahan. American officials framed the operation as a limited, precision action designed to neutralize an imminent threat and prevent a larger, more destructive regional war.</p>
<p>By acting before Iran could cross the nuclear threshold, the US aimed to avoid a future scenario in which multiple states—particularly Israel—might engage in broader, uncoordinated military campaigns. The strike also sent a calibrated message intended to deter further escalation while leaving diplomatic channels open.</p>
<p>Iran’s ballistic missile arsenal remains one of the largest in the region, and its proxy network, coordinated through the Islamic Revolutionary Guard Corps’ Quds Force, continues to operate across Iraq, Lebanon, Syria, and Yemen.</p>
<p>The US, by contrast, faces delays and budget overruns in its own modernization efforts and lacks credible theater-range nuclear options in both Europe and Asia. This is not dominance; it is vulnerability.</p>
<p><strong>Diplomacy and Arms Control: Not Mutually Exclusive</strong></p>
<p>Canyon calls for a return to arms control and diplomacy, citing the expiration of New START in 2026. Diplomacy is essential, but history shows that arms control only works when backed by <a href="https://www.google.com/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwjv18uwl4qOAxW4JUQIHSBEAW0QFnoECBcQAQ&amp;url=https%3A%2F%2Ftnsr.org%2F2018%2F11%2Fthe-purposes-of-arms-control%2F&amp;usg=AOvVaw394GwgBWUdQqNos61KdXAC&amp;opi=89978449">credible deterrence</a>.</p>
<p>The most successful arms control agreements (Strategic Arms Limitations Talks (SALT), INF, START) were negotiated when the US held a position of strength. The collapse of the INF Treaty and the uncertain future of New START are not the result of American intransigence but of Russian violations and China’s refusal to join trilateral talks. As the Congressional Research Service notes, “Arms control is not a substitute for deterrence; it is a complement to it.”</p>
<p><strong>Alliance Cohesion and Forward Deployment</strong></p>
<p>The suggestion that forward-deploying nuclear assets makes allies “targets, not safer” is textbook pacifist propaganda. This ignores decades of alliance management and empirical research. Extended deterrence—backed by visible, credible, American capabilities—has prevented proliferation in Japan, South Korea, and NATO for generations.</p>
<p>A <a href="https://www.google.com/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwiO4aX6l4qOAxUR_skDHWiXHy8QFnoECCcQAQ&amp;url=https%3A%2F%2Fwww.heritage.org%2Fmilitary-strength%2Fassessment-us-military-power%2Fus-nuclear-weapons&amp;usg=AOvVaw15LGIyBLHmyufWRZz5DxVZ&amp;opi=89978449">2023 RAND study</a> found that allies are more likely to pursue their own nuclear options if they doubt American commitments. Forward deployment, joint planning, and regular consultations are essential to alliance cohesion and nonproliferation. The United States’ nuclear umbrella extends to over 30 allied and partner nations, primarily within <a href="https://www.google.com/search?sca_esv=ccb8066356fd07b7&amp;cs=0&amp;q=NATO&amp;sa=X&amp;ved=2ahUKEwiDhfnsmIqOAxWr6skDHYqJL1wQxccNegQIAhAB&amp;mstk=AUtExfAceYhAF-0mtB58rM7SNIoAYPP3OmhRwOD6NFvxAiatNzIFKqvv-w96a1UlLSy6D538GPoivqrkNQQNRFZ3ForFQFIRNCLXH-0QrW9WE9j_e0_J4TKLFgdNAwPWlSE-JyM&amp;csui=3">NATO</a>, but also including countries like Australia, Japan, and South Korea. These nations are assured of American protection, including potential nuclear response, in case of attack.</p>
<p><strong>Economic Trade-offs: Security and Prosperity</strong></p>
<p>Context is key. Canyon points to the $1 trillion cost of nuclear modernization over 30 years, suggesting these funds would be better spent elsewhere. This figure represents less than 5 percent of projected defense spending over that period, and less than 0.1 percent of gross domestic product annually. The cost of deterrence is dwarfed by the potential costs of conventional war should deterrence fail. Small conflicts like Afghanistan and Iraq cost over $7 trillion. The cost of a war against China would be far higher.</p>
<p>National strength is not a zero-sum game between security and social spending. The credibility of US leadership—and the stability it underwrites—enables the very prosperity and global order that supports education, healthcare, and infrastructure.</p>
<p><strong>Public Opinion and Global Norms: A Reality Check</strong></p>
<p>Canyon’s claim that “most Americans and the global community favor arms reduction” lacks empirical rigor. Sweeping generalizations like this demand robust, replicated data across diverse populations. Without that, such assertions are more rhetorical than factual.</p>
<p>In contrast, multiple credible surveys reveal consistent public support for deterrence and defense. For example, a November 2022 poll found that 60 percent of Americans believe the military’s primary role is to deter attacks on the US. A national survey showed that a vast majority of voters view nuclear deterrence as critical to national security, with nearly three-quarters supporting modernization efforts.</p>
<p>The 2023 NATO Annual Tracking Survey found that 61 percent of allied respondents believe NATO membership reduces the likelihood of foreign attack, and 58 percent see it as a deterrent. In Germany, 64 percent support a European nuclear deterrent independent of the US, reflecting growing concern over strategic autonomy.</p>
<p>Another poll reported that 69 percent of Americans feel defense spending increases their sense of security. These data points underscore a clear trend; public opinion, in the US and Europe, favors credible deterrence over disarmament, especially amid rising threats from China, North Korea, and Russia. This is the factual foundation that reinforces the case for maintaining and strengthening American nuclear capabilities, not as a provocation, but as a stabilizing force in an increasingly volatile world.</p>
<p><strong>The Real Existential Threats</strong></p>
<p>Extreme weather events, natural disasters, pandemics, and mass displacement are among today’s gravest challenges. Yet, using these non-nuclear crises to justify a softened stance on nuclear deterrence is like comparing apples and oranges. Even the most intelligent and well-informed individuals sometimes fall into the trap of an “either-or” debate, mistakenly assuming it is only possible to address one threat or the other.</p>
<p>Multiple risks demand simultaneous attention. Credible nuclear deterrence is not an overreaction; it is a precise, vital response to a threat that, if unleashed, would compound other crises and shatter global stability.</p>
<p><strong>Conclusion: Dominance as Responsible Leadership</strong></p>
<p>Canyon’s critique is a masterclass in wishful thinking, a dangerously naive philosophy that would lead the free world to ruin if ever implemented. It stems from a misplaced comfort with notions of restraint and diplomacy, ignoring the hard reality that security is founded on military strength. History, from the catastrophic failures of appeasement in the 1930s to the isolationism preceding Pearl Harbor, teaches that weakness only emboldens tyrants. Each concession, whether to Hitler’s remilitarization of the Rhineland or to modern-day aggressors, proves that diplomacy without credible force is nothing more than indulgence.</p>
<p>The current global landscape is dominated by adversaries who respect only strength. Russia, under its neo-imperialist regime, wields its vast nuclear arsenal to bolster conventional aggression. China’s unprecedented military modernization is reshaping the balance of power in Asia, and Iran continues its relentless march toward nuclear capability while sponsoring proxy terror. To imagine that these regimes would respond to soft words or empty promises is akin to believing that a repeatedly misbehaving child will learn simply by being put in timeout. Real change is forced change.</p>
<p>American strength, particularly through a robust nuclear deterrent, is not a provocation; it is the only language these adversaries understand. It ensures that any aggressive action exacts a price too steep to consider. In an increasingly perilous world, where the stakes are nothing less than the survival of global stability, a commitment to maintaining unparalleled military dominance is both pragmatic and essential. Ignoring this reality is not idealism, it is willful blindness that invites disaster.</p>
<p><em>Brandon Toliver is a Senior Fellow at the National Institute for Deterrence Studies.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/07/A-Rebuke-to-Willful-Blindness.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="216" height="60" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 216px) 100vw, 216px" /></a></p>
<p><a href="https://globalsecurityreview.com/exposing-willful-blindness-american-strength-is-nonnegotiable/">Exposing Willful Blindness: American Strength Is Nonnegotiable</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/exposing-willful-blindness-american-strength-is-nonnegotiable/feed/</wfw:commentRss>
			<slash:comments>10</slash:comments>
		
		
			</item>
		<item>
		<title>How Civilian Dual-Use Technologies Are Reshaping Global Security Policies</title>
		<link>https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/</link>
					<comments>https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/#respond</comments>
		
		<dc:creator><![CDATA[Harry Geisler]]></dc:creator>
		<pubDate>Thu, 17 Jul 2025 12:17:17 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Development]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI-enabled navigation]]></category>
		<category><![CDATA[AUKUS]]></category>
		<category><![CDATA[autonomous weapons]]></category>
		<category><![CDATA[Civilian dual-use technologies]]></category>
		<category><![CDATA[collective defense]]></category>
		<category><![CDATA[counter-drone strategy]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[drones]]></category>
		<category><![CDATA[energy grid]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[export control regimes]]></category>
		<category><![CDATA[FPV drones]]></category>
		<category><![CDATA[global security policies]]></category>
		<category><![CDATA[governance gaps]]></category>
		<category><![CDATA[hybrid conflict]]></category>
		<category><![CDATA[infrastructure attacks]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[legal frameworks]]></category>
		<category><![CDATA[National defense]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Nord Stream pipelines]]></category>
		<category><![CDATA[procurement pathways]]></category>
		<category><![CDATA[resilience]]></category>
		<category><![CDATA[sabotage]]></category>
		<category><![CDATA[start-ups]]></category>
		<category><![CDATA[transportation hubs]]></category>
		<category><![CDATA[unmanned aircraft systems]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31187</guid>

					<description><![CDATA[<p>In August 2024, police in northern Germany chased a fleet of drones loitering over critical infrastructure: a decommissioned nuclear plant, a chemical facility, and a Baltic liquified natural gas (LNG) terminal. The drones flew with impunity, reportedly reaching 100 kilometres an hour to evade police. Authorities launched an espionage investigation, suspecting the drones were scouting [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/">How Civilian Dual-Use Technologies Are Reshaping Global Security Policies</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In August 2024, <a href="https://www.defensenews.com/global/europe/2024/08/29/drone-sightings-near-bases-infrastructure-unnerve-german-officials">police in northern Germany</a> chased a fleet of drones loitering over critical infrastructure: a decommissioned nuclear plant, a chemical facility, and a Baltic liquified natural gas (LNG) terminal. The drones flew with impunity, reportedly reaching 100 kilometres an hour to evade police. Authorities launched an espionage investigation, suspecting the drones were scouting for sabotage.</p>
<p>This was not an isolated incident. Civilian-grade drones and other dual-use technologies are increasingly being used to survey or target public infrastructure. From energy grids to airports, the connective tissue of modern life is exposed to risks once confined to traditional warzones. These developments are reshaping global security policies and blurring the boundary between civilian and military domains.</p>
<h3><strong>Civilian Tech, Strategic Impact</strong></h3>
<p>Cheap unmanned aircraft systems (UAS) are now accessible worldwide. While drones were initially developed for military use, the most commonly deployed platforms today, such as DJI’s Mavic series, were originally built for civilian applications like aerial photography and videography. Their affordability, portability, and high-spec cameras made them commercially popular, but those same features have made them easy to repurpose for military contexts.</p>
<p>In particular, first-person view (FPV) drones, designed for immersive recreational flying, were rapidly adapted for frontline use in conflict. These drones are now routinely deployed with improvised explosives or used for precision reconnaissance. In Ukraine, both sides repurposed off-the-shelf drones in vast numbers; nearly two million were produced in 2024 alone. Many of these are equipped with AI-enabled navigation and targeting, underscoring how quickly civilian tech can be weaponised.</p>
<p>Non-state actors are following suit. Armed groups are using FPV drones for low-cost, high impact strikes on infrastructure, blurring the lines between military and civilian threats. This second drone age shows that national security vulnerabilities now stem as much from consumer technology as from conventional arsenals.</p>
<p>The broader implication is clear: private-sector innovations, often created without any defense intent, are shaping the battlefield. These companies bring novel use cases, technical advantages, or agile design processes that legacy defense contractors may overlook. Civilian tech is not just a risk; it is a potential strategic asset. Tapping into this ecosystem, especially among start-ups and experts, could redefine how the country protects critical infrastructure in an era of hybrid conflict.</p>
<p><strong>Infrastructure in the Crosshairs</strong></p>
<p>Modern infrastructure is a key target in modern conflicts or hybrid attacks, just like military bases traditionally were. In 2022, after the <a href="https://www.theguardian.com/business/2022/sep/29/nord-stream-attacks-highlight-vulnerability-undersea-pipelines-west">sabotage of the Nord Stream pipelines</a>, over 70 drone sightings were reported near Norwegian offshore oil platforms. Oslo feared Russian-linked hybrid operations targeting Europe’s energy supply and deployed naval assets and invited NATO allies to assist in patrols.</p>
<p>Meanwhile, Ukraine’s energy grid suffered repeated drone and missile attacks, with waves of <a href="https://www.csis.org/analysis/drone-saturation-russias-shahed-campaign">low-cost Shahed drones</a> used to disable power plants. By spring 2024, <a href="https://www.bbc.co.uk/news/articles/czvvj4j4p8ro">roughly half of Ukraine’s electricity capacity</a> was destroyed, forcing nationwide blackouts.</p>
<p>Outside conflict zones, attacks on infrastructure are also rising. In Sudan, a <a href="https://www.bbc.co.uk/news/articles/cx20x8g2nego">drone strike on a power station caused regional outages,</a> and other drone attacks on water purification stations left the country on the <a href="https://www.bbc.co.uk/news/articles/c3v5n5ynl59o">brink of a significant Cholera outbreak</a>. In the US, federal officials stopped an attack on a power grid by a man using an <a href="https://domesticpreparedness.com/articles/protecting-critical-infrastructure-from-weaponized-drones">explosive-carrying drone</a>.</p>
<p>Transportation hubs are vulnerable, too. In January 2025, <a href="https://d-fendsolutions.com/blog/europes-drone-challenge-and-countermeasures-in-2025/">drone activity shut down Riga Airport</a>, disrupting dozens of flights.</p>
<p><strong> </strong><strong>Gaps in Governance</strong></p>
<p><strong> </strong>Despite growing risks, legal and operational frameworks remain fragmented. Drones and AI-driven surveillance systems often fall outside traditional arms control regimes. As a recent<a href="https://www.flyingmag.com/white-house-unveils-package-of-drone-measures-in-executive-order/"> executive order</a> put it, “Criminals, terrorists, and hostile foreign actors have intensified their weaponization of drone technologies, creating new and serious threats to our homeland.”</p>
<p>Jurisdictional confusion is common. In many countries, local authorities lack legal authority to respond to rogue drones above critical sites. Aviation safety rules and privacy laws create hesitation, giving bad actors a head start.</p>
<p>Even when threat awareness exists, coordination is inconsistent. The Cybersecurity and Infrastructure Security Agency warns that drones are used for surveillance and sabotage, yet they lack the comprehensive tools to oversee private-sector resilience or cross-border response.</p>
<p><strong> </strong><strong>A Global Security Challenge</strong></p>
<p><strong> </strong>Drone and AI threats are not confined by borders. In 2023, the <a href="https://ec.europa.eu/newsroom/cipr/items/805599/en">European Commission launched a new counter-drone strategy</a>, urging member states to harden infrastructure and coordinate airspace protections. NATO has added counter-UAS exercises to its joint drills, while AUKUS partners are beginning to share emerging drone and AI tactics.</p>
<p>But international law is lagging. There is still no global treaty governing the use of armed drones or autonomous surveillance. Export control regimes struggle to manage proliferation of AI-enabling components. At the UN, efforts to establish binding norms on autonomous weapons are stalled. Ad hoc coordination is, however, slowly improving.</p>
<p>When Norway’s oil platforms were threatened, NATO allies were called in within days. After drone sightings near Dutch and Belgian ports, neighboring governments exchanged countermeasure plans. These models suggest a path forward: rapid and collective responses based on shared tools, shared doctrine, and shared threat intelligence.</p>
<p>The future of civilian dual-use technologies will not be defined by innovators alone. Whether drones or AI software, these tools are already reshaping how adversaries threaten public safety and economic continuity. What is at stake is not just national security, but the resilience of infrastructure that supports daily life.</p>
<p><strong>The Crucial Role of Start-ups in National Defense</strong></p>
<p><strong> </strong>Civilian-origin technologies are now driving the next wave of defense capability. From FPV drones to AI surveillance tools, some of the most disruptive military applications today are emerging not from traditional defense primes but from commercial markets, often developed by start-ups with no military background.</p>
<p>A coordinated international framework is urgently needed, one that does not just support innovation and infrastructure protection but actively integrates civilian tech into defense planning. This means lowering the barriers for experts and start-ups to meaningfully contribute alongside legacy contractors. The <a href="https://www.gov.uk/government/publications/the-strategic-defence-review-2025-making-britain-safer-secure-at-home-strong-abroad/the-strategic-defence-review-2025-making-britain-safer-secure-at-home-strong-abroad#:~:text=Industry%2Dbacked.,new%2C%20segmented%20approach%20to%20procurement:&amp;text=Major%20modular%20platforms%20(contracting%20within,on%20novel%20technologies%20each%20year.">United Kingdom’s recent <em>Defence Review</em></a> hinted at this shift, recognising that smaller firms are vital to national resilience, particularly when civilian infrastructure is under threat.</p>
<p>What is truly needed is a NATO-wide or broader allied framework that enables cross-border collaboration, streamlines regulation, and opens up procurement pathways.</p>
<p>Today, many start-ups working at the intersection of security and technology face steep hurdles: limited access to capital, opaque compliance regimes, and procurement processes designed around, and for, large incumbents. Yet by creating space for their innovation, we can modernize collective defense from the ground up, using the very same civilian tools that adversaries are already turning into weapons.</p>
<p>A coordinated international framework is urgently needed, one that not only supports innovation and infrastructure protection but also lowers barriers to experts and start-ups to contribute more meaningfully alongside traditional defense primes. The <a href="https://www.gov.uk/government/publications/the-strategic-defence-review-2025-making-britain-safer-secure-at-home-strong-abroad/the-strategic-defence-review-2025-making-britain-safer-secure-at-home-strong-abroad#:~:text=Industry%2Dbacked.,new%2C%20segmented%20approach%20to%20procurement:&amp;text=Major%20modular%20platforms%20(contracting%20within,on%20novel%20technologies%20each%20year.">UK’s recent <em>Defence</em> <em>Review </em>hinted at this shift</a>, recognizing the value smaller firms bring to national resilience. It is time to take similar action at home.</p>
<p><em>Harry Geisler is the CEO of YAVA.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/07/How-Civilian-Dual-Use-Technologies-Are-Reshaping-Global-Security-Policies.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="180" height="50" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 180px) 100vw, 180px" /></a></p>
<p><a href="https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/">How Civilian Dual-Use Technologies Are Reshaping Global Security Policies</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Midnight Hammer and After</title>
		<link>https://globalsecurityreview.com/midnight-hammer-and-after/</link>
					<comments>https://globalsecurityreview.com/midnight-hammer-and-after/#comments</comments>
		
		<dc:creator><![CDATA[Stephen Cimbala]]></dc:creator>
		<pubDate>Mon, 07 Jul 2025 12:16:17 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Al Udeid Air Base]]></category>
		<category><![CDATA[asymmetrical warfare]]></category>
		<category><![CDATA[B2 Spirit bombers]]></category>
		<category><![CDATA[Cyberattacks]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[Diplomacy]]></category>
		<category><![CDATA[enrichment]]></category>
		<category><![CDATA[fissile material]]></category>
		<category><![CDATA[Fordow]]></category>
		<category><![CDATA[GBU-57 Massive Ordnance Penetrator]]></category>
		<category><![CDATA[General Dan Caine]]></category>
		<category><![CDATA[hamas]]></category>
		<category><![CDATA[Hezbollah]]></category>
		<category><![CDATA[houthis]]></category>
		<category><![CDATA[imagery intelligence]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Iranian proxies]]></category>
		<category><![CDATA[Isfahan]]></category>
		<category><![CDATA[Midnight Hammer]]></category>
		<category><![CDATA[military response]]></category>
		<category><![CDATA[missile strikes]]></category>
		<category><![CDATA[Natanz]]></category>
		<category><![CDATA[Netanyahu]]></category>
		<category><![CDATA[nuclear enrichment]]></category>
		<category><![CDATA[red sea]]></category>
		<category><![CDATA[regime change]]></category>
		<category><![CDATA[Stephen Cimbala]]></category>
		<category><![CDATA[Strait of Hormuz]]></category>
		<category><![CDATA[Tomahawk Land Attack Missiles]]></category>
		<category><![CDATA[Trump administration]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31116</guid>

					<description><![CDATA[<p>American military strikes against Iran’s nuclear enrichment facilities on June 22 present a tableau of military-operational excellence that surprised Iran and much of the international community. The joint operation featured the most extensive use of the B2 Spirit bombers in any single operation. Seven bombers attacked Iranian targets at Fordow and Natanz with highly accurate [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/midnight-hammer-and-after/">Midnight Hammer and After</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>American military strikes against Iran’s nuclear enrichment facilities on June 22 present a tableau of military-operational excellence that surprised Iran and much of the international community. The joint operation featured the most extensive use of the B2 Spirit bombers in any single operation. Seven bombers attacked Iranian targets at Fordow and Natanz with highly accurate GBU-57 Massive Ordnance Penetrator (MOP) bombs.</p>
<p>An American submarine also fired thirty Tomahawk Land Attack Missiles (TLAM) against surface infrastructure targets at Isfahan. As Chairman of the Joint Chiefs of Staff General Dan Caine described it, the entire operation was a complex timed maneuver requiring exact synchronization across multiple platforms in a narrow piece of airspace.</p>
<p>American deception tactics contributed to surprise as neither Iraqi fighters nor their surface-to-air missile defenses attempted to interdict the American bombers and their supporting fighter aircraft, all of which returned safely.</p>
<p>According to General Caine, Operation Midnight Hammer involved more than 125 aircraft, including the seven B2 stealth bombers, numerous fourth- and fifth-generation fighters, and dozens of refueling tankers. Some 75 precision-guided munitions were used in Midnight Hammer, including fourteen GBU-57 MOPs, which were used for the first time in combat.</p>
<p>The operational excellence of Midnight Hammer doubtless constituted a setback to Iran’s nuclear enrichment programs, although exactly how much of a setback remains to be determined.  Battle damage assessment is dependent on overhead photography unless and until further information is obtained from intelligence sources near or at the affected sites.</p>
<p>There also remained unsettled issues relative to American and allied strategy going forward. The Trump administration’s declaratory policy wants to draw a line between going to war with Iran, on one hand, and neutralizing its nuclear capabilities and potential, on the other.  This is a fine line to draw and Iran response, and follow-on condemnations, suggest they see the American position as a distinction without a difference.</p>
<p>Ater the strikes, President Trump indicated that Iran should come to the diplomatic table and negotiate the status of its nuclear future. Iran rejected further negotiations. This left the American and Israeli defense communities to await whatever diplomatic or military response the Iranians offered, including possible military attacks against American forces deployed in the Middle East.</p>
<p>Based on experience, Iran would likely respond with continuing missile strikes against Israel and asymmetrical warfare against the United States. With regard to the latter, Iran’s options included: (1) disrupting the flow of maritime traffic in the Strait of Hormuz; (2) committing cyberattacks against American military or societal targets; (3) committing missile or insurgent attacks against American military personnel in Iraq or elsewhere in the region; (4) supporting protest demonstrations or terrorism in the American homeland, perhaps making use of prepositioned cells made up of illegal aliens; and/or (5) encouraging Iranian proxies in Gaza, Lebanon, and Yemen to further harass American, Israeli, and allied interests.</p>
<p>Thus far, Iran limited its response to employing a small number of missiles against Al Udeid Air Base in Qatar, even giving the Americans advance warning of the strike. For the Trump administration, this is the best possible outcome. Already, imagery intelligence suggests Iran is digging out its capabilities at Fordow and Esfahan. What the future may hold is uncertain. Whether Iran is simply buying time and learning lessons for future success or whether the regime truly desires peace is up in the air.</p>
<p>Future options for Iran have their positives and negatives. Disruptions in the Strait of Hormuz would harm Iran’s own economy, which needs the infusion of cash from oil sales to China.</p>
<p>Cyberattacks are a low-risk, low-cost option that may appeal to Iran in the near term, but they present a more serious potential threat to civilian targets compared to more heavily defended military ones. They will also draw severe reprisals from very competent American and Israeli cyber forces.</p>
<p>Additional attacks against American military personnel and facilities in Iraq are an option, as are missile or unconventional warfare against other regional states hosting American military bases. However, this path was not successful the first time.</p>
<p>Support for antiwar demonstrations or outright terrorism in the American homeland, including “lone wolf” terrorists recruited online, are still a possibility. New stories of Iranian illegal aliens arrested by Immigration and Customs Enforcement are almost a daily occurrence.</p>
<p>As for Iranian proxies, Hamas and Hezbollah are on the ropes, momentarily, due to prior engagements with Israel, but the Houthis declared their intention to plus-up their disruptions of commerce in the Red Sea in the wake of Midnight Hammer. Whether this is possible is yet to be seen.</p>
<p>With respect to Iran’s future nuclear options and American responses, they may proceed in one of three ways: (1) a continuing “whack-a-mole” competition in which Iran continues surreptitious enrichment and the US and Israel continue to monitor its progress and, if necessary, repeat Midnight Hammer, or worse; (2) Iran undergoes a change of regime due to domestic opposition, leaving uncertain for a time exactly who is in charge and who controls the supplies of enriched uranium and nuclear infrastructure, never mind the armed forces and security police; or (3) Iran agrees to negotiate with the US and representatives of the international community another deal to limit its stockpiles of fissile material and its levels of enrichment.</p>
<p>These are possible options, but by no means the only options. Iran may pursue an unexpected path in an effort to outthink the United States and Israel. Whatever the future holds, President Trump and Israeli Prime Minister Benjamin Netanyahu must keep a close eye on a regime that is built on destroying both countries. Hope is critical to human perseverance, but it is not a strategy.</p>
<p><em>Dr. Stephen Cimbala is Distinguished Professor of Political Science at Penn State university, Brandywine. He is currently a senior fellow with the National Institute for Deterrence Studies. Views expressed in this article are the author’s own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/07/Midnight-Hammer-and-After.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="238" height="66" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 238px) 100vw, 238px" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/midnight-hammer-and-after/">Midnight Hammer and After</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/midnight-hammer-and-after/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>The Future of War Is Coming from India to Greece</title>
		<link>https://globalsecurityreview.com/the-future-of-war-is-coming-from-india-to-greece/</link>
					<comments>https://globalsecurityreview.com/the-future-of-war-is-coming-from-india-to-greece/#comments</comments>
		
		<dc:creator><![CDATA[Dimitra Staikou]]></dc:creator>
		<pubDate>Thu, 03 Jul 2025 12:06:08 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[12-year Armament Program]]></category>
		<category><![CDATA[Achilles’ Shield]]></category>
		<category><![CDATA[Agenda 2030]]></category>
		<category><![CDATA[Arunachal Pradesh]]></category>
		<category><![CDATA[Bayraktar drones]]></category>
		<category><![CDATA[border security]]></category>
		<category><![CDATA[Cyprus]]></category>
		<category><![CDATA[defense dome]]></category>
		<category><![CDATA[defense innovation]]></category>
		<category><![CDATA[Dimitra Staikou.]]></category>
		<category><![CDATA[domestic arms industry]]></category>
		<category><![CDATA[Evros border]]></category>
		<category><![CDATA[Future of war]]></category>
		<category><![CDATA[global geopolitical challenges]]></category>
		<category><![CDATA[Greece]]></category>
		<category><![CDATA[Haven Drones]]></category>
		<category><![CDATA[human rights violations]]></category>
		<category><![CDATA[hydrogen-powered drones]]></category>
		<category><![CDATA[illegal aliens detection]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Kashmir]]></category>
		<category><![CDATA[Made in India]]></category>
		<category><![CDATA[military spending]]></category>
		<category><![CDATA[Narendra Modi]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[New Force Structure]]></category>
		<category><![CDATA[Nikos Dendias]]></category>
		<category><![CDATA[Paras Defense Space Technologies]]></category>
		<category><![CDATA[SIPRI]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[Turkey]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31102</guid>

					<description><![CDATA[<p>With the recent war in the Middle East seemingly at an end, Greeks may think that they are at a safe distance from this crisis and rest easy. It is, however, important to remember that Turkey, Greece’s neighbor and long-standing adversary, played or continues to play a role in the varying crises across the region. [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-future-of-war-is-coming-from-india-to-greece/">The Future of War Is Coming from India to Greece</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>With the recent war in the Middle East seemingly at an end, Greeks may think that they are at a safe distance from this crisis and rest easy. It is, however, important to remember that Turkey, Greece’s neighbor and long-standing adversary, played or continues to play a role in the varying crises across the region.</p>
<p>Turkey provides advanced military equipment to Pakistan and financial support when necessary. The success of Turkey’s Bayraktar drones in Ukraine are but one example of Turkey’s push to build a technologically sophisticated military force.</p>
<p>Greece, however, is focused on domestic programs and is developing a military capable of effectively deterring Turkey, should the desire to seize further Greek territory arise. Greeks are complacent and too willing to view membership in the North Atlantic Treaty Organization (NATO) as a guarantee against Turkish aggression.</p>
<p>Indian Prime Minister Narendra Modi made a diplomatic visit to Cyprus on June 15, 2025. This was a fortuitous visit because India has long dealt with the kind of challenges Turkey poses to Greece. The country has also undertaken an effort to modernize its forces, which offers lessons for Greece.</p>
<p>The United States, China, Russia, Germany, and India accounted for 60 percent of the world’s total military spending, with their total expenditure amounting to $1.6 trillion. The Stockholm International Peace Research Institute’s (SIPRI) most recent data highlights that India is consistently investing more in defense, as security issues increasingly dominate national priorities.</p>
<p>India is among the top five military spenders in the world, according to new SIPRI data. India’s defense spending increased by 1.6 percent in 2024, reaching $86.1 billion, making it the fifth largest military power in the world.</p>
<p>India’s first domestically produced hydrogen-powered drones are ready for use. Sharad Shah, Managing Director of Paras Defense Space Technologies, says his company is able to support India’s immediate security needs following the recent attacks. And just as India was preparing to launch deadly strikes on terrorist camps in Pakistan, Paras announced a strategic joint venture with Haven Drowns in Israel, a US-based global company recognized for its autonomous, hydrogen-powered, and mission-specific drones.</p>
<p>The joint venture with Haven Drones will create a new capability in India for the design, manufacture, and supply of next generation drone systems tailored to India’s defense and internal security. These drones serve long-term plans to address global crises.</p>
<p>Paras is a defense engineering company specializing in advanced cutting-edge optical systems, optoelectronic systems, and defense solutions—not originally a drone manufacturer. The drones that emerged from this Indian-Israeli collaboration were tested on the highly volatile border of Israel. What makes them a game changer for India is their resilience and autonomy. These are hydrogen-powered unmanned aircraft that can stay in the air five times longer than current systems and are virtually silent, making them ideal for round-the-clock surveillance. One model can hover 500 meters above the ground, maintaining continuous surveillance of vast areas.</p>
<p>The recent escalation of tensions between India and Pakistan in the Pahalgam region of Kashmir underlines a harsh reality; persistent surveillance and rapid response are no longer optional—they are urgent. Paras is focused on providing real-time intelligence and countermeasures through surveillance technologies that can be deployed without delay and is working with India’s Ministry of Defense to ensure border security.</p>
<p>Both India and Greece must give maximum effort to protect their borders with state-of-the-art drones that can both prevent entry of illegal aliens and detect enemy movements. Greece can benefit greatly from drones in the Evros, which borders Turkey by land and sea. India has similar challenges in the Kashmir region, which borders Pakistan, and in Arunachal Pradesh, which China illegally claims by calling it South Tibet. These common challenges make India a natural partner.</p>
<p>India’s defense sector has experienced strong growth in recent years, driven by the government’s strong emphasis on innovation and increased defense spending. Rising border tensions and global geopolitical challenges spurred both domestic and international orders of Indian defense hardware, demonstrating increased confidence in the capabilities of Indian defense manufacturers.</p>
<p>The domestic defense industry grew to Rs 1.27 lakh crore (over $18 billion) in 2024, registering a remarkable growth of 174 percent since 2015. This impressive growth is supported by government efforts along with foreign military sales that include more than 17,000 items, which encourages domestic production for the international market.</p>
<p>It is time for Greece to start developing its own heavy industry sector and to stop relying on tourism as its source of revenue. In the 1980s, Greece even stopped making automobiles and started depending on loans from European organizations. Given Greece’s central location as the buffer between Europe and the Middle East, it is time to start investing in its own domestic arms manufacturing industry which is exactly what the “Made in India” movement is all about.</p>
<p>Of course, Greece does not have a domestic arms industry, but it understands the complexity of the simultaneous crises that impact the country. It is because of worsening conditions that the Greek Air Force is strengthening air defenses on Crete.</p>
<p>There is, however, positive news. Minister for National Defense Nikos Dendias proposed the creation of a defense dome, Achilles’ Shield, for the country. This effort is already underway as part of the Agenda 2030 effort. This follows the approval of the New Force Structure and the 12-year Armament Program by parliament and the Kysea. These efforts are a good start.</p>
<p>If Greece follows India’s example and invests in an indigenous arms industry that serves both Greece’s needs and an international market, the endeavor can prove successful. Restoring domestic industrial production is also an important undertaking for a country that has largely seen its domestic manufacturing industry perish. Greece has too long rested on its laurels while Turkey modernized its military and grew its domestic defense industry. Taking the positive elements of India’s efforts and avoiding their mistakes can serve as a path forward for Greece.</p>
<p><em>Dimitra Staikou is a Greek lawyer who works as a journalist writing about human rights violations in South Asia. She works for Greece’s biggest newspaper, Skai.gr, and Huffpost.Gr, as well as international distinguished news sites such as Modern Diplomacy and Global Research. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/07/Future-of-War.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="187" height="52" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 187px) 100vw, 187px" /></a></p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/the-future-of-war-is-coming-from-india-to-greece/">The Future of War Is Coming from India to Greece</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-future-of-war-is-coming-from-india-to-greece/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>15 Years in the Making: U.S. Precision Strike on Iran’s Fortified Nuclear Site </title>
		<link>https://globalsecurityreview.com/15-years-in-the-making-u-s-precision-strike-on-irans-fortified-nuclear-site/</link>
					<comments>https://globalsecurityreview.com/15-years-in-the-making-u-s-precision-strike-on-irans-fortified-nuclear-site/#respond</comments>
		
		<dc:creator><![CDATA[GSR Staff]]></dc:creator>
		<pubDate>Fri, 27 Jun 2025 11:55:29 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[B-2 Spirit bomber]]></category>
		<category><![CDATA[Boeing]]></category>
		<category><![CDATA[bunker buster]]></category>
		<category><![CDATA[defense innovation]]></category>
		<category><![CDATA[Defense Partnerships]]></category>
		<category><![CDATA[defense technology]]></category>
		<category><![CDATA[Defense Threat Reduction Agency]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[Fordow]]></category>
		<category><![CDATA[GBU-57]]></category>
		<category><![CDATA[intelligence integration]]></category>
		<category><![CDATA[Iran nuclear site]]></category>
		<category><![CDATA[Iran strike]]></category>
		<category><![CDATA[Isfahan]]></category>
		<category><![CDATA[Massive Ordnance Penetrator]]></category>
		<category><![CDATA[military engineering]]></category>
		<category><![CDATA[military planning]]></category>
		<category><![CDATA[MOP]]></category>
		<category><![CDATA[Natanz]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[Northrop Grumman]]></category>
		<category><![CDATA[nuclear proliferation]]></category>
		<category><![CDATA[Operation Midnight Hammer]]></category>
		<category><![CDATA[precision strike]]></category>
		<category><![CDATA[Quick Reaction Capability]]></category>
		<category><![CDATA[stealth bomber]]></category>
		<category><![CDATA[strategic deterrence]]></category>
		<category><![CDATA[strategic foresight]]></category>
		<category><![CDATA[underground facilities]]></category>
		<category><![CDATA[US Air Force]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31057</guid>

					<description><![CDATA[<p>Today’s Department of Defense release highlights not just a military operation, but decades of foresight, innovation, and strategic discipline. 🔹 Engineering &#38; Intelligence Combined What began in 2009 with the Defense Threat Reduction Agency’s monitoring of Iran’s Fordow site evolved into a cutting-edge capability. The 30,000‑lb GBU‑57 Massive Ordnance Penetrator (MOP) was precisely engineered—tested hundreds [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/15-years-in-the-making-u-s-precision-strike-on-irans-fortified-nuclear-site/">15 Years in the Making: U.S. Precision Strike on Iran’s Fortified Nuclear Site </a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Today’s <a href="https://www.defense.gov/News/News-Stories/Article/Article/4227082/historically-successful-strike-on-iranian-nuclear-site-was-15-years-in-the-maki/">Department of Defense</a> release highlights not just a military operation, but decades of foresight, innovation, and strategic discipline.</p>
<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f539.png" alt="🔹" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Engineering &amp; Intelligence Combined</strong><br />
What began in 2009 with the Defense Threat Reduction Agency’s monitoring of Iran’s Fordow site evolved into a cutting-edge capability. The 30,000‑lb GBU‑57 Massive Ordnance Penetrator (MOP) was precisely engineered—tested hundreds of times and customized in fuse timing and impact parameters—to penetrate deeply buried facilities</p>
<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f539.png" alt="🔹" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Strategic Collaboration &amp; Planning</strong><br />
This achievement isn’t just about hardware. It reflects 15 years of close collaboration between military planners, intelligence analysts, and industry leaders—including Boeing, Northrop Grumman, and the Air Force’s Quick Reaction Capability program</p>
<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f539.png" alt="🔹" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Execution with Precision</strong><br />
On June 22, B‑2 stealth bombers launched Operation “Midnight Hammer,” striking Iran’s Fordow, Natanz, and Isfahan sites with surgical accuracy. The MOP penetrated as planned—leaving minimal surface signatures while delivering deep destruction</p>
<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f539.png" alt="🔹" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>What This Means for National Security</strong><br />
This operation showcases how sustained investment in R&amp;D, intelligence integration, and interagency coordination can yield mission-defining capabilities. It exemplifies the strategic patience and partnership necessary for complex, high-stakes operations.</p>
<p><strong>Key Takeaways for Defense &amp; Tech Leaders:</strong></p>
<ol>
<li><strong>Vision Meets Execution</strong> – Long-term defense projects require a clear vision, persistent funding, and cross-disciplinary alignment.</li>
<li><strong>Testing &amp; Validation</strong> – MOP’s success was no accident—it was the result of rigorous modeling, simulation, and live testing.</li>
<li><strong>Partnership Power</strong> – Defense agencies, military services, and industry must collaborate seamlessly over years to deploy such capabilities.</li>
<li><strong>Strategic Deterrence</strong> – Precision technologies like the MOP expand strategic options, offering alternatives to broader or more escalatory responses.</li>
</ol>
<p>As our world grows more complex, this operation demonstrates that when foresight, perseverance, and technological excellence coalesce, they can deliver decisive outcomes.</p>
<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Let’s discuss: How can lessons from this mission inform future innovation in defense tech and strategic deterrence?</p>
<div style="width: 640px;" class="wp-video"><video class="wp-video-shortcode" id="video-31057-2" width="640" height="360" preload="metadata" controls="controls"><source type="video/mp4" src="https://d34w7g4gy10iej.cloudfront.net/video/2506/DOD_111099043/DOD_111099043-1280x720-3000k.mp4?_=2" /><a href="https://d34w7g4gy10iej.cloudfront.net/video/2506/DOD_111099043/DOD_111099043-1280x720-3000k.mp4">https://d34w7g4gy10iej.cloudfront.net/video/2506/DOD_111099043/DOD_111099043-1280x720-3000k.mp4</a></video></div>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/15-years-in-the-making-u-s-precision-strike-on-irans-fortified-nuclear-site/">15 Years in the Making: U.S. Precision Strike on Iran’s Fortified Nuclear Site </a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/15-years-in-the-making-u-s-precision-strike-on-irans-fortified-nuclear-site/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		<enclosure url="https://d34w7g4gy10iej.cloudfront.net/video/2506/DOD_111099043/DOD_111099043-1280x720-3000k.mp4" length="585131168" type="video/mp4" />

			</item>
		<item>
		<title>Real Space Strategy Live with Christopher Stone: Deterring Chinese Aggression in Space</title>
		<link>https://globalsecurityreview.com/real-space-strategy-live-with-christopher-stone-deterring-chinese-aggression-in-space/</link>
					<comments>https://globalsecurityreview.com/real-space-strategy-live-with-christopher-stone-deterring-chinese-aggression-in-space/#respond</comments>
		
		<dc:creator><![CDATA[Christopher Stone]]></dc:creator>
		<pubDate>Fri, 20 Jun 2025 12:41:28 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Space Deterrence & Conflict]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30997</guid>

					<description><![CDATA[<p>In this June edition of Real Space Strategy Live, host Christopher Stone, Senior Fellow for Space Deterrence at the National Institute for Deterrence Studies, welcomes Dr. Kevin Pollpeter from the U.S. Air Force’s China Aerospace Studies Institute. Together, they explore the evolving threat landscape in space, China’s counterspace capabilities, and the challenges of deterring aggression [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/real-space-strategy-live-with-christopher-stone-deterring-chinese-aggression-in-space/">Real Space Strategy Live with Christopher Stone: Deterring Chinese Aggression in Space</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In this June edition of Real Space Strategy Live, host Christopher Stone, Senior Fellow for Space Deterrence at the National Institute for Deterrence Studies, welcomes Dr. Kevin Pollpeter from the U.S. Air Force’s China Aerospace Studies Institute. Together, they explore the evolving threat landscape in space, China’s counterspace capabilities, and the challenges of deterring aggression in the space domain.</p>
<h3><strong>Topics include: </strong></h3>
<ul>
<li>China&#8217;s military space doctrine</li>
<li>Counterspace threats from kinetic to cyber</li>
<li>The limits of traditional deterrence theory</li>
<li>Strategic recommendations for U.S. space policy</li>
</ul>
<p>&nbsp;</p>
<p><iframe title="Real Space Strategy Live with Christopher Stone: Deterring Chinese Aggression in Space" width="640" height="360" src="https://www.youtube.com/embed/NQm5vxt5zdQ?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p><a href="https://globalsecurityreview.com/real-space-strategy-live-with-christopher-stone-deterring-chinese-aggression-in-space/">Real Space Strategy Live with Christopher Stone: Deterring Chinese Aggression in Space</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/real-space-strategy-live-with-christopher-stone-deterring-chinese-aggression-in-space/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Air Force&#8217;s Nuclear Deterrent: Modernization in Progress</title>
		<link>https://globalsecurityreview.com/the-air-forces-nuclear-deterrent-modernization-in-progress/</link>
					<comments>https://globalsecurityreview.com/the-air-forces-nuclear-deterrent-modernization-in-progress/#respond</comments>
		
		<dc:creator><![CDATA[Curtis McGiffin]]></dc:creator>
		<pubDate>Wed, 04 Jun 2025 12:14:49 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Air Force]]></category>
		<category><![CDATA[B-21 raider]]></category>
		<category><![CDATA[B-52H Stratofortress]]></category>
		<category><![CDATA[B-52J modernization]]></category>
		<category><![CDATA[B61-12 nuclear gravity bomb]]></category>
		<category><![CDATA[cold war]]></category>
		<category><![CDATA[deterrence strategy]]></category>
		<category><![CDATA[F-35 fighter jet]]></category>
		<category><![CDATA[fiber optic cables]]></category>
		<category><![CDATA[Great Power Competition]]></category>
		<category><![CDATA[launch facilities]]></category>
		<category><![CDATA[Long Range Stand Off missile]]></category>
		<category><![CDATA[LRSO]]></category>
		<category><![CDATA[military impact]]></category>
		<category><![CDATA[Minuteman III]]></category>
		<category><![CDATA[modernization]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[NATO nuclear deterrent]]></category>
		<category><![CDATA[nuclear deterrent]]></category>
		<category><![CDATA[nuclear sharing]]></category>
		<category><![CDATA[nuclear triad]]></category>
		<category><![CDATA[psychological impact]]></category>
		<category><![CDATA[Sentinel ICBM]]></category>
		<category><![CDATA[stealth bomber]]></category>
		<category><![CDATA[strategic bomber fleet]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30866</guid>

					<description><![CDATA[<p>The United States is currently undergoing a comprehensive modernization of its nuclear triad and strategic bomber fleet, with the goal of ensuring a cost-effective and credible deterrent in an increasingly complex global security environment. From new cruise missiles to next-generation bombers and upgraded ICBMs, these programs represent a significant investment in national security. Each faces [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-air-forces-nuclear-deterrent-modernization-in-progress/">The Air Force&#8217;s Nuclear Deterrent: Modernization in Progress</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The United States is currently undergoing a comprehensive modernization of its nuclear triad and strategic bomber fleet, with the goal of ensuring a cost-effective and credible deterrent in an increasingly complex global security environment. From new cruise missiles to next-generation bombers and upgraded ICBMs, these programs represent a significant investment in national security. Each faces unique challenges and demonstrates varying degrees of success according to a presentation by Lt Gen Andrew Gebara, the Deputy Chief of Staff for Strategic Deterrence and Nuclear Integration, on May 16, 2025, at a National Institute for Deterrence Studies event in Washington, DC.</p>
<p>One of the cornerstones of this modernization is the development of the B-21 <em>Raider</em>, the nation&#8217;s first <a href="https://www.northropgrumman.com/what-we-do/air/b-21-raider?utm_source=bingpaid&amp;utm_medium=search&amp;utm_campaign=air-b21raider&amp;utm_audience=customerhill&amp;utm_content=keywords&amp;utm_format=cpc&amp;code=APPLICANT_SOURCE-3-442&amp;source=APPLICANT_SOURCE-3-442&amp;msclkid=68ef6570ac181f25e1760d403e4be6e9">sixth-generation aircraft </a>and second stealth bomber. Poised to replace the B-1 and B-2 bomber fleets, the B-21 embodies the pinnacle of airpower, offering dual-use capabilities and unparalleled lethality. Currently, the B-21 is in its flight test phase, and with multiple aircraft progressing through the assembly line, the B-21 program is largely on schedule and within budget, a testament to its efficient development. Once deployed, this capability will present a significant challenge to potential adversaries and strengthen America&#8217;s capacity to project power and effectively threaten vital enemy targets. Low observable stealth and other on-board technologies can ensure successful penetration and retaliation, placing high-value targets at risk in any cost-imposing deterrence strategy, even against the strongest defenses. This threat, along with the fear instilled by the B-21, will certainly cause any aggressor to reconsider attacking the United States or its allies. While the Air Force is <a href="https://www.airandspaceforces.com/allvin-more-b-21s-may-be-necessary-b-52j-upgrade-goes-awry/">currently funded to buy 100 B-21 bombers</a>, the US Strategic Command commander recently <a href="https://www.airandspaceforces.com/stratcom-chief-b-21s-lrso-strategic-systems/">testified</a> that 145 units are needed “to cope with the increased threats to U.S. security.”</p>
<p>Complementing the B-21 and B-52 is the nuclear-tipped Long Range Stand Off (LRSO) missile. Designed to replace the 40-year-old nuclear-armed Air-Launched Cruise Missile (ALCM) currently deployed on the B-52, the LRSO is a crucial component of the air leg of the nuclear triad. Impressively, the LRSO program is <a href="https://docs.house.gov/meetings/AS/AS29/20250507/118208/HHRG-119-AS29-Wstate-GebaraA-20250507.pdf">presently on track</a> regarding schedule and budget, which is a welcome anomaly in major defense acquisitions. Its success is further highlighted by three successful flight tests in 2025 alone, demonstrating its maturity and readiness. The critical question, however, remains: how many LRSO missiles does the nation truly need to maintain a robust deterrent? This calculus involves intricate geopolitical considerations, technological advancements, and the evolving threat landscape. As of 2023, the Air Force plans to procure <a href="https://www.airandspaceforces.com/lrso-production-decision-2027/">1,087 missiles</a>, with some 67 to be expended during the development phase.</p>
<p>Across the Atlantic, the NATO nuclear deterrent is undergoing its own transformation, centered on the F-35 fighter jet and the B61-12 nuclear gravity bomb. All planned units of the B61-12 have been produced, and the F-35 has achieved certification for nuclear operations. While several European allies have already certified their F-35 jets for this crucial mission, others are still awaiting delivery of their aircraft or are in the process of certification. This phased integration underscores the collaborative nature of NATO&#8217;s nuclear sharing arrangements and the ongoing commitment to collective security. The <a href="https://www.af.mil/About-Us/Fact-Sheets/Display/Article/478441/f-35a-lightning-ii/">F-35</a> is a nimble, adaptable, high-performance multirole fighter combining stealth, sensor fusion, and extraordinary situational awareness, enhancing the lethality of NATO’s nuclear deterrent capability.</p>
<p>The venerable senior citizen B-52H Stratofortress, a workhorse of the bomber fleet, is also receiving a suite of vital upgrades. These enhancements include new engines, radar systems, and upgraded nuclear communications systems.  While progress is being made on these upgrades, they are encountering higher costs and longer timelines <a href="https://www.airandspaceforces.com/gao-b-52j-initial-operational-capability-three-year-delay/">than initially projected</a>. Nevertheless, the program is not &#8220;off the rails&#8221; and remains a critical effort to extend this enduring platform&#8217;s operational life and capabilities. When complete, the B-52J will be a more fuel-efficient, <a href="https://armedservices.house.gov/uploadedfiles/lt_gen_gebara_written_posture_statement.pdf">reliable, modern, and better-integrated platform</a> going into the second half of the 21<sup>st</sup> century. Should the B-52J modernization effort be overly delayed or cancelled, it will likely be replaced with <a href="https://www.airandspaceforces.com/allvin-more-b-21s-may-be-necessary-b-52j-upgrade-goes-awry/">additional B-21</a> bombers.</p>
<p>Finally, the Sentinel Intercontinental Ballistic Missile (ICBM) program represents a monumental undertaking. Beyond merely replacing the now 50-year-old Minuteman III missile, Sentinel involves a complete overhaul of the vast infrastructure spanning five missile fields. Following a Nunn-McCurdy recertification last year, all three stages of the missile, including the post-boost section, have undergone successful testing. The next crucial steps include laying <a href="https://thedefensepost.com/2024/04/01/us-sentinel-icbm-delay/">some 7,000 miles</a> of fiber optic cables across five states to establish robust command and control capabilities for the deployed weapons. A significant cost driver that contributed to the Nunn-McCurdy breach was the <a href="https://www.defenseone.com/technology/2025/05/sentinel-icbm-program-needs-brand-new-silos-air-force-says/405077/">escalating cost of rebuilding</a> the individual launch facilities. General Gebara reminded the audience that with 450 launch facilities (LF), any growth or cost increases in one LF can be multiplied by 450. Therefore, a $1 million increase in the design, construction, or reconditioning of one LF equates to adding half a billion dollars to the program, highlighting the scale and complexity of this vital modernization effort. General Bussiere, commander of the Air Force’s Global Strike Command, <a href="https://www.afgsc.af.mil/News/Article-Display/Article/3552578/continuing-peace-from-a-position-of-strength-afgsc-commander-outlines-moderniza/">describes the Sentinel ICBM project</a> as “the largest works project ever taken in fifty years [likely] since Eisenhower’s interstate program.”</p>
<p>The birth of the United States Air Force coincided with the dawn of the nuclear age and the rapid escalation of the Cold War. Nuclear deterrence quickly became a central and defining mission, profoundly shaping USAF structure, development, and doctrine throughout the Cold War and beyond. In today’s complex era of great power competition, the USAF is, as it should be, deeply committed to modernizing and revitalizing its nuclear deterrent. While programs like the LRSO and B-21 demonstrate impressive progress, others, such as the B-52 upgrades and Sentinel ICBM, face inherent challenges. These efforts, though costly and complex, are essential to maintaining a credible and effective deterrent in a dynamic global environment, ensuring national security for decades to come. This must be America’s number one priority!</p>
<p>As the first Chairman of the Joint Chiefs of Staff, General Omar Bradley once <a href="https://paperspast.natlib.govt.nz/newspapers/AG19491021.2.40">affirmed</a>, as a believer in humanity, he deplored the use of the atomic bomb; however, as a soldier, he respected it. The United States should be prepared to utilize the full psychological and military impact of the bomb to prevent a war and, if attacked, to win the war. He was right in October 1949, and his sentiment remains valid today; the Air Force must ensure that its segment of the strategic nuclear triad is prepared to deter war well into the century.</p>
<p><em>Col. Curtis McGiffin </em>(US Air Force, Ret.) is Vice President for Education of the National <em>Institute for Deterrence Studies and a visiting professor at Missouri State University’s School of Defense and Strategic Studies. He has over 30 years of total USAF service. The views expressed are his own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/06/The-Air-Forces-Nuclear-Deterrent-Modernization-in-Progress.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="234" height="65" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 234px) 100vw, 234px" /></a></p>
<p><a href="https://globalsecurityreview.com/the-air-forces-nuclear-deterrent-modernization-in-progress/">The Air Force&#8217;s Nuclear Deterrent: Modernization in Progress</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-air-forces-nuclear-deterrent-modernization-in-progress/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Maintaining American Military Primacy Without Breaking the Bank</title>
		<link>https://globalsecurityreview.com/maintaining-american-military-primacy-without-breaking-the-bank/</link>
					<comments>https://globalsecurityreview.com/maintaining-american-military-primacy-without-breaking-the-bank/#respond</comments>
		
		<dc:creator><![CDATA[Joshua Thibert]]></dc:creator>
		<pubDate>Mon, 12 May 2025 12:11:54 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[6th-generation aircraft]]></category>
		<category><![CDATA[active protection systems]]></category>
		<category><![CDATA[advanced technologies]]></category>
		<category><![CDATA[AI copilots]]></category>
		<category><![CDATA[airframes]]></category>
		<category><![CDATA[American military primacy]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[battlefield awareness]]></category>
		<category><![CDATA[China’s military]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[defense budget]]></category>
		<category><![CDATA[deterrence studies ​]]></category>
		<category><![CDATA[directed energy weapons]]></category>
		<category><![CDATA[electronic warfare]]></category>
		<category><![CDATA[F-15EX Eagle II]]></category>
		<category><![CDATA[F-35A]]></category>
		<category><![CDATA[Hypersonic Weapons]]></category>
		<category><![CDATA[industrial base]]></category>
		<category><![CDATA[ISR drones]]></category>
		<category><![CDATA[JADC2]]></category>
		<category><![CDATA[M1A2 Abrams tanks]]></category>
		<category><![CDATA[modernization]]></category>
		<category><![CDATA[modular upgrades]]></category>
		<category><![CDATA[multi-domain operations]]></category>
		<category><![CDATA[network-centric warfare]]></category>
		<category><![CDATA[open-architecture upgrades]]></category>
		<category><![CDATA[peer threats]]></category>
		<category><![CDATA[radar-absorbent materials]]></category>
		<category><![CDATA[reconnaissance satellites]]></category>
		<category><![CDATA[sensor fusion]]></category>
		<category><![CDATA[stealth coatings]]></category>
		<category><![CDATA[strategic intelligence]]></category>
		<category><![CDATA[supply chain]]></category>
		<category><![CDATA[sustainment costs]]></category>
		<category><![CDATA[swarm UAVs]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30719</guid>

					<description><![CDATA[<p>Maintaining the United States’ position as the world’s premier military force will push the defense budget beyond the trillion-dollar mark. To ensure the long-term sustainability of the world’s most advanced military while maintaining readiness and effectiveness, the US must rethink its approach to defense funding. Prioritizing the right investments in new capabilities, while leveraging advanced [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/maintaining-american-military-primacy-without-breaking-the-bank/">Maintaining American Military Primacy Without Breaking the Bank</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Maintaining the United States’ position as the world’s premier military force will push the defense budget beyond the trillion-dollar mark. To ensure the long-term sustainability of the world’s most advanced military while maintaining readiness and effectiveness, the US must rethink its approach to defense funding. Prioritizing the right investments in new capabilities, while leveraging advanced technologies to enhance existing systems, can reduce costs and preserve a decisive edge. This approach strengthens deterrence and ensures the US can rapidly dominate any conflict, regardless of the operational environment.</p>
<p>Shifting to upgrading existing airframes with advanced technology rather than developing entirely new 6th-generation aircraft could offer significant long-term benefits. This approach results in substantial cost savings by avoiding the massive research and development expenses associated with new platforms while leveraging existing maintenance infrastructure. Additionally, integrating advanced technologies into proven airframes allows for faster deployment, reducing development cycles from decades to just a few years. Reliability would also improve, as these upgraded aircraft are built on battle-tested designs, avoiding the risks of unproven platforms and costly performance shortfalls.</p>
<p>Another key advantage is the ability to adopt modular and open-architecture upgrades, which enable rapid integration of artificial intelligence (AI), sensor fusion, hypersonic weapons, and advanced stealth coatings without requiring entirely new aircraft designs. This incremental innovation approach ensures continuous modernization without the financial and operational burdens of a generational shift. Furthermore, sustaining production of existing airframes stabilizes the industrial base and supply chain, preserving skilled labor and reducing reliance on experimental manufacturing techniques. However, this approach does come with trade-offs.</p>
<p>While upgraded airframes can incorporate many next-generation technologies, they may struggle to compete with emerging peer threats, such as China’s J-20B and a future J-31, which are designed from the ground up with advanced stealth and next-generation propulsion. Despite these limitations, prioritizing enhancements to proven aircraft, while strategically investing in select next-generation platforms, could provide a cost-effective, lower-risk approach to maintaining American air superiority in the evolving global security landscape.</p>
<p>For example, the <a href="https://breakingdefense.com/2023/10/newest-f-35-f-15ex-contracts-are-set-but-how-much-do-they-cost-exclusive/">estimated</a> cost per F-15EX Eagle II is $87.9 million per unit. However, the total procurement cost, including development, support, and spares, can push the price per aircraft to around $117 million. At first glance, this makes the F-15EX slightly more expensive than the F-35A ($82.5 million) but cheaper in terms of long-term sustainment and operational costs, as it leverages existing F-15 infrastructure.</p>
<p>Leveraging emerging technology to enhance existing military capabilities is a cost-effective strategy for extending platform lifecycles, improving combat effectiveness, and increasing survivability. AI and autonomy integration, such as AI copilots for fighter jets and swarm unmanned aerial vehicles (UAV), enhance decision-making and reduce risks for human operators. Upgrading legacy aircraft and naval platforms with hypersonic weapons significantly expands strike ranges and lethality, while applying stealth coatings and advanced electronic warfare systems enhances survivability by reducing detectability and countering modern threats. Cybersecurity and network-centric warfare advancements, including real-time data-sharing and AI-driven analysis, improve battlefield coordination across multiple domains, ensuring more effective mission execution.</p>
<p>Meanwhile, integrating directed-energy weapons, such as high-energy lasers on ships and vehicles, provides cost-effective, high-precision air and missile defense without expending traditional munitions. Ground combat platforms, including M1A2 Abrams tanks and infantry systems, are also benefiting from active protection systems and AI-powered targeting, significantly improving survivability and lethality. In space and intelligence, reconnaissance satellites with AI-driven threat detection and persistent intelligence, surveillance, and reconnaissance (ISR) drones ensure superior situational awareness. By applying AI, hypersonics, stealth, electronic warfare, and directed energy to proven platforms, the US can modernize its forces without the extreme costs and risks of developing entirely new systems, ensuring long-term military superiority while maintaining fiscal responsibility.</p>
<p>This strategy allows the United States to maintain its military superiority over China’s rapidly expanding and modernizing forces by prioritizing technological advancements over costly new platform development. By integrating AI, hypersonics, stealth, electronic warfare, and directed energy into existing platforms, the US can rapidly upgrade combat capabilities without the lengthy and expensive process of designing entirely new aircraft, ships, and ground systems. This ensures that American forces remain combat-ready and adaptable while China continues to build up its military infrastructure.</p>
<p>One key advantage is speed and efficiency—modernizing proven platforms allows the US to deploy cutting-edge technologies much faster than China, which is still refining its next-generation aircraft, naval forces, and missile systems. Upgrading legacy airframes like the F-15EX and B-52J with hypersonic weapons, enhancing stealth with radar-absorbent materials, and improving real-time battlefield awareness with AI-driven sensor fusion ensure that American forces can strike faster, detect threats sooner, and operate with superior coordination.</p>
<p>Additionally, network-centric warfare improvements, such as joint all-domain command and control (<a href="https://www.congress.gov/crs-product/IF11493">JADC2</a>) and real-time data-sharing, enhance multi-domain operations, allowing the US to maintain an intelligence and decision-making advantage over China’s military.</p>
<p>Survivability is another critical factor. By integrating active protection systems into tanks, directed-energy weapons into naval ships, and AI-driven electronic warfare suites into aircraft, US forces can better counter China’s advanced missile threats, cyber warfare tactics, and mass drone swarms. Additionally, maintaining a robust industrial base through upgrades to existing platforms ensures that production remains scalable and sustainable, unlike China’s military, which relies heavily on state-controlled production with limited battlefield testing of new systems.</p>
<p>By leveraging emerging technologies in a modular, cost-effective manner, the US can remain ahead of <a href="https://www.cfr.org/blog/six-takeaways-pentagons-report-chinas-military">China’s growing military</a> without the financial and operational burdens of continuously developing entirely new systems. This strategy ensures that American forces remain agile, lethal, and technologically superior, capable of deterring war and, if necessary, achieving decisive victories in any operational environment.</p>
<p><em>Joshua Thibert is a Senior Analyst at the </em><a href="https://thinkdeterrence.com/"><em>National Institute for Deterrence Studies (NIDS)</em></a><em> and doctoral student at Missouri State University. His extensive academic and practitioner experience spans strategic intelligence, multiple domains within defense and strategic studies, and critical infrastructure protection. Joshua currently resides in Columbus, Ohio.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/05/The-Upgrade-Advantage_-Maintaining-U.S.-Military-Primacy-Without-Breaking-the-Bank.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="274" height="76" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 274px) 100vw, 274px" /></a></p>
<p><a href="https://globalsecurityreview.com/maintaining-american-military-primacy-without-breaking-the-bank/">Maintaining American Military Primacy Without Breaking the Bank</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/maintaining-american-military-primacy-without-breaking-the-bank/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>China’s AI-Driven Information Operations Are Here: The US Needs an AI RMA</title>
		<link>https://globalsecurityreview.com/chinas-ai-driven-information-operations-are-here-the-us-needs-an-ai-rma/</link>
					<comments>https://globalsecurityreview.com/chinas-ai-driven-information-operations-are-here-the-us-needs-an-ai-rma/#respond</comments>
		
		<dc:creator><![CDATA[Matthew J. Fecteau]]></dc:creator>
		<pubDate>Tue, 06 May 2025 12:11:01 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI investment]]></category>
		<category><![CDATA[AI supremacy]]></category>
		<category><![CDATA[AI technical competency.]]></category>
		<category><![CDATA[AI training]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Baidu]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chinese aggression]]></category>
		<category><![CDATA[data centers]]></category>
		<category><![CDATA[decision dominance]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[DeepSeek]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[ERNIE model]]></category>
		<category><![CDATA[Generative AI]]></category>
		<category><![CDATA[gray zone conflict]]></category>
		<category><![CDATA[hybrid conflict]]></category>
		<category><![CDATA[Information Operations]]></category>
		<category><![CDATA[joint force]]></category>
		<category><![CDATA[large language models]]></category>
		<category><![CDATA[malign information operations]]></category>
		<category><![CDATA[military affairs]]></category>
		<category><![CDATA[multidomain operations]]></category>
		<category><![CDATA[Nvidia chips]]></category>
		<category><![CDATA[open-source AI]]></category>
		<category><![CDATA[Project Maven]]></category>
		<category><![CDATA[psychological operations]]></category>
		<category><![CDATA[Qwen]]></category>
		<category><![CDATA[Spamouflage Dragon]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30686</guid>

					<description><![CDATA[<p>The DoD must incorporate artificial intelligence (AI) capabilities to counter the influence of China. Artificial intelligence will inevitably determine who shapes future conflicts. China is actively using these capabilities to gain decision dominance. Focusing on information operations is critical. Drones, for example, use artificial intelligence capabilities, as do defensive systems. However, conflict between near-peer adversaries [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/chinas-ai-driven-information-operations-are-here-the-us-needs-an-ai-rma/">China’s AI-Driven Information Operations Are Here: The US Needs an AI RMA</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The DoD must incorporate artificial intelligence (AI) capabilities to counter the influence of China. Artificial intelligence will inevitably determine who shapes future conflicts. China is actively using these capabilities to gain decision dominance.</p>
<p>Focusing on information operations is critical. Drones, for example, <a href="https://medium.com/@adelstein/ai-powered-defense-how-cutting-edge-technology-is-revolutionizing-national-security-against-drones-1934a13123fa">use artificial intelligence capabilities</a>, as do defensive systems. However, conflict between near-peer adversaries and competitors is still unlikely <a href="https://www.atlanticcouncil.org/blogs/new-atlanticist/todays-wars-are-fought-in-the-gray-zone-heres-everything-you-need-to-know-about-it/">as gray zone and hybrid conflict are the dominant avenues for competition</a>. With the information environment transcending all domains of warfare, artificial intelligence capabilities become the go-to capability to ensure and maintain information advantage.</p>
<p>China’s AI-enhanced information operations are becoming increasingly sophisticated. For example, the Chinese advanced persistent threat actor <a href="https://cyberscoop.com/tag/spamouflage-dragon/">Spamouflage Dragon</a> uses generative AI to create online personas to influence public opinion. China and its proxy companies seek to develop or compete for AI supremacy within the information environment.</p>
<p>Of course, China will use anything within its arsenal to shape strategic, operational, and tactical levels of war to its advantage, expand its influence, and create an ecosystem that is dependent on its technologies. For example, <a href="https://www.cnbc.com/2016/07/01/baidu--the-google-of-china--eyes-expansion-to-us-europe-ceo.html">Baidu, known as the “Google of China,</a>” invested billions into AI capabilities, creating the <a href="https://medium.com/ai-frontiers/baidu-goes-open-source-ernie-ai-model-to-be-released-by-june-2025-72a918897da4">proprietary ERNIE model</a>, which has been trained on billions of parameters, increasing the output’s quality and complexity.</p>
<p>However, China is also leveraging open-source AI models to shape the information environment. With the recent release of open-source <a href="https://www.thenationalnews.com/business/markets/2025/03/06/what-is-qwen-the-open-source-genai-model-from-alibaba-challenging-deepseek/">large language models such as DeepSeek and Qwen</a>, Chinese-linked subsidiaries, <a href="https://www.bloomberg.com/news/articles/2023-10-17/alibaba-tencent-join-funding-for-chinese-ai-high-flyer-baichuan">High-Flyer and Alibaba Group</a> created a way to expand their influence, revise history, and likely create a dependent ecosystem for target countries. Unlike the much more expensive ChatGPT, for which the more basic model is free, China’s investment in <a href="https://economictimes.indiatimes.com/tech/artificial-intelligence/alibaba-releases-ai-model-it-claims-surpasses-deepseek-v3/articleshow/117670287.cms?from=mdr">generative AI models is free</a> for the public and even surpasses <a href="https://www.sparkouttech.com/deepseek-vs-chatgpt/">ChatGPT’s in some respects</a>.</p>
<p>There is a debate about how China’s proxy state companies were able to create these advanced models without US-based critical components. China allegedly <a href="https://www.csis.org/analysis/deepseek-huawei-export-controls-and-future-us-china-ai-race">did not have access to the advanced critical Nvidia chips</a> for which most AI models are dependent. China seems to have created generative models just as suitable or even better than that of ChatGPT, but allegedly at a <a href="https://www.techpolicy.press/closing-the-loopholes-options-for-the-trump-administration-to-strengthen-ai-chip-export-controls/">fraction of the cost and free of charge to the public</a>. The US limited Nvidia chip exports to China, a market predicted to top <a href="https://www.forbes.com/sites/martineparis/2024/07/26/ai-to-drive-1-trillion-in-global-chip-sales-by-2030-as-nvidia-leads/">$1 trillion in revenue within a decade</a>. Still, the accusation is that the Chinese subsidiary leased or bought the more advanced <a href="https://www.business-standard.com/technology/tech-news/us-trade-rules-breached-singapore-detains-three-in-nvidia-gpu-crackdown-125030400651_1.html">Nvidia chips from Singapore, circumventing restrictions</a>, and used <a href="https://www.theverge.com/news/601195/openai-evidence-deepseek-distillation-ai-data">ChatGPT to train its model</a>.</p>
<p>Regardless of how China secured these critical technologies, the cat is indeed out of the bag. China has shown that it has the capability to develop new and emerging AI technologies. From the capabilities already built, it now has a baseline to create even more capabilities to develop its own AI chip ecosystem. With such capabilities, China will become more active within the information environment with the help of AI capabilities, and its motives are far from benevolent.</p>
<p>Why is the Chinese model free? China has several motives, but it is likely in hopes that data and information across the globe are the price tag for using the model while lessening a dependency on Western technologies and <a href="https://www.weforum.org/stories/2025/01/transforming-industries-with-ai-lessons-from-china/#:~:text=China's%20trajectory%20in%20AI%20is,for%20AI%20innovation%20by%202030.">becoming a global leader in AI by 2030</a>. Whatever data is obtained by the United States is icing on the cake. The West is not the primary target audience. Both models have servers in Singapore and China, where information is likely subject to Chinese laws, and terms and conditions are meaningless.</p>
<p>The Chinese will use AI technologies to gain an advantage in the information environment and seek to expand influence by creating an ecosystem for which other countries are dependent on their models. The incentive is to give countries this technology to foster dependency. The idea is similar to China’s debt-trap diplomacy—<a href="https://www.cfr.org/backgrounder/chinas-massive-belt-and-road-initiative">the Belt and Road Initiative</a>. While ChatGPT’s basic model is free, China seeks to develop better models at a cheaper price to serve as leverage over countries that cannot afford the higher-end US-based models.</p>
<p>The United States is taking the right approach to maintaining its information advantage through AI development and investment. The <a href="https://www.reuters.com/technology/artificial-intelligence/behind-500-billion-ai-data-center-plan-us-startups-jockey-with-tech-giants-2025-01-23/">billions pouring into creating AI data centers</a> will play an important role in ensuring the United States has the edge in AI.</p>
<p>These data centers remain critical for identifying and countering any malign information operations against the United States, its partners, and its allies. When Iran attempted to influence the 2024 presidential election using the generative model GPT, <a href="https://openai.com/index/disrupting-deceptive-uses-of-AI-by-covert-influence-operations/">OpenAI detected and shut it down</a>. Without this expansive investment in AI data centers that keep information within the letter of US law and oversight, these interventions would be out of reach, and information operations may be even more challenging to detect.</p>
<p>However, this approach is insufficient without incorporating artificial Intelligence into all aspects of military operations. The DoD uses artificial intelligence within some branches, but given the expansive nature of AI, this is not enough. AI is expected to touch nearly all aspects of military operations, especially information operations, and may not have time to wait for its major AI initiative, <a href="https://interestingengineering.com/military/project-maven-the-epicenter-of-us-ai-military-efforts">Project Maven</a>, to fully develop.</p>
<p>Some military scholars have called something like this a <a href="https://www.csis.org/analysis/real-revolution-military-affairs">revolution in military affairs</a>, but perhaps, given the impact of war, it could be classified as such. <a href="https://nationalinterest.org/feature/nothing-new-why-revolution-military-affairs-same-old-one-77266">The concept is somewhat antiquated and outdated without some context</a>, but it remains the best way to describe what should take place within the DoD. The foundation is already in place through the conceptual framework of multidomain operations.</p>
<p>Artificial capabilities are widely available through graphical user interfaces in deployable, ready-to-use form, such as ChatGPT or even internal <a href="https://www.army.mil/article/283601/enhancing_military_operational_effectiveness_through_the_integration_of_camo_and_nipr_gpt">large language models</a>. The joint force should use these capabilities to the broadest extent possible. If anything, artificial intelligence, including large language models, will make joint and combined forces more lethal and accurate as they counter Chinese efforts within the information environment.</p>
<p>The DoD must adopt incentives for service members to understand the capabilities of AI and incorporate them in all training environments. These incentives can include bonuses for taking AI-driven courses. The DoD can also increase awareness and accessibility of AI courses on its education platforms which now have a paucity of artificial intelligence courses.</p>
<p>The DoD must also improve the training environment. With proprietary or off-the-shelf software, the DoD can incorporate AI offensive and defensive platforms within all training and mission-critical tasks. Even simply assisting with identifying generative outputs, e.g., deepfakes, will counter Chinese influence within the information environment, especially during hybrid conflict. Furthermore, military doctrine should recognize the importance of AI, especially information operations, with an emphasis on psychological operations.</p>
<p>While AI investment is critical to countering Chinese influence within the information environment, the only way to truly embrace multidomain operations is to ensure service members have the AI technical competency necessary to maneuver within the information environment deterring Chinese aggression.</p>
<p><em>US Army Lieutenant Colonel Matthew J. Fecteau is a PhD researcher at King’s College London studying how artificial Intelligence will impact conflict. He can be reached at matthew.fecteau.alumni@armywarcollege.edu.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/05/Chinas-AI-Driven-Information-Operations-are-Here.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="288" height="80" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 288px) 100vw, 288px" /></a></p>
<p><a href="https://globalsecurityreview.com/chinas-ai-driven-information-operations-are-here-the-us-needs-an-ai-rma/">China’s AI-Driven Information Operations Are Here: The US Needs an AI RMA</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/chinas-ai-driven-information-operations-are-here-the-us-needs-an-ai-rma/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hypersonic Weapons: Are We Entering a New Era of Vulnerability?</title>
		<link>https://globalsecurityreview.com/hypersonic-weapons-are-we-entering-a-new-era-of-vulnerability/</link>
					<comments>https://globalsecurityreview.com/hypersonic-weapons-are-we-entering-a-new-era-of-vulnerability/#comments</comments>
		
		<dc:creator><![CDATA[Brandon Toliver]]></dc:creator>
		<pubDate>Mon, 05 May 2025 12:09:30 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AGM-183 ARRW]]></category>
		<category><![CDATA[ambiguity]]></category>
		<category><![CDATA[Arms Control]]></category>
		<category><![CDATA[Avangard]]></category>
		<category><![CDATA[coercive tool]]></category>
		<category><![CDATA[confidence-building measures]]></category>
		<category><![CDATA[conventional payloads]]></category>
		<category><![CDATA[conventional prompt strike]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[DF-17]]></category>
		<category><![CDATA[escalation]]></category>
		<category><![CDATA[first-strike role]]></category>
		<category><![CDATA[FOBs]]></category>
		<category><![CDATA[fractional orbital bombardment system]]></category>
		<category><![CDATA[glide phase interceptor]]></category>
		<category><![CDATA[global balance of power]]></category>
		<category><![CDATA[hypersonic cruise missiles]]></category>
		<category><![CDATA[hypersonic glide vehicles]]></category>
		<category><![CDATA[Hypersonic Weapons]]></category>
		<category><![CDATA[interceptor systems]]></category>
		<category><![CDATA[international cooperation]]></category>
		<category><![CDATA[international norms]]></category>
		<category><![CDATA[long-range hypersonic weapon]]></category>
		<category><![CDATA[Mach 5]]></category>
		<category><![CDATA[military doctrines]]></category>
		<category><![CDATA[miscalculations]]></category>
		<category><![CDATA[missile defense]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[nuclear payloads]]></category>
		<category><![CDATA[nuclear strategy]]></category>
		<category><![CDATA[radar detection]]></category>
		<category><![CDATA[regulations]]></category>
		<category><![CDATA[space-based tracking systems]]></category>
		<category><![CDATA[SS-19]]></category>
		<category><![CDATA[strategic adaptation]]></category>
		<category><![CDATA[strategic competition]]></category>
		<category><![CDATA[strategic security]]></category>
		<category><![CDATA[strategic stability]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[warning times]]></category>
		<category><![CDATA[Zircon]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30673</guid>

					<description><![CDATA[<p>The advent of hypersonic weapons, with their unparalleled speed and maneuverability, ignited a global debate about the future of strategic security. Some argue these weapons unwittingly ushered in an era where traditional defenses are rendered obsolete, leaving nations exposed to swift and devastating attacks. The emergence of hypersonic glide vehicles (HGV) and hypersonic cruise missiles [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/hypersonic-weapons-are-we-entering-a-new-era-of-vulnerability/">Hypersonic Weapons: Are We Entering a New Era of Vulnerability?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The advent of hypersonic weapons, with their unparalleled speed and maneuverability, ignited a global debate about the future of strategic security. Some argue these weapons unwittingly ushered in an era where traditional defenses are rendered obsolete, leaving nations exposed to swift and devastating attacks. The emergence of hypersonic glide vehicles (HGV) and hypersonic cruise missiles (HCM) prompts a fundamental reassessment of assumptions about deterrence and defense.</p>
<p>Hypersonic weapons, capable of exceeding Mach 5 with unpredictable flight paths, <a href="https://www.google.com/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwjDyqS03ISMAxXdSDABHdn2BmUQ-NANegQIShAG&amp;url=https%3A%2F%2Fwww.csis.org%2Fanalysis%2Fcomplex-air-defense-countering-hypersonic-missile-threat-0%23%3A~%3Atext%3DI%2520think%2520it%27s%2520a%2520number%2Cto%2520adequately%2520address%2520the%2520threat.&amp;usg=AOvVaw3XVxaqX_L8zs0rOiDfXyxI&amp;opi=89978449">shatter the bedrock principles</a> of conventional missile defense. Their ability to glide and maneuver within the atmosphere allows them to evade radar detection and interceptor systems, compressing warning times to mere minutes. This drastic reduction in reaction time amplifies the risk of miscalculations and accidental escalation, particularly in moments of crisis.</p>
<p>The global balance of power is being fundamentally altered, not merely adjusted, by the aggressive pursuit of maneuverable hypersonic weapon capabilities. China’s DF-17 hypersonic missile, coupled with its reported testing of a fractional orbital bombardment system (FOBS) with a hypersonic payload, demonstrates a clear intent to achieve <a href="https://www.google.com/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwjZvb7O3ISMAxVQM9AFHQYhEjgQFnoECCMQAQ&amp;url=https%3A%2F%2Fmedia.defense.gov%2F2023%2FOct%2F19%2F2003323409%2F-1%2F-1%2F1%2F2023-MILITARY-AND-SECURITY-DEVELOPMENTS-INVOLVING-THE-PEOPLES-REPUBLIC-OF-CHINA.PDF&amp;usg=AOvVaw071h0Fy5906vIE-xj7tnoR&amp;opi=89978449">global strike capabilities with minimal warning</a>. Russia’s deployment of the Avangard HGV on its SS-19 intercontinental ballistic missiles and the operational status of the <a href="https://www.google.com/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwimx7rg3ISMAxX3JNAFHdOhCP4QFnoECBYQAQ&amp;url=https%3A%2F%2Fjamestown.org%2Fprogram%2Fthe-role-of-hypersonic-weapons-in-russian-military-strategy%2F&amp;usg=AOvVaw3n36uTFyvfkRCtN8vA3S-g&amp;opi=89978449">Zircon hypersonic</a> anti-ship missile further highlight the growing proliferation of these advanced weapons. North Korea’s claim of <a href="https://www.google.com/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwjQ2_zs3ISMAxVm8MkDHV_GL5YQFnoECCAQAQ&amp;url=https%3A%2F%2Fthediplomat.com%2Ftag%2Fnorth-korea-hypersonic-missile%2F&amp;usg=AOvVaw20bRg4HsjuR_uIgDgG7ptn&amp;opi=89978449">successful hypersonic missile tests</a>, while requiring verification, signal a potential integration of these weapons into its theater nuclear strategy, adding another layer of complexity to regional security.</p>
<p>The inherent capacity of maneuverable hypersonic weapons to render existing missile defense systems obsolete signifies not just a technological leap, but a deliberate dismantling of established strategic certainties. The unpredictability of their flight paths and the compression of warning times do not just complicate defense planning; they erode the very foundation of strategic stability, where deterrence relies on the certainty of retaliation. The potential for these weapons to carry both conventional and nuclear payloads does not just increase their versatility; it blurs the lines between conventional and nuclear conflict, creating a perilous ambiguity that heightens the risk of miscalculation.</p>
<p>The ability to strike targets with minimal warning does not just enhance offensive capabilities; it creates a coercive tool, enabling states to exert pressure and achieve strategic objectives without resorting to large-scale conventional warfare. The potential for hypersonic weapons to be deployed in a first-strike role does not just raise concerns about escalation; it fundamentally alters the calculus of deterrence, where the threat of retaliation may no longer be sufficient to prevent aggression.</p>
<p>To counter this burgeoning vulnerability, the United States must not merely react, but fundamentally redefine its strategic posture, acknowledging that piecemeal technological solutions are insufficient to address the profound shift hypersonic weapons impose on the security landscape. The rapid development of the glide phase interceptor (GPI) and space-based tracking systems is not just about enhancing missile defense; it is about restoring a sense of strategic stability, reassuring allies and deterring potential adversaries. The expansion of conventional hypersonic programs, such as the AGM-183 ARRW, conventional prompt strike, and the long-range hypersonic weapon, is not just about developing counterforce capabilities; it is about demonstrating a commitment to <a href="https://www.google.com/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwiMkcr93ISMAxXy78kDHb_0AS0QFnoECCIQAQ&amp;url=https%3A%2F%2Fwww.gao.gov%2Fproducts%2Fgao-24-106792&amp;usg=AOvVaw2jIDDvLxHHcvNklw37Y8Mg&amp;opi=89978449">maintaining a credible deterrent</a>, signaling to potential adversaries that aggression will be met with a swift and decisive response. The integration of hypersonic weapons into existing military doctrines does not just require tactical adjustments; it demands a fundamental reevaluation of strategic thinking, adapting to a new era of high-speed warfare.</p>
<p>The international community’s response to hypersonic weapons must not be limited to national defense initiatives; it must include a concerted effort to promote arms control and transparency. The absence of clear <a href="https://www.google.com/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwigzbuP3YSMAxWsRTABHY1wDBgQ-NANegQIKxAC&amp;url=https%3A%2F%2Funidir.org%2Fpublication%2Fthe-implications-of-hypersonic-weapons-for-international-stability-and-arms-control-report-on-a-unidir-unoda-turn-based-exercise%2F%23%3A~%3Atext%3DView%2520or%2520Download%26text%3DIn%2520September%25202019%252C%2520a%2520one%2C%252C%2520UNIDIR%252C%2520Geneva%252C%2520Switzerland.&amp;usg=AOvVaw0Dza55Gx-PQxOYY8KilYUi&amp;opi=89978449">international norms and regulations regarding hypersonic weapons</a> does not just create uncertainty; it fosters a climate of strategic competition, where states are incentivized to develop and deploy these weapons without restraint. The development of transparency and confidence-building measures is not just about reducing the risk of miscalculation; it is about building a foundation for strategic stability, where states can engage in dialogue and cooperation to mitigate the risks posed by these advanced weapons.</p>
<p>Hypersonic weapons represent a paradigm shift in military technology, fundamentally questioning if the world is entering a new era of vulnerability, undermining the foundations of traditional missile defense and reshaping the strategic landscape. Addressing this challenge requires a comprehensive approach that combines technological innovation, strategic adaptation, and international cooperation. Only through a concerted effort can the international community hope to mitigate the risks posed by hypersonic weapons and ensure a more stable and secure future.</p>
<p><em>Brandon Toliver, PhD, serves on the A4 staff of Headquarters Air Force. The views expressed are those of the author and do not reflect the official guidance or position of the United States government, the Department of Defense, the United States Air Force, or the United States Space Force.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/05/Hypersonic-Weapons_-Are-We-Entering-a-New-Era-of-Vulnerability.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="234" height="65" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 234px) 100vw, 234px" /></a></p>
<p><a href="https://globalsecurityreview.com/hypersonic-weapons-are-we-entering-a-new-era-of-vulnerability/">Hypersonic Weapons: Are We Entering a New Era of Vulnerability?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/hypersonic-weapons-are-we-entering-a-new-era-of-vulnerability/feed/</wfw:commentRss>
			<slash:comments>25</slash:comments>
		
		
			</item>
		<item>
		<title>Navigating the US-China Relationship: Myths and Realities</title>
		<link>https://globalsecurityreview.com/navigating-the-us-china-relationship-myths-and-realities/</link>
					<comments>https://globalsecurityreview.com/navigating-the-us-china-relationship-myths-and-realities/#respond</comments>
		
		<dc:creator><![CDATA[James Petrosky,&nbsp;Adam Lowther&nbsp;&&nbsp;Curtis McGiffin]]></dc:creator>
		<pubDate>Wed, 23 Apr 2025 12:49:56 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[China Threat]]></category>
		<category><![CDATA[cold war]]></category>
		<category><![CDATA[economic]]></category>
		<category><![CDATA[geopolitical dynamics]]></category>
		<category><![CDATA[Military Strategy]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Trade]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30589</guid>

					<description><![CDATA[<p>In a stark warning echoing through national security corridors, the NIDS team confronts the unsettling truths behind US-China tensions, drawing from Miles Yu’s provocative article, “A Dangerous Myth of US-China Cold War Tensions.” This is no diplomatic disagreement, it’s a brewing storm cloaked in trade deals and technology theft. Viewed through the unforgiving lens of [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/navigating-the-us-china-relationship-myths-and-realities/">Navigating the US-China Relationship: Myths and Realities</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In a stark warning echoing through national security corridors, the NIDS team confronts the unsettling truths behind US-China tensions, drawing from Miles Yu’s provocative article, “A Dangerous Myth of US-China Cold War Tensions.”</p>
<p>This is no diplomatic disagreement, it’s a brewing storm cloaked in trade deals and technology theft. Viewed through the unforgiving lens of a new Cold War, their discussion exposes the economic fault lines, ballooning trade deficits, strategic supply chain vulnerabilities, and the silent hemorrhaging of American innovation through intellectual property theft. As they unearth Cold War-era playbooks and contrast them with China’s modern hybrid strategies, a chilling pattern emerges: the past isn’t repeating, it’s evolving.</p>
<p>They delve to the heart of deterrence, revealing a precarious global balance that demands more than policy; it demands resolve. If America misreads the moment, it may sleepwalk into strategic irrelevance.</p>
<p><strong>Watch</strong><br />
<a href="https://youtu.be/TFMAZoRSwWk"><img loading="lazy" decoding="async" class="alignnone wp-image-30497 size-full" src="http://globalsecurityreview.com/wp-content/uploads/2025/04/yt-icon.png" alt="" width="65" height="65" /></a></p>
<hr />
<p>Get Involved with more NIDS Services: https://thinkdeterrence.com/ Deterrence Education at NIDS https://thinkdeterrence.com/deterrence-education/   Like and follow us: LinkedIn: https://www.linkedin.com/company/thinkdeterrence  X.com: https://x.com/thinkdeterrence  YouTube: https://www.youtube.com/channel/UCyGa4dcPqONWzjmbuZMOBHQ  Rumble: https://rumble.com/user/NIDSthinkdeterrence  Global Security Review: https://globalsecurityreview.com/  Our Free Events: https://thinkdeterrence.com/events/</p>
<p><a href="https://globalsecurityreview.com/navigating-the-us-china-relationship-myths-and-realities/">Navigating the US-China Relationship: Myths and Realities</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/navigating-the-us-china-relationship-myths-and-realities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hegseth’s Doctrine: A Rebirth and Redefinition of American Deterrence?</title>
		<link>https://globalsecurityreview.com/hegseths-doctrine-a-rebirth-and-redefinition-of-american-deterrence/</link>
					<comments>https://globalsecurityreview.com/hegseths-doctrine-a-rebirth-and-redefinition-of-american-deterrence/#comments</comments>
		
		<dc:creator><![CDATA[Brandon Toliver]]></dc:creator>
		<pubDate>Mon, 21 Apr 2025 12:15:51 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI Tools]]></category>
		<category><![CDATA[American Deterrence]]></category>
		<category><![CDATA[Arms Race]]></category>
		<category><![CDATA[AUKUS]]></category>
		<category><![CDATA[Combat-Focused Posture]]></category>
		<category><![CDATA[cyber warfare]]></category>
		<category><![CDATA[Early Warning Systems]]></category>
		<category><![CDATA[extended deterrence]]></category>
		<category><![CDATA[Hegseth’s Doctrine]]></category>
		<category><![CDATA[Hypersonic Weapons]]></category>
		<category><![CDATA[modernization]]></category>
		<category><![CDATA[multipolar world]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Nuclear Brinkmanship]]></category>
		<category><![CDATA[nuclear posture]]></category>
		<category><![CDATA[Nuclear Sharing Agreements]]></category>
		<category><![CDATA[Nuclear Supremacy]]></category>
		<category><![CDATA[nuclear triad]]></category>
		<category><![CDATA[Offensive Capabilities]]></category>
		<category><![CDATA[Quantum-Resistant Encryption]]></category>
		<category><![CDATA[space-based systems]]></category>
		<category><![CDATA[strategic ambiguity]]></category>
		<category><![CDATA[Strategic Prudence]]></category>
		<category><![CDATA[technological innovation]]></category>
		<category><![CDATA[warrior ethos]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30564</guid>

					<description><![CDATA[<p>Secretary of Defense Pete Hegseth’s recent “Message to the Force” is not merely a call to arms; it is a strategic blueprint to reshape American nuclear deterrence. It is a bold attempt to reverse the relative decline of American military might. His vision, born from a conviction that adversaries have grown emboldened by perceived American [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/hegseths-doctrine-a-rebirth-and-redefinition-of-american-deterrence/">Hegseth’s Doctrine: A Rebirth and Redefinition of American Deterrence?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Secretary of Defense Pete Hegseth’s recent “<a href="https://www.defense.gov/News/Releases/Release/Article/4040940/secretary-hegseths-message-to-the-force/">Message to the Force</a>” is not merely a call to arms; it is a strategic blueprint to reshape American nuclear deterrence. It is a bold attempt to reverse the relative decline of American military might. His vision, born from a conviction that adversaries have grown emboldened by perceived American hesitancy, aims to forge a revitalized nuclear posture, one predicated on strength, resolve, and the restoration of a warrior ethos.</p>
<p>Secretary Hegseth, a <a href="https://www.defense.gov/About/Biographies/Biography/Article/4040890/hon-pete-hegseth/">veteran</a> with combat experience in Iraq and Afghanistan, emerged from a military culture defined by counterinsurgency warfare, rapid technological adaptation, and constrained rules of engagement. His formative years were shaped by the leadership of prominent figures like General (Ret.) David Petraeus and General (Ret.) James Mattis, who emphasized adaptive leadership, decisive action, and strategic communication. The norms of that era often prioritized minimizing civilian casualties, leveraging asymmetric warfare, and coalition-based operations. Given this background, Hegseth’s emphasis on restoring a warrior ethos and projecting unyielding strength likely stems from his own military experiences and the influential leaders who shaped his perspective.</p>
<p>Hegseth’s message signals a deliberate <a href="https://dod.defense.gov/News/Special-Reports/NPR/">shift away</a> from the strategic ambiguity that may embolden adversaries. The emphasis on deterrence through strength suggests a belief that Russia’s nuclear brinkmanship, China’s rapid arsenal expansion, and North Korea’s unpredictability stem from a perception of American hesitancy. One might observe that the concept of strategic ambiguity, once hailed as a nuanced tool of deterrence, now appears as outdated as the punch-card computers that once calculated nuclear trajectories.</p>
<p>This shift reflects a growing concern about the credibility of extended deterrence and the need for more <a href="https://www.jstor.org/stable/2539273">explicit signaling of American resolve</a>. By modernizing the nuclear triad and reaffirming America’s willingness to use force, the Pentagon aims to reinstate fear as a core pillar of deterrence.</p>
<p>The emphasis on reviving the warrior ethos implies that nuclear deterrence must be as much about mindset as it is about capability. It is striking to note that the last time a Secretary of Defense emphasized a similar warrior ethos, the world was still reeling from the Cuban Missile Crisis, a stark reminder of the high stakes involved. The focus on a warfighting mentality suggests a move away from the bureaucratic approach that dominated <a href="https://nsarchive.gwu.edu/project/nuclear-vault">nuclear policy in recent decades</a>. It is a move toward a more operational and combat-focused posture.</p>
<p>The intent may be to move away from a risk-averse approach, ensuring that warfighters at all levels understand nuclear deterrence as an active, rather than passive, responsibility. This shift could result in more frequent readiness drills, a recalibration of nuclear employment thresholds, and <a href="https://www.jstor.org/stable/2539133#:~:text=Therefore%20in%20this%20article%20I%20propose%20a%20general,new%20nuclear%20nation's%20policies%20as%20they%20become%20known.">strategic force posturing</a> that prioritizes offensive capabilities over restraint.</p>
<p>China is projected to reach <a href="https://safe.menlosecurity.com/https:/doi.org/10.1080/00963402.2021.1989208">nuclear parity</a> with the US by 2035, while Russia continues aggressive arsenal expansion and hybrid warfare tactics. Hegseth’s directive appears motivated by a desire to prevent a world where nuclear deterrence is no longer dictated by American supremacy. This shift away from the established norms of strategic restraint is a necessary adaptation to a <a href="https://archive.org/details/theoryofinternat00walt">multipolar world</a>, or it could be a dangerous escalation that precipitates a new arms race.</p>
<p>There is an inherent tension between maintaining strategic dominance and <a href="https://samuelbhfaure.com/wp-content/uploads/2015/10/s2-mearsheimer-2001.pdf">fostering international stability</a>. Modernization efforts—accelerated intercontinental ballistic missile production, hypersonic weapons, and a stronger nuclear-capable bomber fleet—align with an intent to sustain America’s dominant position before near-peer threats fully materialize.</p>
<p>The call to rebuild the military by rapidly fielding emerging technologies may suggest a strategic push toward <a href="https://www.cnas.org/publications/reports/strategic-competition-in-an-era-of-artificial-intelligence">AI tools that enable improved nuclear command and control</a>, quantum-resistant encryption, and space-based early warning systems. The intent behind these investments appears twofold. First, there is a desire to ensure American nuclear forces cannot be neutralized by cyber, space, or electronic warfare. Second, there is a desire to establish deterrence dominance through superior technological integration before adversaries close the gap.</p>
<p>If this is a return to a bold, <a href="https://totalmilitaryinsight.com/george-s-pattons-leadership/">George S. Patton-style of leadership</a>, where decisive action and unwavering resolve are paramount, it could also risk a dangerous overemphasis on military solutions at the expense of diplomacy. This approach raises crucial questions about the balance between technological innovation and strategic prudence.</p>
<p>Hegseth’s message reaffirms commitment to American allies, signaling that extended deterrence remains a central policy. The intent appears to be preempting concerns of American disengagement from NATO and Indo-Pacific security commitments while simultaneously warning adversaries, especially China, that American nuclear resolve is non-negotiable. Some may assume that a more aggressive posture inherently breeds instability, paradoxically, it could also create a more stable balance of power by clearly defining red lines and deterring potential aggression.</p>
<p>This strategy hinges on the assumption that adversaries will respond rationally to <a href="https://www.jstor.org/stable/j.ctt5vm52s">demonstrations of force</a>. This could translate into increased nuclear deployments to allied territories; stronger trilateral deterrence initiatives between the US, UK, and Australia (AUKUS); and a renewed focus on NATO’s nuclear-sharing agreements to counter Russian regional threats.</p>
<p>Secretary Hegseth’s “Message to the Force” signals an intentional and urgent shift in US nuclear strategy—one motivated by a belief that deterrence is eroding and must be aggressively rebuilt. Whether through new weapons systems, a hardened warrior mindset, or the integration of cutting-edge technology, the modernization push under his tenure will likely define the next era of American nuclear policy.</p>
<p><em>Brandon Toliver, PhD, serves on the A4 staff of Headquarters Air Force. The views expressed are those of the author and do not reflect the official guidance or position of the United States government, the Department of Defense, the United States Air Force, or the United States Space Force.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/04/A-Rebirth-and-Redefinition-of-American-Deterrence.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="335" height="93" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 335px) 100vw, 335px" /></a></p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/hegseths-doctrine-a-rebirth-and-redefinition-of-american-deterrence/">Hegseth’s Doctrine: A Rebirth and Redefinition of American Deterrence?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/hegseths-doctrine-a-rebirth-and-redefinition-of-american-deterrence/feed/</wfw:commentRss>
			<slash:comments>36</slash:comments>
		
		
			</item>
		<item>
		<title>Podcast &#8211; Future-Proofing National Security: We Can&#8217;t Just Wish for Deterrence</title>
		<link>https://globalsecurityreview.com/podcast-future-proofing-national-security-we-cant-just-wish-for-deterrence/</link>
					<comments>https://globalsecurityreview.com/podcast-future-proofing-national-security-we-cant-just-wish-for-deterrence/#respond</comments>
		
		<dc:creator><![CDATA[James Petrosky,&nbsp;Adam Lowther&nbsp;&&nbsp;Curtis McGiffin]]></dc:creator>
		<pubDate>Wed, 09 Apr 2025 11:01:10 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[global security]]></category>
		<category><![CDATA[ICBM]]></category>
		<category><![CDATA[National Institute for Deterrence Studies. ​]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[nuclear modernization]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30492</guid>

					<description><![CDATA[<p>The team at the National Institute for Deterrence Studies discusses their top three wishes for improving the nuclear enterprise and national security as we move through 2025. Jim emphasizes the need to revitalize the public&#8217;s understanding of nuclear issues and workforce development. Curtis advocates for a cultural shift towards deterrence over defense and more effective [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/podcast-future-proofing-national-security-we-cant-just-wish-for-deterrence/">Podcast &#8211; Future-Proofing National Security: We Can&#8217;t Just Wish for Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The team at the National Institute for Deterrence Studies discusses their top three wishes for improving the nuclear enterprise and national security as we move through 2025. Jim emphasizes the need to revitalize the public&#8217;s understanding of nuclear issues and workforce development. Curtis advocates for a cultural shift towards deterrence over defense and more effective deterrence projection, while Adam focuses on budget balancing and avoiding unnecessary wars. The conversation highlights the interconnectedness of these themes and the importance of a robust nuclear strategy.</p>
<h2><span style="color: #000080;"><strong>Hosted on YouTube, Rumble or RSS.com</strong></span></h2>
<table style="height: 65px;" border="0" width="325">
<tbody>
<tr>
<td width="133"><strong>YouTube</strong></td>
<td width="144"><strong>Rumble</strong></td>
<td width="120"><strong>RSS.com</strong></td>
</tr>
<tr>
<td width="25"><a href="https://youtu.be/_amZpisBcRU"><img loading="lazy" decoding="async" class="alignnone wp-image-30497 size-full" src="http://globalsecurityreview.com/wp-content/uploads/2025/04/yt-icon.png" alt="" width="65" height="65" /></a></td>
<td width="25"><a href="https://rumble.com/v6rndz9-the-nids-view-future-proofing-national-security-we-cant-just-wish-for-deter.html?e9s=src_v1_upp"><img loading="lazy" decoding="async" class="alignnone wp-image-30496 size-full" src="http://globalsecurityreview.com/wp-content/uploads/2025/04/rumble-icon.png" alt="" width="57" height="64" /></a></td>
<td width="25"><a href="https://rss.com/podcasts/nuclearview/1972896/"><img loading="lazy" decoding="async" class="alignnone wp-image-30495 size-full" src="http://globalsecurityreview.com/wp-content/uploads/2025/04/rss-com.png" alt="" width="72" height="72" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/04/rss-com.png 72w, https://globalsecurityreview.com/wp-content/uploads/2025/04/rss-com-70x70.png 70w" sizes="(max-width: 72px) 100vw, 72px" /></a></td>
</tr>
</tbody>
</table>
<hr />
<p><strong>Get Involved with more NIDS Services:</strong> <a href="https://thinkdeterrence.com/">https://thinkdeterrence.com/ </a></p>
<p><strong>Deterrence Education at NIDS</strong> <a href="https://thinkdeterrence.com/deterrence-education/">https://thinkdeterrence.com/deterrence-education/ </a></p>
<p><strong>Like and follow us</strong> – LinkedIn: <a href="https://www.linkedin.com/company/thinkdeterrence">https://www.linkedin.com/company/thinkdeterrence </a></p>
<p><strong>X.com:</strong> https://x.com/thinkdeterrence</p>
<p><strong>YouTube:</strong> <a href="https://www.youtube.com/channel/UCyGa4dcPqONWzjmbuZMOBHQ">https://www.youtube.com/channel/UCyGa4dcPqONWzjmbuZMOBHQ</a></p>
<p><strong> Rumble</strong>: https://rumble.com/user/NIDSthinkdeterrence</p>
<p><strong>Global Security Review:</strong> https://globalsecurityreview.com/</p>
<p>LinkedIn:<a href="https://www.linkedin.com/company/globalsecurityreview/"> https://www.linkedin.com/company/globalsecurityreview/</a></p>
<p><strong> X.com:</strong> https://x.com/security_wonk</p>
<p><strong>Our Free Events</strong>: https://thinkdeterrence.com/events/</p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/podcast-future-proofing-national-security-we-cant-just-wish-for-deterrence/">Podcast &#8211; Future-Proofing National Security: We Can&#8217;t Just Wish for Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/podcast-future-proofing-national-security-we-cant-just-wish-for-deterrence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity Framework for Maritime Port Management</title>
		<link>https://globalsecurityreview.com/cybersecurity-framework-for-maritime-port-management/</link>
					<comments>https://globalsecurityreview.com/cybersecurity-framework-for-maritime-port-management/#respond</comments>
		
		<dc:creator><![CDATA[Maryyum Masood&nbsp;&&nbsp;Rizwana Abbasi]]></dc:creator>
		<pubDate>Tue, 08 Apr 2025 12:37:28 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[cargo]]></category>
		<category><![CDATA[collaboration]]></category>
		<category><![CDATA[Cyberattacks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[digital]]></category>
		<category><![CDATA[disruptions]]></category>
		<category><![CDATA[financial]]></category>
		<category><![CDATA[global]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[infrastructure]]></category>
		<category><![CDATA[intellectual property]]></category>
		<category><![CDATA[Maritime]]></category>
		<category><![CDATA[navigation]]></category>
		<category><![CDATA[networks]]></category>
		<category><![CDATA[operations]]></category>
		<category><![CDATA[ports]]></category>
		<category><![CDATA[protocols]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[response]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[supply chains]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[third-party]]></category>
		<category><![CDATA[threat detection]]></category>
		<category><![CDATA[Trade]]></category>
		<category><![CDATA[training]]></category>
		<category><![CDATA[transportation]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30472</guid>

					<description><![CDATA[<p>Maritime ports act as mediums for international trade and transportation. They facilitate the legitime flow of trade and the transfer of goods between ships and shore. Ports have the requisite infrastructure to run routine operations, such as handling the docking of ships and cranes and management of storage facilities and warehouses. Ports not only link [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/cybersecurity-framework-for-maritime-port-management/">Cybersecurity Framework for Maritime Port Management</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Maritime ports act as mediums for international trade and transportation. They facilitate the legitime flow of trade and the transfer of goods between ships and shore. Ports have the requisite infrastructure to run routine operations, such as handling the docking of ships and cranes and management of storage facilities and warehouses. Ports not only link the sea lines of communication (SLOC) but also connect to land transportation, such as highways, railroads, and airports, enabling the smooth movement of goods to and from the ports.</p>
<p>Maritime ports authorize customs clearance and are involved in regulatory checks, ensuring compliance with national and international law. Ports perform most of these functions digitally. Maritime ports are now under serious threat of malicious cyberattacks that can disrupt and compromise port operations worldwide.</p>
<p>Industry is deeply interconnected, and a cyberattack on one major port can send shockwaves through global trade networks. Consider a scenario where a major port, responsible for handling millions of cargo containers, suddenly halts operations due to a cyberattack. Cranes freeze, logistics systems collapse, and cargo ships are left stranded at sea. This is not a hypothetical scenario; it is a real and escalating threat to global trade.</p>
<p>The maritime industry, long seen as the backbone of international commerce, now faces an urgent cybersecurity crisis. Ports are no longer just about cranes and cargo; they have evolved into digital ecosystems reliant on interconnected networks, automation, and artificial intelligence. As ports become smarter, they are also becoming more vulnerable. Cybercriminals are increasingly exploiting these vulnerabilities, causing financial losses, operational disruptions, and even national security risks.</p>
<p>Maritime cyberattacks are no longer rare occurrences, they are becoming alarmingly frequent. In 2023, a ransomware attack crippled more than 1,000 vessels by targeting a software provider used across the shipping industry. The attack forced the shipping industry to shut down its ShipManager system, affecting global supply chains. A year earlier, the Port of Lisbon suffered a cyberattack that took its website offline for days, with the ransomware group LockBit claiming responsibility and alleging that it had stolen financial reports, contracts, and ship logs.</p>
<p>In Germany, a 2022 cyberattack on two oil companies disrupted fuel shipments, forcing Shell to reroute supplies and exposing the vulnerabilities of critical maritime infrastructure. The 2017 NotPetya ransomware attack, which paralyzed Maersk and caused an estimated $300 million in damage, remains one of the most devastating cyberattacks in shipping history.</p>
<p>Ports are among the most attractive targets for cybercriminals. The motives behind these attacks vary as some hackers seek financial gain, while others aim to steal sensitive trade-related data, and some may even use cyberattacks as part of hybrid warfare.</p>
<p>The economic consequences are staggering, from ransom payments and insurance hikes to delays that can ripple across global supply chains. Beyond financial losses, cyber threats to ports pose serious security risks. For example, a well-coordinated cyberattack on a major port could disrupt military logistics, cripple trade networks, or even manipulate cargo data to facilitate smuggling and illicit trade.</p>
<p>Hackers carry the potential for unauthorized intrusion into ports’ digital networks and interrupt ports’ routine operation through malicious software attacks. The workforce involved in port management may be trapped into revealing sensitive data by clicking on malicious links. The hackers can also disrupt digital networks that regulate critical port infrastructure, such as cranes, pumps, and valves. Supervisory control and data acquisition (SCADA) systems can come under cyber threats disrupting routine functions. N<em>onstandard computing hardware</em> like sensors, actuators, or appliances that transmit data from the network wirelessly are vulnerable to data theft.</p>
<p>Hackers can steal data such as cargo manifests, crew information, and financial records. They can also manipulate data, such as altering cargo manifests, or manipulate navigation systems. Hackers can also steal intellectual property, such as trade secrets or proprietary software.</p>
<p>Another pressing issue is supply-chain security. Ports rely on a complex web of third-party vendors for logistics, software, and cargo management. If one vendor is compromised, the entire port system could be at risk.</p>
<p>Hackers can also use unmanned aerial vehicles (UAVs) for surveillance means or to attack port infrastructure, such as damaging equipment or disrupting power supplies. Ports may be exposed to cyberattacks through third-party suppliers, such as logistics providers or maintenance contractors. Ports may be exposed to cyberattacks through cargo and containers, which may contain malicious devices or software.</p>
<p>Cybersecurity in the maritime sector is often treated as an afterthought. Many ports still operate with outdated software and weak security protocols, making them easy targets. Given the critical role of ports in the global economy, the widening cybersecurity gap is a growing challenge. Strengthening port security necessitates urgent regulatory mechanisms, some of which are proposed below.</p>
<p><strong>Regulatory Mechanisms</strong></p>
<p>To mitigate the growing cyber threat, ports should adopt internationally recognized cybersecurity frameworks. First, ports should adhere to the rules and protocols of the International Maritime Organization’s (IMO) Maritime Cyber Risk Management Guidelines, the National Institute of Standards and Technology (NIST) Cybersecurity Framework, and ISO 27001 standards. Implementing these frameworks will help establish clear security protocols and ensure that ports are prepared to defend against cyberattacks.</p>
<p>Second, network security should be reinforced by segmenting information technology (IT) and operational technology (OT) systems, preventing malware from spreading across critical infrastructure. Regular penetration testing and vulnerability assessments can further identify weak points before attackers do.</p>
<p>Third, investing in cybersecurity training for port workers is equally crucial. Many cyberattacks exploit human error—phishing e-mails, weak passwords, and social engineering attacks remain among the most common entry points for hackers. A well-trained workforce can serve as the first line of defense against these threats.</p>
<p>Fourth, leveraging artificial intelligence and machine learning for threat detection can enhance ports’ ability to identify cyber risks before they escalate into full-scale attacks. Artificial intelligence (AI)–led systems can monitor network activity in real time, flagging suspicious behavior and predicting potential breaches before they happen. In this regard, the strict security assessments of third-party vendors and blockchain-based cargo tracking can enhance transparency and reduce the risk of supply-chain cyberattacks.</p>
<p>Fifth, beyond prevention, ports should also be prepared to respond effectively to cyber incidents. For this, establishing cyber incident response teams (CIRT) can ensure that ports have trained professionals ready to mitigate and recover from cyberattacks swiftly.</p>
<p>Sixth, regular cyber drills and crisis simulations should be conducted to test response plans. This ensures that when an attack occurs, the damage is minimized, and recovery is swift.</p>
<p>Seventh, international collaboration to deal with these threats is essential. Governments, port authorities, and private stakeholders should work together to share intelligence, standardize security protocols, and invest in collective defense mechanisms.</p>
<p>Public-private partnerships can play a key role in funding advanced cybersecurity infrastructure, while international regulatory bodies like the IMO must enforce stricter cybersecurity mandates across the industry. Finally, as ports transition into smart ports, powered by the internet of things (IoT), AI, and automation, cybersecurity should be at the forefront of maritime security strategies. Emerging technologies like quantum computing and zero trust architecture will play a crucial role in strengthening digital defenses, but ports should remain vigilant. The very technologies designed to enhance security could also introduce new vulnerabilities if not properly managed.</p>
<p>Cybersecurity is no longer just a technical issue; it is a fundamental pillar of modern port management. If cybersecurity continues to be treated as an afterthought, the next major cyberattack could bring global trade to a standstill. Ports are the lifelines of the world economy, and securing them is not just about protecting data, it is about safeguarding the stability of international commerce and national security.</p>
<p><em>Maryyum Masood is working as a Research Officer &amp; Associate Editor at the Center for International Strategic Studies (CISS) Islamabad. She is an MPhil scholar in the Department of Strategic Studies at the National Defense University (NDU) Islamabad.</em></p>
<p><em>Rizwana Abbasi is an Associate Professor of Security Studies at the National University of Modern Languages, Islamabad, a non-resident Fellow of the Center for International Strategic Studies (CISS), Islamabad, and a Visiting Fellow at the Central European University of Austria.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/04/Cybersecurity-Framework-for-Maritime-Port-Management.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="317" height="88" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 317px) 100vw, 317px" /></a></p>
<p><a href="https://globalsecurityreview.com/cybersecurity-framework-for-maritime-port-management/">Cybersecurity Framework for Maritime Port Management</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/cybersecurity-framework-for-maritime-port-management/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Achieving Peace Through Strength: A Sustainment Imperative</title>
		<link>https://globalsecurityreview.com/achieving-peace-through-strength-a-sustainment-imperative/</link>
					<comments>https://globalsecurityreview.com/achieving-peace-through-strength-a-sustainment-imperative/#comments</comments>
		
		<dc:creator><![CDATA[Brandon Toliver]]></dc:creator>
		<pubDate>Mon, 31 Mar 2025 12:13:21 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[acquisition reform ​]]></category>
		<category><![CDATA[advanced manufacturing]]></category>
		<category><![CDATA[Air Force]]></category>
		<category><![CDATA[aircraft]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[defense industrial base]]></category>
		<category><![CDATA[depot maintenance]]></category>
		<category><![CDATA[funding]]></category>
		<category><![CDATA[Government Accountability Office]]></category>
		<category><![CDATA[Great Power Competition]]></category>
		<category><![CDATA[infrastructure]]></category>
		<category><![CDATA[military]]></category>
		<category><![CDATA[modernization]]></category>
		<category><![CDATA[operational readiness]]></category>
		<category><![CDATA[peace]]></category>
		<category><![CDATA[personnel]]></category>
		<category><![CDATA[procurement processes]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[software maintenance]]></category>
		<category><![CDATA[strategic deterrence]]></category>
		<category><![CDATA[strength]]></category>
		<category><![CDATA[supply-chain vulnerabilities]]></category>
		<category><![CDATA[sustainment]]></category>
		<category><![CDATA[technical expertise]]></category>
		<category><![CDATA[warrior ethos]]></category>
		<category><![CDATA[workforce retention]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30390</guid>

					<description><![CDATA[<p>Secretary of Defense Pete Hegseth’s directive to achieve “peace through strength” inherently relies on a restored warrior ethos, a rebuilt military, and reestablished deterrence. However, sustainment challenges within the Air Force—including personnel shortfalls and aging infrastructure—threaten the execution of this mission. Addressing these challenges is vital for maintaining operational readiness and strategic deterrence against pacing [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/achieving-peace-through-strength-a-sustainment-imperative/">Achieving Peace Through Strength: A Sustainment Imperative</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Secretary of Defense Pete Hegseth’s directive to achieve “<a href="https://www.defense.gov/News/Releases/Release/Article/4040940/secretary-hegseths-message-to-the-force/">peace through strength</a>” inherently relies on a restored warrior ethos, a rebuilt military, and reestablished deterrence. However, sustainment challenges within the Air Force—including personnel shortfalls and aging infrastructure—threaten the execution of this mission. Addressing these challenges is vital for maintaining operational readiness and strategic deterrence against pacing threats, particularly posed by nations like China and Russia.</p>
<p>Informed by the works of Lieutenant General Tom D. Miller, particularly “<a href="https://www.google.com/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwjb-tm8gO6LAxWZE1kFHf72ALEQFnoECBQQAQ&amp;url=https%3A%2F%2Fdml.armywarcollege.edu%2Fwp-content%2Fuploads%2F2023%2F01%2FMiller-Defense-Sustainment-Industrial-Base-2010.pdf&amp;usg=AOvVaw3ZXraxctSKJCCoB3YUd09V&amp;opi=89978449">The Defense Sustainment Industrial Base</a>” and “<a href="https://www.brookings.edu/articles/capability-capacity-and-risk-in-the-sustainment-of-air-force-weapon-systems/">Capability, Capacity, and Risk in Sustainment of Air Force Weapon Systems</a>,” it is clear that the challenges and strategies surrounding maintenance of Air Force weapon systems are multifaceted. The first article highlights the foundational elements necessary for a robust defense sustainment industrial base, emphasizing the need for a resilient infrastructure. The second publication further develops this analysis, delving into the evolving landscape of capability, capacity, and risk management in the context of sustaining advanced weapon systems. Collectively, these works offer critical insights and recommendations on optimizing the sustainment process, ensuring readiness and effectiveness in a changing security landscape.</p>
<p>This passage highlights a significant juxtaposition of key themes present in the Secretary of Defense’s goals and Gen. Miller’s examination of Air Force sustainment challenges. To navigate these challenges effectively, specific focus must be placed on three pivotal areas: restoring the warrior ethos, rebuilding the military, and reestablishing deterrence.</p>
<p>In the effort to restore the warrior ethos, the military needs skilled personnel, modern facilities, and a sustainable defense industrial base. Workforce retention and a shortage of technical expertise undeniably impact operational readiness. According to the Secretary of Defense’s mandate, there is a pressing need to “revive the warrior ethos and restore trust in our military.”</p>
<p>Miller’s analysis reveals that the sustainment workforce is facing severe challenges such as an aging workforce, a lack of recruitment, and significant technical expertise gaps. <a href="https://www.google.com/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwjLxI_1gO6LAxUTElkFHeEwDmYQFnoECCUQAQ&amp;url=https%3A%2F%2Fwww.afsc.af.mil%2F&amp;usg=AOvVaw0NR4JOXP31-7yi8FPQ96DQ&amp;opi=89978449">The Air Force Sustainment Center (AFSC)</a> is currently experiencing a 30 percent shortage in experienced depot maintenance personnel. This shortfall adversely affects the maintenance and throughput of mission-critical aircraft. A 2022 report by the <a href="https://www.gao.gov/products/gao-23-105571">Government Accountability Office (GAO) reported</a> that workforce shortages at Air Logistics Complexes (ALCs) contribute to an average delay of 20 percent in aircraft depot maintenance cycles, diminishing operational readiness.</p>
<p>Transitioning from a counterterrorism focus to one that emphasizes great power competition necessitates a sustainment workforce capable of advanced manufacturing and software maintenance, but current training pipelines struggle to produce such expertise. The implications are stark; a degraded sustainment workforce directly undermines operational readiness, particularly in maintaining high-end platforms like the F-35, which are essential for effective deterrence.</p>
<p>In relation to rebuilding the military, the defense industrial base faces significant hurdles due to aging infrastructure, inefficient procurement processes, and inconsistent funding. Secretary Hegseth emphasizes the importance of this rebuilding process, stating the need to match threats with capabilities. Gen. Miller’s assessments indicate that the Air Force’s sustainment infrastructure is outdated and that funding for depot modernization is inconsistent. The average age of Air Force maintenance depots exceeds 60 years, with several facilities dating back to World War II. Supply-chain vulnerabilities also arise. Significant dependence on a sole supplier for 67 percent of critical spare parts for legacy aircraft creates potential crises during conflicts. Moreover, extended procurement cycles often delay readiness enhancements, averaging 8 to 10 years from requirement to fielding for sustainment modernization projects.</p>
<p>Thus, without rapid modernization of sustainment infrastructure and necessary acquisition reform, the Air Force will struggle to maintain aging fleets while simultaneously integrating essential next-generation capabilities for initiatives like joint all-domain command and control (JADC2) and agile combat employment (ACE).</p>
<p>Reestablishing deterrence requires a comprehensive assessment of readiness to ensure that sustainment capacity effectively aligns with the threats posed by nations such as China and Russia. As stated in the SECDEF mandates, deterrence must be reestablished through defense of the homeland and collaboration with allies. However, Miller’s 2022 assessment points out a disconnect between current sustainment funding models and the operational requirements of deterrence in contested environments. For instance, from 2012 to 2022, the <a href="https://www.google.com/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwj27azYge6LAxVNEVkFHbfnNVUQFnoECBQQAQ&amp;url=https%3A%2F%2Fwww.airandspaceforces.com%2Fair-force-mission-capable-rates-fiscal-2024%2F&amp;usg=AOvVaw2KqGvEhWtyOQhQbIcC9ztO&amp;opi=89978449">readiness rates</a> for the USAF fighter fleet plummeted from 75 to 57 percent, with sustainment backlogs contributing significantly to non-mission-capable status. Only 40 percent of American sustainment infrastructure is currently forward-positioned in the Indo-Pacific, which is crucial for countering aggressive actions from adversaries.</p>
<p>To counter these challenges and bolster national defense strategy, courses of action should be implemented. First, revitalizing the sustainment workforce through expanded training and technological improvements is essential. According to projected outcomes, this could reduce depot maintenance delays by 15 to 20 percent within five years while raising mission-capable rates for advanced platforms.</p>
<p>Second, prioritizing infrastructure and acquisition reform will require streamlining procurement processes and integrating industry best practices. This reform could lead to a reduction in aircraft downtime and enhance rapid repair capabilities essential for operating within geographic regions such as the Indo-Pacific. Finally, adopting a risk-based resource-allocation strategy aligned with high-threat mission areas can significantly strengthen deterrence, ultimately raising mission-capable rates of critical platforms.</p>
<p>By aligning sustainment actions with the objectives of the <em>National Defense Strategy</em>, the Air Force can demonstrate improved deterrence capabilities, build enduring advantages, and modernize its force. An immediate investment in revitalizing the sustainment workforce, modernizing depot infrastructure, and aligning resources with operational needs is imperative. A reformative approach to sustainment is not merely an operational necessity; it constitutes a vital aspect of maintaining peace through strength. Without these necessary adjustments, the Air Force risks facing severe mission degradation in high-threat scenarios, ultimately jeopardizing national defense.</p>
<p><em>Brandon Toliver, PhD, serves on the A4 staff of Headquarters Air Force. The views expressed are those of the author and do not reflect the official guidance or position of the United States government, the Department of Defense, the United States Air Force, or the United States Space Force.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/03/Achieving-Peace-Through-Strength.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="295" height="82" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 295px) 100vw, 295px" /></a></p>
<p><a href="https://globalsecurityreview.com/achieving-peace-through-strength-a-sustainment-imperative/">Achieving Peace Through Strength: A Sustainment Imperative</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/achieving-peace-through-strength-a-sustainment-imperative/feed/</wfw:commentRss>
			<slash:comments>33</slash:comments>
		
		
			</item>
		<item>
		<title>Trump’s Trade and Tariff Policy Benefits America’s Nuclear Deterrent</title>
		<link>https://globalsecurityreview.com/trumps-trade-and-tariff-policy-benefits-americas-nuclear-deterrent/</link>
					<comments>https://globalsecurityreview.com/trumps-trade-and-tariff-policy-benefits-americas-nuclear-deterrent/#respond</comments>
		
		<dc:creator><![CDATA[Curtis McGiffin]]></dc:creator>
		<pubDate>Mon, 03 Mar 2025 13:11:25 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Deterrence & Foreign Policy]]></category>
		<category><![CDATA[Economics & Trade]]></category>
		<category><![CDATA[Government & Politics]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Balance]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[curtis mcgiffin]]></category>
		<category><![CDATA[defense budget]]></category>
		<category><![CDATA[Defense Spending]]></category>
		<category><![CDATA[Donald Trump]]></category>
		<category><![CDATA[dynamic parity]]></category>
		<category><![CDATA[economy]]></category>
		<category><![CDATA[fairness]]></category>
		<category><![CDATA[GDP]]></category>
		<category><![CDATA[Geopolitical Stability]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[modernization]]></category>
		<category><![CDATA[National debt]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[nuclear deterrent]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[Prosperity]]></category>
		<category><![CDATA[Reciprocity]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[sovereignty]]></category>
		<category><![CDATA[strategic stability]]></category>
		<category><![CDATA[Tariff]]></category>
		<category><![CDATA[Trade]]></category>
		<category><![CDATA[Trade Deficit]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30190</guid>

					<description><![CDATA[<p>Recently, President Donald Trump established a new Trade and Tariff Reciprocity Policy. In his signed memo, he stated, “It is the policy of the United States to reduce our large and persistent annual trade deficit in goods and to address other unfair and unbalanced aspects of our trade with foreign trading partners.” His memo also [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/trumps-trade-and-tariff-policy-benefits-americas-nuclear-deterrent/">Trump’s Trade and Tariff Policy Benefits America’s Nuclear Deterrent</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Recently, President Donald Trump established a new Trade and Tariff Reciprocity Policy. In his <a href="https://www.whitehouse.gov/articles/2025/02/reciprocal-trade-and-tariffs/">signed memo</a>, he stated, “It is the policy of the United States to reduce our large and persistent annual trade deficit in goods and to address other unfair and unbalanced aspects of our trade with foreign trading partners.” His memo also instructs his administration to identify “the equivalent of a reciprocal tariff for each foreign trading partner.”</p>
<p>During the signing event, President Trump <a href="https://www.youtube.com/watch?v=kMzfeyHmq2s">remarked</a>, “On trade, I have decided, for purposes of fairness, that I will charge a reciprocal tariff, meaning whatever countries charge the United States of America, we will charge them no more, no less. In other words, they charge the US a tax or tariff, and we will charge them the exact same tax or tariff, very simple.”</p>
<p>A strong economy is vital to national security. In addition to reliable access to energy, minerals, and capital, any great power fundamentally requires a resilient, production-oriented, economic infrastructure that ensures a comprehensive and adequate industrial base capable of producing most of the nation’s necessities.</p>
<p>Furthermore, America’s national debt exceeds $36 trillion, with a debt-to-GDP ratio surpassing 133 percent. In fiscal year 2024, the cost of servicing the debt’s interest <a href="https://www.foxbusiness.com/politics/us-national-debt-interest-exceeds-defense-spending-cbo">surpassed</a> America’s defense budget.</p>
<p>Americans place great importance on fairness and balance. The Declaration of Independence famously states that “all men are created equal” and advocates for equal treatment for all individuals, regardless of status or position. The Constitution establishes a framework that balances power among various branches of government, as outlined in James Madison’s <em>Federalist 51</em>.</p>
<p>Socrates once remarked, “If measure and symmetry are absent from any composition in any degree, ruin awaits both the ingredients and the composition&#8230;. Measure and symmetry are beauty and virtue the world over.” He was right.</p>
<p>President Trump seeks to implement tariff reciprocity towards America’s competitors in a fair, just, and balanced manner. Can this same principle be applied to his peace through strength <a href="https://globalsecurityreview.com/peace-through-strength-enhancing-americas-nuclear-deterrence-today/">deterrence</a> approach? Yes, it can.</p>
<p><a href="https://thinkdeterrence.com/dynamic-parity/">Dynamic parity</a> is a nuclear deterrence strategy that deliberately achieves and maintains a contextually symmetrical balance of nuclear force capabilities, capacities, and composition in relation to the combined nuclear strength of China, North Korea, Russia, and possibly Iran. This strategy seeks to balance America’s nuclear deterrent force against the potentially collaborative arsenals of these adversaries, thereby enhancing deterrence, reassuring allies, and preserving strategic stability in a world lacking binding arms control agreements.</p>
<p>America is about <a href="https://www.realcleardefense.com/articles/2024/10/08/us_nuclear_deterrence_what_went_wrong_and_what_can_be_done_1063632.html">15 years</a> into a 30-year effort to recapitalize its nuclear arsenal, which has a <a href="https://www.armscontrol.org/factsheets/us-modernization-2024-update">program of record that offers</a> a one-for-one intercontinental ballistic missile (ICBM) swap, two fewer ballistic missile submarines, and a reduced bomb load capacity. The current program of record was designed for a world that no longer exists.</p>
<p>Even the Biden administration’s acting Assistant Secretary of Defense for Space Policy <a href="https://www.csis.org/analysis/nuclear-threats-and-role-allies-conversation-acting-assistant-secretary-vipin-narang">acknowledged</a> the need to explore “options for increasing future launcher capacity or adding more deployed warheads in land, sea, and air capabilities” to address the significant growth and variety of China’s nuclear arsenal. The 2023 Congressional Commission <a href="https://www.ida.org/-/media/feature/publications/a/am/americas-strategic-posture/strategic-posture-commission-report.ashx">report</a> on U.S. Strategic Posture stated that the current nuclear modernization program is “necessary, but not sufficient” for facing two nuclear peers: China and Russia.</p>
<p>Americans often assess the fairness of financial rewards and the distribution of costs, commonly reacting to perceived unfairness with feelings of hostility and responding with protest. Regarding economic, political, or national security issues, we are “<a href="https://www.psychologytoday.com/us/blog/the-mindful-self-express/201408/the-neuroscience-fairness-and-injustice?msockid=3899c21deff46a6631b0d76bee226b9e">wired to resist unfair treatment</a>.” This sense of fairness and balance also extends to America’s defensive posture. A recent Reagan National Defense Forum <a href="https://www.reaganfoundation.org/reagan-institute/centers/peace-through-strength/reagan-national-defense-survey/">Survey</a> noted that 77 percent of voters were concerned that the national debt might force defense cuts, with 79 percent supporting increased defense spending, and 70 percent of those surveyed were concerned about “Russia launching a thermonuclear attack against the US.”</p>
<p>In this context, geopolitical fairness refers to the perceived evenhandedness among nations in a manner that mutually impacts interests. Meanwhile, geopolitical balance pertains to the distribution of perceived power between states in the international system. The 2024 <em>Annual Threat Assessment</em> <a href="https://www.dni.gov/index.php/newsroom/reports-publications/reports-publications-2024/3787-2024-annual-threat-assessment-of-the-u-s-intelligence-community">noted</a> that Russia possesses the largest, most diverse, and <a href="https://www.realcleardefense.com/articles/2025/01/24/recent_developments_in_russian_nuclear_capabilities_1086894.html">most modern</a> nuclear weapons stockpile in the world. This infers that America remains inferior in aggregate nuclear weapon numbers and is trailing in modernization, which creates an imbalance.</p>
<p>Correcting long-standing imbalances in trade policy and military shortfalls is vital to the American conscience. Allowing trade deficits with economic competitors to persist without challenge is akin to unilateral disarmament. The US trade deficit for goods reached <a href="https://www.businessinsider.com/trump-trade-deficit-exports-imports-tariffs-us-consumers-2025-2">a record $1.2 trillion</a> in 2024, while the treasury <a href="https://www.crfb.org/press-releases/treasury-confirms-calendar-year-2024-deficit-tops-20-trillion">borrowed $2 trillion</a> that same year. Ongoing deficits of this magnitude threaten domestic companies and jobs, putting negative pressure on GDP and the prosperity of individual Americans. Ensuring that America’s nuclear deterrent can counter the threats posed by its adversaries will safeguard citizens’ security and sovereignty, enabling prosperity.</p>
<p>President Trump’s new Trade and Tariff Reciprocity Policy, like the nuclear deterrence strategy of <em>Dynamic Parity</em>, places the burden of acceptable behavior on America’s competitors. They both empower America to act in the interest of fairness, aiming to achieve balance in both process and product. Geopolitical stability is not born of an America exploited economically or constrained militarily. This kind of weakness is not only provocative but also insulting.</p>
<p><em><a href="https://thinkdeterrence.com/the-team-2/curtis-mcgiffin/">Col. Curtis McGiffin</a> (US Air Force, Ret.) is Vice President for Education of the National Institute for Deterrence Studies and a visiting professor at Missouri State University’s School of Defense and Strategic Studies. He has over 30 years of total USAF service. The views expressed are his own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/03/How-Trumps-Trade-and-Tariff-Reciprocity-Policy-Can-Benefit-Americas-Nuclear-Deterrent.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29719" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button.png" alt="" width="302" height="84" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-300x83.png 300w" sizes="(max-width: 302px) 100vw, 302px" /></a></p>
<p><a href="https://globalsecurityreview.com/trumps-trade-and-tariff-policy-benefits-americas-nuclear-deterrent/">Trump’s Trade and Tariff Policy Benefits America’s Nuclear Deterrent</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/trumps-trade-and-tariff-policy-benefits-americas-nuclear-deterrent/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Congratulations on Becoming the Secretary of Defense</title>
		<link>https://globalsecurityreview.com/congratulations-on-becoming-the-secretary-of-defense/</link>
					<comments>https://globalsecurityreview.com/congratulations-on-becoming-the-secretary-of-defense/#respond</comments>
		
		<dc:creator><![CDATA[Michael Fincher]]></dc:creator>
		<pubDate>Thu, 13 Feb 2025 13:14:57 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Air Force]]></category>
		<category><![CDATA[Army]]></category>
		<category><![CDATA[Axis of Autocracy]]></category>
		<category><![CDATA[border security]]></category>
		<category><![CDATA[budgets]]></category>
		<category><![CDATA[bureaucracy]]></category>
		<category><![CDATA[bureaucratic infighting]]></category>
		<category><![CDATA[Chinese]]></category>
		<category><![CDATA[combat air force]]></category>
		<category><![CDATA[combat forces]]></category>
		<category><![CDATA[combat veteran]]></category>
		<category><![CDATA[combatant]]></category>
		<category><![CDATA[command opportunities]]></category>
		<category><![CDATA[Democrats]]></category>
		<category><![CDATA[drone swarms]]></category>
		<category><![CDATA[duplication]]></category>
		<category><![CDATA[education]]></category>
		<category><![CDATA[entitlements]]></category>
		<category><![CDATA[federal government]]></category>
		<category><![CDATA[health]]></category>
		<category><![CDATA[illegal immigration]]></category>
		<category><![CDATA[international order]]></category>
		<category><![CDATA[Iranians]]></category>
		<category><![CDATA[Michael Fincher]]></category>
		<category><![CDATA[military]]></category>
		<category><![CDATA[military force]]></category>
		<category><![CDATA[missile defense systems]]></category>
		<category><![CDATA[missile technology]]></category>
		<category><![CDATA[National defense]]></category>
		<category><![CDATA[National Institute for Deterrence Studies. ​]]></category>
		<category><![CDATA[Navy]]></category>
		<category><![CDATA[North Koreans]]></category>
		<category><![CDATA[nuclear arsenal]]></category>
		<category><![CDATA[pentagon]]></category>
		<category><![CDATA[personnel system]]></category>
		<category><![CDATA[political activism]]></category>
		<category><![CDATA[politicization]]></category>
		<category><![CDATA[President Trump]]></category>
		<category><![CDATA[Republicans]]></category>
		<category><![CDATA[retirement]]></category>
		<category><![CDATA[robots]]></category>
		<category><![CDATA[Russians]]></category>
		<category><![CDATA[secretary of defense]]></category>
		<category><![CDATA[service members]]></category>
		<category><![CDATA[ships]]></category>
		<category><![CDATA[social activism]]></category>
		<category><![CDATA[strategic arsenal]]></category>
		<category><![CDATA[tax dollars]]></category>
		<category><![CDATA[theater nuclear arsenal]]></category>
		<category><![CDATA[toxic base housing]]></category>
		<category><![CDATA[unity]]></category>
		<category><![CDATA[US Air Force]]></category>
		<category><![CDATA[war on terror]]></category>
		<category><![CDATA[warfighting capabilities]]></category>
		<category><![CDATA[weapon systems]]></category>
		<category><![CDATA[Weinberger Doctrine]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30044</guid>

					<description><![CDATA[<p>Secretary Hegseth, It is good to have a combat veteran as the new Secretary of Defense. It is also good to have someone who, while writing a book on the current state of the military, came to understand the difficulties service members face, why they choose not to resign or not re-enlist, and how hard [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/congratulations-on-becoming-the-secretary-of-defense/">Congratulations on Becoming the Secretary of Defense</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Secretary Hegseth,</p>
<p>It is good to have a combat veteran as the new Secretary of Defense. It is also good to have someone who, while writing a book on the current state of the military, came to understand the difficulties service members face, why they choose not to resign or not re-enlist, and how hard it can be for some once they leave the service. That same research will also help you to eliminate the politicization that left the military hurting for recruits.</p>
<p>This understanding and experience will be helpful in correcting the course of the Department of Defense. Prioritizing warfighting capabilities and lethality over supporting the mission creep of bureaucracy is critical but antithetical to everything that is Washington, DC. The Pentagon was focused on budgets and bureaucratic infighting long before you arrived. The five-sided puzzle palace will fight back and has a long institutional memory.</p>
<p>Just remember, of <a href="https://www.fedsmith.com/2024/10/25/federal-employees-and-2024-political-donations/">all services and the department</a> itself, only the US Air Force Airmen gave more money to Republicans than Democrats. There is at least one ray of hope.</p>
<p>For decades the military has had its combat forces slashed, bases closed or consolidated, and weapon systems and platforms reduced or retired—all while the Chinese, Iranians, North Koreans, and Russians expanded their military capabilities and plotted the destruction of the international order Americans built. While the war on terror was lost by the very people who hate the fact that you are Secretary of Defense, you have an opportunity to right the ship before it is too late.</p>
<p>No doubt, you will receive more input on what you should do than you can possibly digest. Let me offer a quick list.</p>
<p>First, a sovereign state, by definition, controls its borders. That is a military function. Help President Trump secure the border. There is no such thing as acceptable illegal immigration.</p>
<p>Second, adopt the Weinberger Doctrine as your overriding strategy for the use of military force. You will never go wrong if you do.</p>
<p>Third, the military may be the best socialist system in the world, but it is time to overhaul the personnel system and bring it into the twenty-first century. The military is unique, but do not let that be an excuse.</p>
<p>Fourth, modernization and expansion of the nuclear arsenal must be your top spending priority. A bigger Army, conventional Navy, or conventional Air Force will not deter China, Iran, North Korea, or Russia; only a robust strategic and theater nuclear arsenal can achieve that objective.</p>
<p>Fifth, service members, particularly junior enlisted, have lived in <a href="https://www.nbcnews.com/news/investigations/photos-us-military-bases-show-mold-mice-roaches-brown-water-rcna168368">toxic base housing</a> for far too long. This problem should not make this list, but after two decades it has yet to be solved.</p>
<p>Sixth, remove the cancerous social and political activism that inundates the military. Nothing harms unity more than pitting servicemembers against one another because of their race, gender, or some other contrived distinction. Based on your initial actions, your efforts are already moving ahead.</p>
<p>Seventh, there is simply too much duplication across the services and within the services. Ensuring command opportunities should not lead to the creation of unneeded commands. The services are too small to be inefficient.</p>
<p>Eighth, <a href="https://www.heritage.org/defense/report/reforms-needed-reduce-delays-and-costs-us-shipbuilding">expand the number of combatant</a> ships, missile defense systems, and the combat air force. Neither the Navy nor the Air Force has the capability to wage a sustained campaign against a peer. Not only does the nation lack the delivery platforms, but it will go Winchester in a matter of days. Thus, every kind of weapon is also needed.</p>
<p>Ninth, take the time to reset the baseline and see what the military really needs to defeat the Axis of Autocracy. Is it <a href="https://www.airandspaceforces.com/drone-swarms-new-threat-us-bases/">drone swarms</a>, <a href="https://globalsecurityreview.com/donald-trumps-iron-dome/">missile technology</a>, robots? Whatever the answer may be, it is unlikely exactly what we already have.</p>
<p>Finally, get very good at telling the American people why it is more important to spend tax dollars on the military than the entitlements they know and love. This is perhaps your biggest task. In 2024, the federal government took in $4.4 trillion and spent $4.6 trillion on entitlement programs alone. That is unsustainable. The federal government was never meant to take care of the health, retirement, and education of Americans. It was specifically tasked to defend the nation.</p>
<p>You have a big job ahead of you. Good luck. Americans want nothing more than your success. The safety of the country depends on it.</p>
<p><em>Michael Fincher is a Fellow at the National Institute for Deterrence Studies. Views expressed in this article are the author’s own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/02/Congratulations-Secretary-Hegseth.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/congratulations-on-becoming-the-secretary-of-defense/">Congratulations on Becoming the Secretary of Defense</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/congratulations-on-becoming-the-secretary-of-defense/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ICBM EAR Report Jan, 3 2025</title>
		<link>https://globalsecurityreview.com/icbm-ear-report-jan-3-2025/</link>
					<comments>https://globalsecurityreview.com/icbm-ear-report-jan-3-2025/#respond</comments>
		
		<dc:creator><![CDATA[Peter Huessy]]></dc:creator>
		<pubDate>Wed, 08 Jan 2025 13:16:27 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[EAR Report]]></category>
		<category><![CDATA[Government & Politics]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[anti-American policy]]></category>
		<category><![CDATA[Arms Race]]></category>
		<category><![CDATA[Beijing]]></category>
		<category><![CDATA[Biden]]></category>
		<category><![CDATA[Brilliant Pebbles]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[China threat report]]></category>
		<category><![CDATA[Chinese nuclear threat]]></category>
		<category><![CDATA[coercion]]></category>
		<category><![CDATA[congress]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[EAR]]></category>
		<category><![CDATA[economic news]]></category>
		<category><![CDATA[European defense]]></category>
		<category><![CDATA[Geostrategic Analysis]]></category>
		<category><![CDATA[Hoover Institute]]></category>
		<category><![CDATA[ICBM]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[intermediate-range ballistic missile]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Iranian nuclear threat]]></category>
		<category><![CDATA[Kim Jong Un]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[Mike Johnson]]></category>
		<category><![CDATA[missile defense]]></category>
		<category><![CDATA[Moscow]]></category>
		<category><![CDATA[National Institute of Deterrent Studies]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[NDAA]]></category>
		<category><![CDATA[next generation interceptor]]></category>
		<category><![CDATA[NGI]]></category>
		<category><![CDATA[NIDS]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[nuclear assets]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[nuclear funding]]></category>
		<category><![CDATA[nuclear modernization]]></category>
		<category><![CDATA[nuclear stability]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Peter Huessy]]></category>
		<category><![CDATA[Reagan]]></category>
		<category><![CDATA[ROK]]></category>
		<category><![CDATA[Royal United Services Institute]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Russian nuclear forces]]></category>
		<category><![CDATA[seminar series]]></category>
		<category><![CDATA[Senate Appropriations Committee]]></category>
		<category><![CDATA[Senate Armed Services Committee]]></category>
		<category><![CDATA[space technology]]></category>
		<category><![CDATA[space-based systems]]></category>
		<category><![CDATA[Speaker of the House]]></category>
		<category><![CDATA[strategic developments]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[Trump]]></category>
		<category><![CDATA[U.S. defense manufacturing]]></category>
		<category><![CDATA[U.S. Navy]]></category>
		<category><![CDATA[U.S. security]]></category>
		<category><![CDATA[U.S. Senate]]></category>
		<category><![CDATA[U.S.-South Korean Alliance]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[Union of Concerned Scientists]]></category>
		<category><![CDATA[ussr]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29765</guid>

					<description><![CDATA[<p>ICBM EAR Report Executive Summary Based on the latest EAR Report, these are the critical points on global security, upcoming events, and the ongoing discourse on nuclear deterrence, modernization, and geopolitical strategy for 2025. Quotes of the Week Xi Jinping (China): &#8220;No one can stop the historical trend” of China’s “reunification” with Taiwan.&#8221; U.S. Ambassador [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/icbm-ear-report-jan-3-2025/">ICBM EAR Report Jan, 3 2025</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>ICBM EAR Report</strong> <strong><br />
Executive Summary</strong></p>
<p>Based on the latest EAR Report, these are the critical points on global security, upcoming events, and the ongoing discourse on nuclear deterrence, modernization, and geopolitical strategy for 2025.</p>
<p><strong>Quotes of the Week</strong></p>
<ul>
<li><strong>Xi Jinping (China):</strong> &#8220;No one can stop the historical trend” of China’s “reunification” with Taiwan.&#8221;</li>
<li><strong>U.S. Ambassador Philip Goldberg (South Korea):</strong> Reaffirmed the U.S.-South Korean alliance amidst geopolitical tensions.</li>
<li><strong>DPRK Kim Jong Un:</strong> Committed to implementing the &#8220;toughest&#8221; anti-American policy while criticizing the U.S.-South Korea-Japan security partnership.</li>
<li><strong>Antony Blinken (U.S. Secretary of State):</strong> Highlighted Russia&#8217;s intentions to share advanced space technology with North Korea.</li>
<li><strong>NATO Official:</strong> Warned of unconventional Russian attacks causing substantial casualties.</li>
</ul>
<p><strong>Upcoming 2025 Seminar Events</strong></p>
<ol>
<li><strong>January 10, 2025, 10:00 AM:</strong> Robert Soofer &amp; Mark Massa on &#8220;The Case for Homeland Missile Defense.&#8221;</li>
<li><strong>January 31, 2025, 10:00 AM:</strong> Shoshana Bryen &amp; Ilan Berman on &#8220;Middle East Update and the Iranian Nuclear Threat.&#8221;</li>
<li><strong>February 14, 2025, 10:00 AM:</strong> Stephen Blank &amp; Mark Schneider on &#8220;Russian Intentions with Its Growing Nuclear Forces.&#8221;</li>
<li><strong>February 28, 2025, 10:00 AM:</strong> Hon. Madelyn Creedon &amp; Hon. Frank Miller on &#8220;Assessment and Update of the Posture Commission.&#8221;</li>
<li><strong>March 14, 2025, 10:00 AM:</strong> Gordon Chang &amp; Rick Fisher on &#8220;The Chinese Nuclear Threat &amp; Implications for US Security.&#8221;</li>
</ol>
<p><strong>Nuclear Derangement Syndrome</strong></p>
<ul>
<li>Criticism of nuclear deterrence is gaining momentum, focusing on framing nuclear weapons as both unnecessary and dangerous.</li>
<li>The Union of Concerned Scientists highlights essays opposing nuclear modernization, which are countered with arguments emphasizing deterrence as essential for stability.</li>
<li>The critique overlooks the strategic necessity of nuclear weapons in preventing large-scale conflicts and ensuring global security.</li>
</ul>
<p><strong>The Biden-Trump Arms Race</strong></p>
<ul>
<li><strong>Criticism:</strong> The Biden and Trump administrations&#8217; claims of an arms race are exaggerated. They focus on necessary modernization within New START limits.</li>
<li><strong>Reality:</strong> Modernization efforts (Columbia submarines, Sentinel ICBMs, B21 bombers) align with treaty commitments, aiming for readiness by 2042.</li>
<li><strong>Key Concern:</strong> Rising nuclear capabilities of Russia and China surpass New START limits, demanding U.S. responses to maintain strategic balance.</li>
<li><strong>Counterarguments:</strong> Opponents argue modernization fuels an arms race, while proponents emphasize deterrence and technological edge against adversaries.</li>
</ul>
<p><span style="color: #000080;"><strong>Download the full report.</strong></span></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/01/ICBM-EAR-week-of-January-3.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29719 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/icbm-ear-report-jan-3-2025/">ICBM EAR Report Jan, 3 2025</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/icbm-ear-report-jan-3-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Escalation Dominance Is a Flawed Framework</title>
		<link>https://globalsecurityreview.com/escalation-dominance-is-a-flawed-framework/</link>
					<comments>https://globalsecurityreview.com/escalation-dominance-is-a-flawed-framework/#respond</comments>
		
		<dc:creator><![CDATA[Katerina Canyon]]></dc:creator>
		<pubDate>Mon, 06 Jan 2025 12:33:06 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Diplomacy]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Arms Control]]></category>
		<category><![CDATA[Arms Race]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Cold War logic]]></category>
		<category><![CDATA[conflict prevention]]></category>
		<category><![CDATA[cooperation]]></category>
		<category><![CDATA[cuban missile crisis]]></category>
		<category><![CDATA[economic development]]></category>
		<category><![CDATA[escalation dominance]]></category>
		<category><![CDATA[global stability]]></category>
		<category><![CDATA[humanitarian aid]]></category>
		<category><![CDATA[humanitarian engagement]]></category>
		<category><![CDATA[military capability]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[nuclear arms race]]></category>
		<category><![CDATA[Peace Economy Project ​]]></category>
		<category><![CDATA[resilience]]></category>
		<category><![CDATA[restraint]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[smart defense spending]]></category>
		<category><![CDATA[sustainable policies]]></category>
		<category><![CDATA[systemic inequalities]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[understanding]]></category>
		<category><![CDATA[US deterrence policy]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29731</guid>

					<description><![CDATA[<p>The argument for “escalation dominance” as a cornerstone of US deterrence policy, presented in Joe Buff’s recent Global Security Review article, relies on outdated Cold War logic that fails to address the complexities and ethical considerations of today’s global security environment. While the premise of maintaining deterrence is essential, the emphasis on overwhelming military capability [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/escalation-dominance-is-a-flawed-framework/">Escalation Dominance Is a Flawed Framework</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The argument for “<a href="https://www.jstor.org/stable/10.7249/mg614af.9?seq=10">escalation dominance</a>” as a cornerstone of US deterrence policy, presented in Joe Buff’s <a href="https://globalsecurityreview.com/modern-escalation-dominance-is-essential-to-effective-deterrence-and-assurance/">recent <em>Global Security Review </em>article</a>, relies on outdated <a href="https://www.chathamhouse.org/2020/04/perspectives-nuclear-deterrence-21st-century-0/nuclear-deterrence-destabilized">Cold War logic</a> that fails to address the complexities and ethical considerations of today’s global security environment. While the premise of maintaining deterrence is essential, the emphasis on overwhelming military capability as a panacea for geopolitical challenges is both dangerous and counterproductive.</p>
<p>Buff asserts that the US must invest heavily in full-spectrum military capabilities to deter adversaries. However, history shows that militarization alone often escalates tensions rather than resolving them. For instance, the <a href="https://history.state.gov/milestones/1961-1968/cuban-missile-crisis">Cuban Missile Crisis</a>—a frequent example in escalation dominance arguments—was resolved through diplomacy, not military action.</p>
<p>President John F. Kennedy and Soviet General Secretary Nikita Khrushchev’s willingness to negotiate behind the scenes prevented catastrophe. This underscores the need for diplomacy as a primary tool of deterrence, rather than relying solely on military might.</p>
<p>The concept of escalation dominance inherently invites an arms race. If the Americans aim for superiority at every “rung” of the escalation ladder, adversaries will predictably respond by developing their own capabilities, leading to a dangerous spiral of militarization.</p>
<p>This is evident in the ongoing nuclear arms race with <a href="https://www.cfr.org/timeline/us-russia-nuclear-arms-control">Russia</a> and <a href="https://armscontrolcenter.org/the-china-dilemma/">China</a>, where both nations responded to American advancements with their own. Far from ensuring security, this creates an unstable environment where miscalculation or miscommunication can lead to catastrophic conflict.</p>
<p>Buff’s advocacy for relentless dominance neglects the immense human and ethical costs of prolonged conflict. The destruction in <a href="https://www.hrw.org/europe/central-asia/ukraine">Ukraine</a> serves as a stark warning of the devastation that unchecked militarization can bring. Escalation dominance does not account for the millions of civilians who suffer in war zones, the refugees who flee their homes, or the global economic and environmental impacts of sustained conflict. A more humane approach prioritizes conflict prevention through diplomacy, humanitarian aid, and economic development.</p>
<p>The article frames restraint as synonymous with appeasement, a reductive argument that misrepresents modern security strategies. Restraint does not mean inaction—it means carefully measured responses that avoid unnecessary escalation while maintaining credibility.</p>
<p>The assumption that adversaries only understand brute force disregards the nuanced motivations behind their actions. Engaging adversaries through dialogue and understanding, rather than confrontation, is often a more effective way to address their concerns and reduce hostilities.</p>
<p>The push for escalation dominance ignores the domestic consequences of prioritizing military spending over critical needs like healthcare, education, and infrastructure. Buff argues that America’s survival depends on overwhelming military capability, yet the true strength of a nation lies in the well-being of its people. Allocating resources to address systemic inequalities and bolster resilience at home is a more sustainable approach to national security than pouring trillions into the Pentagon.</p>
<p>Rather than focusing solely on military dominance, the US should adopt a balanced approach to deterrence. It should incorporate four major objectives.</p>
<p>First, diplomacy should always be the first option. Prioritizing dialogue and international cooperation to resolve conflicts must always precede conflict and escalation.</p>
<p>Second, arms control is a necessary component of national strategy. Reinvigorating arms control agreements to reduce the risk of catastrophic war and rebuilding trust with adversaries is a must.</p>
<p>Third, humanitarian engagement is core to American foreign policy. Addressing root causes of instability, such as poverty, inequality, and climate change, through global partnerships, can prevent conflict.</p>
<p>Fourth, smart defense spending is critical to an affordable defense. Invest in modern, cost-effective defense strategies while reallocating excess military funds to domestic needs is important for the nation.</p>
<p>Buff’s call for escalation dominance reflects a worldview that prioritizes power over pragmatism and ignores the interconnected realities of the 21st century. True security comes not from the constant threat of overwhelming force, but from fostering global stability through cooperation, understanding, and sustainable policies. The US must resist the temptation to revert to Cold War thinking and instead embrace strategies that build a more peaceful and equitable world.</p>
<p><em>Katerina Canyon is the Executive Director of the Peace Economy Project. The views expressed are her own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/01/Escalation-Dominance-A-Flawed-Framework-for-Modern-Security-Challenges.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29719 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/escalation-dominance-is-a-flawed-framework/">Escalation Dominance Is a Flawed Framework</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/escalation-dominance-is-a-flawed-framework/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ICBM EAR Report for December 20th</title>
		<link>https://globalsecurityreview.com/icbm-ear-report-for-december-20th/</link>
					<comments>https://globalsecurityreview.com/icbm-ear-report-for-december-20th/#respond</comments>
		
		<dc:creator><![CDATA[Peter Huessy]]></dc:creator>
		<pubDate>Fri, 27 Dec 2024 13:42:17 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[EAR Report]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Government & Politics]]></category>
		<category><![CDATA[Space Deterrence & Conflict]]></category>
		<category><![CDATA[ABM Treaty]]></category>
		<category><![CDATA[agricultural assistance]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Air Force Global Strike Command]]></category>
		<category><![CDATA[alert warheads]]></category>
		<category><![CDATA[Appropriations]]></category>
		<category><![CDATA[Arms Control]]></category>
		<category><![CDATA[B-52J]]></category>
		<category><![CDATA[ballistic missile]]></category>
		<category><![CDATA[Barack Obama]]></category>
		<category><![CDATA[big data]]></category>
		<category><![CDATA[Bill Clinton]]></category>
		<category><![CDATA[Bill Gertz]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[China Military Power Report]]></category>
		<category><![CDATA[Chinese military]]></category>
		<category><![CDATA[Chuck Fleischmann]]></category>
		<category><![CDATA[coercive threats]]></category>
		<category><![CDATA[cold war]]></category>
		<category><![CDATA[Columbia submarines]]></category>
		<category><![CDATA[Columbia-class submarines]]></category>
		<category><![CDATA[congress]]></category>
		<category><![CDATA[conventional missiles]]></category>
		<category><![CDATA[CR]]></category>
		<category><![CDATA[cyber warfare]]></category>
		<category><![CDATA[D-5 missiles]]></category>
		<category><![CDATA[debt limit]]></category>
		<category><![CDATA[deep fake]]></category>
		<category><![CDATA[Defense Secretary]]></category>
		<category><![CDATA[Defense Spending]]></category>
		<category><![CDATA[Defense Subcommittee]]></category>
		<category><![CDATA[disaster relief]]></category>
		<category><![CDATA[Donald Trump]]></category>
		<category><![CDATA[drones]]></category>
		<category><![CDATA[EAR]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[F130 engine]]></category>
		<category><![CDATA[Gaza]]></category>
		<category><![CDATA[George H.W. Bush]]></category>
		<category><![CDATA[George W. Bush]]></category>
		<category><![CDATA[GMD]]></category>
		<category><![CDATA[GPALS]]></category>
		<category><![CDATA[homeland missile defense]]></category>
		<category><![CDATA[hypersonic missile]]></category>
		<category><![CDATA[ICBM]]></category>
		<category><![CDATA[ICBM leg]]></category>
		<category><![CDATA[Information Warfare]]></category>
		<category><![CDATA[intelligentized warfare]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Jon Finer]]></category>
		<category><![CDATA[Lloyd Austin]]></category>
		<category><![CDATA[Minuteman III]]></category>
		<category><![CDATA[missile defense]]></category>
		<category><![CDATA[Mitch McConnell]]></category>
		<category><![CDATA[mutual assured destruction]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[New START]]></category>
		<category><![CDATA[nuclear buildup]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[nuclear deterrent]]></category>
		<category><![CDATA[nuclear warheads]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[Ohio-class submarines]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Peter Huessy]]></category>
		<category><![CDATA[PLA]]></category>
		<category><![CDATA[quantum computing]]></category>
		<category><![CDATA[Robert Joseph]]></category>
		<category><![CDATA[Robert Peters]]></category>
		<category><![CDATA[robotic arm]]></category>
		<category><![CDATA[Rolls-Royce]]></category>
		<category><![CDATA[Ronald Reagan]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Sentinel]]></category>
		<category><![CDATA[shipyard capacity.]]></category>
		<category><![CDATA[SLBM]]></category>
		<category><![CDATA[SLBM warheads]]></category>
		<category><![CDATA[space station]]></category>
		<category><![CDATA[space-based defense]]></category>
		<category><![CDATA[space-based interceptors]]></category>
		<category><![CDATA[SpaceX]]></category>
		<category><![CDATA[strategic defenses]]></category>
		<category><![CDATA[submarine launched missiles]]></category>
		<category><![CDATA[Taliban]]></category>
		<category><![CDATA[Todd Weeks]]></category>
		<category><![CDATA[Triad]]></category>
		<category><![CDATA[U.S.-ROK alliance]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[US Senate]]></category>
		<category><![CDATA[Valery Gerasimov]]></category>
		<category><![CDATA[Vladimir Putin]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29686</guid>

					<description><![CDATA[<p>Summary Report for ICBM EAR Report of December 20, 2024 The EAR Report is a must read for National security professionals to stay informed about rapidly evolving global threats and the strategic implications for U.S. defense policy. This report addresses critical developments in nuclear deterrence, missile defense, and geopolitical trends, and equips professionals with actionable [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/icbm-ear-report-for-december-20th/">ICBM EAR Report for December 20th</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Summary Report for ICBM EAR Report of December 20, 2024</strong></p>
<p>The EAR Report is a must read for National security professionals to stay informed about rapidly evolving global threats and the strategic implications for U.S. defense policy.</p>
<p>This report addresses critical developments in nuclear deterrence, missile defense, and geopolitical trends, and equips professionals with actionable insights to navigate the complexities of modern security challenges effectively.</p>
<p><strong>Commentary and Quotes of the Week</strong></p>
<ul>
<li><strong>Defense Secretary Lloyd Austin</strong>: Reaffirmed the U.S.-ROK alliance and the strengthening of extended deterrence through the Nuclear Consultative Group.<br />
<strong>Peter Huessy</strong>: Detailed the financial and strategic implications of eliminating the ICBM leg of the U.S. nuclear triad, emphasizing the costs of alternative measures for maintaining current deterrence levels.<br />
<strong>Jon Finer, Deputy National Security Adviser</strong>: Highlighted Pakistan&#8217;s emerging threat with the development of long-range ballistic missile capabilities.<br />
<strong>Bill Gertz</strong>: Revealed China&#8217;s rapid nuclear buildup and the expansion of its missile capabilities.<br />
<strong>Russian Leaders</strong>: Asserted advancements in missile systems and dismissed arms control as a relic of the past.<br />
<strong>Rep. Chuck Fleischmann</strong>: Stressed the urgency of modernizing the U.S. nuclear deterrent, citing contributions from Tennessee&#8217;s Oak Ridge Lab.</li>
</ul>
<p><strong>Strategic Developments of the Week</strong></p>
<ul>
<li><strong>China&#8217;s Military Build-Up</strong>: The Pentagon report highlighted Beijing&#8217;s dramatic advancements in hypersonic missile technology, nuclear warheads, and &#8216;intelligentized warfare.&#8217;<br />
<strong>Russia&#8217;s Strategic Actions</strong>: Russia&#8217;s legislative shift regarding the Taliban and progress in missile systems underlined its geopolitical maneuvers.<br />
<strong>U.S. Missile Defense Challenges</strong>: Reports emphasized the lag in U.S. hypersonic missile capabilities compared to China, pressing the need for enhanced missile defense systems.<br />
<strong>Space and Drone Developments</strong>: New legislation and technological advances highlight the increasing role of space and drones in modern warfare.</li>
</ul>
<p><strong>Important Reports of the Week</strong></p>
<ol>
<li><strong>&#8220;President Trump Must Put the Nuclear Enterprise on a Wartime Footing&#8221; by Robert Peters</strong>:
<ul>
<li>Advocates for accelerating nuclear arsenal modernization to restore deterrence credibility.<br />
Calls for a stronger commitment to stockpile stewardship and missile defense.</li>
</ul>
</li>
<li><strong>&#8220;Importance of Building Homeland Missile Defense&#8221; by Robert Joseph</strong>:
<ul>
<li>Reiterates the vision of a comprehensive missile defense system to counter emerging threats.<br />
Proposes leveraging space-based systems for more robust and efficient protection.</li>
</ul>
</li>
<li><strong>&#8220;What Happens if the United States Eliminates the ICBM Leg of the Triad?&#8221;</strong>:
<ul>
<li>Examines the repercussions of removing the ICBM leg, including massive financial costs for alternative deterrence methods and strategic vulnerabilities.</li>
</ul>
</li>
</ol>
<h2><span style="color: #000080;">Download the Full Report</span><br />
<a href="http://globalsecurityreview.com/wp-content/uploads/2024/12/ICBM-EAR-Report-of-December-12.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-28926 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></h2>
<p><a href="https://globalsecurityreview.com/icbm-ear-report-for-december-20th/">ICBM EAR Report for December 20th</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/icbm-ear-report-for-december-20th/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ICBM EAR Report &#8211; November 22</title>
		<link>https://globalsecurityreview.com/icbm-ear-report-november-22/</link>
					<comments>https://globalsecurityreview.com/icbm-ear-report-november-22/#respond</comments>
		
		<dc:creator><![CDATA[Peter Huessy]]></dc:creator>
		<pubDate>Wed, 27 Nov 2024 13:05:20 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[EAR Report]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[boost-phase intercept]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[conventional threats]]></category>
		<category><![CDATA[defense industrial base]]></category>
		<category><![CDATA[geopolitical tensions]]></category>
		<category><![CDATA[homeland security]]></category>
		<category><![CDATA[ICBM]]></category>
		<category><![CDATA[layered defense]]></category>
		<category><![CDATA[missile defense]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[nuclear doctrine]]></category>
		<category><![CDATA[nuclear modernization]]></category>
		<category><![CDATA[nuclear triad]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[space-based sensors]]></category>
		<category><![CDATA[strategic imperatives]]></category>
		<category><![CDATA[strategic stability]]></category>
		<category><![CDATA[U.S. nuclear deterrent]]></category>
		<category><![CDATA[Ukraine]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29455</guid>

					<description><![CDATA[<p>Introduction This week&#8217;s EAR Report brings critical updates on global security dynamics in a world fraught with geopolitical tensions and nuclear threats. ​ From the evolving nuclear doctrines of major powers to the strategic imperatives of missile defense, we provide a comprehensive overview of the current state of international security. ​ Understanding these developments is [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/icbm-ear-report-november-22/">ICBM EAR Report &#8211; November 22</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Introduction</strong></p>
<p>This week&#8217;s EAR Report brings critical updates on global security dynamics in a world fraught with geopolitical tensions and nuclear threats. ​ From the evolving nuclear doctrines of major powers to the strategic imperatives of missile defense, we provide a comprehensive overview of the current state of international security. ​ Understanding these developments is crucial for policymakers and the public as nations grapple with the complexities of deterrence and defense. ​</p>
<p><strong>Strategic Developments: New Russian Nuclear Doctrine Summary </strong><strong>​</strong></p>
<p>Russian President Vladimir Putin has ratified a revised nuclear doctrine, emphasizing nuclear deterrence against potential adversaries, including countries and military alliances that view Russia as an enemy. ​ The doctrine allows for nuclear responses to significant threats to Russia’s sovereignty, even from conventional weapons, and includes the possibility of nuclear retaliation if Belarus, as part of the Union State, is attacked. ​</p>
<p><strong>Homeland Missile Defense </strong><strong>​</strong></p>
<p>North Korea, Russia, and China continue to enhance their long-range missile capabilities, posing a threat to the U.S. homeland. ​ The next U.S. president must prioritize restoring credible missile defense. ​ Recommendations include developing space-based sensors for persistent missile tracking, advancing boost-phase intercept technologies, and creating a multi-layered defense framework incorporating land, sea, air, and space interceptors. ​ The goal is to counter both rogue state missile salvos and limited nuclear launches from major powers. ​</p>
<p><strong>Deterring the Nuclear Dictators: Foreign Affairs by Madelyn Creedon and Franklin Miller </strong><strong>​</strong></p>
<p>The U.S. faces renewed nuclear threats from Russia, China, and North Korea. ​ The Biden administration has updated nuclear-targeting guidance to deter these adversaries simultaneously. ​ However, modernization efforts for the U.S. nuclear deterrent are hampered by industrial base limitations, material shortages, and funding gaps. ​ The next administration should expedite modernization without extensive policy reviews, focusing on replacing aging systems and enhancing the defense industrial base. ​</p>
<p><strong>Key Takeaways</strong></p>
<ol>
<li><strong>Russian Nuclear Doctrine</strong>: Emphasizes deterrence against adversaries and allows nuclear responses to significant threats, including conventional attacks. ​</li>
<li><strong>Missile Defense</strong>: Urgent need for a comprehensive, layered missile defense system incorporating advanced technologies and space-based sensors. ​</li>
<li><strong>U.S. Nuclear Deterrence</strong>: Updated guidance to deter multiple adversaries; modernization efforts must be accelerated to address current and future threats. ​</li>
<li><strong>Industrial Base Challenges</strong>: Modernization of the U.S. nuclear arsenal is hindered by industrial limitations and funding issues. ​</li>
<li><strong>Strategic Imperatives</strong>: The U.S. must maintain a robust nuclear triad and enhance its defense capabilities to ensure national and allied security. ​</li>
</ol>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/11/ICBM-EAR-Week-of-November-18-24-2024.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-28926 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/icbm-ear-report-november-22/">ICBM EAR Report &#8211; November 22</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/icbm-ear-report-november-22/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Counter Terror’s High-tech to Low-tech Backfire</title>
		<link>https://globalsecurityreview.com/counter-terrors-high-tech-to-low-tech-backfire/</link>
					<comments>https://globalsecurityreview.com/counter-terrors-high-tech-to-low-tech-backfire/#respond</comments>
		
		<dc:creator><![CDATA[Justin Leopold-Cohen]]></dc:creator>
		<pubDate>Mon, 28 Oct 2024 12:15:51 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA["Counter-terrorism]]></category>
		<category><![CDATA[analog communications]]></category>
		<category><![CDATA[armed assaults]]></category>
		<category><![CDATA[Aum Shinrikyo]]></category>
		<category><![CDATA[bombings]]></category>
		<category><![CDATA[cellular detection]]></category>
		<category><![CDATA[Center for Strategic and International Studies]]></category>
		<category><![CDATA[chemical weapons]]></category>
		<category><![CDATA[commercial drones]]></category>
		<category><![CDATA[couriers]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[dead drops]]></category>
		<category><![CDATA[dynamite]]></category>
		<category><![CDATA[economic impact]]></category>
		<category><![CDATA[gasoline]]></category>
		<category><![CDATA[Global Terrorism Index]]></category>
		<category><![CDATA[ground operation]]></category>
		<category><![CDATA[gunpowder]]></category>
		<category><![CDATA[hamas]]></category>
		<category><![CDATA[handwritten notes]]></category>
		<category><![CDATA[Hezbollah]]></category>
		<category><![CDATA[high-tech]]></category>
		<category><![CDATA[homeland security]]></category>
		<category><![CDATA[IDF]]></category>
		<category><![CDATA[incendiary balloons]]></category>
		<category><![CDATA[inexpensive methods]]></category>
		<category><![CDATA[International Security]]></category>
		<category><![CDATA[Iranian missile attack]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[low-tech]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[pagers]]></category>
		<category><![CDATA[power plant attack]]></category>
		<category><![CDATA[Sarin gas attack]]></category>
		<category><![CDATA[technology in warfare]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[terrorism statistics]]></category>
		<category><![CDATA[UAVs]]></category>
		<category><![CDATA[walkie-talkies]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29212</guid>

					<description><![CDATA[<p>As the media ponders how Israel will respond to Iranian missile attack, many remain awestruck by the September 17, 2024, Israeli pager attack and subsequent walkie-talkie detonations that killed or injured Lebanon-based Hezbollah fighters. While the legality of such an attack is debatable, some are considering this a next step in using technology in warfare. [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/counter-terrors-high-tech-to-low-tech-backfire/">Counter Terror’s High-tech to Low-tech Backfire</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As the media ponders how Israel will respond to <a href="https://www.cnn.com/2024/10/01/politics/iran-missile-attack-israel/index.html">Iranian missile </a>attack, many remain awestruck by the September 17, 2024, Israeli <a href="https://www.cnn.com/2024/09/17/middleeast/lebanon-pager-attack-explosions-hezbollah-explainer-intl-latam/index.html">pager attack</a> and subsequent <a href="https://www.bbc.com/news/articles/cz04m913m49o">walkie-talkie </a>detonations that killed or injured Lebanon-based Hezbollah fighters. While the legality of such an attack is debatable, some are considering this a next step in using <a href="https://www.nytimes.com/2024/09/19/us/politics/israel-hezbollah-pager-attacks.html">technology in warfare</a>. Some are concerned that terrorists may copy the method.</p>
<p>Hezbollah, now attempting to fend off Israel’s <a href="https://www.nytimes.com/2024/09/30/world/middleeast/israel-hezbollah-lebanon-ground-invasion.html#:~:text=Sept.%2030,%202024.%20The%20Israeli%20military">September 30 ground operation</a>, is simultaneously working to adapt its own approach to technology, and, if history is any indicator of the future, the terror group will likely continue as it has, answering Israel’s high-tech efforts with ironically harder to trace low-tech options. That Hezbollah was even using pagers was to <a href="https://www.cnn.com/2024/09/17/middleeast/lebanon-pager-attack-explosions-hezbollah-explainer-intl-latam/index.html">avoid cellular detection</a>. And as they adapt, their communications will likely go even more analog, perhaps communicating only through <a href="https://www.nbcnews.com/id/wbna42853221">couriers</a><u>,</u> as Osama Bin Laden was known to do, or using physical handwritten <a href="https://www.bbc.com/news/world-europe-12068534">notes and dead drops</a>, as militant Italian anarchist groups did in the early 2000s.</p>
<p>While the idea of a terrorist group obtaining a more technologically advanced arsenal, such as nuclear or chemical weapons, or instituting a mass cyberattack is daunting, it is not exactly uncommon due to expense and required expertise. What is far more likely is that Hezbollah and other terrorist groups will downgrade methods, opting for cheaper and easier to implement weapons and methods which are more than capable of lethal outcomes.</p>
<p>Time and time again, society has seen heavy damage wrought on person and property via methods that seem relatively primitive.</p>
<p>In 2021, the Gaza-based terrorist group Hamas increased their use of <a href="https://www.cnn.com/2021/06/16/middleeast/israel-gaza-incendiary-balloons-cmd-intl/index.html">incendiary balloons</a> when attacking Israel, causing more than 20 fires in southern Israel, straining civilian and IDF emergency service resources, and burning upward of 10,000 acres of farmland over the preceding three years. These “balloons are easily constructed and require little setup to launch compared to rockets, which are expensive and time-consuming to produce” but are still incredibly effective.</p>
<p>In 2013, a US power plant in California was victim of an as yet unsolved <a href="https://www.npr.org/sections/thetwo-way/2014/02/05/272015606/sniper-attack-on-calif-power-station-raises-terrorism-fears">shooting attack</a>, damaging multiple transformers. Surprisingly set up with little to no security, the plant’s perimeter was breached and approximately 100 rounds of high-powered rifle ammunition were fired into 17 transformers before police arrived. The damage was severe enough that to avoid blackouts across Silicon Valley power had to be diverted from other areas during the months-long repair.</p>
<p>While these incidents are high profile, given the critical infrastructure connections, they did not result in any fatalities. However, that is not always the goal of terrorists and is hardly the reality for other common low-tech methods. Shootings, bombings, and melee attacks continue to make up the <a href="https://www.csis.org/analysis/tactics-and-targets-domestic-terrorists">overwhelming majority</a> of terrorist attacks. Research from the <a href="https://www.csis.org/analysis/tactics-and-targets-domestic-terrorists">Center for Strategic and International Studies</a> shows that from 2015 to 2020,  85 percent of terror attacks employed one of these methods, with 12 percent being unrealized threats, 2 percent other, and 1 percent vehicle ramming.</p>
<p>The numbers are remarkably similar for lethal attacks in 2023 according to the <a href="https://www.visionofhumanity.org/wp-content/uploads/2024/02/GTI-2024-web-290224.pdf">2024 Global Terrorism Index</a> published by Vision of Humanity. Out of the 50 most lethal terrorist attacks, only one, an incident in the Homs Province of Syria, featuring an explosive-laden unmanned aerial vehicle (UAV) targeting a military graduation ceremony which killed 89 people, could be thought of as a high-tech weapon. The other 49 were made up of 43 armed assaults, five bombings, and one explosive projectile.</p>
<p>As terrorist groups get backed into a corner by high-tech counter methods like the Israeli pager attack, it is increasingly likely they will rely on time-proven simple methods. The world may even see them adapting and learning from accidents such as the September 2024 <a href="https://www.usatoday.com/story/news/nation/2024/09/17/texas-pipeline-fire-deer-park/75266574007/">car crash into a gas pipeline</a> in Texas which caused an explosion or the 2017 Hamburg, Germany, airport evacuation which resulted from the accidental discharge of a simple, lipstick-sized can of <a href="https://www.washingtonpost.com/world/europe/hamburg-airport-briefly-closed-after-dozens-injured-by-unidentified-substance/2017/02/12/7371809c-f129-11e6-a9b0-ecee7ce475fc_story.html">pepper spray</a>. While these were both accidents, one can imagine the economic and fear-induced impact if a terrorist group were to try to replicate the outcomes.</p>
<p>There are, of course, outliers to the terrorist use of low-tech methods. There is the terrorist cult Aum Shinrikyo’s launch of the notorious <a href="https://www.bbc.com/news/world-asia-35975069">Tokyo Sarin gas attack</a> in 1995 or drone attacks along the lines of  2023’s drone attack in Syria, as well as other groups’ potential use of <a href="https://www.nbcnews.com/tech/security/flip-side-drone-boom-airports-stadiums-power-plants-need-defending-rcna128248">commercial drones</a>. But today’s would-be terrorist is likely not resorting to high-tech weapon or communication devices, and more often than not, going for something easy and/or available. To borrow from Chistopher Nolan’s Joker in the <a href="https://www.imdb.com/title/tt0468569/quotes/?item=qt0484253&amp;ref_=ext_shr_lnk"><em>Dark Knight</em></a>, items like “dynamite, and gunpowder, and gasoline [are] cheap” and are going to comprise the bulk of the future threats from terrorist groups.</p>
<p><em>Justin Leopold-Cohen is a homeland security analyst in Washington, DC. He has written widely on national and international security issues for outlets including </em>Small Wars Journal<em>, the Wavell Room, and Inkstick Media. Any views expressed in the article are his own and not representative of, or endorsed by, any organization or government.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/10/Counter-Terrors-High-tech-to-Low-tech-Backfire.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-28926 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/counter-terrors-high-tech-to-low-tech-backfire/">Counter Terror’s High-tech to Low-tech Backfire</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/counter-terrors-high-tech-to-low-tech-backfire/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Knowledge Alert: 2023 Global Security Review Compendium of Articles</title>
		<link>https://globalsecurityreview.com/knowledge-alert-2023-global-security-review-compendium-of-articles/</link>
					<comments>https://globalsecurityreview.com/knowledge-alert-2023-global-security-review-compendium-of-articles/#respond</comments>
		
		<dc:creator><![CDATA[GSR Staff]]></dc:creator>
		<pubDate>Wed, 10 Jan 2024 22:24:41 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[authors]]></category>
		<category><![CDATA[educators]]></category>
		<category><![CDATA[Global Security Review]]></category>
		<category><![CDATA[hot]]></category>
		<category><![CDATA[hot topics]]></category>
		<category><![CDATA[urgent]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=26770</guid>

					<description><![CDATA[<p>Whether you are a scholar, a published author, an accomplished  educator or just want to keep informed on today&#8217;s volatile global security landscape, the 2023 Global Security Review Compendium of Articles provide a stage for critical thought relevant to the strategic global security landscape.  Our experts and practitioners expose you to global security concerns, lead you [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/knowledge-alert-2023-global-security-review-compendium-of-articles/">Knowledge Alert: 2023 Global Security Review Compendium of Articles</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><b><img loading="lazy" decoding="async" class="wp-image-26773 alignleft" src="http://globalsecurityreview.com/wp-content/uploads/2024/01/2023-Compendium-of-Articles--232x300.png" alt="" width="303" height="392" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/01/2023-Compendium-of-Articles--232x300.png 232w, https://globalsecurityreview.com/wp-content/uploads/2024/01/2023-Compendium-of-Articles--791x1024.png 791w, https://globalsecurityreview.com/wp-content/uploads/2024/01/2023-Compendium-of-Articles--768x994.png 768w, https://globalsecurityreview.com/wp-content/uploads/2024/01/2023-Compendium-of-Articles--1187x1536.png 1187w, https://globalsecurityreview.com/wp-content/uploads/2024/01/2023-Compendium-of-Articles-.png 1545w" sizes="(max-width: 303px) 100vw, 303px" />Whether you are a scholar, a published author, an accomplished</b><span class="Apple-converted-space" style="font-weight: bold;">  </span><b>educator or just want to keep informed on today&#8217;s volatile global sec</b><b>urity landscape, the 2023 Global Security Review Compendium of Articles provide a stage for critical thought relevant to the strategic global security landscape.<span class="Apple-converted-space">  </span>Our experts and practitioners expose you to global security concerns, lead you through investigative thought on China, Russia, North Korea and more. </b></p>
<p class="p1"><b>This compendium is instrumental in the advocacy of global security, global nuclear surety, space conflict and deterrence, and much, much more! </b></p>
<p class="p1"><b>This product is available for download and use as a guide to what is to come for 2024.<span class="Apple-converted-space">  </span>If you want to reflect on the past year’s hottest perspective in global security, pass this compendium along to your colleagues, leadership and concerned educators.</b></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<hr />
<h1><span style="color: #3a64af;"><em><strong>Exclusive Preview </strong></em></span></h1>
<hr />
<p><img loading="lazy" decoding="async" class="alignnone wp-image-26193" src="http://globalsecurityreview.com/wp-content/uploads/2023/11/GSR-Images-300x233.png" alt="" width="174" height="135" srcset="https://globalsecurityreview.com/wp-content/uploads/2023/11/GSR-Images-300x233.png 300w, https://globalsecurityreview.com/wp-content/uploads/2023/11/GSR-Images-768x597.png 768w, https://globalsecurityreview.com/wp-content/uploads/2023/11/GSR-Images-650x500.png 650w, https://globalsecurityreview.com/wp-content/uploads/2023/11/GSR-Images.png 900w" sizes="(max-width: 174px) 100vw, 174px" /></p>
<div></div>
<div class="page" title="Page 4">
<div class="section">
<div class="layoutArea">
<div class="column">
<div>
<p>&#8220;<a href="https://globalsecurityreview.com/the-comprehensive-strategy-for-the-space-force-the-good-and-bad/">The Comprehensive Strategy for the Space Force: The Good and Bad</a>&#8221; by Christopher Stone critically evaluates the U.S. Space Force&#8217;s strategy as outlined in a congressional report. Stone highlights the positives, such as acknowledging the Space Force&#8217;s role in supporting terrestrial forces. However, he points out significant gaps, arguing that the Space Force should focus more on warfighting capabilities to counter growing space threats from China and Russia, rather than merely supporting other forces. He emphasizes the need for combat-credible space forces capable of offensive and defensive operations, asserting that this should be the primary mission of the Space Force.</p>
<hr />
</div>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-26331" src="http://globalsecurityreview.com/wp-content/uploads/2023/11/Russian-Cyber-Attacks-300x300.png" alt="" width="168" height="168" srcset="https://globalsecurityreview.com/wp-content/uploads/2023/11/Russian-Cyber-Attacks-300x300.png 300w, https://globalsecurityreview.com/wp-content/uploads/2023/11/Russian-Cyber-Attacks-150x150.png 150w, https://globalsecurityreview.com/wp-content/uploads/2023/11/Russian-Cyber-Attacks-768x768.png 768w, https://globalsecurityreview.com/wp-content/uploads/2023/11/Russian-Cyber-Attacks-70x70.png 70w, https://globalsecurityreview.com/wp-content/uploads/2023/11/Russian-Cyber-Attacks-700x700.png 700w, https://globalsecurityreview.com/wp-content/uploads/2023/11/Russian-Cyber-Attacks-500x500.png 500w, https://globalsecurityreview.com/wp-content/uploads/2023/11/Russian-Cyber-Attacks.png 800w" sizes="(max-width: 168px) 100vw, 168px" /></p>
</div>
</div>
</div>
</div>
<div>
<p>&#8220;<a href="https://globalsecurityreview.com/russia-and-the-growing-danger-of-satellite-cyberattacks/https://globalsecurityreview.com/russia-and-the-growing-danger-of-satellite-cyberattacks/https://globalsecurityreview.com/russia-and-the-growing-danger-of-satellite-cyberattacks/https://globalsecurityreview.com/russia-and-the-growing-danger-of-satellite-cyberattacks/https://globalsecurityreview.com/russia-and-the-growing-danger-of-satellite-cyberattacks/">Russia and the Growing Danger of Satellite Cyber-Attacks</a>&#8221; by Alexis Schlotterback highlights the increasing threat of Russian cyber operations targeting satellites. The article explores various satellite cyberattack methods such as data interception, data corruption, and seizure of control. It emphasizes Russia&#8217;s advanced capabilities in cyber warfare, including the use of GPS jammers and potential hacking of American satellite control systems. The discussion includes the need for enhanced security measures in satellite infrastructure to protect against these threats.</p>
</div>
<hr />
<p><img loading="lazy" decoding="async" class="alignnone wp-image-26484" src="http://globalsecurityreview.com/wp-content/uploads/2023/12/Posture-Commission-Article-300x233.png" alt="China article image" width="182" height="141" srcset="https://globalsecurityreview.com/wp-content/uploads/2023/12/Posture-Commission-Article-300x233.png 300w, https://globalsecurityreview.com/wp-content/uploads/2023/12/Posture-Commission-Article-768x597.png 768w, https://globalsecurityreview.com/wp-content/uploads/2023/12/Posture-Commission-Article-650x500.png 650w, https://globalsecurityreview.com/wp-content/uploads/2023/12/Posture-Commission-Article.png 900w" sizes="(max-width: 182px) 100vw, 182px" /></p>
<div>
<p>&#8220;<a href="https://globalsecurityreview.com/the-strategic-posture-commission-and-the-china-breakout/">The Strategic Posture Commission and the China Breakout</a>&#8221; by Peter Huessy discusses the rapid expansion of China&#8217;s nuclear capabilities and its implications for U.S. strategic posture. Huessy highlights the significant growth of China&#8217;s nuclear arsenal and the development of advanced delivery systems. He emphasizes the need for the U.S. to enhance its nuclear deterrence and missile defense capabilities in response to China&#8217;s expanding nuclear force. The article urges the U.S. to consider strategic adjustments to maintain a credible deterrent against the evolving threat posed by China.</p>
</div>
<p>Download the full compendium here.<br />
<a href="http://globalsecurityreview.com/wp-content/uploads/2024/01/2023-Compendium-of-Articles.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-26665 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/01/Download-This-Publication-300x83.png" alt="Get this publication" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/01/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/01/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/knowledge-alert-2023-global-security-review-compendium-of-articles/">Knowledge Alert: 2023 Global Security Review Compendium of Articles</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/knowledge-alert-2023-global-security-review-compendium-of-articles/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Nuclear Weapons and Military Preparedness in the Asia-Pacific</title>
		<link>https://globalsecurityreview.com/nuclear-weapons-and-military-preparedness-in-the-asia-pacific/</link>
					<comments>https://globalsecurityreview.com/nuclear-weapons-and-military-preparedness-in-the-asia-pacific/#respond</comments>
		
		<dc:creator><![CDATA[Christine M. Leah&nbsp;&&nbsp;Natalie Treloar]]></dc:creator>
		<pubDate>Tue, 12 Dec 2023 14:31:03 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Asia-Pacific]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[Hybrid Warfare]]></category>
		<category><![CDATA[Indo-Pacific]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=26506</guid>

					<description><![CDATA[<p>The United States is not militarily prepared to deter conflict with China over Taiwan. Whilst American military power in the Asia-Pacific is formidable, the sheer logistical challenges of deterrence with conventional forces in a multipolar maritime theater fundamentally undermine the United States’ preparedness to fight and defeat a People’s Republic of China (PRC) assault on [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/nuclear-weapons-and-military-preparedness-in-the-asia-pacific/">Nuclear Weapons and Military Preparedness in the Asia-Pacific</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The United States is not militarily prepared to deter conflict with China over Taiwan. Whilst American military power in the Asia-Pacific is formidable, the sheer logistical challenges of deterrence with conventional forces in a multipolar maritime theater fundamentally undermine the United States’ preparedness to fight and defeat a People’s Republic of China (PRC) assault on Taiwan.</p>
<p>Alternatively, credible deterrence may be more readily achieved through the threat of low-yield nuclear weapons actively dispersed throughout the Asia-Pacific. Specifically, it is achieved through the threat of nuclear-armed sea-launched cruise missiles (SLCM-N) deployed aboard American submarines. However, the risk of nuclear escalation and the undisclosed conditions under which Xi Jinping could use force need to be factored into American deterrence posture. These conditions likely include <a href="https://asia.nikkei.com/Politics/International-relations/APEC/Why-Xi-tried-to-assure-U.S.-he-has-no-plans-for-Taiwan-invasion">any attempts to introduce nuclear weapons into the Taiwan issue and any American security guarantees for the self-governing island</a>.</p>
<p>Preparedness is not a well-covered concept in academic literature and is therefore not as well understood by most civilian strategic thinkers. It is chiefly a military concept for thinking about force generation and deployment. Preparedness is the sustainable capacity to apply capabilities to accomplish government-directed tasks over time. It is composed of readiness and sustainability. Readiness is the ability of a capability to be applied to a specific activity within a nominated time frame for a specified period of time to achieve a desired effect. Sustainability is the ability of a force to maintain the necessary level of combat power for the duration required to achieve its objectives.</p>
<p>There is a fundamental difference between conventional and nuclear preparedness. Conventional forces for theater missions need significant time for mobilization and deployment to signal intent. In contrast, nuclear-armed forces are always “on,” that is deterrence of some form is already operational and credibly signalling intent. Nuclear deterrence provides an operational level of capability (O-LOC) that is readily useable and presents the immediate threat of devastating damage, as opposed to unready conventional deterrence.</p>
<p>Conventional deterrence has significant inadequacies, as Richard K. Betts kindly points out. First, success in conventional operations is likely to be overestimated due to uncertainty in the balance of forces, political constraints, and conditions of engagement. Second, an extreme imbalance of forces is critical to successful outcomes of the initial phase. Third, the deterrence factor of military capabilities depends on political factors, namely the motives and beliefs of the adversary. Fourth, extremely high confidence in conventional options is required to provide the same level of deterrence as the threat of nuclear retaliation. Finally, conventional deterrence raises the risk of escalation to nuclear war. The United States’ Asia-Pacific deterrence posture must factor these shortfalls of conventional deterrence, especially when further undermined by the momentous logistical challenges associated with operating in a vast Asia-Pacific maritime environment.</p>
<p>During the Cold War, nuclear weapons were integral to American and allied preparedness. Credible and reliable deterrence in the Cold War can be attributed to McNamara’s <a href="https://www.tandfonline.com/doi/full/10.1080/01495933.2012.647528">resilient, flexible, and survivable</a> American forces. Continuous nuclear modernization programs throughout the Cold War generated large numbers of strategic platforms and weapons that enabled adaptability in American force development and plans. The Cold War also highlighted the importance of a viable industrial infrastructure that is required to produce strategic forces and provide deterrence, assurance, dissuasion, and damage limitation.</p>
<p>As the Cold War competition ended, the US and Russia gradually decreased their sizeable and diverse nuclear arsenals. <a href="https://www.statista.com/chart/16305/stockpiled-nuclear-warhead-count/">From 1987 to 2005</a>, arms control treaties played a central role in reducing nuclear arsenals. Many in the West believed that nuclear deterrence was a thing of the past.</p>
<p>However, this decline in the American arsenal presents a problem today. There is a renaissance in geopolitical competition 101, and the US now faces two nuclear-armed peers—China and Russia. Although, China’s growing military challenge to regional stability was <a href="https://csbaonline.org/research/publications/airsea-battle-concept/">obvious for some time</a>, it is only in the past few years that the US acknowledged China as a peer competitor. In addition to Russia threatening the use of nuclear weapons in Ukraine, China is diversifying and increasing its nuclear arsenal, presumably in an <a href="https://www.economist.com/by-invitation/2023/01/31/andrew-krepinevich-on-how-chinas-nuclear-ambitions-will-change-deterrence">attempt to gain parity with the US</a> and undermine overall American deterrence and extended deterrence capabilities. It was American nuclear preparedness that helped keep the Cold War cold.</p>
<p>Russia and China are substantially increasing their nuclear preparedness. The US and its allies must acknowledge this reality and adjust, with credible options, their nuclear preparedness. This is especially true in relation to the concept of <a href="https://thediplomat.com/2016/09/is-it-time-for-nuclear-sharing-in-east-asia/">extended deterrence in the Asia-Pacific, which never got nearly enough attention as Europe did during the</a> Cold War.</p>
<p>However, there is a lack of credible confirmation that the US still views nuclear weapons as a central pillar of deterrence and strategic ambiguity, especially in the Asia-Pacific. In fact, there is quite the opposite with the introduction of “integrated deterrence” in 2022. This concept (which is really just a buzzword) of integrated deterrence actually <a href="https://www.realcleardefense.com/articles/2022/12/31/integrated_deterrence_grand_strategys_poor_cousin_873155.html">minimizes the role of nuclear weapons in American grand strategy</a>. The concept has negative implications for preparedness posture settings in the Asia-Pacific that are necessary to deter and defeat PRC aggression against Taiwan, Japan, South Korea, and Australia.</p>
<p>This compares to Western Europe during the Cold War, which was never satisfied with purely conventional deterrence and wanted American nuclear weapons to provide immediate, reliable, and credible deterrence. The US and its allies must consider the sheer logistical difficulties of conventional deterrence in a maritime environment as vast as the Asia-Pacific. Logistical challenges for conventional deterrence over significant and contested distances, including tasks to guarantee prompt replenishment of disabled combat ships, establish defensive perimeters for fleet support and ensure the safety of fleet replenishment oilers and dry-cargo/ammunition supply ships. Furthermore, significant budget constraints since 2013, coupled with longer-term financial and industrial base uncertainty, raise significant <a href="https://www.nationaldefensemagazine.org/articles/2023/2/8/report-finds-imbalance-between-us-defense-strategies-industrial-base-capacity">questions about the future of the US Navy’s long-term ability to project power and maintain sea-control</a> (as opposed to sea-denial) in the Asia-Pacific region.</p>
<p>Europe was, and remains, one single geostrategic entity connected by land. Thus, collective deterrence was relatively easy. Whereas, in the Asia-Pacific, Japan, South Korea, Australia, and Taiwan are significantly more dispersed and separated by long sea-lines-of-communication, with neutral and non-aligned states dotted between them. American forces will need to move significant numbers of vessels, aircraft, troops, supplies, and munitions across these vastly dispersed and contested distances.</p>
<p>There is also the difficulty of concentrating large numbers of strike aircraft at locations other than on aircraft carriers. Whereas, penetrating long-range stealth bombers may offer an advantage because of their range, they may not be sufficient to perform all warfighting and deterrence tasks.</p>
<p>A lack of diverse permanent bases on allied soil greatly increases the demands and stress on an aerial fleet and the logistics involved in keeping American forces adequately supplied. It also makes for significantly longer transit times for ships and submarines to and from distant resupply points. Submarines and many surface combatants are currently unable to replenish their missile magazines without sailing back to the United States. Indeed, it is only now that American planners are starting to think very seriously about the logistics and operational issues of extended deterrence in Asia, which were never given much attention because American seapower in this region was never contested.</p>
<p>As the earlier discussion illustrates, significant logistical challenges associated with conventional deterrence in a maritime environment as vast as the Asia-Pacific call into question reliance on conventional systems to deter aggression at different rungs of the escalation ladder. Low-yield nuclear weapons, such as the SLCM-N, are the most likely solution to the deterrence credibility challenge. An American—and allied—deterrence posture that poses the problem of nuclear escalation in the Asia-Pacific is likely to <a href="https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/the-role-of-nuclear-weapons-in-a-taiwan-crisis/">credibly deter Chinese nuclear escalation</a>. Absent such an effort, China may see the opportunity President Xi is looking for.</p>
<p><em>Christine M. Leah is a fellow at the National Institute for Deterrence Studies. Natalie Treloar is at Alpha-India Consultancy. They are based in Australia. The views presented here are their own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2023/12/Nuclear-Weapons-Military-Preparedness-in-the-Asia-Pacific.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-26183 size-full" src="http://globalsecurityreview.com/wp-content/uploads/2023/11/get-the-full-article.jpg" alt="" width="150" height="43" /></a></p>
<p><a href="https://globalsecurityreview.com/nuclear-weapons-and-military-preparedness-in-the-asia-pacific/">Nuclear Weapons and Military Preparedness in the Asia-Pacific</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/nuclear-weapons-and-military-preparedness-in-the-asia-pacific/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>President Biden’s Nuclear Posture Review…Seven Months Later</title>
		<link>https://globalsecurityreview.com/president-bidens-nuclear-posture-review-7-months-later/</link>
		
		<dc:creator><![CDATA[Sam Stanton&nbsp;&&nbsp;Adam Lowther]]></dc:creator>
		<pubDate>Tue, 23 May 2023 16:45:25 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=25502</guid>

					<description><![CDATA[<p>With the release of the National Security Strategy (NSS), National Defense Strategy (NDS), and Nuclear Posture Review(NPR) in October 2022, we now have enough time and distance from their publication to evaluate the Biden administration’s long-awaited look at its view toward nuclear weapons and the nation’s two primary threats Russia and China. With Russia waiting [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/president-bidens-nuclear-posture-review-7-months-later/">President Biden’s Nuclear Posture Review…Seven Months Later</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;">With the release of the <a href="https://nssarchive.us/wp-content/uploads/2022/10/Biden-Harris-Administrations-National-Security-Strategy-10.2022.pdf"><em>National Security Strategy</em></a> (NSS), <a href="https://media.defense.gov/2022/Oct/27/2003103845/-1/-1/1/2022-NATIONAL-DEFENSE-STRATEGY-NPR-MDR.PDF"><em>National Defense Strategy</em></a> (NDS), and <a href="https://media.defense.gov/2022/Oct/27/2003103845/-1/-1/1/2022-NATIONAL-DEFENSE-STRATEGY-NPR-MDR.PDF#page=33"><em>Nuclear Posture Review</em></a>(NPR) in October 2022, we now have enough time and distance from their publication to evaluate the Biden administration’s long-awaited look at its view toward nuclear weapons and the nation’s <a href="https://www.npr.org/2023/03/08/1162010924/top-u-s-security-officials-discuss-russia-china-in-assessment-of-worldwide-threa">two primary threats</a> Russia and China. With Russia waiting for Ukraine to launch a major offensive and <a href="https://www.cfr.org/blog/how-taiwan-assessing-and-responding-growing-threats-china">China engaging in aggressive action against Taiwan</a> on a daily basis, making sure the <em>Nuclear Posture Review</em> gets it right is perhaps more important than ever.</p>
<p style="font-weight: 400;">Since its publication last fall, few foreign policy analysts would argue the world is more secure than it was then. In fact, they would likely argue just the opposite. Blaming the current state of affairs on the NPR would be unfair, but to some, there are key attributes of the NPR that led to more instability than security. To better understand these concerns, let us revisit some key points in the document.</p>
<h3 style="font-weight: 400;">What It Says</h3>
<p style="font-weight: 400;">The NPR opens by suggesting that “nuclear deterrence is foundational to broader US defense strategy and the extended deterrence commitments that we have made to allies and partners.” Readers are also informed that the government is committed to disarmament obligations under the Treaty on the Non-Proliferation of Nuclear Weapons (NPT).</p>
<p style="font-weight: 400;">Due recognition is given to the fact that our principal adversaries (Russia, China, and North Korea) are expanding and diversifying their nuclear and non-nuclear arsenals, which is necessitating the United States replace its legacy nuclear weapons. The <em>Nuclear Posture Review </em>(2022) then gets to the heart of the Biden administration’s plan.</p>
<p style="font-weight: 400;">This plan includes: adopting a strategy and policy that sets a high bar for nuclear employment; adopting <a href="https://www.realcleardefense.com/articles/2022/12/31/integrated_deterrence_grand_strategys_poor_cousin_873155.html">integrated deterrence</a>; eliminating the “<a href="https://www.researchgate.net/publication/283593468_A_step_short_of_the_bomb_Explaining_the_strategy_of_nuclear_hedging">hedge against an uncertain future</a>”; strengthening extended deterrence and allied assurance; pursuing arms control, strategic stability, and nonproliferation; reducing the risk of miscalculation; full-scope triad replacement and  modernization of nuclear command, control, and communications (NC3); retirement of the <a href="https://nuclearweaponarchive.org/Usa/Weapons/B83.html">B83-1 gravity bomb</a>; and cancellation of the nuclear submarine-launched cruise missile (<a href="https://apps.dtic.mil/sti/pdfs/AD1177662.pdf">SLCM-N</a>).</p>
<p style="font-weight: 400;">The <em>Nuclear Posture Review </em>then turns to the threat posed by Russia and China. According to the administration, by some point in the 2030s the United States will face <a href="https://www.airandspaceforces.com/us-consider-expanding-nuclear-arsenal-china-russia/">two nuclear peer competitors</a> or potential adversaries. The changing security environment poses four challenges to deterrence: (1) there is a heightened risk of nuclear weapons use; (2) <a href="https://www.wsj.com/articles/like-it-or-not-the-u-s-is-in-an-arms-race-with-china-weapons-icbm-missiles-beijing-war-pentagon-nuclear-power-915d8ae5">China is fielding a peer nuclear arsenal</a>; (3) opportunistic aggression is creating deterrence challenges; and (4) multi-domain challenges, which we do not fully understand, are proving challenging.</p>
<p style="font-weight: 400;">The <em>Nuclear Posture Review</em> then details the role of nuclear weapons in American strategy. It makes three points: nuclear weapons exist to deter strategic attacks directed against the homeland and allies and partners, nuclear weapons exist to assure allies and partners of American commitment, and nuclear forces exist to achieve American objectives if deterrence fails.</p>
<p style="font-weight: 400;">The document then shifts to tailored strategies or “Country-Specific Approaches.”  What appears here is a strategy statement that indicates America’s biggest concern is Russia and China. North Korea is recognized as a threat which, should Kim Jung Un use nuclear weapons “will result in the end of that regime.” It is clear that the <a href="https://www.nato.int/cps/en/natohq/topics_50068.htm">United States remains committed to nuclear deterrence</a> in Europe. The same is true for the Indo-Pacific, with the American focus shifting there.</p>
<p style="font-weight: 400;">Whether through naivete or simple hope, the United States will continue honoring <a href="https://carnegieendowment.org/publications/interactive/new-start">New START</a> treaty commitments while Russia does not. With New START expiring in 2026, the Biden administration desires to negotiate a new arms control treaty, in spite of the clear evidence, even then, that Russia had different desires.</p>
<p style="font-weight: 400;">It is only later in the NPR that a discussion of nuclear modernization takes place. On the positive side, the administration calls for making dual-capable aircraft (F-35) ready to carry the <a href="https://www.airforce-technology.com/projects/b61-12-nuclear-bomb/">B61-12</a> gravity bomb; fielding the <a href="https://submarinesuppliers.org/programs/ssbn/columbia-class/"><em>Columbia</em>-class</a> ballistic missile submarine, the <a href="https://www.af.mil/About-Us/Fact-Sheets/Display/Article/2682973/b-21-raider/">B21 bomber</a>, and the <a href="https://www.afnwc.af.mil/Weapon-Systems/Sentinel-ICBM-LGM-35A/">Sentinel intercontinental ballistic missile</a>; modernizing the <a href="https://www.airuniversity.af.edu/AUPress/Book-Reviews/Display/Article/3299649/nuclear-command-control-and-communications-a-primer-on-us-systems-and-future-ch/">NC3 system</a>; and modernizing the weapons complex.</p>
<p style="font-weight: 400;">Finally, the <em>Nuclear Posture Review </em>examines the need to <a href="https://www.npr.org/2023/03/09/1162390573/the-push-to-rebuild-the-u-s-s-nuclear-stockpile">refurbish the nuclear stockpile</a>. The Department of Defense and National Nuclear Security Administration (NNSA) are called to improve coordination for development and refurbishment of nuclear systems, with NNSA improving production of weapons components required for the short term and beyond.</p>
<h3 style="font-weight: 400;">Six Months later…What Does the NPR Get Right?</h3>
<p style="font-weight: 400;">The 2022 <em>Nuclear Posture Review</em> gets three things right. First, it does not make “no first use” or “sole purpose” the nuclear policy of the United States. This was a wise decision. Such a decision recognizes that in the current security environment the actions of Russia, China, or North Korea may necessitate a nuclear response to a non-nuclear action. With <a href="https://idstch.com/space/rising-threat-space-domain-electronic-cyber-warfare-space-defence-agencies-enforcing-information-assurance-requirements/">threats in the cyber and space domains</a> possibly posing a catastrophic risk to the United States and America’s allies questioning our commitment, avoiding either of these policies is wise.</p>
<p style="font-weight: 400;">Second, the Biden administration’s continued <a href="https://crsreports.congress.gov/product/pdf/IF/IF10519">support for modernization</a>—despite opposition from the disarmament community—was the right decision. As the document states, “We will continue to employ a nuclear triad and are fully committed to the programs that will begin to field modernized systems later this decade.”</p>
<p style="font-weight: 400;">Third, the Biden administration clearly committed to needed investments in the production capabilities of the nuclear weapons complex. With the post-Cold War reductions across the science and manufacturing base that took place, the expansion currently under way is a good start, with much more needed.</p>
<p style="font-weight: 400;">Every action of Russia, China and North Korea since the <em>Nuclear Posture’s </em>release underscores the wisdom of these decisions.</p>
<h3 style="font-weight: 400;">Six Months Later…What Does the NPR Get Wrong?</h3>
<p style="font-weight: 400;">There are numerous areas where the <em>Nuclear Posture Review </em>gets it wrong. Time has only underscored the recklessness of the Biden administration’s desire to advance its nuclear disarmament inclinations in the face of <a href="https://www.rand.org/blog/2023/04/countering-russias-nuclear-threat-in-europe.html">Russian aggression</a> and <a href="https://www.politico.com/news/2022/11/29/pentagon-china-nuclear-stockpile-00071101">Chinese expansion</a>. The administration’s desire to eliminate the nation’s nuclear hedge, which is the only way to rapidly (3-5 years) expand the American nuclear arsenal, is dangerous.</p>
<p style="font-weight: 400;">A Russian breakout from New START limits, continued Chinese expansion and aggression, <a href="https://apnews.com/article/north-korea-kim-jong-un-nuclear-arsenal-9b1093e2939b87facfdf1f74612d3738">North Korean expansion</a>, an <a href="https://www.wsj.com/articles/iran-could-produce-nuclear-weapon-in-several-months-if-it-decides-to-do-so-mark-milley-says-ecd38f07">Iranian bomb</a>, and other events will necessitate an American expansion of its nuclear arsenal. Technical failure of one warhead type may also require the nation to use its hedge. Elimination of the hedge as a “formal role of nuclear weapons” is reckless and dialogue should continue to educate the Biden administration and Congress on this so that the decision is reversed.</p>
<p style="font-weight: 400;">Cancellation of SLCM-N is also a significant and destabilizing mistake. Fielding <a href="https://news.usni.org/2022/04/27/report-to-congress-on-sea-launched-nuclear-cruise-missile">SLCM-N was seen as a way to provide a non-strategic nuclear option</a> to Russian threats in the 2018 <em>Nuclear Posture Review.</em> Those threats continue in the present because NATO’s dual-capable aircraft (capable of carrying a B61 gravity bomb) are largely political tools and do not effectively deter Russian nuclear threats.</p>
<p style="font-weight: 400;">The arguments against SLCM-N do not stand up well against scrutiny. In a defense budget of about $800 billion per year, SLCM-N is a rounding error. It is also a low-yield nuclear option that does not reduce the number of strategic nuclear weapons carried by ballistic missile submarines, like the <a href="https://www.popularmechanics.com/military/weapons/a30708035/w76-2-nuclear-weapon-submarine/">W76-2</a>. Since SLCM-N is carried by attack submarines instead of ballistic missile submarines, it adds an additional low-yield option on vessels that operate very differently from the strategic nuclear fleet. This is an unwanted complication for Russia, China, and North Korea, which strengthens American deterrence and improves ally assurance.</p>
<p style="font-weight: 400;">The Biden administration’s continued support for <a href="https://www.nti.org/education-center/treaties-and-regimes/comprehensive-nuclear-test-ban-treaty-ctbt/">Comprehensive Nuclear-Test Ban Treaty (CTBT)</a> is also a mistake that unduly hampers modernization of the nuclear arsenal. If the nation is embarking on a reinvigoration of nuclear production capability, it is important to reserve <a href="https://www.discovermagazine.com/technology/testing-nuclear-weapons-is-more-important-than-ever">the right to test new designs and materials as needed</a>. Testing also has signaling value, particularly in an environment where testing is exceedingly rare. Science-based stockpile stewardship has its strengths, but it is foolish to preclude the option to test in the event it becomes necessary.</p>
<p style="font-weight: 400;">The <em>Nuclear Posture Review </em>also fails to clearly explain how the nuclear arsenal defeats <a href="https://www.realcleardefense.com/articles/2021/06/11/out_of_sight_should_not_mean_out_of_reach_deterrence_and_the_proliferation_of_hard_and_deeply_buried_targets_780952.html">hardened and deeply buried targets</a>. It also fails to address unconventional uses of nuclear weapons against the United States. For example, how will the nation respond to an <a href="https://www.forbes.com/sites/jamesconca/2021/09/27/the-electromagnetic-pulse-threatcant-we-just-paint-over-it/?sh=adc41541883b">electromagnetic pulse</a> that causes widespread loss?</p>
<p style="font-weight: 400;">Admittedly, many long-time nuclear practitioners feared a more disarmament-friendly document, which leaves those same practitioners accentuating the positives discussed above. The document was still largely deaf to a declining strategic environment that has only worsened. North Korean expansion of its nuclear arsenal and ballistic missile program did not pause with the publication of the <em>Nuclear Posture Review</em>. Chinese aggression toward Taiwan and its nuclear expansion are still on pace. Russia continues to threaten NATO and the United States with nuclear weapons use.</p>
<p style="font-weight: 400;">Since its publication, the strategic environment and America’s place in the world has only declined. When Bob Peters recently <a href="https://www.realcleardefense.com/articles/2023/04/12/its_time_for_a_new_nuclear_posture_review_893258.html">called for a new</a> <em>Nuclear Posture Review</em>, he was right. We should all join him in that call. It is time to let reason, not optimism, drive American nuclear strategy.</p>
<p style="font-weight: 400;"><em>The authors thank Bill Murphy, Christine Leah, Zak Kallenborn, Larry School, James Ragland, and Tom Ramos for their contributions to this article. </em></p>
<p><a href="https://globalsecurityreview.com/president-bidens-nuclear-posture-review-7-months-later/">President Biden’s Nuclear Posture Review…Seven Months Later</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>If Armenia Wants Western Defense Support, Doctrine and Partner Engagement Reform Must Happen Now</title>
		<link>https://globalsecurityreview.com/if-armenia-wants-western-defense-support-doctrine-and-partner-engagement-reform-must-happen-now/</link>
		
		<dc:creator><![CDATA[Jack Dulgarian]]></dc:creator>
		<pubDate>Mon, 01 May 2023 18:06:47 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Armenia]]></category>
		<category><![CDATA[Azerbaijan]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Nagorno-Karabakh]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Russia]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=25476</guid>

					<description><![CDATA[<p>Armenia cannot protect the indigenous Nagorno-Karabakh people and Republic of Armenia without a competent vanguard. The Armenian Ministry of Defense can continue to rely on Russia, but will Moscow come to Armenia’s aid during another major attack? Probably not. Armenia’s biggest vulnerability is that it relies on Russia for defense, which has been a noncommittal [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/if-armenia-wants-western-defense-support-doctrine-and-partner-engagement-reform-must-happen-now/">If Armenia Wants Western Defense Support, Doctrine and Partner Engagement Reform Must Happen Now</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><em>Armenia cannot protect the indigenous Nagorno-Karabakh people and Republic of Armenia without a competent vanguard. The Armenian Ministry of Defense can continue to rely on Russia, but will Moscow come to Armenia’s aid during another major attack? Probably not. </em></p>
<p style="font-weight: 400;">Armenia’s biggest vulnerability is that it relies on Russia for defense, which has been a noncommittal security guarantor <a href="https://www.crisisgroup.org/content/nagorno-karabakh-conflict-visual-explainer">since at least 2016’s Four Day War</a>. After Armenia was attacked by Azerbaijan on sovereign territory, Prime Minister Nikol Pashinyan pleaded for help from the Collective Security Treaty Organization (CSTO), a Russian dominated defense treaty alliance. In response the CSTO led sent a civilian delegate on “<a href="https://eurasianet.org/for-armenians-csto-missing-in-action">fact finding mission</a>” damaged areas.</p>
<p style="font-weight: 400;">Following the week of attacks U.S. Speaker of the House Nancy Pelosi’s visited Yerevan and <a href="https://apnews.com/article/nancy-pelosi-azerbaijan-armenia-yerevan-259e965620a28a9de61e62b0718bf3ae">stated</a>  Azerbaijan attack as “illegal and deadly”. This diplomatic serendipity to Armenia was a tremendous step for Washington’s advancing relations with Yerevan. However, the Speaker of the House is only one significant leader in the U.S. Government. Nations and non-state actors do not begin formal bilateral cooperation with the U.S. overnight. Cooperation requires many actors in diplomacy, private sector, military, law enforcement, lawmakers, and intelligence, to name some, who share common interest.</p>
<p style="font-weight: 400;">The U.S. probably has interests to work with Armenia due to shared democratic values, a bustling tech sector which <a href="https://www.prnewswire.com/news-releases/servicetitan-opens-office-in-armenia-300793618.html">cooperates with American companies</a>, and diaspora members who carry a significant voice in domestic politics. Armenia very likely has interests to work with the U.S. for the sake of maintaining its sovereignty.  Yet one major point of concern for cooperation with Washington is that <a href="https://web.archive.org/web/20080103020828/http:/www.nkr.am/eng/deklaraciya209.html">only Armenia recognizes the Nagorno-Karabakh Republic</a> (NKR) based on the Soviet Oblast’s referendum in the 1990s. The rest of the world, including Russia and the U.S., recognize <a href="https://journals.openedition.org/monderusse/9334?lang=en">Stalin’s redrawn borders</a> placing the Armenian dominate population firmly within Baku’s authority.</p>
<p style="font-weight: 400;">The following are opportunities for Yerevan to press for its highest defense needs while soliciting the White House, Pentagon, and Congress for security assistance. Engaging these American actors probably will take more time, which is a luxury Yerevan does not have. Warm weather in the Caucasus is here again and <a href="https://anca.org/assets/pdf/1022_ODNIReport_SouthCaucasus.pdf">Azerbaijan may attack again</a>.</p>
<h3 style="font-weight: 400;">Need for Integrated Air Defense Systems (IADS)</h3>
<p style="font-weight: 400;">The most significant threat Armenia faces from Azerbaijan are Turkish-made <a href="https://www.youtube.com/watch?v=KIC1SBEUi_Q">TB-2 drones</a> (UAVs). According to some war fighting experts, the TB-2 and other drones give Azerbaijan a tremendous attack advantage, <a href="http://www.military-today.com/aircraft/bayraktar_tb2.htm">providing air-to-ground missile fire, while simultaneously giving real time intelligence, surveillance, and reconnaissance to troops</a>. The Turkish-made drone was <a href="https://www.youtube.com/watch?v=YSy0wJv6u70">so successful after the 2020 Nagorno-Karabakh War</a> against Armenian procured Russian defense systems that Ukraine decided to <a href="https://www.oryxspioenkop.com/2022/02/defending-ukraine-listing-russian-army.html">use the same weapons system</a> in its war against Russia. Azerbaijan’s seemingly uncontested attack capability from the air can strike infantry vehicles, tanks, and deny logistics to the front lines.  Judging from sources online, Armenian Armed Forces and Nagorno-Karabakh Self Defense Forces do not seem to have a viable alternative to counter this great threat from the air.</p>
<p style="font-weight: 400;">Yerevan needs to understand that only IADS are the most capable counter to Azerbaijan’s threat from the air. To oversimplify, there are several air defense systems which can deny a threat including, man-portable air defense systems (<a href="https://www.armscontrol.org/factsheets/manpads">MANPADS</a>), surface to air missiles (<a href="https://www.armscontrol.org/factsheets/missiledefenseataglance">SAMs</a>), air artillery guns (<a href="https://www.armscontrol.org/factsheets/missiledefenseataglance">AAGs</a>), and air-to-air denial from jets.</p>
<p style="font-weight: 400;">One option for Yerevan’s new IADS is the <a href="https://www.army-technology.com/projects/mistral-missile/"><em>Mistral</em></a>, a French MANPADS which can counter Azeri threats from the air. It operates in many countries outside France, such as <a href="https://alert5.com/2020/02/14/cyprus-buys-exocet-and-mistral-missiles/">Cyprus</a>, <a href="https://1tv.ge/en/news/french-air-defense-systems-already-georgia/">Georgia</a>, <a href="https://www.mbda-systems.com/press-releases/serbia-signs-for-the-acquisition-of-mistral-3-short-range-air-defense-systems-with-mbda/">Serbia</a>, and others. Although the <em>Mistral </em>has yet to be proven in combat against Turkish drones, it could provide a barrier in the air against Azerbaijan’s greatest weapons. <a href="https://www.iri.org/resources/public-opinion-survey-residents-of-armenia-july-2022/">France is the highest favored country by Armenians</a>, according to a U.S. think tank poll, and <a href="https://www.reuters.com/world/europe/frances-macron-armenia-azerbaijan-must-resume-dialogue-2022-09-26/">President Macron’s pro-Armenian rhetoric</a> could lead to an air defense deal. As the TB-2 and other <a href="https://www.atlanticcouncil.org/content-series/airpower-after-ukraine/the-tb2-the-value-of-a-cheap-and-good-enough-drone/">Turkish UAVs are some of the most popular in the world today</a>, a counter weapons system would arguably find great demand.</p>
<p style="font-weight: 400;">Every Armenian engineer and defense manufacturer should focus on IADS procurement, and domestic research and development right now, from tracking incoming threats to eliminating them.</p>
<h3 style="font-weight: 400;">Soviet Era Doctrine &amp; Personnel Reform<strong> </strong></h3>
<p style="font-weight: 400;">It logically follows that <a href="https://www.rusemb.org.uk/press/2029">Russian warfighting doctrine</a> heavily influences <a href="https://jamestown.org/program/rationalizing-the-tonoyan-doctrine-armenias-active-deterrence-strategy/">Armenian warfighting doctrine</a>. Both borrow from the <a href="https://www.armyupress.army.mil/Journals/NCO-Journal/Archives/2019/March/Russian-ncos/">Soviet Union</a>. In 2011, then-Commanding General of the U.S. Army Europe Mark Hertling and an unnamed Russian General held a <a href="https://twitter.com/MarkHertling/status/1506775508545122310?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1506775508545122310%7Ctwgr%5E4ea071798ddb181ae6afd4284afbdae102af36d4%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Ftaskandpurpose.com%2Fnews%2Frussia-noncomissioned-officers-us-military%2F">conversation</a> on training personnel. General Hertling told his counterpart that without an effective non-commissioned officer (NCO) corps, Russian troops will never be trained effectively. Sure enough, <a href="https://www.defenseone.com/policy/2022/05/ncos-america-has-them-china-wants-them-russia-struggling-without-them/366586/#:~:text=Russia's%20version%20of%20NCOs%20are,tactics%20and%20things%20like%20that%E2%80%A6">lack of Russian NCOs have been one of the biggest operational issues during their Ukraine campaign</a>. Russian NCOs “Are not in charge of tactics,” Russian military expert <a href="https://www.cna.org/experts/Kofman_M">Michael Kofman</a> opined to American defense news outlet <a href="https://www.defenseone.com/policy/2022/05/ncos-america-has-them-china-wants-them-russia-struggling-without-them/366586/"><em>Defense One</em></a> “That&#8217;s why the Russian military is officer top-heavy. The officer corps handles all those issues that NCOs might.”</p>
<p style="font-weight: 400;">Armenia’s conscript-dependent military may desire to emulate the principles of a “<a href="https://www.britannica.com/topic/all-volunteer-force">professional</a> military” (or “all-volunteer military” – these terms are used interchangeably). Yet, a significant overhaul in doctrine with war potentially imminent likely requires much more dedication in time, resources, and training to overcome critical personnel vulnerabilities. Yerevan can instead task its Ministry of Defense to train a robust NCO corps borrowing from Western doctrine such as the U.S. Call them, for example “<a href="https://en.wikipedia.org/wiki/Vardan_Mamikonian">Vartan’s Volunteers</a>”, and establish prestige with joining a volunteer all-year NCO corps.</p>
<p style="font-weight: 400;">U.S. Medal of Honor Recipient and Afghanistan War Veteran <a href="https://www.army.mil/medalofhonor/romesha/citation.html">Clint Romesha</a> <a href="https://taskandpurpose.com/news/russia-noncomissioned-officers-us-military/">offered thoughts on what makes efficient NCOs</a> to <a href="https://taskandpurpose.com/"><em>Task and Purpose</em></a>, an American military news outlet,</p>
<p style="font-weight: 400;">While officers are the ones who put the plan together, it’s those enlisted leaders, the NCOs, who implement it. Even before those orders come down from the officers, the NCOs are moving proactively and preparing the troops, and they are usually the ones fighting with their junior soldiers on the front lines, leading them in combat.</p>
<p style="font-weight: 400;">This is not to suggest that Armenian NCOs, officers, or others are not competent. Rather, as some Armenian analysts call for Armenia to become a “<a href="https://www.civilnet.am/en/news/670870/memo-to-pashinyan-armenia-should-be-a-garrison-state/">Garrison State</a>”, a strong, modern, defense doctrine needs to have “suits” (political and private sector), “stars” (generals and commissioned officers), and “stripes” (NCOs and conscripted) all understand their responsibilities and carry it out effectively. Immediate reform with NCO corps could be a short-term improvement to better improve command and control from the bottom-up, while doctrine is reformed top-down.</p>
<p style="font-weight: 400;">For recruitment and conscription guidance, Yerevan can look to nations which have successful programs. <a href="https://www.cmpb.gov.sg/web/portal/cmpb/home/life-in-ns/saf/after-basic-training">Singapore’s</a>relations with <a href="https://www.state.gov/u-s-relations-with-singapore/">Washington</a> are strong and likewise with <a href="https://en.armradio.am/2019/09/30/armenia-singapore-taking-relations-to-new-level/">Yerevan</a>. Singapore’s military has extensively trained with the U.S. and could probably provide insight on personnel, training, and logistics from a civilian to solider mentality. Furthermore, Armenia can utilize contractors from eclectic backgrounds, such as diaspora Armenians from U.S., France, Russia, Lebanon, Greece, or elsewhere. The Armenian government could expand its robust diaspora work-live programs for contractors to train conscripted soldiers, thereby increasing the rate of trained civilians. Moreover, a diaspora group of military experts could perhaps work with the Ministry of Defense as an affiliate council to study and suggest micro and macro-Armenian military inquiries.</p>
<p style="font-weight: 400;">Above all, Yerevan must think beyond “pro-Moscow” or “anti-Moscow”. The best militaries in the world borrow strategies, doctrine, operational planning, and more from others to enhance assets to their greatest potential. They do not prepare to fight the last war.</p>
<h3 style="font-weight: 400;">Training<strong> </strong></h3>
<p style="font-weight: 400;">India’s <a href="https://economictimes.indiatimes.com/news/defence/india-armenia-arms-deal-amid-the-coming-together-of-3-brothers/videoshow/94685139.cms?from=mdr">major arms deal to Armenia</a> may be the first step in a blossoming Armenian relationship. Azerbaijan is strongly allied with Pakistan. India and Pakistan historically share animosity.  Moreover, India views Armenia as a vital link to <a href="https://eurasiantimes.com/landmark-trade-deal-india-russia-iran-conduct-business-through-instc-corridor/">for its trade route from Iran through the Black Sea region</a>. Indian <a href="https://eurasiantimes.com/indian-armys-mountain-division-the-best-in-world-chinese-experts-admit/">Mountain Brigades</a> are some of the best mountain troops in the world. It can be argued that Indian President Modhi could find training Armenia for combat in high terrain to test his best operational and tactical methods for the ongoing <a href="https://www.nytimes.com/interactive/2020/07/18/world/asia/china-india-border-conflict.html">challenges with China in their own disputed territory</a>.</p>
<p style="font-weight: 400;">French President Macron and Armenian Prime Minister Nikol Pashinyan have spoken over the phone many times since the 2020 Nagorno-Karabakh War. <a href="https://www.tactical-life.com/exclusives/la-legions-sniper-school/">French Sniper Schools</a> are some of the most well-respected institutions in the world. French sniper training to Armenian long-range fighters could prove to be vital for another defensive conflict judging from the rugged terrain and long lines of sight within Armenian territory.</p>
<p style="font-weight: 400;"><a href="https://web.archive.org/web/20210809223822/https:/www.mnd.go.kr/user/mnd/upload/pblictn/PBLICTNEBOOK_202106300300426680.pdf">South Korea</a> is a nation which always must consider <a href="https://www.un.org/counterterrorism/sites/www.un.org.counterterrorism/files/220607_compendium_of_good_practices_web.pdf">border security</a>. Perhaps Armenia could learn from South Korean defense against neighboring North Korea, utilizing training programs, expertise on surveillance and counter surveillance, mining, reconnaissance, and communications to headquarters from the forward line of troops.</p>
<h3 style="font-weight: 400;">Equipment &amp; Arms Procurement<strong> </strong></h3>
<p style="font-weight: 400;">Yerevan needs <a href="https://www.google.com/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwiKgY3b6Yr7AhXRK0QIHXo-CeIQFnoECAsQAQ&amp;url=https%3A%2F%2Fevnreport.com%2Fspotlight-karabakh%2Farms-supplies-to-armenia-and-azerbaijan%2F&amp;usg=AOvVaw2jhJ6-qfVl1B6JRcBn4UWK">to look beyond Russian suppliers for equipment and arms procurement</a>. Diplomatic loyalty to allies and financial cost can often be problematic factors for nations who desire to bulwark defense capabilities. If Armenia’s ultimate goal is to earn Washington’s trust and purchase arms from the American private sector, Yerevan should engage US friendly countries to procure “surplus” while diaspora and Armenia’s Ministry of Foreign Affairs press American private companies and Congress to procure from the “source”.</p>
<p style="font-weight: 400;"><a href="https://www.state.gov/u-s-relations-with-saudi-arabia/">Saudi Arabia</a> and Azerbaijan declined in relations during the 2020 Nagorno-Karabakh War when Saudi Arabia <a href="https://news24online.com/news/world/azerbaijan-armenia-war-saudi-arabia-calls-boycott-turkish-goods-israel-urges-nato-action-against-turkey-2248ea3f">called for peace</a> instead affirming the Azeri position on territorial claims. Saudi Arabia might be under the impression that a crippled Armenia would mean Turkish dominance over the Caucasus region, and therefore may be inclined to send equipment and defensive weapons to Armenia. Yerevan can argue to Riyadh, perhaps making a case that a Turkish dominated Caucasus region would mean that Sunni Muslim nations in the central Asian steppe would be more inclined to follow Turkey rather than Saudi Arabia.</p>
<p style="font-weight: 400;">Greece shares over 2,000 years of mostly positive relations with Armenia. Today, Athens confronts hostile rhetoric from Turkey’s President Erdogan. In 2020, Greece accused Turkish troops of <a href="https://www.armyvoice.gr/2020/05/%ce%ad%ce%b2%cf%81%ce%bf%cf%82-%ce%ba%ce%bb%ce%b9%ce%bc%ce%ac%ce%ba%cf%89%cf%83%ce%b7-%cf%86%ce%ad%cf%81%ce%b5%cf%82/">making an incursion within Greek territory</a>. In 2022, Athens sent millions of dollars in defense equipment to Ukraine, <a href="https://www.youtube.com/watch?v=LObobWEkfA0">according to a speech given by Prime Minister Kyriakos Mitsotakis to the U.S. Congress</a>. A revamped Greek military considering perceived Turkish aggression and NATO duties to Ukraine could also aid Armenia.</p>
<p style="font-weight: 400;"><a href="https://news.yahoo.com/us-brazil-sign-agreement-enabling-military-sales-173853364.html">Brazil</a> <a href="https://www.reuters.com/world/americas/lula-wins-brazilian-election-bolsonaro-has-not-conceded-2022-10-31/">just concluded the closest election in its history</a>. Armenia can play to the new President Lula da Silva under the guise as the first Christian nation who desires to prevent another genocide on the grounds of protecting democracy and human rights. Lula may want a quick foreign policy victory as an ecumenical issue while Brazil remains divided domestically. The <a href="https://www.academia.edu/3836034">small but impactful Brazilian-Armenian diaspora</a> can be utilized to this degree.</p>
<p style="font-weight: 400;">Egypt’s Coptic Orthodox Christian minority (which shares ties to Armenian Apostolic Christians) recently suffered a tragic deadly <a href="https://www.cnbc.com/2022/08/14/fire-at-coptic-church-in-cairo-kills-41-hurts-14.html">loss of 41 believers in a fire</a>. Egyptian President Abdel Fattah El-Sisi may be seeking an opportunity of good will to his non-Muslim supporters, assisting Armenia could be one. Furthermore, Egyptian-Turkish relations <a href="https://arabcenterdc.org/resource/egypt-turkey-relations-challenges-and-future-prospects/">have gone through a rough patch since 2013</a>. Yerevan could leverage Egypt if El-Sisi desires to press Turkey in the tense Eastern Mediterranean.</p>
<p style="font-weight: 400;">The above are just a few examples. Yerevan should indiscriminately look to the broader US community of allies. Yet most important, the Armenian Diaspora should focus all efforts on one primary goal: earning the trust of the US military defense industry and carry out private sector deals to Yerevan.</p>
<p style="font-weight: 400;">The Armenian Diaspora’s extensive networks were instrumental in <a href="https://www.usip.org/publications/2021/04/why-bidens-recognition-armenian-genocide-significant">pushing the recognition of Armenian Genocide</a> by the Executive Branch, Legislative Branch, and state governments. Yet for all the Diaspora’s merits to raise awareness in history, new history can arguably be made if Armenians in Nagorno-Karabakh are ethnically cleansed from their homes. Armenian Diaspora can use their tremendously organized body to engage U.S. blue-chip defense contractors. Diaspora education can encourage the American private sector to push Congress for Yerevan to eventually procure American equipment. Once permission is granted, private sector defense contractors can immediately begin selling systems to the now-democratic former Soviet republic for self-defense purposes.</p>
<p><a href="https://globalsecurityreview.com/if-armenia-wants-western-defense-support-doctrine-and-partner-engagement-reform-must-happen-now/">If Armenia Wants Western Defense Support, Doctrine and Partner Engagement Reform Must Happen Now</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Emerging U.S.-U.K. Tensions May Jeopardize Counterterrorism Efforts</title>
		<link>https://globalsecurityreview.com/emerging-us-uk-tensions-may-jeopardize-counterterrorism-efforts/</link>
		
		<dc:creator><![CDATA[Col. Rob Maness]]></dc:creator>
		<pubDate>Fri, 28 Apr 2023 15:54:59 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=25461</guid>

					<description><![CDATA[<p>The media firestorm that has arisen in the wake of Russia’s detention of Wall Street Journal reporter Evan Gershkovich has brought newfound attention to the issues of extradition and the legal treatment of foreign nationals accused of crimes. Unfortunately, this is but one example of a growing trend of authoritarian regimes taking high-profile American detainees [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/emerging-us-uk-tensions-may-jeopardize-counterterrorism-efforts/">Emerging U.S.-U.K. Tensions May Jeopardize Counterterrorism Efforts</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 style="font-weight: 400;">The media firestorm that has arisen in the wake of Russia’s detention of Wall Street Journal reporter Evan Gershkovich has brought newfound attention to the issues of extradition and the legal treatment of foreign nationals accused of crimes.</h2>
<p style="font-weight: 400;">Unfortunately, this is but one example of a growing trend of authoritarian regimes taking high-profile American detainees to achieve diplomatic ends, as it is an increasingly utilized approach by countries like Iran and China as well. But while this is a foreign policy reality that Americans may increasingly need to come to grips with, many may not be aware that there are also emerging tensions between the United States and United Kingdom over extradition related matters. A key treaty that assists in battling terrorism may hang in the balance.</p>
<p style="font-weight: 400;">The U.S.-U.K. Extradition Treaty of 2003 in many ways represents a culmination of the mutual respect and cooperation that exists between these two great nations. Established in the wake of the September 11<sup>th</sup>terrorist attacks, it has proven invaluable in ensuring that terrorists and other dangerous criminals are brought to justice and has been effective in protecting national security interests on both sides of the Atlantic.</p>
<p style="font-weight: 400;">However, recent attempts by the United States to expand the treaty&#8217;s scope to include white-collar criminal matters have raised concerns about its potential misuse and the broader national security implications. The ongoing legal battle over the extradition of Dr. Mike Lynch to the United States, in particular, highlights the potential risks of misusing the treaty in ways that could ultimately undermine this productive working relationship.</p>
<p style="font-weight: 400;">Dr. Lynch, a British citizen and tech entrepreneur known by some as ‘<a href="https://www.cnbc.com/2022/02/01/mike-lynch-the-british-tech-mogul-facing-extradition-to-the-us.html" data-saferedirecturl="https://www.google.com/url?q=https://www.cnbc.com/2022/02/01/mike-lynch-the-british-tech-mogul-facing-extradition-to-the-us.html&amp;source=gmail&amp;ust=1682774732124000&amp;usg=AOvVaw26pRW2C5MKepzvAN0ViFc4">Britain’s Bill Gates</a>,’ is the former CEO of the British software company Autonomy. Subject to a years-long fraud investigation by the United States Department of Justice (DOJ), Dr. Lynch and other executives at Autonomy have been accused of artificially inflating the company’s revenues prior to its acquisition by Hewlett-Packard (HP). However, the case against Dr. Lynch is far from clear-cut.</p>
<p style="font-weight: 400;">A British civil court reviewed the corporate dispute and ruled in favor of HP in its claims against Lynch in January 2022. But the UK&#8217;s Serious Fraud Office (SFO) previously conducted a lengthy investigation into the matter and ultimately decided not to pursue criminal charges concluding that there was &#8220;insufficient evidence&#8221; to prosecute. Moreover, there are serious concerns about the DOJ&#8217;s case. Specifically, the DOJ&#8217;s indictment of Dr. Lynch relies heavily on the testimony of former Autonomy executives who have themselves been charged with fraud and on disputed accounting practices that were approved by Autonomy&#8217;s auditors at the time.</p>
<p style="font-weight: 400;">Despite these discrepancies and the fact that this case has been litigated extensively in the British judicial system, the DOJ is still seeking to try Dr. Lynch for his alleged crimes in the United States. This has renewed calls for change by some in the U.K. that are concerned about imbalances in the extradition treaty in favor of the U.S., and who believe it is inappropriate for the U.S. to override the U.K.&#8217;s judgment.</p>
<p style="font-weight: 400;">In 2020 then-Prime Minister Boris Johnson <a href="https://www.businessinsider.com/boris-johnson-slams-unbalanced-us-extradition-deal-assange-harry-dunn-2020-2" data-saferedirecturl="https://www.google.com/url?q=https://www.businessinsider.com/boris-johnson-slams-unbalanced-us-extradition-deal-assange-harry-dunn-2020-2&amp;source=gmail&amp;ust=1682774732125000&amp;usg=AOvVaw1MVFiTY_iA-ZJ3M_-Bd0DL">said</a> of the treaty, “I do think there are elements of that relationship that are unbalanced and I certainly think that it is worth looking at.” More recently, Tom Tugendhat, the current UK Minister for State Security, has called for the treaty to be “<a href="https://www.economist.com/britain/2022/02/05/mike-lynch-has-lost-britains-biggest-fraud-case" data-saferedirecturl="https://www.google.com/url?q=https://www.economist.com/britain/2022/02/05/mike-lynch-has-lost-britains-biggest-fraud-case&amp;source=gmail&amp;ust=1682774732125000&amp;usg=AOvVaw3_KGdpDOc1NejZJS07S5j6">rebalanced</a>.”</p>
<p style="font-weight: 400;">It is worth noting that such changes would not be unprecedented. The U.K. has already amended the treaty once, in 2013, to include a “<a href="https://www.lbkmlaw.com/news-events-238.html" data-saferedirecturl="https://www.google.com/url?q=https://www.lbkmlaw.com/news-events-238.html&amp;source=gmail&amp;ust=1682774732125000&amp;usg=AOvVaw1moQSw179ei7aJub-MLzZL">forum provision</a>” that has provided the U.K. with a greater license to refuse extradition requests. Diplomats and national security officials of all stripes should therefore be concerned about the lasting negative impacts that could come if the United States continues to push the limits of the treaty.</p>
<p style="font-weight: 400;">The fact of the matter is, this dispute is at its essence a civil dispute and not a matter of national security. Using the treaty to aid in the prosecution of executives involved in an international business transaction is well outside the original intent of this treaty. This could in turn undermine British willingness to cooperate with other, more serious cases such as when the treaty was successfully used in the past to extradite the likes of Babar Ahmad and Syed Talha Ahsan for providing material support to terrorists, and Abu Hamza al-Masri for conspiring to establish a terrorist training camp and supporting jihad.</p>
<p style="font-weight: 400;">The United Kingdom and the United States have long enjoyed a close relationship that has been critical in maintaining global stability and promoting democratic values. With regards to such matters of international law, especially involving cases without any direct impact on national security, it is imperative that officials on both sides of the Atlantic avoid taking measures that would make it more difficult for the two countries to combat terrorism and other serious crimes.</p>
<p><a href="https://globalsecurityreview.com/emerging-us-uk-tensions-may-jeopardize-counterterrorism-efforts/">Emerging U.S.-U.K. Tensions May Jeopardize Counterterrorism Efforts</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Changing Face of Conflict: What is Hybrid Warfare?</title>
		<link>https://globalsecurityreview.com/hybrid-and-non-linear-warfare-systematically-erases-the-divide-between-war-peace/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Sat, 15 Apr 2023 19:33:27 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Georgia]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/hybrid-and-non-linear-warfare-systematically-erases-the-divide-between-war-peace/</guid>

					<description><![CDATA[<p>Understanding the Implications of Hybrid and Non-Linear Warfare I. Introduction The concept of warfare has evolved significantly over the years, with the traditional notion of state-on-state conflict increasingly giving way to more complex forms of engagement. This essay explores the concept of hybrid and non-linear warfare, a strategy that systematically blurs the lines between war [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/hybrid-and-non-linear-warfare-systematically-erases-the-divide-between-war-peace/">The Changing Face of Conflict: What is Hybrid Warfare?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Understanding the Implications of Hybrid and Non-Linear Warfare</h2>
<h3>I. Introduction</h3>
<p>The concept of warfare has evolved significantly over the years, with the traditional notion of state-on-state conflict increasingly giving way to more complex forms of engagement. This essay explores the concept of hybrid and non-linear warfare, a strategy that systematically blurs the lines between war and peace, and its implications for international security. The Russo-Ukrainian War (2014-2023) and the Chinese approach to hybrid warfare, particularly regarding Taiwan and the South China Sea, serve as case studies to illustrate the practical application of these concepts.</p>
<p>Hybrid warfare combines conventional and unconventional methods, including military operations, cyber warfare, disinformation campaigns, and economic pressure. Non-linear warfare, on the other hand, refers to a strategy that disrupts the traditional battlefield, making it difficult to distinguish between combatants and civilians or between times of war and peace. These strategies have become increasingly prevalent in the 21st century as state and non-state actors seek to gain strategic advantages without resorting to full-scale conventional warfare<sup>1</sup>.</p>
<p>The Russo-Ukrainian War provides a clear example of these tactics in action. The conflict, which began with Russia&#8217;s annexation of Crimea in 2014, has been marked by a mix of traditional military operations, cyber attacks, and information warfare.<sup>2</sup> The war has also been characterized by its non-linear nature, with the front lines and the state of war and peace often blurred.</p>
<p>Meanwhile, China&#8217;s approach to hybrid warfare, particularly about Taiwan and the South China Sea, offers another perspective on these strategies. Chinese military theorists Qiao Liang and Wang Xiangsui, in their work &#8220;Unrestricted Warfare,&#8221; have outlined a broad approach to conflict that includes not only military actions but also economic, informational, and other non-military means.<sup>3</sup> This approach, evident in China&#8217;s actions in the South China Sea and towards Taiwan, reflects a strategic shift towards hybrid and non-linear warfare.</p>
<p>This essay aims to explore these issues in depth, examining the nature of hybrid and non-linear warfare, its implications for international security, and how it has been employed in the Russo-Ukrainian War and by China. In doing so, it seeks to provide a comprehensive understanding of these complex and evolving forms of warfare.</p>
<h3>II. Hybrid and Non-Linear Warfare: An Overview</h3>
<p>Hybrid and non-linear warfare represent two of the most significant developments in conflict and warfare in the 21st century. Their complexity and fluidity characterize these forms of warfare and the blurring of traditional lines between combatants and civilians and between war and peace.<sup>4</sup></p>
<p>Hybrid warfare is a type of conflict that blends conventional and unconventional methods, including military operations, cyber warfare, disinformation campaigns, and economic pressure. This form of warfare is not limited to a single shape or dimension and can involve a mix of regular and irregular tactics across all dimensions of war.<sup>5</sup> The term &#8216;hybrid warfare&#8217; has been in use since at least 2005 when it was employed to describe the strategy used by Hezbollah in the 2006 Lebanon War.<sup>6</sup></p>
<p>Non-linear warfare, on the other hand, disrupts the traditional battlefield, making it difficult to distinguish between combatants and civilians or between times of war and peace. This form of warfare utilizes a grand strategy approach, where force-on-force conflict is not the primary objective. Instead, the goal is to create a complex and fluid situation that exploits an opponent&#8217;s weaknesses.<sup>7</sup></p>
<p>Several factors, including advances in technology, the increasing interconnectedness of the world, and the evolving nature of threats, have driven the rise of hybrid and non-linear warfare. These forms of action allow state and non-state actors to gain strategic advantages without resorting to full-scale conventional war. However, they also pose significant challenges to international security, as they can be difficult to detect and counter and have far-reaching impacts on societies&#8217; political, economic, and social fabric.<sup>8</sup></p>
<p>In the following sections, we will delve deeper into these concepts and explore their implications through the lens of the Russo-Ukrainian War and China&#8217;s approach to hybrid warfare about Taiwan and the South China Sea.</p>
<h3>III. Case Study: The Russo-Ukrainian War</h3>
<p>The Russo-Ukrainian War began in 2014 and is a prime example of hybrid warfare. The conflict started with disguised Russian troops&#8217; covert invasion of the Ukrainian autonomous republic of Crimea. This was followed by the seizure of territory in Ukraine’s Donbas region by Russians and local proxy forces, marking the expansion of the conflict.<sup>9</sup></p>
<p>In the early stages of the war, Russia employed a blend of conventional and unconventional tactics to destabilize Ukraine. This included cyber warfare, propaganda, economic pressure, and the deployment of &#8220;little green men&#8221; &#8211; soldiers without insignia who were later confirmed to be Russian personnel.<sup>10</sup></p>
<p>However, the war took a significant turn on February 24, 2022, when Russia launched a full-scale invasion of Ukraine.<sup>11</sup> This marked a shift from the hybrid warfare tactics used in annexing Crimea to a more traditional form of warfare. Despite initial gains by Russian forces, Ukrainian defenders repelled attempts to seize Kyiv and other major cities and soon launched counterattacks at Russian positions.<sup>12</sup></p>
<p>The full-scale invasion was not executed in the same manner as the 2014 annexation of Crimea. The gradual escalation of tensions and the failure of Russia at a strategic level to achieve its objectives became evident. The invasion resulted in a significant loss of life and displacement of people, with millions fleeing Ukraine.<sup>13</sup></p>
<p>The Russo-Ukrainian War demonstrates the complexities and challenges of hybrid warfare. While Russia initially succeeded in destabilizing Ukraine through a blend of conventional and unconventional tactics, the shift to a full-scale invasion marked a significant escalation of the conflict. The failure of Russia to achieve its strategic objectives despite this escalation highlights the limitations of hybrid warfare when confronted with a determined and resilient defense.</p>
<p>The Russo-Ukrainian War also underscores the international implications of hybrid warfare. The conflict drew widespread international condemnation and led to significant sanctions against Russia. It also highlighted the role of global alliances and partnerships in countering hybrid warfare tactics.<sup>14</sup></p>
<h3>IV. Case Study: China&#8217;s Approach to Hybrid Warfare</h3>
<p>China&#8217;s approach to hybrid warfare, particularly in the context of Taiwan and the South China Sea, offers a unique perspective on applying non-linear warfare strategies. This section will analyze China&#8217;s hybrid warfare tactics, focusing on its maritime gray zone operations, cyber warfare capabilities, and information warfare strategies.</p>
<p>China&#8217;s hybrid warfare strategy combines military, economic, diplomatic, and informational means to achieve strategic objectives without resorting to open warfare.<sup>15</sup> This approach is particularly evident in China&#8217;s maritime gray zone operations in the South China Sea. China has been using a combination of naval, coast guard, and militia forces to assert its territorial claims in the region.<sup>16</sup> These operations are designed to incrementally alter the status quo in China&#8217;s favor without provoking a military response from other regional actors or the United States.<sup>17</sup></p>
<p>China has developed significant capabilities in the cyber domain and has been accused of conducting cyber espionage and cyberattacks against foreign governments and corporations.<sup>18</sup> China&#8217;s cyber warfare strategy is driven by its perception of other countries&#8217; changing cyber warfare approaches and practices, especially those of the U.S. and Russia.<sup>19</sup> The Chinese government views cyber warfare as consistent with its military strategy, which is modified according to the national security environment, domestic situation, and activities of foreign militaries.<sup>20</sup></p>
<p>China&#8217;s information warfare strategies also play a crucial role in its hybrid warfare approach. The Chinese Communist Party (CCP) has been using information warfare to control the narrative within its borders and influence perceptions abroad.<sup>21</sup> The CCP employs various tactics, including censorship, propaganda, and disinformation campaigns, to shape public opinion and advance its strategic objectives.<sup>22</sup></p>
<p>In the context of Taiwan, China&#8217;s hybrid warfare approach is designed to isolate Taiwan internationally, undermine its political system, and gradually erode its will to resist unification with the mainland.<sup>23</sup> This strategy includes diplomatic pressure to reduce the number of countries recognizing Taiwan, economic coercion to make Taiwan more dependent on the continent, and military intimidation to demonstrate China&#8217;s resolve to achieve unification.<sup>24</sup></p>
<p>China&#8217;s approach is multifaceted and adaptive, reflecting its strategic objectives and the evolving security environment. This approach allows China to pursue its interests and assert its influence without resorting to open warfare, thereby minimizing the risk of escalation and international backlash.</p>
<h3>V: Causes and Consequences of Hybrid Warfare</h3>
<p>Hybrid warfare, as a complex and multifaceted form of conflict, is driven by various causes and has significant national and international security consequences. This section will explore these causes and effects, drawing on various academic sources to provide a comprehensive analysis.</p>
<h4>V.1 Causes of Hybrid Warfare</h4>
<p>The causes of hybrid warfare are multifaceted and complex, reflecting the diverse nature of this form of conflict. One key driver is the changing nature of power in the international system. Monaghan notes that the diffusion of power away from states and toward non-state actors has created an environment where hybrid threats can thrive.<sup>25</sup> This is particularly true in the digital domain, where non-state actors can wield significant influence.</p>
<p>Another cause of hybrid warfare is the desire of states to achieve their objectives without resorting to conventional action, which is often costly and risky. Hybrid warfare allows states to exploit the &#8220;gray zone&#8221; between peace and war, using military and non-military means to achieve their objectives.<sup>26</sup> This is evident in the case studies of Russia and China discussed in the previous sections.</p>
<h4>V.2 Consequences of Hybrid Warfare</h4>
<p>The consequences of hybrid warfare are significant and wide-ranging. At the national level, hybrid warfare can undermine state sovereignty, security, and the rule of law. This is evident in the case of Ukraine, where Russia&#8217;s use of hybrid warfare tactics has resulted in a protracted conflict that has undermined Ukraine&#8217;s sovereignty and security.<sup>27</sup></p>
<p>At the international level, hybrid warfare can destabilize the global system and challenge the norms and principles that underpin it. This is particularly the case in the South China Sea, where China&#8217;s use of hybrid warfare tactics has challenged the principle of freedom of navigation.<sup>28</sup></p>
<p>Hybrid warfare also has significant implications for the conduct of warfare. As Baines and Edwards note, hybrid warfare blurs the lines between combatants and civilians and between war and peace.<sup>29</sup> This complicates the conduct of action and poses significant ethical and legal challenges.</p>
<h3>VI: Rethinking Warfare: A New Framework</h3>
<p>The evolution of warfare, particularly the rise of hybrid and non-linear warfare, necessitates a new framework for understanding and responding to these threats. This section will explore the need for a new framework, the critical elements of this framework, and how it can be applied to the case studies of Russia and China.</p>
<ol>
<li><strong>The Need for a New Framework</strong><br />
The traditional understanding of warfare, which primarily focuses on conventional military conflict, is no longer sufficient to address the complexities of the contemporary security environment<sup>30</sup>. Hybrid warfare, characterized by blending conventional, irregular, and cyber warfare, along with other non-military tools, has become a prevalent strategy for state actors.<sup>31</sup> This necessitates a new framework that can effectively address the multi-dimensional nature of hybrid warfare.</li>
<li><strong>Key Elements of the New Framework: </strong>The new framework should incorporate the following key elements:
<ol>
<li><strong>Comprehensive Understanding of Hybrid Warfare:</strong> The framework should provide a comprehensive understanding of hybrid warfare, including its various dimensions, such as conventional, irregular, cyber, and information warfare.<sup>32</sup> It should also consider using non-military economic, diplomatic, and political tools.</li>
<li><strong>Recognition of the Role of Non-State Actors:</strong> The framework should recognize the role of non-state actors in hybrid warfare. This includes not only insurgent groups and terrorists but also cybercriminals, hackers, and other actors who state actors can co-opt to achieve their objectives.<sup>33</sup></li>
<li><strong>Incorporation of Technological Developments: </strong>The framework should incorporate the impact of technological developments on warfare. This includes using cyber capabilities, artificial intelligence, and other emerging technologies.<sup>34</sup></li>
<li><strong>Focus on Resilience and Defense: </strong>The framework should emphasize the importance of resilience and defense in responding to hybrid threats. This includes not only military security but also strengthening societal resilience, cyber protection, and other non-military reasons. <sup>35</sup></li>
</ol>
</li>
<li><strong>Application to the Case Studies of Russia and China: </strong><span style="text-transform: initial;">The new framework can be applied to the case studies of Russia and China to provide a more comprehensive understanding of their hybrid warfare strategies.</span>
<ol>
<li><strong style="text-transform: initial;">Russia:</strong><span style="text-transform: initial;"> The new framework can help to understand Russia&#8217;s use of hybrid warfare in Ukraine. It can shed light on Russia&#8217;s use of conventional and irregular warfare, cyber and information war, and non-military tools such as economic and political measures</span><sup style="text-transform: initial;">36</sup><span style="text-transform: initial;">.</span></li>
<li><strong style="text-transform: initial;">China:</strong><span style="text-transform: initial;"> The new framework can help to understand China&#8217;s use of hybrid warfare in its approach towards Taiwan and the South China Sea. It can shed light on China&#8217;s use of conventional and irregular warfare, cyber and information war, and non-military tools such as economic and political measures.</span><sup style="text-transform: initial;">37</sup></li>
</ol>
</li>
</ol>
<p>The continuous evolution of warfare necessitates a new framework for understanding and responding to hybrid threats. This framework should provide a comprehensive experience of hybrid warfare, recognize the role of non-state actors, incorporate technological developments, and focus on resilience and defense. It can be applied to the case studies of Russia and China to provide a more comprehensive understanding of their hybrid warfare strategies.</p>
<h3>VII. The Agile Approach to Hybrid Warfare</h3>
<p>The agile approach to hybrid warfare is a strategic response that emphasizes flexibility, adaptability, and rapid decision-making in the face of complex and evolving threats. This approach is particularly relevant in hybrid warfare, where the lines between conventional and unconventional warfare are blurred, and the adversary&#8217;s tactics constantly evolve.</p>
<p>The agile approach is not a new concept in military strategy. It is rooted in maneuver warfare principles, which emphasize speed, surprise, and initiative to disrupt the enemy&#8217;s decision-making process.<sup>38</sup> However, applying these principles to hybrid warfare is a relatively recent development.</p>
<p>The NATO Alliance has recognized the need for an agile approach to hybrid threats. In its 2016 Warsaw Summit, NATO leaders agreed on a strategy to enhance the Alliance&#8217;s resilience against hybrid threats, emphasizing the need for rapid decision-making, enhanced situational awareness, and improved strategic communications.<sup>39</sup></p>
<p>The U.S. Department of Defense has adopted an agile approach to hybrid threats. The 2014 Quadrennial Defense Review highlighted the need for a more agile force that can quickly adapt to new threats and challenges.<sup>40</sup> This approach has been further developed in the concept of Multi-Domain Operations, which seeks to integrate capabilities across all domains (land, sea, air, space, and cyberspace) to create multiple dilemmas for the adversary.<sup>41</sup></p>
<p>The agile approach to hybrid warfare also has implications for defense acquisition and technology development. Rapid technological change and the proliferation of advanced technologies to non-state actors and near-peer competitors have increased the complexity of the threat environment. Defense organizations must rapidly adopt more agile and flexible acquisition processes to field new capabilities.<sup>42</sup></p>
<p>However, the agile approach is not without its challenges. It requires high coordination and integration across different domains and agencies, which can be challenging to achieve in large and complex organizations. It also requires a cultural shift towards greater risk tolerance and a willingness to experiment and learn from failure.<sup>43</sup></p>
<p>An agile approach to hybrid warfare offers an intriguing framework for responding to the complex and evolving threats posed by hybrid warfare. However, its successful implementation requires significant organizational and cultural changes.</p>
<h3>VIII. Policy Recommendations</h3>
<p>The complexity and evolving nature of hybrid warfare necessitates a comprehensive and adaptive approach to policy-making. The following recommendations are proposed to counter hybrid threats effectively:</p>
<ol>
<li><strong>Strengthening International Cooperation:</strong> The international community must work together to counter hybrid threats. This includes sharing intelligence, coordinating responses, and developing joint strategies. In this direction, NATO has already taken steps, establishing the Hybrid Analysis Branch and the Hybrid Warfare Fusion Cell to enhance understanding and response to hybrid threats.<sup>44</sup> However, more can be done to strengthen these efforts, including expanding these initiatives to include non-NATO members and fostering closer cooperation with the private sector and civil society.</li>
<li><strong>Building Resilience:</strong> Resilience is critical to countering hybrid warfare. This includes societal resilience, such as public awareness and media literacy to counter disinformation campaigns, and institutional resilience, such as robust cyber defenses and crisis management capabilities.<sup>45</sup></li>
<li><strong>Investing in Research and Development:</strong> Technological advancements play a significant role in hybrid warfare. Therefore, investing in research and development in artificial intelligence, cyber security, and advanced weaponry can provide a competitive edge.<sup>46</sup></li>
<li><strong>Enhancing Legal and Normative Frameworks:</strong> Hybrid warfare often exploits legal and normative gray zones. Therefore, enhancing international legal and normative frameworks to address these challenges is crucial. This includes clarifying the application of international law in the cyber domain and developing norms against the use of disinformation and other hybrid tactics.<sup>47</sup></li>
<li><strong>Adopting a Whole-of-Government Approach:</strong> Countering hybrid threats requires a coordinated approach involving all government sectors. This includes the military and intelligence agencies and departments dealing with foreign affairs, domestic security, finance, and infrastructure.<sup>48</sup></li>
<li><strong>Promoting Strategic Communication:</strong> Effective communication is crucial in countering hybrid warfare. This includes both internal and external communication within the government with the public and international partners. Strategic communication can help to counter disinformation, build public trust, and promote a unified response to hybrid threats.<sup>49</sup></li>
</ol>
<p>Countering hybrid warfare requires a comprehensive and adaptive approach involving all societal sectors. By strengthening international cooperation, building resilience, investing in research and development, enhancing legal and normative frameworks, adopting a whole-of-government approach, and promoting strategic communication, we can effectively counter the complex and evolving threats posed by hybrid warfare.</p>
<h3>IX. Conclusion</h3>
<p>Hybrid warfare, characterized by blending conventional, irregular, and cyber action with other non-military tools, has emerged as a significant challenge in the contemporary security environment. This essay has comprehensively analyzed hybrid war, its causes and consequences, and the need for a new framework to understand and respond to these threats.</p>
<p>The case studies of Russia and China illustrate hybrid warfare&#8217;s diverse and complex nature. Russia&#8217;s actions in Ukraine and China&#8217;s approach towards Taiwan and the South China Sea demonstrate how state actors can exploit the &#8220;gray zone&#8221; between peace and war to achieve their objectives.<sup>50 </sup><sup>51</sup> These case studies underscore the need for a comprehensive understanding of hybrid warfare that includes both military aspects and non-military dimensions, such as economic, diplomatic, and political measures.</p>
<p>The causes of hybrid warfare are multifaceted and complex, reflecting the changing nature of power in the international system and the desire of states to achieve their objectives without resorting to conventional action.<sup>52</sup> The consequences of hybrid action are significant and wide-ranging, undermining state sovereignty and security, destabilizing the international system, and complicating the conduct of warfare.<sup>53</sup></p>
<p>The agile approach to hybrid warfare offers a promising framework for responding to these complex and evolving threats. This approach emphasizes flexibility, adaptability, and rapid decision-making and incorporates the impact of technological developments on warfare.<sup>54</sup> However, its successful implementation requires significant organizational and cultural changes.</p>
<p>The policy recommendations proposed in This essay provide a roadmap for countering hybrid threats. These include strengthening international cooperation, building resilience, investing in research and development, enhancing legal and normative frameworks, adopting a whole-of-government approach, and promoting strategic communication.<sup>55</sup> However, the effectiveness of these measures will depend on the specific circumstances of each country and the nature of the threats they face.</p>
<p><b>Endnotes</b></p>
<p><sup>1</sup> Smith, M. E. (2016). Hybrid warfare and its implications for defense and security policies. European View, 15(2), 223-234.<br />
<sup>2</sup> Galeotti, M. (2019). The Russo-Ukrainian War: A Case Study in Non-Linear Warfare. In Non-Linear Warfare (pp. 45-64). Palgrave Macmillan, Cham.<br />
<sup>3</sup> Liang, Q., &amp; Xiangsui, W. (1999). Unrestricted Warfare. PLA Literature and Arts Publishing House.<br />
<sup>4</sup> Hoffman, F. G. (2007). Conflict in the 21st Century: The Rise of Hybrid Wars. Potomac Institute for Policy Studies, 1-72.<br />
<sup>5</sup> Kaldor, M. (2012). New and old wars: Organised violence in a global era. Stanford University Press.<br />
<sup>6</sup> Van Puyvelde, D. (2015). Hybrid war – does it even exist? NATO Review. Retrieved from <a href="https://www.nato.int/docu/review/articles/2015/05/07/hybrid-war-does-it-even-exist/index.html">https://www.nato.int/docu/review/articles/2015/05/07/hybrid-war-does-it-even-exist/index.html</a><br />
<sup>7</sup> Hoffman, F. G. (2009). Hybrid warfare and challenges. JFQ: Joint Force Quarterly, (52), 34-39.<br />
<sup>8</sup> Kofman, M., &amp; Rojansky, M. (2015). A Closer Look at Russia&#8217;s &#8220;Hybrid War.&#8221; Kennan Cable No. 7. Woodrow Wilson International Center for Scholars.<br />
<sup>9</sup> Galeotti, Mark. &#8220;Russia&#8217;s &#8216;New&#8217; Tools for Confronting the West: Continuity and Innovation in Moscow&#8217;s Exercise of Power.&#8221; Chatham House, The Royal Institute of International Affairs, March 2016.<br />
<sup>10</sup> &#8220;Documents on Democracy: Russia&#8217;s Invasion of Ukraine.&#8221; Journal of Democracy, 2023.<br />
<sup>15</sup> Fravel, M. Taylor. &#8220;China&#8217;s Strategy in the South China Sea.&#8221; Contemporary Southeast Asia: A Journal of International and Strategic Affairs 33, no. 3 (2011): 292-319.<br />
<sup>16</sup> Erickson, Andrew S., and Ryan D. Martinson. &#8220;China&#8217;s Maritime Gray Zone Operations.&#8221; Studies in Chinese Military Science (2019).<br />
<sup>17</sup> Yoshihara, Toshi, and James R. Holmes. &#8220;China&#8217;s Vision of Victory.&#8221; The Diplomat, June 6, 2019.<br />
<sup>18</sup> Segal, Adam. &#8220;What Are China’s Cyber Capabilities and Intentions?&#8221; Carnegie Endowment for International Peace, April 1, 2019.<br />
<sup>21</sup> Brady, Anne-Marie. &#8220;Magic Weapons: China&#8217;s Political Influence Activities Under Xi Jinping.&#8221; Wilson Center, September 18, 2017.<br />
<sup>23</sup> Chase, Michael S., and Benjamin S. Purser III. &#8220;China&#8217;s Long-Range Bomber Flights: Drivers and Implications.&#8221; RAND Corporation, 2015.<br />
<sup>24</sup> Tsang, Steve. &#8220;Taiwan&#8217;s Impact on China: Why Soft Power Matters More than Economic or Political Inputs.&#8221; The China Quarterly 177 (2004): 25-44.<br />
<sup>25</sup> Monaghan, Andrew. &#8220;The &#8216;War&#8217; in Russia&#8217;s &#8216;Hybrid Warfare.'&#8221; Parameters 45, no. 4 (2015): 65-80.<br />
<sup>26</sup> Hoffman, Frank G. &#8220;Conflict in the 21st Century: The Rise of Hybrid Wars.&#8221; Potomac Institute for Policy Studies, 2007.<br />
<sup>27</sup> Galeotti, Mark. &#8220;I&#8217;m Sorry for Creating the &#8216;Gerasimov Doctrine.'&#8221; Foreign Policy, 2018.<br />
<sup>28</sup> Yoshihara, Toshi and Holmes, James R. &#8220;Red Star over the Pacific: China&#8217;s Rise and the Challenge to U.S. Maritime Strategy.&#8221; Naval Institute Press, 2018.<br />
<sup>29</sup> Baines, Paul, and Edwards, Nicholas. &#8220;The Art of Hybrid War: China&#8217;s Maritime Gray Zone Operations.&#8221; Naval War College Review 73, no. 2 (2020): 1-37.<br />
<sup>30</sup> Hoffman, F. G. (2007). Conflict in the 21st Century: The Rise of Hybrid Wars. Potomac Institute for Policy Studies.<br />
<sup>31</sup> Johnson, R. (2018). Hybrid warfare and its countermeasures: A critique of the literature. Small Wars &amp; Insurgencies, 29(1), 141-163.<br />
<sup>32</sup> Thiele, R. D. (2017). Hybrid warfare and the changing character of conflict. Connections, 16(2), 65-72.<br />
<sup>33</sup> Popescu, N. (2015). Hybrid tactics: neither new nor only Russian. EUISS Issue Alert, 4.<br />
<sup>34</sup> Kostyuk, N., &amp; Zhukov, Y. M. (2019). Invisible digital front: Can cyber attacks shape battlefield events? Journal of Conflict Resolution, 63(2), 317-347.<br />
<sup>35</sup> Baines, P. R., &amp; Jones, K. (2019). Influence and interference in foreign elections: the real threat to the ‘free and fair’ election process? Intelligence and National Security, 34(5), 685-703.<br />
<sup>36</sup> Galeotti, M. (2016). Hybrid, ambiguous, and non-linear? How new is Russia’s ‘new way of war’? Small Wars &amp; Insurgencies, 27(2), 282-301.<br />
<sup>37</sup> Cheung, T. M., &amp; Thomas, J. (2018). The impact of China&#8217;s military modernization on regional stability. In China&#8217;s Evolving Military Strategy (pp. 1-30). Brookings Institution Press.<br />
<sup>38</sup> Lind, William S. &#8220;Maneuver Warfare: Can We Make It Work?&#8221; Defense &amp; Security Analysis 5, no. 2 (1989): 153-161.<br />
<sup>39</sup> &#8220;Warsaw Summit Communiqué.&#8221; NATO. July 9, 2016. <a href="https://www.nato.int/cps/en/natohq/officialtexts133169.htm">https://www.nato.int/cps/en/natohq/officialtexts133169.htm</a>.<br />
<sup>40</sup> &#8220;Quadrennial Defense Review 2014.&#8221; U.S. Department of Defense. March 4, 2014. <a href="https://archive.defense.gov/pubs/2014QuadrennialDefenseReview.pdf">https://archive.defense.gov/pubs/2014QuadrennialDefenseReview.pdf</a>.<br />
<sup>41</sup> &#8220;Multi-Domain Operations.&#8221; U.S. Army. <a href="https://www.army.mil/standto/archive/2018/12/06/">https://www.army.mil/standto/archive/2018/12/06/</a>.<br />
<sup>42</sup> Gansler, Jacques S., and William Lucyshyn. &#8220;Defense Acquisition Reform: Where Do We Go from Here?&#8221; University of Maryland School of Public Policy, Center for Public Policy and Private Enterprise. October 2014. <a href="https://www.csis.org/analysis/defense-acquisition-reform-where-do-we-go-here">https://www.csis.org/analysis/defense-acquisition-reform-where-do-we-go-here</a>.<br />
<sup>43</sup> Blanken, Leo J., and Jason Lepore. &#8220;Is the U.S. Military Ready for Agile Acquisition?&#8221; War on the Rocks. August 14, 2019. <a href="https://warontherocks.com/2019/08/is-the-u-s-military-ready-for-agile-acquisition/">https://warontherocks.com/2019/08/is-the-u-s-military-ready-for-agile-acquisition/</a>.<br />
<sup>44</sup> &#8220;Hybrid Warfare,&#8221; NATO, <a href="https://www.nato.int/cps/en/natohq/topics156338.htm">https://www.nato.int/cps/en/natohq/topics156338.htm</a>.<br />
<sup>45</sup> &#8220;Hybrid Warfare: New Threats, Complexity, and Trust as the Antidote,&#8221; NATO Review, 2023, <a href="https://www.nato.int/docu/review/articles/2021/11/30/hybrid-warfare-new-threats-complexity-and-trust-as-the-antidote/index.html">https://www.nato.int/docu/review/articles/2021/11/30/hybrid-warfare-new-threats-complexity-and-trust-as-the-antidote/index.html</a>.<br />
<sup>46</sup> Andrew Monaghan, &#8220;The &#8216;War&#8217; in Russia&#8217;s &#8216;Hybrid Warfare,'&#8221; Prism 8, no. 2 (2019): 104-120, <a href="https://ndupress.ndu.edu/Portals/68/Documents/prism/prism8-2/PRISM8-2Monaghan.pdf">https://ndupress.ndu.edu/Portals/68/Documents/prism/prism8-2/PRISM8-2Monaghan.pdf</a>.<br />
<sup>50</sup> Monaghan, Andrew. &#8220;The &#8216;War&#8217; in Russia&#8217;s &#8216;Hybrid Warfare.'&#8221; Parameters 45, no. 4 (2015): 65-80.<br />
<sup>51</sup> Yoshihara, Toshi and Holmes, James R. &#8220;Red Star over the Pacific: China&#8217;s Rise and the Challenge to U.S. Maritime Strategy.&#8221; Naval Institute Press, 2018.<br />
<sup>52</sup> Hoffman, Frank G. &#8220;Conflict in the 21st Century: The Rise of Hybrid Wars.&#8221; Potomac Institute for Policy Studies, 2007.<br />
<sup>53</sup> Baines, Paul, and Edwards, Nicholas. &#8220;The Art of Hybrid War: China&#8217;s Maritime Gray Zone Operations.&#8221; Naval War College Review 73, no. 2 (2020): 1-37.<br />
<sup>54</sup> Lind, William S. &#8220;Maneuver Warfare: Can We Make It Work?&#8221; Defense &amp; Security Analysis 5, no. 2 (1989): 153-161.<br />
<sup>55</sup> &#8220;Hybrid Warfare,&#8221; NATO, <a href="https://www.nato.int/cps/en/natohq/topics156338.htm">https://www.nato.int/cps/en/natohq/topics156338.htm</a>.</p>
<p><a href="https://globalsecurityreview.com/hybrid-and-non-linear-warfare-systematically-erases-the-divide-between-war-peace/">The Changing Face of Conflict: What is Hybrid Warfare?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>More Than an Army: The Turkish Armed Forces as a Core Pillar of National Identity</title>
		<link>https://globalsecurityreview.com/more-than-an-army-the-turkish-armed-forces-as-a-core-pillar-of-national-identity/</link>
		
		<dc:creator><![CDATA[Alp Sevimlisoy]]></dc:creator>
		<pubDate>Wed, 22 Mar 2023 17:37:50 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Turkey]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=25409</guid>

					<description><![CDATA[<p>As the Turkish Republic celebrates its centennial this year, one institution that has stood the test of time and continues to be the bastion of defense and guardian of the nation is the Turkish Armed Forces. With a history that spans the Ottoman Empire through to the Republic, this military force safeguards national security interests [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/more-than-an-army-the-turkish-armed-forces-as-a-core-pillar-of-national-identity/">More Than an Army: The Turkish Armed Forces as a Core Pillar of National Identity</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As the Turkish Republic celebrates its centennial this year, one institution that has stood the test of time and continues to be the bastion of defense and guardian of the nation is the Turkish Armed Forces. With a history that spans the Ottoman Empire through to the Republic, this military force safeguards national security interests and upholds NATO objectives through its Atlanticist doctrine. In addition to its defense role, the Turkish Armed Forces have also been a beacon of hope during natural disasters, including the recent earthquake in the country&#8217;s Southeast.</p>
<p>The modern Turkish Armed Forces form its identity with the foundation of the Republic, protecting the tenents of the Founding Father, Atatürk, who enshrined a constitution that is still today one of the most advanced legislative examples of governance, spanning Secularism, National Unity, and the very existence of the nation-state itself. These principles upheld as both a virtue and a right, function in unison with the Imperial legacy of the nation, encapsulated via Fatih The Conqueror who upon his victory at Constantinople (subsequently renamed Istanbul) placed Kayser-I-Rum otherwise translated as Caesar of Rome as one of his main honorifics, enabling the bestowment of respect for the responsibility to also protect citizens who are descendants of those that once lived within Ottoman borders as displayed in operations spanning Bosnia, Kosovo, Libya, Syria across the decades and continuing to this very day.</p>
<p>The Turkish Armed Forces play a crucial role in curbing Russian influence in nations like Syria and Libya and stopping the efforts of the People&#8217;s Republic of China to gain inroads in the Aegean. Turkey is one of the few NATO nations with active personnel directly countering the Russian Federation, notably in Libya and Syria. At the same time, Turkish Bayraktar drones and newly allocated Turkish naval corvettes support the valiant Ukrainian forces leading their campaign to reclaim their homeland.</p>
<p>The integration of the Turkish Republic and the Turkish Armed Forces into the region&#8217;s supreme power has resulted in further integration into NATO and the emergence of a pan-continental power. The introduction of the TCG Anadolu aircraft carrier and the use of F-35s and Eurofighter jets will underscore the security of the grain export agreement and ensure Turkish military and state prowess in the Black Sea and by defacto the Caucasus. The renewal of military alliances, such as the US-Turkish Mechanism and the military alliance between the United Kingdom and the Turkish Republic, highlights the importance of protecting the Eastern and Southern Flanks of NATO. In the coming period, Turkey will integrate hypersonic missiles into its arsenal of strength, in tandem with the US commitment to modernize existing tactical nuclear capabilities already held in the country.</p>
<p>The recent earthquake that has impacted historical cities such as Gaziantep and Adana, where the Incirlik Airbase is located, has once again turned the populace and leadership of the country to the Turkish Armed Forces. The TAF has taken full operational control over the fallout of the seismic damage, displaying their leadership, operational prowess, and sense of duty beyond purely being the Armed Forces of the Turkish nation. As Turkey approaches its centennial anniversary, the Turkish Armed Forces remain the beacon of the homeland and its guardian, providing hope and affection to citizens who have lost their homes and loved ones due to the quakes.</p>
<p><a href="https://globalsecurityreview.com/more-than-an-army-the-turkish-armed-forces-as-a-core-pillar-of-national-identity/">More Than an Army: The Turkish Armed Forces as a Core Pillar of National Identity</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Expand U.S. CYBERCOM to better secure American Infrastructure</title>
		<link>https://globalsecurityreview.com/expand-cybercom-to-better-secure-american-infrastructure/</link>
		
		<dc:creator><![CDATA[Taylor Clark]]></dc:creator>
		<pubDate>Mon, 07 Nov 2022 18:22:22 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=23799</guid>

					<description><![CDATA[<p>This article was originally published on April 13, 2021. According to McAfee, over $1 trillion was lost to cybercrime in 2020. Some estimate if governments do not secure the cybersphere, this number will continue to skyrocket and reach over $10 trillion annually by 2025. Even cybersecurity firms are at risk. For example, FireEye, a government [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/expand-cybercom-to-better-secure-american-infrastructure/">Expand U.S. CYBERCOM to better secure American Infrastructure</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>This article was originally published on April 13, 2021.</em></p>
<p><span style="color: #333333;">According to <a href="https://www.mcafee.com/enterprise/en-us/assets/reports/rp-hidden-costs-of-cybercrime.pdf">McAfee</a>, over $1 trillion was lost to cybercrime in 2020. Some estimate if governments do not secure the cybersphere, this number will continue to skyrocket and reach over <a href="https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/">$10 trillion</a> annually by 2025. Even cybersecurity firms are at risk. For example, <a href="https://www.fireeye.com/blog/products-and-services/2020/12/fireeye-shares-details-of-recent-cyber-attack-actions-to-protect-community.html">FireEye</a>, a government contract cybersecurity company, was recently a victim of a state-sponsored attack targeting its assessment tools.</span></p>
<p><span style="color: #333333;">Currently, the United States has no whole-of-government approach to secure its cyber vulnerabilities. Private companies maintain most of the control, with little to no oversight, and the Department of Defense (DOD) focuses almost exclusively on military cyber vulnerabilities. The United States needs to take definitive action to secure its systems to avoid further loss. By expanding the Department of Defense’s Cyber Command (USCYBERCOM), the U.S. can create a whole-of-government approach to improve resiliency and consolidate cyber expertise and resources.</span></p>
<p><span style="color: #333333;"><a href="https://www.cybercom.mil/About/Mission-and-Vision/">USCYBERCOM</a> is one of the commands of the Department of Defense. It has three points of focus: defending the DOD’s network, offering mission support, and strengthening U.S. networks against cyber-attacks. Expanding USCYBERCOM’s focus beyond military capabilities to include other U.S. Government Departments, allies, and private companies will lead to more effective policy.</span></p>
<p><span style="color: #333333;">First, expanding USCYBERCOM increases resiliency against internal and external threats, against both state and non-state actors. By adapting preexisting infrastructure, more of these threats can be easily assessed and rectified. USCYBERCOM methods can be easily expanded to encompass more critical infrastructure.</span></p>
<p><span style="color: #333333;">Second, consolidating resources means more effective work. The number of qualified personnel is relatively small and spread through different government agencies and private companies. By fusing the specialized workforce, the government can implement more innovative ideas and decrease vulnerability. Furthermore, merging budgets provides more extensive protection. The United States government spends between <a href="https://www.statista.com/statistics/675399/us-government-spending-cyber-security/">$18-19</a> billion per year on cybersecurity. Instead of having this money spent across various agencies and departments, collective action would be more easily achieved by combining them.</span></p>
<p><span style="color: #333333;">Finally, expanding USCYBERCOM leads to a whole-of-government approach. As it currently stands, private companies work separately on their systems, the US government employs them, and there is little oversight. USCYBERCOM works on military cyber capacities with congressional oversight. An expanded USCYBERCOM would involve more government agencies, include private companies’ input, and generate even more robust oversight from the Congress. This extensive involvement creates a well-rounded approach to cyber vulnerabilities and a timely response to discovered weaknesses.</span></p>
<p><span style="color: #333333;">For some, the dual-hat arrangement that the commander of CYBERCOM is also the Director of the National Security Agency (NSA) is controversial. Established in 2009 under the Obama Administration, USCYBERCOM was a small operation, and under the agreement, USCYBERCOM and NSA shared staffing and information resources. Following the Snowden leaks, different leaders have suggested the separation of the two. But this is not in the interest of national cybersecurity as, without this agreement, the NSA would not be compelled to share information or manpower. Without formal information-sharing agreements, U.S. agencies may be simultaneously working to address the same vulnerabilities. Expanding CYBERCOM will reduce duplication and lead to a more effective government response to cyberattacks and cyber vulnerabilities.</span></p>
<p><span style="color: #333333;">Expanding the responsibilities and members of USCYBERCOM gives the United States the ability to stand against malicious actors by implementing comprehensive and unified cyber policy. Decisive action will enable us to address vulnerabilities and reduce monetary and property losses. As the internet continues to expand, CYBERCOM can protect and promote American security and prosperity.</span></p>
<p><a href="https://globalsecurityreview.com/expand-cybercom-to-better-secure-american-infrastructure/">Expand U.S. CYBERCOM to better secure American Infrastructure</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>New Age NATO: The necessary might of leadership, minus the inhibitions of bureaucracy</title>
		<link>https://globalsecurityreview.com/new-age-nato-necessary-might-leadership-minus-bureaucratic-inhibitions/</link>
		
		<dc:creator><![CDATA[Alp Sevimlisoy&nbsp;&&nbsp;Peter Woodard]]></dc:creator>
		<pubDate>Wed, 07 Sep 2022 04:01:22 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Turkey]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=25155</guid>

					<description><![CDATA[<p>As the world gazed upon Speaker Pelosi’s flight route last month, be it via flight tracking apps, minute-by-minute coverage on CNN or various policy speculators huddled in D.C. corridors, one aspect was clear collective American and, by defacto, NATO might was emulated via the office of the Executive, represented by the Speaker upon arrival, not [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/new-age-nato-necessary-might-leadership-minus-bureaucratic-inhibitions/">New Age NATO: The necessary might of leadership, minus the inhibitions of bureaucracy</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As the world gazed upon Speaker Pelosi’s flight route last month, be it via flight tracking apps, minute-by-minute coverage on CNN or various policy speculators huddled in D.C. corridors, one aspect was clear collective American and, by defacto, NATO might was emulated via the office of the Executive, represented by the Speaker upon arrival, not the systematic functions of the State Department seeking to place diplomatic ‘balance’ above the individual commitment to global security amidst a slew of threats from Beijing.</p>
<p>Amongst the backdrop of the shared concern for Taipei’s security threats permeated all levels of society from the People’s Republic of China via the Chinese Communist Party or, in other words, directly from Xi Jinping himself, with each statement indicating a China that has now positioned itself as not simply our competitor but rather our collective foe.</p>
<p>The capabilities of the Chinese People’s Republic are correlated heavily to a system of governance allowing them to grant the Executive with a full ‘vestiture’ of power, able to threaten our way of life in an instance and further strike at us via hypersonic missiles that no longer require local positioning close to our borders to reach our very zip codes themselves. China doubles down on its executive privilege by being able to bypass (via non-existence) the equivalent of Senate Appropriations to arm our foes. At the same time, we are left to the mercy of special interest groups and biased lobbies when seeking to arm NATO allies such as the Republic of Turkey. They require a trifecta of F-35s, Patriot missile defense systems, and shared hypersonic missile placement to counter the Russian Federation on the Southern and Eastern Flank of the Transatlantic Alliance. The case is clear for more power to be granted to the Executive in the United States as well as NATO nations to ensure that we can utilize statecraft at its ‘maxima’ concerning both committing to and executing both our unilateral and shared national security objectives against President Putin who enjoys the largesse of a modern Ivan the Terrible and Xi Jinping seemingly governing China in a manner akin to Emperor Wenzong of Qing.</p>
<p>A system of governance that vests further direct command to NATO leaders domestically, notably in matters concerning military deployment as well as the provision of strategic hardware amongst allies, is imperative in the current backdrop globally, which is far more reminiscent of the permeations before the First World War juxtaposed with that of the implicit build-up to the Cold War. To enable such prowess overseas, notably in countries that already function within a Presidential system within NATO, such as the United States and the Turkish Republic, domestically, systems must be in place to ensure local stability. One such successful structure that provided our security in the West for many decades against the Soviet Union was referred to as GLADIO or, in other words, “Stay-Behind,” with the coinage being that military-civilian structures were in place to ensure both the continuity of the state in the event of a Comintern invasion or domestic subversion campaign and on day-to-day basis combat local anti-NATO illegal organizations and cells from endangering the lives of one’s populace and to halt any infiltration at the time by Soviet assets within Western governments. Recently, Chinese assets were identified within the U.S. Treasury Department, and Russian Agents were charged with acts amounting to seeking a total dismantling of the American political system; therefore, our foes have already commenced actions indicative of exploiting our systematic institutional weaknesses and domestic “Stay-Behind” structures are crucial to combat China and Russia’s campaign to use our form of Democracy, with all its benefits and caveats, in a manner to undermine our way of life.</p>
<p>There are two very successful organizations in this regard which were exemplified historically by the United Kingdom and the Republic of Turkey, one being the “Force Research Unit” (F.R.U.) and the other “Kontrgerilla” (Counter-Guerrilla) respectively for both nations. The F.R.U. exemplified the British Army’s clinical response to the thousands of killings carried out by the Separatists in Northern Ireland with heroics displayed by the late Captain Robert Nairac, with the section’s activities being noteworthy in combatting both the domestic strife caused by the illegal separatists as well as stopping overseas support provisioned to them by the Soviets. In the Turkish Republic, against a backdrop of compounding political tensions between the 1970-the 80s, Counter-Guerrilla successfully defeated a plethora of illegal Stalinist, Marxist and Leninist groups seeking to destabilize the NATO member nation domestically and thus ensuring the structure and continuity of the state while cutting off Soviet support for such cells providing NATO with shared security from Istanbul to Washington.</p>
<p>Whilst the populace in the United States bemoans a political system where such discontent is evident by the recent creation of the Forward Party whereby though insignificant with regard to political clout, is sufficient emphasis that those chosen to lead our nations are not fulfilling their vows “spoken upon thee” when first seeking office, the fact is that no matter the individual, no matter the party, unless the Executive has parity of power with regard to governance at a level that is comparable with the executive privilege enjoyed by our superpower foes who are seeking to undermine the rules-based international order, then we run the risk of losing the war of “Great Power Competition” and unless we streamline our institutional governance to prioritize whomever we choose to lead us, empowering them also with the apparatus to mobilize and safeguard our national security via clandestine our very way of life in the West itself may be at the mercy of the next stage of Beijing’s Hypersonic missiles.</p>
<p><a href="https://globalsecurityreview.com/new-age-nato-necessary-might-leadership-minus-bureaucratic-inhibitions/">New Age NATO: The necessary might of leadership, minus the inhibitions of bureaucracy</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>F-35 Upgrades Must Not Compromise Readiness</title>
		<link>https://globalsecurityreview.com/f-35-upgrades-must-not-compromise-readiness/</link>
		
		<dc:creator><![CDATA[Col. Rob Maness]]></dc:creator>
		<pubDate>Mon, 18 Jul 2022 14:57:44 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=25080</guid>

					<description><![CDATA[<p>As the world changes and threats evolve, the mission requirements for our major weapon systems need to evolve with them. This applies as much to the F-35 as any other system and Congress should especially keep this in mind as they continue to work through the National Defense Authorization Act, which just passed the House of Representatives [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/f-35-upgrades-must-not-compromise-readiness/">F-35 Upgrades Must Not Compromise Readiness</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>As the world changes and threats evolve, the mission requirements for our major weapon systems need to evolve with them.</h2>
<p>This applies as much to the F-35 as any other system and Congress should especially keep this in mind as they continue to work through <a href="https://rollcall.com/2022/07/12/house-poised-for-ndaa-floor-debate/">the National Defense Authorization Act</a>, which just passed the House of Representatives last <span class="s2">this</span><span class="s1"> week, but still must clear the Senate and be reconciled in conference committee. It is critical that any needed improvements to this aircraft are made in a manner that is the least disruptive, and that does not compromise readiness and the ability of America and its allies fielding the F-35 to respond quickly to any situation.</span></p>
<p><span style="text-transform: initial;">There are some in Washington, for instance, who are calling for a wholesale engine replacement for the F-35. Instead of upgrading the existing powerplant on the F-35 – known as the F135 engine – these individuals are instead proposing the revival of a previously cancelled program known as the Adaptive Engine Transition Program (AETP). This would be a serious mistake.</span></p>
<p><span class="s1">Derived from the tried-and-true powerplant of the F-22 Raptor, the F135 engine has been one of the few bright spots in the F-35 program, setting several new performance benchmarks. Still, while the F135 engine has more than met its original stringent specifications, the F-35’s planned mission growth will require even greater thrust, power, and thermal management capabilities within eight years. An engine upgrade is not optional; without it, this combat aircraft will lack the speed and precision needed to maintain superiority in modern battlespaces.</span></p>
<p><span class="s1">As a result, an Enhanced Engine Package (EEP) has been proposed to retrofit the F135 engine to meet and even exceed these revised specifications. Taking this approach rather than trying to replace the entire engine with the AETP is preferable for a number of reasons.</span></p>
<p class="p1"><span class="s1">First, starting from scratch with a whole new engine will inevitably set back the deployment of new F-35 aircraft by months or even years. Seldom do such major engineering endeavors go off without a hitch, and it is entirely realistic to expect new and unforeseen problems to surface with the new powerplant before it can be reliably deployed. Instead, making improvements to an existing, proven, and reliable powerplant will build on past successes, challenges, and lessons, and eliminate a great deal of downtime between concept and actual fielding.</span></p>
<p class="p1"><span class="s1">Second, retrofitting the existing engine will minimize disruptions to the existing supply chain. A new engine means a whole new supply chain. At the best of times this is an expensive and time-consuming prospect. These are clearly not the best of times in terms of parts procurement, manufacturing, and delivery. The dedicated existing supply chain in place with the F135 engine will be a significant advantage and will minimize the cost and downtime to bring needed upgrades online versus entirely replacing the engine.</span></p>
<p class="p1"><span class="s1">Third is the impact on the F-35’s universality. One of the greatest benefits of the Joint Strike Fighter is the fact that it was a joint project between not only the U.S. Air Force, Navy, and Marine Corps, but also among nine allied partner nations, including the UK and our NORAD partner Canada. The reality is that replacing the F135 engine is an expensive undertaking, and operational complications with the AETP mean that it will in all likelihood solely be an Air Force project.</span></p>
<p class="p1"><span class="s1">Our allies, even assuming they would be able to absorb the cost of the new engine, cannot afford to manage two separate powerplants, two separate supply chains, and two separate maintenance programs. The AETP is also incompatible with the Navy and Marine versions – the F-35B Short Takeoff/Vertical Landing (STOVL), and the F-35C carrier-based version – because these respective branches <a href="https://www.airforcemag.com/adding-new-aetp-engine-f-35-air-force-alone-would-pay-for-it/">cannot fit the engine</a> into their versions of the aircraft. This means the Navy and Marines would have different powerplants than the Air Force version. It also means that our allies will have aircraft with different engines (and parts, supply chains, support, etc.) than the Air Force. This greatly complicates that universality of the program and creates interoperability issues.</span></p>
<p class="p1"><span class="s1">Probably most important impact is what an engine replacement would have on operational capability. In the time it would take to test and establish a new supply chain for a new engine, upgrades to the existing F-35 engine could already be completed. The impact on operational readiness of the F-35 would be minimal and the pilots who fly this machine would know that they are operating an aircraft with a proven and reliable engine.</span></p>
<p class="p1"><span class="s1">The bottom line is that decisions need to be made on what is best for the mission and, by extent, for America and its allies. The F-35 fleet needs upgrades, but it absolutely must be done in a way minimizes costs and downtime, so that we never compromise our edge and our readiness.</span></p>
<p><a href="https://globalsecurityreview.com/f-35-upgrades-must-not-compromise-readiness/">F-35 Upgrades Must Not Compromise Readiness</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A New START for New START? The Future Russo-American Nuclear Arms Control</title>
		<link>https://globalsecurityreview.com/a-new-start-for-new-start-the-future-russo-american-nuclear-arms-control/</link>
		
		<dc:creator><![CDATA[Stephen Cimbala&nbsp;&&nbsp;Adam Lowther]]></dc:creator>
		<pubDate>Tue, 12 Jul 2022 10:17:23 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=25071</guid>

					<description><![CDATA[<p>The war in Ukraine will end sooner or later. It may likely take the form of a negotiated peace settlement, which will allow traditional diplomatic relations to return between the United States and Russia. The transition from war to peace will undoubtedly prove a bumpy road where Russia, Ukraine, and NATO member states all have [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/a-new-start-for-new-start-the-future-russo-american-nuclear-arms-control/">A New START for New START? The Future Russo-American Nuclear Arms Control</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;">The war in Ukraine will <a href="https://www.msn.com/en-us/news/world/how-will-the-ukraine-war-end/ar-AAYXLbP">end</a> sooner or later. It may likely take the form of a <a href="https://www.nbcboston.com/news/local/when-will-the-war-in-ukraine-end-local-experts-explain/2718287/">negotiated peace</a> settlement, which will allow traditional diplomatic relations to return between the United States and Russia. The transition from war to peace will undoubtedly prove a bumpy road where Russia, Ukraine, and NATO member states all have significant dissatisfaction with the peace agreement.  Nevertheless, other important issues of international security and world order cannot be postponed indefinitely. By that time, more than ever, the <a href="https://link.springer.com/article/10.1007/s42597-022-00069-5">future of nuclear arms control</a> will require significant attention from the leadership in the United States and Russia.</p>
<p style="font-weight: 400;">Even before Russia’s war on Ukraine, which began on February 24, 2022, the Russo–American nuclear arms control dialogue was icy. Both states <a href="https://www.heritage.org/arms-control/commentary/inf-treaty-wise-withdrawal">withdrew</a> from the Intermediate Nuclear Forces (INF) Treaty that previously precluded any deployment of nuclear or conventional missiles with ranges from 500 to 5,500 kilometers. Russian President Vladimir Putin showcased several advanced nuclear delivery systems in development or ready for deployment in his address to the Russian Federal Assembly in 2018. Putin <a href="https://www.euronews.com/2022/02/28/putin-s-objection-not-nato-but-a-more-european-ukraine-ex-eu-chief-barroso">continued to object</a> to American missile defenses deployed in European NATO member-states as part of the alliance’s modernization plans, describing these ship-based and <a href="https://euro-sd.com/2019/05/articles/13076/ballistic-missile-defence-in-eastern-europe/">shore-located antimissile systems</a> as potential threats to Russia’s nuclear deterrent.</p>
<p style="font-weight: 400;">As the Biden administration took office, the last nuclear arms control agreement remaining was the <a href="https://www.state.gov/new-start/">New START</a> Treaty of 2010, which was scheduled to expire in February 2021 unless the United States and Russia agreed to a <a href="https://www.iiss.org/blogs/military-balance/2021/02/new-start-extension-arms-control">five-year extension</a>. Fortunately, the Biden administration moved rapidly to negotiate an extension with Russia, leaving New START in place for another five years. However, New START’s value lies less in its symbolism or historical status than in its potential for revitalizing the Russo–American nuclear arms control process. If New START cannot be the cornerstone for a rebooted nuclear arms control regime, it will be a historical footnote but not a favorable augury for future progress.</p>
<p style="font-weight: 400;">Progress in nuclear arms control between Russia and the United States is a necessary condition for other steps to reduce the risks of future nuclear war. Together, both countries control about 90 percent of the <a href="https://www.reuters.com/world/global-nuclear-arsenal-grow-first-time-since-cold-war-think-tank-2022-06-12/">world’s nuclear weapons</a>. Any hope of restraining <a href="https://www.nuclearissues.co.uk/blog/post-3-79xwp">vertical proliferation</a> (larger arsenals among existing nuclear weapons states) or <a href="https://link.springer.com/chapter/10.1007/978-3-030-48737-9_7">horizontal proliferation</a> (the spread of nuclear weapons to additional state or non-state actors) depends upon leadership from Washington and Moscow.  Regional rivalries in the Middle East and Asia could <a href="https://www.brookings.edu/research/the-iran-nuclear-deal-prelude-to-proliferation-in-the-middle-east/">increase the number</a> of nuclear weapons states outside of Europe or create new incentives for non-nuclear powers to acquire nuclear arsenals.  New nuclear weapons states often lack the technologies, tactics, techniques, and procedures to field nuclear weapons that are secure from a first strike or possess the warhead security employed by the United States and Russia.</p>
<p style="font-weight: 400;">If New START is the basic building block for resuming a cooperative security relationship with Russia, what does it entail? New START restricts the number of operationally deployed nuclear warheads for each state to 1,550 weapons on a maximum number of 700 deployed launchers (intercontinental ballistic missiles (ICBM); submarine-launched ballistic missiles (SLBM); and heavy bombers). Current Russian and American strategic nuclear forces comply with these New START limits. <a href="https://www.armscontrol.org/factsheets/NewSTART#:~:text=New%20START%20counts%20each%20heavy%20bomber%20as%20one,of%20bombers%20would%20find%20no%20weapons%20to%20inspect.">Counting rules</a> treat each bomber as a single weapon, although bombers actually carry variable numbers of weapons. Thus, the official New START figures understate the total numbers of weapons actually deployed by each side.</p>
<p style="font-weight: 400;">Within a common ceiling on the numbers of weapons and launchers deployed under New START limits, the US and Russia have strategic nuclear forces that are structured very differently. <a href="https://sgp.fas.org/crs/nuke/R45861.pdf">Russia’s forces</a> emphasize land based strategic missiles (ICBMs) while the <a href="https://news.usni.org/2021/12/15/document-u-s-strategic-nuclear-forces-background-developments-and-issues">United States</a> is more reliant upon submarine-launched ballistic missiles (SLBMs). This difference in emphasis is likely to continue in future planning and deployments. Both Washington and Moscow have committed themselves to future nuclear modernization plans that will replace or refurbish each arm of the venerable nuclear triad of land-based, sea-based, and airborne launchers. This situation results partly from bureaucratic inertia, but also from the conviction that a three-legged deterrent force provides more flexibility for military planners and a more complicated attack surface for hostile forces.</p>
<p style="font-weight: 400;">During and after the Cold War, efforts to rationalize <a href="https://www.google.com/books/edition/Nuclear_Strategy_Arms_Control_And_The_Fu/gCqNDwAAQBAJ?hl=en&amp;gbpv=1&amp;dq=nuclear+strategy&amp;printsec=frontcover">American nuclear war plans</a> ran up against competing priorities among policymakers, military planners, and expert analysts inside and outside government. American declaratory policy for deterrence was not always consistent with employment policy for the use of nuclear weapons, should deterrence fail. Broadly speaking, <a href="https://www.google.com/books/edition/The_Evolution_of_Nuclear_Strategy/HbOmDwAAQBAJ?hl=en&amp;gbpv=1&amp;dq=nuclear+strategy&amp;printsec=frontcover">alternative models for nuclear employment policy</a> included: (1) a force sufficient to inflict unacceptable retaliatory destruction on the society of the attacker; (2) option one plus forces and command systems for <a href="https://www.militarystrategymagazine.com/article/flexible-response-and-integrated-deterrence-at-sea-in-the-21st-century-implications-for-the-u-s-navy/">flexible targeting</a> and <a href="https://www.stimson.org/wp-content/files/file-attachments/Escalation%20Control%20FINAL_0.pdf">escalation control</a>, including some options for lower-yield weapons; (3) options one and two plus counterforce superiority relative to any prospective attacker; and (4) options one and three, plus antimissile defenses capable of damage limitation even against major attacks.</p>
<p style="font-weight: 400;">There were variations around these themes, but the evolving American nuclear targeting plan—the <a href="https://www.jstor.org/stable/pdf/10.7249/op223af.12.pdf?refreqid=excelsior%3A7f2a73b1d9a59e8794737bc8c3115447&amp;ab_segments=&amp;origin=&amp;acceptTC=1">single integrated operations plan</a> (SIOP)—was put into effect by target planning staff matching available weapons to prospective targets. After all was said and done, no credible plan for anything resembling “victory” at an acceptable cost was available to American or Russian nuclear planners.</p>
<p style="font-weight: 400;">Strategic analysis sometimes fails to recognize that deterrence depends for its success, not only on the cleverness of the deterrer, but on the psychology and strategic thinking of the object of deterrence threats. States are not billiard balls, and leaders’ estimates of what will deter their competitors are often wide of the mark. Intelligence estimates may err in their assessments of enemy intentions, capabilities, or both. History, before and after the beginning of the nuclear age, is littered with deterrence failures based on faulty intelligence, biased images of other states and their leaders, and many varieties of motivational bias and wishful thinking. States’ perceptions of one another’s military-strategic doctrines are subjected to mirror imaging or other sources of distortion.</p>
<p style="font-weight: 400;">In the case of Russia, for example, some contend that Russian military thinking treated nuclear weapons as just another point on a linear continuum of violence, and not as a nonlinear departure from military rationality. However, at their historic meeting at Reykjavik in 1987 Presidents Ronald Reagan and Mikhail Gorbachev agreed that a nuclear war <a href="https://www.washingtonpost.com/archive/politics/1987/12/11/joint-statement-by-reagan-gorbachev/cd990a8d-87a1-4d74-88f8-704f93c80cd3/">could not be won</a> and should never be fought. This long road to nuclear deterrence sobriety for both the US and Russia was not achieved without some dangerous detours like the <a href="https://history.state.gov/milestones/1961-1968/cuban-missile-crisis">Cuban Missile Crisis</a> (1962) and <a href="https://warontherocks.com/2021/03/the-mythical-war-scare-of-1983/">Able Archer</a> (1983). Future nuclear powers, without the benefit of Cold War experience, may behave less prudently.</p>
<p style="font-weight: 400;">This familiar Russo-American strategic nuclear choreography is going to be shaken up by twenty-first century political and technological realities. The rise of China as a major nuclear power is no longer in doubt. The People’s Republic of China (PRC) is <a href="https://www.tandfonline.com/doi/pdf/10.1080/00963402.2021.1989208?needAccess=true">modernizing its land and sea-based nuclear-missile forces and bombers</a>, developing the potential for a regionally dominant and globally competitive nuclear arsenal. This decade, the United States may face two nuclear peers in Moscow and Beijing. Such a development raises important questions about American nuclear force sizing and modernization. Both the quality and quantity of nuclear weapons, of various ranges and yields, will be up for discussion among American defense planners. The United States and its allies will also have to consider how <a href="https://media.defense.gov/2020/Sep/01/2002488689/-1/-1/1/2020-DOD-CHINA-MILITARY-POWER-REPORT-FINAL.PDF">China’s rise</a> affects American and allied conventional force modernization and the United States’ ability to counter China’s regional anti-access/area denial capabilities.</p>
<p style="font-weight: 400;">A regional conventional war involving Chinese and American forces also raises the possibility of nuclear escalation. Another issue is the <a href="https://www.cfr.org/backgrounder/china-russia-relationship-xi-putin-taiwan-ukraine#:~:text=1%20China%20and%20Russia%20have%20expanded%20trade%20and,has%20exposed%20the%20limits%20of%20the%20relationship.%20">maturing alliance</a> between Russia and China. Although not necessarily in agreement on all strategic issues, Moscow and Beijing concur in their desire to push back against the rules-based international order favored by the United States. On the other hand, <a href="https://www.businessinsider.com/why-china-is-rapidly-expanding-its-nuclear-arsenal-2022-1#:~:text=1%20China%27s%20rapid%20military%20expansion%20in%20recent%20years,weapons%20to%20survive%20and%20respond%20to%20an%20attack.">China’s nuclear rise</a> may encourage existing Asian powers like <a href="https://www.cato.org/commentary/south-korea-next-nation-build-nuclear-weapons">Korea</a> and <a href="https://nationalinterest.org/blog/reboot/surprise-japan-could-quickly-build-nuclear-weapons-crisis-190089">Japan</a> to augment their conventional forces with nuclear weapons.</p>
<p style="font-weight: 400;">New technologies are certain to stress prior assumptions about the stability of nuclear deterrence based on assured retaliation. Three examples are instructive. First, because <a href="https://www.voanews.com/a/what-are-hypersonic-weapons-and-who-has-them-/6492459.html">hypersonic weapons</a> do not fly a ballistic path that allows for reliable detection and tracking, the time and ability required to determine a target does not, at present, exist. Second, <a href="https://warontherocks.com/2019/02/drones-of-mass-destruction-drone-swarms-and-the-future-of-nuclear-chemical-and-biological-weapons/">drone swarms</a> are also a threat as adversaries develop innovative ways to employ them for offensive or defensive purposes. Drone attacks against command-and-control systems or mobile launch systems like transporter erector launched intercontinental ballistic missiles and ballistic missile submarines. Third, nuclear coercion could be preceded or accompanied by <a href="https://carnegieendowment.org/files/Levite_et_all_C3_Stability.pdf#:~:text=Cyber%20attacks%20on%20nuclear%20command%2C%20control%2C%20and%20communications,not%20established%20effective%20risk-reduction%20mechanisms%20in%20this%20regard.">cyberattacks</a> against military communications and command and control systems or other military and civil infrastructure. Cyber-attacks could also serve as advanced tools for disinformation, propaganda, and other deceptive “like-war” tools.</p>
<p style="font-weight: 400;">If the rise of China and the uncertain implications of new technologies do not offer enough concern for Russo-American arms control regimes, there is the additional challenge of deciding “how much is enough” for American defense preparedness and for nuclear weapons specifically. The American defense budget dwarfs all others at a time of considerable stress in the US economy.  For a country with global commitments, military preparedness does not come cheap. The nuclear arsenal is also expected to provide <a href="https://www.stimson.org/2021/walking-the-tightrope-u-s-extended-deterrence-in-northeast-asia-under-president-biden/#:~:text=The%20most%20important%2C%20though%20not%20only%2C%20objective%20of,States%20and%20Soviet%20Union%20adopted%20damage%20limitation%20strategies.">extended deterrence</a> for allies in Europe, the Middle East, and Asia. Without the American nuclear “umbrella,” some allies might consider more seriously the option of developing their own nuclear arsenals.</p>
<p style="font-weight: 400;">In Asia, this risk is especially salient in view of China’s expanding capabilities and assertive behavior. Regardless of the perceived strategic necessity for various forces or weapons systems, competing demands from domestic priorities will place limits on future defense budgets. Difficult trade-offs within future budgets is certain as the United States is expected to face a <a href="https://www.cnn.com/2022/06/26/business/recession-signs-roundup/index.html">prolonged recession</a> over the next few years. With regard to nuclear forces, expenditures for deployed and reserve weapons and launchers are only part of the equation. Also <a href="https://www.bing.com/search?q=modernizing+nuclear+infrastructure&amp;cvid=f0ec73967a024ffa89c46662657fe3fb&amp;aqs=edge..69i57j69i64.8254j0j4&amp;FORM=ANAB01&amp;PC=DCTS">demanding of resources</a> are the components of the nation’s nuclear infrastructure, including weapons laboratories, and defense contractors who support the Pentagon’s research and development.</p>
<p style="font-weight: 400;">Too much complacency exists about the pace of nuclear proliferation. Admittedly, some of the most <a href="https://www.brookings.edu/research/predicting-proliferation-the-history-of-the-future-of-nuclear-weapons/#:~:text=Projections%20regarding%20Nth%20country%20proliferation%20during%20the%20Cold,concern%20about%20horizontal%20proliferation%20among%20the%20industrialized%20countries.">pessimistic predictions made during the Cold War</a> about the eventual spread of nuclear weapons were wide of the mark. Far fewer nations became nuclear powers than expected. It would be wrong to infer from the relative slow growth in the number of nuclear powers that we have reached a condition of stasis with respect to the entry of new countries into the ranks of nuclear weapons states. A <a href="https://www.washingtoninstitute.org/policy-analysis/implications-nuclear-iran">nuclear Iran</a>, for example, would almost certainly lead to the proliferation of nuclear weapons states across the region.</p>
<p style="font-weight: 400;">Another case is the already crowded nuclear competition in Asia, including Russia, China, India, Pakistan, and North Korea. A more expansive China or a more nuclear-assertive North Korea could increase popular support in South Korea and/or Japan for their own national nuclear force, despite the historic nuclear allergy of Japan and the defense guarantees to both countries provided by the United States. In addition to the challenge of new nuclear weapons states, there is also the lesser, but still dangerous, possibility of non-state actors acquiring nuclear weapons or materials.  The United Nations <a href="https://www.un.org/disarmament/wmd/nuclear/tpnw/">Treaty on the Prohibition of Nuclear Weapons</a> shows widespread recognition by governments of a continuing nuclear danger. But none of the current nuclear weapons states shows any interest in dismantling their nuclear arsenals. A number of existing nuclear powers are <a href="https://sipri.org/media/press-release/2021/global-nuclear-arsenals-grow-states-continue-modernize-new-sipri-yearbook-out-now">increasing their arsenals</a> in size and quality (Russia, China, North Korea).  Therefore, arms control, both “old style” and “new age,” remains relevant and necessary.</p>
<p style="font-weight: 400;">With all of the challenges described above, we return to the question offered in the title of this article; is a new start for New START possible? The number of variables than may shape the answer to this question are numerous and unpredictable, leaving these two analysts uncertain of the New START Treaty’s future and the role of nuclear arms control in a world of increasing insecurity. Our greatest fear is that China’s growing nuclear arsenal may make New START and any other nuclear arms control efforts untenable as nuclear parity between Russia, China, and the United States leads to uncertainty and the desire to begin growing strategic nuclear arsenals. With no easy solutions, the United States is certain to see troubled days ahead.</p>
<p><a href="https://globalsecurityreview.com/a-new-start-for-new-start-the-future-russo-american-nuclear-arms-control/">A New START for New START? The Future Russo-American Nuclear Arms Control</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>From Missiles to Microchips</title>
		<link>https://globalsecurityreview.com/from-missiles-to-microchips/</link>
		
		<dc:creator><![CDATA[Joshua E. Duke]]></dc:creator>
		<pubDate>Wed, 06 Jul 2022 17:10:01 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=15665</guid>

					<description><![CDATA[<p>This article was originally published on June 30, 2020. Efforts by the United States Intelligence Community (IC) to apply Cold War strategies to new age threats and non-state actors have largely failed, leading to adaptations and evolutions within the IC to understand and address new threats in new ways. The Soviet Union and the Islamic [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/from-missiles-to-microchips/">From Missiles to Microchips</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>This article was originally published on June 30, 2020.</em></p>
<p>Efforts by the United States Intelligence Community (IC) to apply Cold War strategies to new age threats and non-state actors have largely failed, leading to adaptations and evolutions within the IC to understand and address new threats in new ways. The Soviet Union and the Islamic State terror organization pose very different problems for intelligence professionals to solve. As the world moves further into the information age, the IC as a whole is evolving to meet new threats with analytical, technical, and ideological developments designed to foster the flow of information, rather than compartmentalize it into Cold War-era boxes and stovepipes.</p>
<p>This article outlines the differences between nation-states and non-state actors, including their structures, threats posed by them, and IC adaptations necessary for global social progress. The first step in this process is to define and differentiate nation-states and non-state actors, followed by an outline of IC approaches to each type of threat, intelligence paradigm developments, and potential enhancements to future U.S. intelligence operations.</p>
<h3>Nation-States vs. Non-State Actors</h3>
<p>Nation-states need structure to function in the world, while non-state actors do not. Foreign intelligence organizations of nation-states are designed to function as parts of their nation&#8217;s governmental structure in some form or way, which makes identifying them and addressing potential threats from them a verifiable process. Nation-states are also generally held accountable for the actions taken by government associated organizations and departments, which in part dictates the field of activity that any given nation-state can and will be willing to conduct at any time. International repercussions from the global community—including sanctions and/or military retaliation—are a strong deterrent for most national governments that prevents them from taking certain courses of action and from many forms of conduct.</p>
<p>The Russian Federation, for instance, took control of Crimea in a deception-based maneuver that resulted in virtually no combat, intentionally avoiding any conventional military retaliation from the West.<sup>1</sup> Chinese military expansion into the South China Sea, while creating tension in the region, does not involve war or international conflict either.<sup>2</sup> Still, when faced with being charged with cyber-attacks on the United States, the Chinese Government remains unwilling to admit that it was even conducting cyber operations,<sup>3</sup> for fear of international repercussions—including the potential for conventional war. These examples show that while nations are willing to act, they are generally unwilling to engage in major conflict or start a war. Non-state actors do not have this problem. Instead, many thrive on the prospects of international conflict and warfare.</p>
<p>Non-state actors are generally defined by their lack of structure, asymmetric tactics, and unique operational procedures. Any entity not acting on behalf of or directed by a nation-state is a non-state actor, including drug cartels, terrorist organizations, hackers, sex trafficking organizations, international corporations, vigilantes, bounty hunters, and even basic criminals and individual citizens of the world. They can, therefore, only be defined in the category of not being a nation-state or directed by a nation-state, and not defined in respect to what they actually are.<sup>4</sup> Some non-state actors have an organizational structure, such as corporations, and can be addressed like that of a nation-state, or targeted similarly for espionage or protection purposes. However, most non-state actors that pose threats to nation-states do not have a structure that is easily identifiable, definable, or targetable.</p>
<p>Operational procedures and tactics of non-state actor threats also tend to be less symmetrical than nation-states, and almost every non-state actor is unique in its specific operational procedures and techniques. Each threat must be evaluated and addressed individually for threat mitigation and/or intelligence operations because of this uniqueness. Conducting counterterrorism operations against the Islamic State, for example, cannot be based on counterterrorism operations against Hezbollah, simply due to the differences in each organization&#8217;s unique strategies, culture, location, and patterns, despite both of them being terrorist organizations. Non-state actors require a higher degree of analysis to understand each threat completely before actions are taken, unlike nation-states where threats posed are understood, partly based on comparable historical analyses, international law, the economic prosperity of the nation, and regional stability.</p>
<h3>Nation-States and Non-State Actors: Similarities and Differences</h3>
<p>Nation-states and non-state actors are similar in the respect that they are mainly people led by other people, so understanding the behavioral psychology of people is a useful approach to understanding either type of threat. Both require resources, including people, to present a threat. Terrorist organizations like the Islamic State rely primarily on weapons and recruiting to grow in numbers and capabilities—the larger they are, and the more weapons they have, the more significant of a threat they can potentially pose. Nation-states like Russia and China rely heavily on other resources, such as energy, food, water, and other types of wealth-creating capital. Organizational utilization of those resources also differs, as a nation-state&#8217;s resources are used mostly for ensuring economic stability for its citizens and creating capital wealth to raise international prestige and rapport. At the same time, terrorist organizations have somewhat different concerns.</p>
<p>Terrorist organizations&#8217; primary concern for resource utilization is being able to kill as many people as possible with as much media attention as possible, to boost recruiting efforts, and spread their ideology across the world for purposes of regional or global domination.<sup>5</sup> Public support matters to both nation-states and non-state actors as well, since increasing one&#8217;s reputation, both locally and around the world, can increase the range of actions that are acceptable to conduct. Russia&#8217;s invasion of Crimea was not retaliated against, mainly because of the way the issue was presented to the public,<sup>6</sup> just as media manipulation by the Islamic State was primarily responsible for its swift expansion and success in recruiting.<sup>7</sup> Both of these entities swayed public support in their favor to help achieve their goals.</p>
<p>Despite several similarities between nation-states and non-state actors, there are many factors that simply only apply to one or the other. International law does not regulate or affect non-state actors or their actions since they inherently cannot be a party to any international agreement or treaty for any reason. Nation-states, on the other hand, face severe repercussions by openly violating any international laws or signed treaties, or if they are caught violating either of these clandestinely. Nation-states also have massive infrastructures for large scale weaponry and economic operations as well. In contrast, hostile non-state actors do not have access to the required materials and/or facilities needed to establish such features. There are no terrorist organizations with a space program, for example.</p>
<p>This means that any satellite operations conducted by terrorists, be it for cell phone communications or cyber operations, must go through a nation-state&#8217;s infrastructure. Nation-states like Iran who are state sponsors of terrorism and also have a space program, therefore, create a very unique problem.<sup>8</sup> Non-state actors cannot by definition have a ballistic missile program either, since this also requires an infrastructure that only a Nation-State can achieve, but they can still acquire and use such weapons through allies, theft, or the black market. If the Pakistani Taliban or the Haqqani Network, for instance, were to seize Pakistan&#8217;s missile facilities, they would immediately become the world&#8217;s first terrorist organization with nuclear Inter-Continental Ballistic Missiles,<sup>9</sup> which makes potential instability within the Pakistani Government of paramount international concern.<sup>10</sup></p>
<p>Technological innovations generally also require a Nation-State&#8217;s infrastructure with research facilities, scientific education programs, and a lot of money, limiting this combat multiplying factor to nation-states as well. Just as with missiles, however, non-state actors may still acquire technological innovations, including medical devices, weapons, computer hardware/software, communications equipment, or espionage devices by other means. In free societies like the United States, this problem is multiplied by readily available technological innovations to the public. It has resulted in the evolution of technologically based non-state actors like the hacktivist collective, Anonymous, presenting new and unique threats to nation-states and the world.<sup>11</sup></p>
<p>Free societies have also provided other non-state actors, like terrorist organizations, with technological infrastructures that can be used for cyber operations and tactical social media coordination for paramilitary operations, including terrorist attacks, such as happened in Chattanooga, Tennessee, and Paris, France. The fact remains that non-state actors, while very different in nature from nation-states, have overlapping features, and unique features, and each threat must be approached by intelligence professionals uniquely and individually to achieve success. Intelligence methods and operational tactics must evolve continuously in the face of perpetual technological and ideological evolutions around the world to maintain global stability and human freedom, and the American intelligence infrastructure represents the best hope for achieving this goal in today&#8217;s world.</p>
<h3>Intelligence Community Adaptations: Killing the Cold War Mindset</h3>
<p>Intelligence operations and focuses throughout the Cold War were primarily concerned with threats posed by nation-states, and in particular, the Soviet Union and its Communist allies. The intelligence infrastructure of the United States that was created and grown during this era of Nation-State threat priorities stimulated the creation of extensive analytical techniques and operations explicitly designed to counter threats from foreign nations and their organizations. While terrorism and other non-state actors existed, they were not prevalent and did not receive enough attention to warrant extensive development of Non-State Actor threat mitigation techniques until relatively recently.</p>
<p>Intelligence representatives developing the intelligence infrastructure that exists today can target specific organizations within specific Governments for intelligence and counterintelligence operations. The ability to understand a structured organization made this possible and facilitated expansive espionage operations, including penetration operations and counterintelligence missions, to deceive the enemy and/or deny them information. The ability to identify the enemy and define it is the primary reason this type of analysis and intelligence operation targeting nation-states is so successful. The Soviet Union was an obvious target. Its intelligence, political, economic, and military organs also were definable, and therefore targetable. Even the tactics and procedures used by the Soviet Union could be documented over time, providing a standard analytical framework to base decisions on, with known variables regarding how specific parts of the Soviet Union&#8217;s organizations function and operate. Traditional threats posed by nation-states and individuals, before the onset of the information age, pale in comparison to the threats that exist today, threats that cannot be defined, controlled, and some that simply cannot be defeated, only mitigated.</p>
<p>Moving from the Cold War era into the information age has changed everything and created a large number of asymmetrical threats, not just from asymmetrical non-state actors, but from nation-states as well, transforming the entire global threat landscape forever. Intelligence professionals in today&#8217;s world must deal with issues and threats that have never existed, and therefore without historical data to reference when attempting to analyze them. Technological proliferation is the primary cause of this new threat landscape, technology in nearly every area of human life that is causing third world threats to be armed with first world weapons and technologies to aid their cause.</p>
<p>Transnational terrorist networks conducting cyberspace operations and coordinated paramilitary attacks on civilian populations have created global fear in addition to the physical threats that exist in the world, multiplying the overall effect of any attack they conduct. Many nation-states have also adopted non-traditional techniques and weapons, creating entirely new potential combat zones in space and cyberspace. The United States IC in today&#8217;s world must address a more significant number of potential and real threats, simultaneously, than have ever existed at one time in human history, and the freedom of the entire human race is at risk.</p>
<p>Intelligence professionals in the information age are no longer only trying to discover the number of tanks or missiles that an adversarial foreign nation has operational at a given time. They are instead assessing a multitude of threats without historical precedence that change the entire analysis and many which act as force multipliers, including but not limited to:</p>
<ul>
<li>The number of supercomputers any potential adversary has access to</li>
<li>The speed of an adversary&#8217;s most advanced processor</li>
<li>Whether or not terrorist organizations have access to weapons of mass destruction, how they might use them, and where they could turn to get them</li>
<li>Regional and global economic stability</li>
<li>Human rights violations by nation-states and non-state actors</li>
<li>Weaponized space assets, potential and known, and their impact(s)</li>
<li>Prospects for human expansion into space, including colonization, celestial militarization, and planetary resource exploitation</li>
<li>Robotics technology proliferation</li>
<li>Military and intelligence-related nano-science applications</li>
<li>Global and regional drug and sex trafficking operations</li>
<li>Human impacts on the Earth&#8217;s natural cycles</li>
<li>The radicalization of violent homicidal terrorists who gain a foothold in failed states and spread their ideology throughout cyberspace</li>
</ul>
<p>These are just some of the things that occupy the focus of the IC today, and each one has its own unique properties and operational requirements. Individual entities and organizations within each classification also contain their own unique features and operational tactics. The evolution apparent in the IC is as complex and expansive as the evolution from a paper letter to a personal computer hard drive with a terabyte of data storage. Growth does not make something inherently more effective; however, so another focus—on intelligence procedures themselves—is also necessary for the IC to appropriately adapt to current and future threats in the world.</p>
<h3>Intelligence Evolution in the Information Age</h3>
<p>Many of the challenges of today have not been addressed before in history and must be analyzed and understood before they can be addressed. Some threats are similar to threats of the past, however, and understanding history can help analysts learn to analyze more effectively, through the study of human nature, warfare, and intelligence operations throughout history. Communism is an ideology, and the Kharijite ideology that spurs the majority of radical Islamic terrorists into action is also an ideology. While there are few similarities between the ideologies themselves, the practice of combating an ideology on a global scale is not new to the United States or the IC. The Soviet Union eventually collapsed from economic and social disparity. The Communist ideology lost popularity, however, due to disillusionment within its believers, not the Soviet Union&#8217;s collapse.</p>
<p>Even Communist China does not follow the original Marxist philosophies of early communism. It has adapted to a Capitalistic type of communism in the face of widespread disillusionment with the Communist ideology. The Kharijite ideology can be fought the same way – through intentional and extensive operations aimed at disillusioning the believers and potential believers of radical Islamism. Cyberspace and economically challenged regions in the world are the primary recruiting grounds for radical terrorist organizations, which means the IC can target these same areas to eliminate the potential for recruitment, with aggressive, offensive counterintelligence operations in cyberspace in addition to economic interventions to educate and elevate the populations of regions with economic and social disparity. Ironically, eliminating social and economic inequality in critical areas of the world could collapse radical Islamic terrorist ideologies in much the same way that increasing economic and social disparity collapsed the Soviet Union and led to the disillusionment of Communism.</p>
<p>Lack of education and the censorship of information are significant factors that contribute to social disparities in the world, and therefore need to be countered with information proliferation and education. Part of this requires technological proliferation to increase the ease of access for societies to information through the internet, and potentially even Government sponsorship of satellite communications and internet capabilities for nation-states that lack the potential for such a technological infrastructure by themselves. Because this increases the risk of these technological assets being used by non-state actors for other purposes, increased intelligence operations, specifically in cyberspace, must accompany these information expansions.</p>
<p>In addition to these longer-term strategic economic and social methods to tear down the radical Kharijite ideology that fuels the majority of global Islamic terror, enhanced paramilitary operations and covert actions are needed to simultaneously combat physical terrorist elements already established around the world. With combined international cybersecurity efforts to ensure cyberspace as a place for global information proliferation and education, along with robust offensive counterintelligence, covert action, and paramilitary efforts to combat global terrorism and other physical Non-State Actor threats, world peace has its first opportunity in recorded history to be achievable and maintained. The challenge now is for Governments and people to realize this, and act accordingly to secure the future for humanity and the world.</p>
<p><em>The views and opinions expressed in this article are those of the author and do not necessarily reflect the official policy or position of any U.S. government agency, including but not limited to the Department of Defense, the Department of the Army, the Department of the Navy, or the Marine Corps. Assumptions made within the analysis are not reflective of the position of any U.S. government entity.</em></p>
<hr />
<p><sup>1</sup> Kristin Ven Bruusgaard, &#8220;Crimea and Russia&#8217;s Strategic Overhaul,&#8221; <em>Parameters</em> 44, no. 3 (2014): 81-90.</p>
<p><sup>2</sup> Miroslaw Przygoda, &#8220;China – Russia, a Strategic Political and Economic Axis of the Contemporary World,&#8221; <em>Varazdin Development and Entrepreneurship Agency (VADEA)</em> (2015).</p>
<p><sup>3</sup> Cuihong Cai and Diego Dati, &#8220;Words Mightier than Hacks: Narratives of Cyberwar in the United States and China,&#8221; <em>Asian Perspective</em> 39, no. 3 (2015): 541-553.</p>
<p><sup>4</sup> David Moore, <em>Sensemaking: A Structure for an Intelligence Revolution,</em> (Washington D.C.: NDIC Press, 2011).</p>
<p><sup>5</sup> Andrew Terrill, &#8220;Understanding the Strengths and Vulnerabilities of ISIS.&#8221; <em>Parameters</em> 44, no. 3 (2014): 13-23.</p>
<p><sup>6</sup> Thomas Grant, &#8220;International Dispute Settlement in Response to an Unlawful Seizure of Territory: Three Mechanisms,&#8221; <em>Chicago Journal of International Law</em> 16, no. 1 (2015): 1-42.</p>
<p><sup>7</sup> Rohan Gunaratna, &#8220;A New Threat Landscape in 2015,&#8221; <em>UNISCI Discussion Papers</em> 37 (2015): 9-13.</p>
<p><sup>8</sup> Dan Dickerson, “Iran Would Strike First,” <em>Journal of Counterterrorism and Homeland Security International</em> 16, no. 3 (2010): 30-36.</p>
<p><sup>9</sup> Paul Kerr and Mary Nikitin, &#8220;Pakistan’s Nuclear Weapons: Proliferation and Security Issues,&#8221; <em>Current Politics and Economics of the Middle East</em>3, no. 2 (2012): 313-351.</p>
<p><sup>10</sup> Kerr and Nikitin, “Pakistan’s Nuclear Weapons.”</p>
<p><sup>11</sup> Brian Kelly, &#8220;Investing in a Centralized Cybersecurity Infrastructure: Why “Hacktivism” Can and Should Influence Cybersecurity Reform,&#8221; <em>Boston University Law Review</em> 92, no. 5 (2012): 1663-1711.</p>
<p><a href="https://globalsecurityreview.com/from-missiles-to-microchips/">From Missiles to Microchips</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Revolt of the Admirals: The Perspective of the General Board</title>
		<link>https://globalsecurityreview.com/the-revolt-of-the-admirals-the-perspective-of-the-general-board/</link>
		
		<dc:creator><![CDATA[John Kuehn]]></dc:creator>
		<pubDate>Fri, 01 Jul 2022 14:47:00 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=13385</guid>

					<description><![CDATA[<p>This article has been adapted from Chapter 9 of the author&#8217;s larger work on the General Board,&#160;America&#8217;s First General Staff (Naval Institute Press, 2017). Published with the author&#8217;s permission. The passage of the 1947 National Security Act (NSA 1947) can be rightly identified as the causative agent of what became known to history as “The [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-revolt-of-the-admirals-the-perspective-of-the-general-board/">The Revolt of the Admirals: The Perspective of the General Board</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: center"><em>This article has been adapted from Chapter 9 of the author&#8217;s larger work on the General Board,&nbsp;</em><a href="https://www.usni.org/press/books/americas-first-general-staff">America&#8217;s First General Staff</a><em> (Naval Institute Press, 2017). Published with the author&#8217;s permission.</em></p>
<hr>
<p>The passage of the 1947 National Security Act (NSA 1947) can be rightly identified as the causative agent of what became known to history as “The Revolt of the Admirals.”&nbsp; At the same time, the organization that might have served as the nerve center for such a result, the General Board of the Navy (and where it had been the center for several low-level revolts in the past),&nbsp; played a decidedly muted role in all that went on.&nbsp; Instead, the newer and more powerful office of the Chief of Naval Operations (OpNav) served as the locus for what became a major civil-military relations crisis in 1949.<sup>[1]</sup></p>
<p>The General Board, once mighty until World War II, and now rejuvenated by the appointment of the retired Admiral John Towers might easily have then faded again into insignificance once Towers retired for good and Forrestal “fleeted up” from Secretary of the Navy (SecNav) to the new post of Secretary of Defense (SECDEF) per the National Security Act of 1947.&nbsp; That it did not is due to several factors:&nbsp; the new CNO, the new SecNav, and the continuing service of Towers’ handpicked lieutenants (especially Admiral “Soc” McMorris and Captain Arleigh Burke). Fleet Admiral Chester Nimitz retired nearly at the same time as Towers.&nbsp; His replacement, Admiral Louis Denfield, had been serving as Chief of the Bureau of Naval Personnel (BuPers).</p>
<p>Denfield might have reflected his position on the value of the General Board in a report in late 1945 for Forrestal delineating flag officer billets for the post-war Navy.&nbsp; Denfield recommended retention of the General Board with a complement of seven admirals.&nbsp;&nbsp; In another sign of his probable esteem and empathy for the Board, Denfield recommended upgrading the chairman’s rank from vice admiral to full admiral.&nbsp; This was precisely what Forrestal did when he brought Towers in to serve as chairman.&nbsp; The tone of the communications between the Board and the CNO became more cordial than it had been under Nimitz.&nbsp;&nbsp; The Board was to do some of its most interesting work under Denfield until the fight over naval aviation in 1949 witnessed the departure of SecNav John Sullivan (formerly Assistant SecNav) and removal of Denfield.<sup>[2]</sup>&nbsp;&nbsp; At the same time, the General Board decreased in size slightly, shrinking down to seven members (including only three admirals) with Towers’ departure.</p>
<p>A scan of the subjects assigned for the Board to study in 1948 reveals its new scope and charter.&nbsp;&nbsp; Beginning in January, Sullivan referred to it several very important policy topics, including:&nbsp; “Functions of the Navy in support of a National War Effort,”&nbsp; “Composition and cost of Reserve Fleets,” and revision of the “Naval Policy.”<sup>[3]</sup>&nbsp;&nbsp; Just as in 1922, the SecNav had turned to the General Board for an overall policy document under the new defense regime instituted by the NSA 1947.&nbsp; The idea of potential war, too, was very much on the minds of naval leaders at the highest levels, although it was at odds with the continuing demobilization and costs for maintaining some of the ships of the huge World War II legacy fleet in various states of readiness.</p>
<p>By the summer SecNav ordered another naval policy review, but more importantly, Sullivan turned to the General Board for a long-range recommendation for the design of the navy for the next decade (1951-1960).&nbsp;&nbsp; Arleigh Burke undertook the task of overseeing this study.&nbsp;&nbsp; The process had actually started the previous November under Towers with a top-secret memorandum to the CNO that in turn had been stimulated by Joint Strategic Plans Committee (JSPC) seeking the Board’s “…views…as to the Naval Operating Forces which will be required in Fiscal Year 1955, particularly as such information pertains to naval aviation.”<sup>[4]</sup>&nbsp;&nbsp; Thus the Board became involved in two of the most important naval issues of the day—the Navy of the future and the role of naval aviation in that future.&nbsp; The initial report by Burke in November 1947 emphasized that “The only major war likely to occur between now and fiscal 1955 is a war instigated by the USSR against the United States.”</p>
<p>Burke went on to emphasize his (and presumably the other Board members’) view of what navy that threat should be designed for:&nbsp; “The USSR will not intentionally risk such a war until she is fully prepared to fight with, in addition to her land forces, an air force, a submarine force, and possibly a guided missile force capable of delivering an effective surprise attack on industrial and military centers within the continental United States, our principal advance bases, and our lines of communications as the initial, hostile act.”&nbsp;&nbsp; The report also emphasized that the Board should use “history as a guide,” especially recent history—thus the notion that a Pearl Harbor type attack using new modern missiles, possibly on submarines or other ships, must be considered in construction and building decisions.</p>
<p>It made sense that naval aviation figured prominently as one means to keep this threat as far as possible from vital targets overseas as well as in the continental heartland.&nbsp;&nbsp; Just as important, however, were US submarines, both in the attack and as radar pickets.&nbsp; This view of future warfare helps understand better the selection of Denfield, a submariner, as CNO and the alignment of Burke and the Board in this matter.<sup>[5]</sup>&nbsp;&nbsp; At the same time, the Board was receiving updates from JCS staff papers (presumably those of the Joint Strategic Plans Committee) “each Friday.”<sup>[6]</sup></p>
<p>By June 1948 the analysis had expanded and included political and economic factors as well as military—each area getting its own enclosure.&nbsp; The study’s scope reminds one of George Kennan’s work.&nbsp; Possibly Burke or other members had read Kennan’s famous 1947 article on “The Sources of Soviet Conduct” in <em>Foreign Affairs</em>.<sup>[7]</sup>&nbsp; The study emphasized the ongoing concern over defense unification as a means to highlight the need to resolve these disputes to better formulate strategy:&nbsp; “The controversy which accompanied the attempts to merge the armed forces has not died out.&nbsp; The paramount interests of national security demand an atmosphere of harmony and unanimity of purpose in the military establishment and allow no room for unhealthy service jealousies and for bickering and jockeying for favored position.”&nbsp; The authors found that Europe and the “Middle East” were the two most “critical points of contact in a war with Russia.”<sup>[8]</sup></p>
<p>Enclosure D of the study discussed the Navy’s “contribution” inside a “harmonious” military establishment.&nbsp; The study made several predictions, including an estimate that the USSR would have atomic bombs by no later than 1952 ready for use in war and that the US would not initiate a “preventative war.”<sup>[9]</sup> In a later section it discussed the most urgent threats to aircraft carrier-centered forces as aircraft and submarines.&nbsp; It also emphasized the need for a large flush deck carrier to allow for the operation of larger aircraft to carry atomic bombs as well as to intercept attacking aircraft at better stand-off ranges (presumably due to atomic bomb-equipped aircraft from the USSR).&nbsp;&nbsp; Other “lessons learned” from World War II appeared in the form of an emphasis on anti-submarine warfare to counter a Soviet unrestricted submarine war similar to that of the Germans as well as the seizure of advanced bases on the periphery of the USSR to project power against the Soviet industrial base.<sup>[10]</sup></p>
<p>The completed top-secret report was then forwarded to Secretary Sullivan with the recommendation to provide copies to the secretaries of Defense (Forrestal), the Army, and the Air Force.&nbsp; At the same time, it included a withering critique of the readiness of all US military forces to engage in a war with the USSR, focusing in particular on the poor readiness as a result of budget economies that had left the US Navy bereft of ASW craft, submarines, aircraft, and with only eleven attack aircraft carriers.&nbsp;&nbsp; It also emphasized the delineation of “roles and missions” at Key West the year before had done little to solve the problem of inter-service rivalries and dis-unity of command.<sup>[11]</sup>&nbsp; Forrestal undoubtedly agreed with almost everything in the report, but one can see how these positions, especially the Board’s assessment of abysmal military readiness (among other things), might rub members of the Truman administration the wrong way.</p>
<p>Forrestal’s demise—and his protection as SECDEF of the General Board—was not long in coming.&nbsp;&nbsp; During the 1948 presidential campaign, it leaked out that he was willing to serve in a subsequent democratic administration.&nbsp; His principled opposition to further cuts and subordination of the Navy to a centralized, Army-Air Force controlled defense establishment further alienated him with those services and the President.&nbsp; In March 1949, after his unexpected re-election, Truman replaced Forrestal with Louis Johnson as SECDEF.<sup>[12]</sup>&nbsp; Johnson believed in economizing via reliance on air power to justify cuts. With Forrestal out of the way and an election mandate from the American people for Truman, Johnson adopted the attitude of the Army and Air Force vis-à-vis naval aviation and the Marine Corps.&nbsp; During the civil-military conflict known to history as “The Revolt of the Admirals” Johnson informed Admiral Richard Connolly:</p>
<p style="padding-left: 40px"><em>&#8220;Admiral, the Navy is on its way out.&nbsp; Now, take amphibious operations.&nbsp; There&#8217;s no reason for having a Navy and a Marine Corps.&nbsp; General Bradley&#8230;tells me that amphibious operations are a thing of the past.&nbsp; We&#8217;ll never have any more amphibious operations.&nbsp; That does away with the Marine Corps.&nbsp; And the Air Force can do anything the Navy can do nowadays, so that does away with the Navy.&#8221;<sup>[13]</sup></em></p>
<p>However, the General Board was not the lightning rod at the center of this major policy dispute in peacetime in the Navy—even though it supported Denfield and a strong role for naval aviation in the current defense structure.&nbsp; Shortly after helping write the “Ten Year” study, Burke left the Board for command of the cruiser <em>Huntington</em>.&nbsp; McMorris left as chairman the month prior.&nbsp; The Board was now under the leadership of the two-star admiral, although his heir apparent RADM Allan McCann could be categorized as an “up and comer.”<sup>[14]</sup>&nbsp;&nbsp; Because of the perceived shortcomings in the original “Ten Year” study, another was commissioned for the Board shortly after Burke’s departure in an effort to come up with a compromise.&nbsp; The resulting study had no more effect outside the Navy than its predecessor and might be regarded as the last national policy study the Board performed.<sup>[15]</sup></p>
<p>Burke’s work for the General Board attracted high-level attention and in late 1948 Denfield decided to use his policy expertise inside CNO, moving him from command and making him head of a new organization, OP-23, devoted exclusively to unification policy issues.<sup>[16]</sup>&nbsp;&nbsp; Burke’s OP-23 became the lightning rod instead of the General Board during the Revolt of the Admirals in the summer and fall of 1949.&nbsp;&nbsp; This episode in naval history has been dealt with at length elsewhere, but its impact on the existence of the General Board, which was not heavily involved, was significant.&nbsp; For SECDEF Johnson, the Navy’s resistance to a strategy that relied almost entirely on airpower for power projection in a possible nuclear war with the USSR had created a deep rift.&nbsp;&nbsp; Additionally, conflict overuse of the B-36 bomber versus a “supercarrier,” or both, also underlay the conflict.<sup>[17]</sup></p>
<p>The series of events characterized as “revolt” started not long after Johnson took over from Forrestal. Johnson initiated a series of actions that caused an eventual house-cleaning of the top leadership of the Navy—both civilian and senior officers—although it is unlikely that this is exactly what Johnson intended. The first to go was Secretary John Sullivan, who resigned shortly after Johnson canceled the contract to finish building the supercarrier <em>United States</em> –capable of launching nuclear-armed Navy bombers—in April 1949.[18]&nbsp; Sullivan’s replacement, Francis P. Matthews, was a political appointee with no experience with the Navy.&nbsp; He shared Johnson’s policy views on defense and the Navy’s subordinate role to the Air Force in strategy.<sup>[19]</sup>&nbsp;&nbsp; Matthews took charge during a period when Congressional opinion of the Navy had been damaged by the perception of official Navy misbehavior, if not misconduct, in a series of hearings on the B-36 before Congress.&nbsp;&nbsp; Burke and Vice CNO Arthur Radford worried about this perception and organized a series of hearings that fall (1949) to try to redeem the situation.&nbsp; At the same time, Burke worked under increasingly difficult conditions when McCann was pulled from the General Board in June and assigned as Navy Inspector General, his charter being to investigate Burke, among others.<sup>[20]</sup></p>
<p>The crisis came to a head when Radford and others began testifying to Congress early in October.&nbsp; Their reasoned testimony, supported by Burke’s office despite the seizure of its files, impressed Congressional observers and did much to retrieve the Navy’s reputation with the branch of government that could hurt it most.&nbsp; The climax came on 13 October—ironically the day celebrated as the US Navy’s birthday—with Denfield’s testimony.&nbsp; The CNO made an impassioned appeal for a robust defense policy not based solely on the “self-sufficiency of air power….”<sup>[21]</sup>&nbsp;&nbsp; Johnson and Matthews interpreted this as disloyalty and removed Denfield as CNO not long after, although Denfield remained on active service.&nbsp; Forrest Sherman, who had stayed in the background on the unification debates, became the CNO.&nbsp; It has been argued by some historians that Radford’s, Burke’s, and finally Denfield’s actions saved naval aviation (and possibly the Marine Corps as well).&nbsp;&nbsp; However, at the time this was far from certain.&nbsp;&nbsp; By June 1950 the Navy’s component of aircraft carriers was on the blocks to go as low as six on active duty with only one on station in the Western Pacific when the forces of North Korea invaded South Korea.&nbsp;&nbsp; This war—which confirmed predictions made in the Board’s 1948 study—had as big a role in saving naval aviation and the Marine Corps, and a large conventional Navy for sea control, as did the actions of Navy officers during the “revolt.”<sup>[22]</sup></p>
<p>The General Board might be regarded as collateral damage due to the “revolt.”&nbsp; However, it is not completely clear if the revolt was anything more than a contributing factor rather than the proximate cause of the Board’s disestablishment at the beginning of 1951, more than a year later.&nbsp; Little in the minutes and hearings of its activities references the momentous events in Congress, Burke’s OP-23 and with the CNO.&nbsp;&nbsp; During August 1949 the Board did look at two potentially controversial topics—one on the Army’s “General Staff System Applicability to the Navy.”&nbsp;&nbsp; Army Colonel Kilbourne Johnston of the Office of the Army Comptroller and “leading expert” on the Army system testified to the Board on 9 August.&nbsp; In his opening comments he said of the Board:</p>
<p style="padding-left: 40px"><em>&#8220;In my organization studies extending over a period of seventeen years, the Navy General Board has always appeared to me to be the epitome of the pure general staff theory.&nbsp; I think you will see as I develop my subject that in my own mind at least there is a grave doubt whether or not the Navy does not have a General Staff much closer to that conceived of by the Germans in the early part of the nineteenth century [than the Army]…&#8221;&nbsp;<sup>[23]</sup></em></p>
<p>Unfortunately, Secretary Matthews was not present to hear this rather astonishing judgment by an Army officer on the value of the General Board.&nbsp; The Board recommended that a specialized and centralized general staff corps <em>not</em> be adopted and that the current OpNav organization be retained without major changes “…until the full impact of the implementation of the National Security Act Amendments of 1949…on the Department of the Navy is known….”&nbsp; It also emphasized that this system resulted in “a high degree of civilian participation” but neglected its own significant role in assisting that participation.<sup>[24]</sup>&nbsp; Better reflecting Matthews’ concerns was another hearing two days later on “Organization of the Navy Department” with testimony by two “management engineers”—although it was clear that this hearing was closely related to whatever findings might emerge from the general staff discussions.&nbsp;&nbsp; Most of this discussion centered on how general staff functions and operations of the fleet had been concentrated under Admiral Ernest King as an expedient measure in wartime.<sup>[25]</sup></p>
<p>However, as the crisis of the revolt came to a head in September the General Board record was silent.&nbsp;&nbsp; It turned in its report on the General Staff on 19 August and the next set of minutes does not appear until 19 September 1949, after Denfield’s testimony was complete.&nbsp; The record simply picks up at the point with “business as usual,” announcing that VADM Harry W. Hill had reported as chairman.&nbsp;&nbsp; Hill had extensive combat experience in command of amphibious operations in World War II from Tarawa to Okinawa and had recently formed the National War College in Washington as its first commandant.&nbsp; His first order of business was to have the Board consider questions submitted to it by the Secretary of the Navy, although the record is silent about what these questions were.&nbsp; Perhaps they involved the recent unpleasantness with CNO.<sup>[26]</sup>&nbsp;&nbsp; These questions might be the reason that at the same time the Board began to plan for various field trips to naval bases and facilities from Key West to the West Coast in October.&nbsp; The record never specifies what its answers were, or even if they were forwarded to the Secretary—but if they were about recent events they did not cause Matthews to dissolve the Board.&nbsp; The hearings reflect no perturbations in routine either; on 4 October a secret hearing was held about integrating guided missiles onto surface ships and then much of the remainder of the month was spent on the aforementioned field trip.<sup>[27]</sup>&nbsp;&nbsp; In mid-November the Board picked up its routine again, looking at the “Relationship of the importance of the various budgetary programs to maintain the most effective Navy.”&nbsp; It would work this project until March of the following year.&nbsp; At this time the Board consisted of VADM Hill, two rear admirals, two captains (one as secretary), and one Marine colonel.<sup>[28]</sup></p>
<p>The demise of the General Board came not long after, quietly and without fanfare, much in the same way, the General Board had been created in 1900.&nbsp; At first, things seemed back to “ops normal,” but before long the Board’s old enemies inside the OpNav organization again made an issue of fleet design oversight, claiming that the Ships’Characteristics Board (SCB) inside OpNav obviated the Board’s historic role in prioritizing and reviewing ship designs.&nbsp; RADM G.H. Fort recommended that the current way of doing business, as ironed out by Towers nearly two years before, be retained.<sup>[29]</sup>&nbsp; This may have proved the proximate cause for both CNO and SecNav to reexamine the necessity for the Board.&nbsp; Its policy work could be done by RADM Burke’s Strategic Plans Division inside OpNav (OP-30), the SCB could handle its ships’ characteristics function, and the reconciliation of materiel ends, ways and means was now the province of a new Material Review Board created in December 1950.<sup>[30]</sup>&nbsp; The “Revolt” had removed any powerful partisans like Denfield and Sullivan who may have protected the General Board, to say nothing of Forrestal (who may have committed suicide).&nbsp; It simply had too many enemies in OpNav, which now controlled the Navy absolutely.</p>
<p style="text-align: center">* * *</p>
<p>On 16 January 1951 CNO Admiral Forrest Sherman informed Fort of the “dissolution” of the Board by “appropriate changes to U.S. Navy Regulations, 1948.”&nbsp; No reason was provided.&nbsp;&nbsp; SecNav Matthews apparently did not even tell the Board directly of his decision, although perhaps he had delegated the CNO to make this decision in the previous August.&nbsp;&nbsp; Too, the Korean War might have saved naval aviation and the Marines, but wartime had never served to highlight the utility of the Board while at the same time highlight the importance of OpNav.<sup>[31]</sup>&nbsp; The Board passed quietly into the mists of history, like a ship cutting through an empty patch of ocean.</p>
<hr>
<p>[1] For a complete history of the General Board, and especially its civil-military relations with various administrations, see the author’s&nbsp; <em>America’s First General Staff:&nbsp; A Short History of the Rise and Fall of the General Board of the Navy, 1900-1950</em> (Annapolis, MD: Naval Institute Press, 2017). This article comes from research for that work, especially chapter 9.</p>
<p>[2] National Archives and Records Administration (NARA), Record Group (RG 80), CNO Correspondence, BuPers (Denfeld) to CNO (Nimitz), 27 March 1946, “Flag Billets Proposal for in the Post War Navy.”</p>
<p>[3] NARA, RG-80, Proceedings and Hearings of the General Board (PHGB) serial list 1948, these encompassed, respectively, serials 315, 316, and 317.</p>
<p>[4] General Board (GB) serial list 1948, serial (321); Arleigh Burke papers, Naval Historical and Heritage Center (NHHC) 21 November 1947, “Naval Operating Forces – Fiscal 1955,” 1.</p>
<p>[5] Burke papers, 21 November 1947, “Naval Operating Forces – Fiscal 1955,” 1-2, 4-5.</p>
<p><a href="applewebdata://E5266262-0E91-4ACE-B4AF-00DB579F2834#_ednref6" name="_edn6">[6]</a> From 20 Sept 47 General Board Procedures, Burke Papers, Division III, page 5.</p>
<p>[7] George F. Kennan, “The Sources of Soviet Conduct” by X. <em>Foreign Affairs</em> (July 1947): 566–82.</p>
<p>[8] GB 425, 25 June 1948, “National Security and Navy Contributions Thereto for the Next Ten Years:&nbsp; A Study by the General Board,” from the Burke Papers, Enclosure C (Military), 1-3.&nbsp; This study was also known as serial 315.</p>
<p>[9] Ibid., 1-3, and Enclosure D, “Concepts of War and Navy Contributions,” from the Burke Papers, 1-2.</p>
<p>[10] Ibid., Enclosure D, “Concepts of War and Navy Contributions,” from the Burke Papers, 7, 56.</p>
<p>[11] Ibid., Enclosure C, “Conclusions,” 1-9.</p>
<p>[12] Barlow, <em>Revolt of the Admirals</em>, 174-175.</p>
<p>[13] Cited in Baer, <em>One Hundred Years</em>, 313.</p>
<p>[14] GB ML 1948; Barlow, 165; Carl LaVO, <em>Pushing the Limits:&nbsp; The Remarkable Life and Times of Vice Admiral Allan Rockwell McCann</em>(Annapolis, MD: Naval Institute Press, 2013), 200-202.&nbsp; McCann became Inspector General of the Navy during the “Revolt of the Admirals” in 1949.</p>
<p>[15] GB 325, “Navy Contributions to National Security, revision of 315 and continuous study,” 6 October 1948.</p>
<p>[16] Barlow, <em>Revolt of the Admirals</em>, 164-169.</p>
<p>[17] Barlow, <em>The Revolt of the Admirals</em>, chapter 9.</p>
<p>[18] Barlow, 186-191.</p>
<p>[19] Barlow, 206.</p>
<p>[20] GB ML 1949; McCann was reassigned by Matthews on 20 June; see also LaVO, <em>Pushing the Limits</em>, 206-211.</p>
<p>[21] Barlow, 247-254.</p>
<p>[22] Barlow, 269-273; Baer, 318-320.</p>
<p>[23] PHGB 9 August 1949, “Organization of U.S. Army General Staff.,” 1.</p>
<p>[24] GB 142EN2 (7-49), 19 August 1949, “Applicability of the General Staff System to the Navy, Study of,” 1-2.</p>
<p>[25] PHGB 11 August 1949, “Organization of the Navy Department.”</p>
<p>[26] GB minutes 19 August 1949; for Hill see <a href="http://www.navysite.de/dd/dd986.htm">http://www.navysite.de/dd/dd986.htm</a> (accessed 8/30/2016).</p>
<p>[27] PHGB 4 October 1949, “Guided Missles;” GB minutes September and October 1949.</p>
<p>[28] GB minutes November 1949 through March 1950.</p>
<p>[29] GB 155EN2, G.H. Fort to VCNO 11 October 1950, “Establishment of Shipbuilding and Conversion Programs and Ship Characteristics therefor,” 1-3.</p>
<p>[30] Baer, 301; SecNav Correspondence, SecNav to&nbsp; CNO and Chief of Material, 28 December 1950, “Material Review Board.”</p>
<p>[31] See Kuehn, <em>America’s First General Staff</em>, especially chapters 5 and 9.</p>
<p><a href="https://globalsecurityreview.com/the-revolt-of-the-admirals-the-perspective-of-the-general-board/">The Revolt of the Admirals: The Perspective of the General Board</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Understanding Information Operations &#038; Information Warfare</title>
		<link>https://globalsecurityreview.com/understanding-information-operations-information-warfare/</link>
		
		<dc:creator><![CDATA[Matthew J. Fecteau]]></dc:creator>
		<pubDate>Wed, 22 Jun 2022 15:44:22 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Information Operations]]></category>
		<category><![CDATA[Information Warfare]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=9644</guid>

					<description><![CDATA[<p>This article was originally published on January 7, 2019. The concept of information operations (IO) has entered into our everyday lexicon without a precise definition. Any stated definition of information operations is relative to the context. IO remains a complex subject, and the field is evolving. This article hopes to provide greater insight and clarity [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/understanding-information-operations-information-warfare/">Understanding Information Operations &#038; Information Warfare</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>This article was originally published on January 7, 2019.</em></p>
<h2>The concept of information operations (IO) has entered into our everyday lexicon without a precise definition.</h2>
<p>Any stated definition of information operations is relative to the context. IO remains a complex subject, and the field is evolving. This article hopes to provide greater insight and clarity into the definition of IO, and also identify existing and potential shortfalls.</p>
<p>Regardless of context, information operations maintain some nearly-universally-agreed-upon characteristics. An information operation is a campaign that is dedicated to obtaining a decisive advantage in the information environment. Some conflate IO with mere cyber or influence operations, but these are one of many capabilities that IO practitioners—both civilian and military—use to gain an edge in the information environment.</p>
<p>This messaging effort has multiple components to ensure the desired effects are delivered in the most advantageous way possible—sometimes using influence and other times the intention is solely to send a direct, clear, and concise message. Take, for example, a scenario involving displaced persons. The influencing elements are sending out pamphlets intended to induce the displaced persons to return home, but civil liaison elements are building permanent structures that will incentivize displaced individuals to remain. It is the IO practitioner’s job to de-conflict this disjointed message. An IO practitioner should be working in tandem with other capabilities to shape the information environment.</p>
<h3>The Russian interference in the 2016 presidential election was a strategic use of IO.</h3>
<p>The Russian government sought to both influence the U.S. presidential election, and undermine the Democratic systems. State-sponsored Russian actors hacked into Democratic National Committee servers and gained access to a key Democratic advisor’s emails. These hackers than used third-party intermediaries to release derogatory or potentially damaging information through WikiLeaks. Furthermore, Russian actors focused on psychological operations disseminated propaganda and disinformation via social media. An IO practitioner would, typically, be the one that coordinated this effort.</p>
<p>However, the definition of IO can change based on the context in which the term is used. According to a Congressional Research Service (CRS) report from 2018, a government entity, IO is sometimes conflated with Information Warfare (IW). <u><a href="https://fas.org/sgp/crs/natsec/R45142.pdf">The report says</a></u> that “Information warfare takes place at the strategic level, while information operations (IO) involve using various information-related capabilities to implement the strategy.” However, unlike IO, IW is not defined in any contemporary U.S. military doctrine, nor does the U.S. military doctrine specify IW “takes place at the strategic level.” Surprisingly, no recent U.S. Government publication specifies there is a distinction between IO and IW; the U.S. Government should clarify the difference—if one exists.</p>
<h3>The U.S. military has its own distinct view of information operations.</h3>
<p>The <u><a href="http://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp3_13.pdf">2016 U.S. military doctrine</a></u> defines IO as “The integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision-making of adversaries and potential adversaries while protecting our own.” Per this doctrine, IO is focused on coordination and synchronization “during military operations.” IO is absent real deliverables, it relies on other capabilities to deliver effects. As previously stated, influence and cyber operations are just two of many information-related capabilities.</p>
<p>The more antiquated IO <u><a href="http://www.c4i.org/jp3_13.pdf">doctrine</a></u> distinguished between information warfare and information operations. In a military <u><a href="http://archive.defense.gov/news/newsarticle.aspx?id=41611">publication from 1999</a></u>, IO is defined as “…actions taken to affect adversary information and information systems while defending one&#8217;s own information and information systems.” The publication addresses IW as “Information warfare (IW) is IO conducted during time of crisis or conflict (including war) to achieve or promote specific objectives over a specific adversary or adversaries.” While these definitions appear to be out-of-date, they provide substantially greater clarity and understandability than contemporary military doctrine (IW was removed from military doctrine in 2006).</p>
<p>In the private sector, the definition differs from the military with actual deliverables. <u><a href="https://fbnewsroomus.files.wordpress.com/2017/04/facebook-and-information-operations-v1.pdf">Facebook Security</a></u> defines “as actions were taken by organized actors (governments or non-state actors) to distort domestic or foreign political sentiment, most frequently to achieve a strategic and/or geopolitical outcome.” Facebook’s definition appears to conflate IO with mere influencing instead of producing a specific desired effect.</p>
<p>The nonprofit global policy think tank Rand Corporation <u><a href="https://www.rand.org/topics/information-operations.html">defines IO</a></u> as the following: “Information operations and warfare, also known as influence operations, includes the collection of tactical information about an adversary as well as the dissemination of propaganda in pursuit of a competitive advantage over an opponent.” This definition poses a number of challenges because—again—much like the private-sector Facebook definition, it is focused on “influence operations,” which are, in actuality, only part of a true IO campaign that is synchronizing and coordinating a range of influence, cyber, and psychological elements. RAND’s definition also conflates IW with IO. For its part, the CRS report attempts to distinguish IW from IO, something U.S. military doctrine fails to do.</p>
<h3>The absence of a clear definition could lead to a strategic disaster.</h3>
<p>Making things even more complicated is the fact that these nuanced definitions also face international interpretation, and the United States’ foreign competitors may define or conceptualize information operations differently. This means matching their capabilities that much more difficult, making any discussion over a strategic competitor’s (e.g. Russia) IO capabilities an apples-to-oranges comparison.</p>
<p>It is now more important than ever to develop a clear and concise understanding of information operations as a concept. Unfortunately, this paper may fall short because of the complexity and evolving nature of IO. In the short-term, the U.S. Government could re-adopt the out-of-date, yet more concise definitions for IO and IW.</p>
<p>Updating these definitions would ensure that IO is properly understood, conceptually and practically speaking. Until then, with each new IO definition, there will be a nuanced complexity that only serves to confuse rather than clarify the ever-changing nature of information operations.</p>
<hr />
<p><em>The views expressed in this report are those of the author and do not necessarily reflect the official policy or position of the Department of the Army, the Department of Defense, or the U.S. Government.</em></p>
<p><a href="https://globalsecurityreview.com/understanding-information-operations-information-warfare/">Understanding Information Operations &#038; Information Warfare</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Department of Defense’s Multidomain Operations Challenge</title>
		<link>https://globalsecurityreview.com/defense-department-multidomain-operations-challenge/</link>
		
		<dc:creator><![CDATA[John Laudun, Tom Kroh, Mahbube Sidikki, Robert Arp, &amp; Adam Lowther]]></dc:creator>
		<pubDate>Thu, 16 Jun 2022 13:10:00 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=24470</guid>

					<description><![CDATA[<p>This article was originally published on October 21, 2021. In response to the shift towards Indo-Pacific regional concerns, the US Army and the Department of Defense began developing multidomain operations as a broad warfighting concept in 2016. Relying on a “third offset” that acknowledges the Army will “operate on congested, and potentially contaminated battlefields while [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/defense-department-multidomain-operations-challenge/">The Department of Defense’s Multidomain Operations Challenge</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>This article was originally published on October 21, 2021. </em></p>
<p>In response to the shift towards <a href="https://www.defense.gov/News/News-Stories/Article/Article/604466/igphoto/2001845768/">Indo-Pacific regional concerns</a>, the US Army and the Department of Defense began developing multidomain operations as a broad warfighting concept in <a href="https://www.defensenews.com/digital-show-dailies/ausa/2016/10/03/the-multi-domain-battle/">2016</a>. Relying on a “<a href="https://usacac.army.mil/sites/default/files/publications/17855.pdf">third offset</a>” that acknowledges the Army will “operate on congested, and potentially contaminated battlefields while under persistent surveillance, and will encounter advanced capabilities such as cyber, counter-space, electronic warfare, robotics, and artificial intelligence,” the goal is to develop information advantage that allows American forces to operate with greater speed and efficiency.</p>
<p>The problem with this information-dependent future is that adversaries are already working on asymmetric ways to disrupt and defeat this approach. Thus, we see five problems for the Army specifically, and also the overall joint force&#8217;s plans for a future where multidomain operations is the warfighting concept around which land forces and the joint force deter or defeat China and Russia: (1) understanding that the US is already at war with Russia and China; (2) multidomain operations rely on artificial intelligence; (3) the US is falling behind Russia and China in the development of robotic and autonomous systems; (4) China and Russia are leveraging Americans’ social media information presence to manipulate truth; and (5) adversaries are seeking to deny the US access to the electromagnetic spectrum.</p>
<h3>The State of Play</h3>
<p>Starting with background information is instructive. First, the shift to multidomain operations comes in response to the <a href="https://apps.dtic.mil/dtic/tr/fulltext/u2/1039909.pdf">Asia-Pacific pivot</a>, which the Obama administration and subsequent administrations began. To meet the needs of the pivot, the DoD authored the <a href="https://dod.defense.gov/Portals/1/Documents/pubs/ASB-ConceptImplementation-Summary-May-2013.pdf">Air-Sea Battle</a> concept (2013), which largely excluded the Army and incentivized the service to rethink its role in future conflicts.</p>
<p>[bs-quote quote=&#8221;The United States\&#8217; first challenge is understanding that the country is already at war with Russia and China.&#8221; style=&#8221;default&#8221; align=&#8221;left&#8221; color=&#8221;&#8221; author_name=&#8221;&#8221; author_job=&#8221;&#8221; author_avatar=&#8221;&#8221; author_link=&#8221;&#8221;][/bs-quote]</p>
<p>Thus, when the 2017 <em><a href="https://trumpwhitehouse.archives.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf">National Security Strategy</a></em> refocused on <a href="https://www.state.gov/wp-content/uploads/2020/06/T-paper-series-6-Strategic-competition-508.pdf">peer competition</a>, the Army was already in the midst of developing a new warfighting concept designed to defeat Russia or China in a <a href="https://mwi.usma.edu/large-scale-combat-operations-army-can-get-groove-back/">large-scale conventional operation</a>. <a href="https://warontherocks.com/2017/06/multi-domain-battle-airland-battle-once-more-with-feeling/">Multidomain battle</a> (2016) became <a href="https://adminpubs.tradoc.army.mil/pamphlets/TP525-3-1.pdf">multidomain operations</a> (2018) and eventually became <a href="https://crsreports.congress.gov/product/pdf/R/R46725">joint all domain command and control</a> within the joint community. The Army, however, continues to discuss multidomain operations, which it sees as distinct from joint all domain command and control.</p>
<p>The US Army’s <a href="https://breakingdefense.com/2021/08/army-hammers-out-multi-domain-ops-doctrine-capstone-fm-3-0-due-next-summer/"><em>Field Manual 3-0, Operations </em>(FM 3-0)</a>, currently in coordination, introduces <a href="https://www.army.mil/article/243754/the_u_s_army_in_multi_domain_operations_2028">multi-domain operations</a> as the warfighting concept under which land forces will defeat Russia, China, or any adversary in large-scale conventional operations. The draft version describes multidomain operations as “how army forces enable and operate as part of the joint force against threats able to contest it in all domains” with a focus on creating and exploiting advantage across the continuum of conflict—integrating capabilities across multiple domains.<sup>1</sup>&nbsp;This definition is similar to the Joint Staff’s <a href="https://crsreports.congress.gov/product/pdf/R/R46725">definition</a> of joint all domain command and control, which seeks to connect all military services&#8217; sensors into a single network.</p>
<p>As <a href="https://warontherocks.com/2021/09/confronting-chaos-a-new-concept-for-information-advantage/">Chris Dougherty</a> has recently observed, the idea that all sensors can be connected to all shooters and that information advantage can be achieved once and for all are both unrealistic. Enough sensors connected to enough shooters during a period of enough advantage is the Army and the Department of Defense’s goal. Or, as <a href="https://warontherocks.com/2021/07/new-tools-to-create-time-and-information-building-the-bike-while-we-ride-it/">General Glen Vanherck</a> termed it, we need to focus on continually building the bike even as we ride it, and roads continue to change.</p>
<h3>It Is More than Great-Power Competition</h3>
<p>The United States&#8217; first challenge is understanding that the country is <a href="https://warontherocks.com/2016/10/american-strategy-and-the-six-phases-of-grief/">already at war</a> with Russia and China. Some within the military and foreign policy establishment attempt to coopt the joint-phasing construct, which includes six “phases” of conflict—laid out in <a href="http://edocs.nps.edu/dodpubs/topic/jointpubs/JP3/JP3-0_100322.pdf">Joint Publication 3-0 </a>—as a way to easily distinguish between peace and war. However, this model was designed to arrange operations, not serve as a model for when war begins and ends.</p>
<p><figure id="attachment_24477" aria-describedby="caption-attachment-24477" style="width: 367px" class="wp-caption alignright"><img loading="lazy" decoding="async" src="http://globalsecurityreview.com/wp-content/uploads/2021/10/oplan-vs-military-effort-joint-operations.png" class="size-full wp-image-24477" alt="Joint Operations" width="367" height="336" srcset="https://globalsecurityreview.com/wp-content/uploads/2021/10/oplan-vs-military-effort-joint-operations.png 367w, https://globalsecurityreview.com/wp-content/uploads/2021/10/oplan-vs-military-effort-joint-operations-300x275.png 300w" sizes="(max-width: 367px) 100vw, 367px" /><figcaption id="caption-attachment-24477" class="wp-caption-text"><em>Fig. 1. Joint Publication 3-0: Joint Operations (2010)</em></figcaption></figure></p>
<p>The Joint Staff has since <a href="https://www.thedecisivepoint.org/news/2017/8/26/reviewing-joint-publication-5-0">reduced the focus on this phased approach</a> to operational planning with its 2017 and <a href="https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp5_0.pdf?ver=ztDG06paGvpQRrLxThNZUw%3d%3d">2020</a> revisions because too many planners and warfighters viewed the phases like a step-by-step process that, once completed, returns the United States to a state of peace. The perception that the military would seamlessly progress from Phase 0 to Phase V and back to Phase 0 was an easy mental model to follow but is contrary to the approaches of <a href="https://www.heritage.org/global-politics/report/winning-without-fighting-the-chinese-psychological-warfare-challenge">China</a> and <a href="https://crsreports.congress.gov/product/pdf/IF/IF11625">Russia</a>.</p>
<p>Despite the Joint Staff’s effort to <a href="https://www.jcs.mil/Portals/36/Documents/Doctrine/jdn_jg/jdn1_19.pdf?ver=2019-06-03-133547-197">reshape thinking</a> within the Department of Defense by recasting conflict as phase-less in recent revisions, this tidy conception of warfare persists. Jake Bebber is correct when he&nbsp;<a href="https://www.researchgate.net/publication/305479256_Information_War_and_Rethinking_Phase_0">writes</a>, “Yet it is here, in Phase 0, that adversaries are conducting military operations designed to deter and ultimately defeat the United States, whether in cyberspace or the broader ‘informationization’ of warfare. It is an era of persistent conflict.” Whether it is Russian hybrid warfare or Chinese informationized warfare, neither adversary sees a clear distinction between war and peace. We are already at war.</p>
<p>Contrary to the American view, the current era is not competition but war between the United States and China/Russia. This war is <em>primarily</em> in the <a href="http://globalsecurityreview.com/cold-war-2-0-russian-information-warfare/">information</a> environment and <a href="https://www.indiatoday.in/world/story/inside-china-s-cyber-war-room-how-pla-is-plotting-global-attacks-1708292-2020-08-06">cyber</a> domain that it is all too frequently dismissed as competition when it is not.</p>
<h3>Failing to Lead in Artificial Intelligence and Machine Learning</h3>
<p>Second, multidomain operations rely on artificial intelligence as an <a href="https://warontherocks.com/2020/09/artificial-intelligence-for-medical-evacuation-in-great-power-conflict/">enabling technology</a> to speed the process of collection, sense-making, and sharing of information—transforming Army <a href="https://warontherocks.com/2018/12/artificial-intelligence-and-the-military-technology-is-only-half-the-battle/">information</a> processing. According to <a href="https://slate.com/news-and-politics/2021/10/us-lost-artificial-intelligence-race-china-nicolas-chaillan.html">Nicholas Chaillan</a>, the &nbsp;United States has already lost the race with <a href="https://warontherocks.com/2020/05/keeping-the-russians-out-the-americans-in-and-the-computers-down-erik-lin-greenberg-on-his-article-allies-and-artificial-intelligence/">Russia</a> and <a href="https://warontherocks.com/2020/06/chinese-debates-on-the-military-utility-of-artificial-intelligence/">China</a> in artificial intelligence.</p>
<p>As <a href="http://dx.doi.org/10.26153/tsw/13985">Paul Scharre</a> observes, technological advances often lead to economic and military advantages. Europe’s lead in the Industrial Revolution made it possible for European nations to control over 80 percent of the world’s landmass by 1914. If the United States falls further behind in the development of artificial intelligence, it may lose a military conflict with China.</p>
<p>The lack of <a href="https://warontherocks.com/2020/01/the-ethical-upside-to-artificial-intelligence/">moral</a> and <a href="https://warontherocks.com/2019/07/i-black-box-explainable-artificial-intelligence-and-the-limits-of-human-deliberative-processes/">legal</a> norms that <a href="https://warontherocks.com/2019/09/the-devil-you-know-trust-in-military-applications-of-artificial-intelligence/">challenge</a> American efforts to weaponize artificial intelligence also creates an advantage for China and Russia that bleeds over into their ability to collect superior <a href="https://warontherocks.com/2020/09/cyber-conflict-as-an-intelligence-competition-in-an-era-of-open-innovation/">adversary</a> data used to train artificial intelligence and machine learning systems.</p>
<p>Another area where American perceptions differ greatly from those of the Chinese and Russians involves the “<a href="https://www.fedscoop.com/ai-should-have-human-on-the-loop-not-in-the-loop-when-it-comes-to-nuke-detection-general-says/">human in/on the loop</a>” question. The hand-wringing Americans engage in over the need for human control of <a href="https://warontherocks.com/2020/06/the-promise-and-risks-of-artificial-intelligence-a-brief-history/">military artificial intelligence</a> does not occur in <a href="https://www2.deloitte.com/bd/en/pages/about-deloitte/press-releases/deloitte-global-automotive-study-asia-pacific-insights.html">China</a> or Russia, where there is a&nbsp;<a href="https://us-east-1-02800070-inspect.menlosecurity.com/safeview-fileserv/tc_download/66a36533953c33c4ab47dc48e743e484053a83d68a413be665806ac6635e6a98/?&#038;cid=NCF7521E87EE6_&#038;rid=e1f2cb9f5f6c62161048da34ec551a91&#038;file_url=https%3A%2F%2Fwww.brookings.edu%2Fwp-content%2Fuploads%2F2020%2F04%2FFP_20200427_ai_weapons_kania_v2.pdf&#038;type=original">greater willingness</a> to rely on autonomous systems in virtual and physical environments.</p>
<p>When it comes to measuring the success of multidomain operations, improving the <a href="https://www.forbes.com/sites/forbestechcouncil/2018/10/05/hows-your-ai-ooda-loop/?sh=5c9bc8de6b13">speed and accuracy</a> of decision-making is <a href="https://www.japcc.org/speeding-up-the-ooda-loop-with-ai/">critical</a>. More than any other service, the Army needs its lower echelon forces to <a href="https://warontherocks.com/2020/04/technology-enabled-mission-command-keeping-up-with-the-john-paul-joneses/">operate independently</a>, especially when communications and connectivity are highly contested.</p>
<p>The <a href="https://warontherocks.com/2020/06/chinese-debates-on-the-military-utility-of-artificial-intelligence/">Chinese</a> and <a href="https://www.defenseone.com/technology/2021/05/russia-accelerating-its-own-link-everything-network/174242/">Russians</a> are well aware of the Department of Defense&#8217;s information dependency with the development of multidomain operations and <a href="https://warontherocks.com/2021/07/to-build-joint-command-and-control-first-break-joint-command-and-control/">joint all domain command and control</a>. As a result, peer adversaries prioritize their OODA loops and the prevention of American effects/influence on their decision-making.</p>
<p>[bs-quote quote=&#8221;Neither China nor Russia has the same conception of war and peace as the United States—leaving the Army, and the joint force, at a distinct disadvantage.&#8221; style=&#8221;default&#8221; align=&#8221;left&#8221; color=&#8221;&#8221; author_name=&#8221;&#8221; author_job=&#8221;&#8221; author_avatar=&#8221;&#8221; author_link=&#8221;&#8221;][/bs-quote]</p>
<p>To deter or defeat American action, both adversaries actively develop artificial intelligence capabilities to penetrate our systems. For the offense, attacks must only work once, where the defense must work repeatedly. When the challenges discussed in this section are taken in aggregate, they present a serious challenge to American success in successfully incorporating artificial intelligence into the systems that will ensure multidomain operations are successful.</p>
<h3>Robotic and Autonomous Systems</h3>
<p>Third, the United States is falling behind <a href="https://thestrategybridge.org/the-bridge/2020/10/8/autonomous-systems-in-the-combat-environment-the-key-or-the-curse-to-the-us">China</a> and <a href="https://us-west-1-02800070-inspect.menlosecurity.com/safeview-fileserv/tc_download/cc34509941844439d8053027dfca64d00b54d73c7829794a3179719e18ffd2ff/?&#038;cid=NE5AE8ACD92AC_&#038;rid=c7e0e1e7bbb9f43842412aefa3c2a6bf&#038;file_url=https%3A%2F%2Fwww.cna.org%2FCNA_files%2Fcenters%2FCNA%2Fsppp%2Frsp%2Frussia-ai%2FRussia-Artificial-Intelligence-Autonomy-Putin-Military.pdf&#038;type=original">Russia</a> in the <a href="https://www.newsweek.com/russia-building-army-robot-weapons-chinas-ai-tech-helping-1594362">development</a> of robotic and autonomous systems, which are also critical to the success of multidomain operations. Adversaries field <a href="https://info.publicintelligence.net/USArmy-RoboticAutonomousMultiDomainOps.pdf">systems</a> range from intelligence, surveillance, and reconnaissance platforms to various types of battlefield drones.</p>
<p>For the United States, similar <a href="https://www.cnas.org/publications/reports/proposed-dod-principles-for-the-combat-employment-of-weapon-systems-with-autonomous-functionalities">systems are not fully autonomous</a>, requiring human control and data analysis. This limits the ability of such <a href="https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/May-June-2017/Pros-and-Cons-of-Autonomous-Weapons-Systems/">systems to serve as force multipliers</a>. For adversaries, robotic and autonomous systems are indispensable as artificial intelligence develops to the point where turning over deadly force to robots is feasible. Whether the United States fields “<a href="https://www.vox.com/2019/6/21/18691459/killer-robots-lethal-autonomous-weapons-ai-war">killer robots</a>” is yet to be seen.</p>
<p>The Army’s <em><a href="https://mronline.org/wp-content/uploads/2018/02/RAS_Strategy.pdf">Robotics and Autonomous Systems Strategy</a></em> (2017) outlines five major objectives: increase situational awareness, lighten soldiers’ physical and cognitive workloads, sustain the force with increased distribution throughput and efficiency, facilitate movement and maneuver, and protect the force. The service is <a href="https://www.armytimes.com/news/your-army/2020/12/01/these-soldiers-ran-a-robot-combat-vehicle-in-rifle-platoon-maneuvers/">developing systems</a> that can support all of the five objectives as a single unit or well-coordinated group but not serve as autonomous killer robots.</p>
<p>These robotic and autonomous systems need to be enabled by <a href="https://es.ndu.edu/Portals/75/Documents/industry-study/reports/2017/es-is-report-robotics-and-autonomous-systems-2017.pdf">numerous data capture and tracking systems</a> such as <a href="https://www.militaryaerospace.com/trusted-computing/article/14073850/data-storage-military-aerospace-applications">smart storage media</a>, <a href="https://www.mdpi.com/1424-8220/19/12/2651/pdf">wearables</a>, <a href="https://www.getfareye.com/insights/blog/real-time-visibility">real-time visibility, and </a><a href="https://www.research.manchester.ac.uk/portal/files/54516759/FULL_TEXT.PDF">conditions monitoring</a>. <a href="https://www.ge.com/additive/additive-manufacturing">Additive manufacturing</a>, artificial intelligence and machine learning, <a href="https://warontherocks.com/2020/02/the-army-needs-full-stack-data-scientists-and-analytics-translators/">data science</a>, and <a href="https://www.sas.com/en_us/insights/analytics/predictive-analytics.html">predictive analysis</a> play a central role in enabling such systems.</p>
<p>What is often under-examined is the <a href="https://idstch.com/technology/ict/databases-are-migrated-to-a-cloud-platform-with-data-as-a-service-daas/">data storage, management, and manipulation requirements</a> for these systems, which is staggering and a critical target for adversaries. Undoubtedly, <a href="https://warontherocks.com/2020/08/peering-into-the-future-of-sino-russian-cyber-security-cooperation/">Chinese and Russian offensive operations</a> are and will seek to penetrate American systems before an attack.</p>
<p>Joint all domain command and control and multidomain operations depend on rapidly collecting, sharing, evaluating, and applying vast quantities of data. The <a href="https://www.washingtonpost.com/national-security/china-us-military-technology/2021/03/31/acc2d9f4-866c-11eb-8a67-f314e5fcf88d_story.html">technologies under development by the United States</a> are highly dependent on data to function, leaving them susceptible to the <a href="https://foreignpolicy.com/2013/04/12/the-five-deadly-ds-of-the-air-forces-cyber-arsenal/">“5 Ds” of offensive cyber operations: deny, degrade, disrupt, destroy, or deceive</a>.</p>
<p>Overcoming the moral/legal, data management, and cyber challenges will make or break the utility of robotic systems for the Army and the joint force—and it all occurs before the first shot is ever fired.</p>
<h3>Collateral Data</h3>
<p>Fourth, <a href="https://www.politico.eu/article/russia-china-us-protests-social-media-twitter/">China and Russia</a> are effectively using the openness of American social information systems to create expansive disinformation and <a href="https://www.google.com/books/edition/Three_Dangerous_Men_Russia_China_Iran_an/REIfEAAAQBAJ?hl=en&#038;gbpv=0">misinformation capabilities</a> that are specifically targeted at not only the American people but soldiers, sailors, airmen, marines, and guardians. These capabilities enable adversaries to obfuscate, hide, and create information, making it <a href="https://warontherocks.com/2018/09/social-media-as-war/">difficult or impossible</a> for Americans—and service members—to separate truth from fiction.</p>
<p>As Guy Schleffer and Benjamin Miller highlight, adversaries can also attack the United States by <a href="https://tnsr.org/2021/07/the-political-effects-of-social-media-platforms-on-different-regime-types/">achieving political effects through social media platforms</a>, where they achieve a <em>fait accompli </em>by exploiting “vast amounts of data about people.” Russian misinformation in the <a href="https://time.com/5565991/russia-influence-2016-election/">2016 election</a> is but one example of the successes such efforts yield. Moreover, campaigns targeting service members are also an adversary tool that will grow in use in years to come as adversaries <a href="https://mediajustice.org/news/the-intercept-shadowdragon-inside-the-social-media-surveillance-software-that-can-watch-your-every-move/">map the social networks</a> of service members and <a href="https://www.bbc.com/news/world-asia-53544505">develop individual profiles</a> for exploitation.</p>
<p>Adversaries engage in a <a href="https://warontherocks.com/2020/01/russia-as-a-hurricane-china-as-climate-change-different-ways-of-information-warfare/">wide variety of experimentation</a> to better shape the views of service members. But just as the platforms’ internal tools for refining results are increasingly driven by machine learning, we expect <a href="https://warontherocks.com/2017/07/cyber-attacks-on-critical-infrastructure-insights-from-war-gaming/">infiltration</a> of information ecosystems by <a href="https://www.wired.com/story/ai-generated-text-is-the-scariest-deepfake-of-all/">texts which are being dynamically generated</a> and refined by sophisticated algorithms.</p>
<p>With data theft and sales widespread, there is an ability to micro-target anyone, anywhere, at any time, as <a href="https://www.youtube.com/watch?v=n8Dd5aVXLCc">Cambridge Analytica demonstrated</a>. Contrary to popular belief, avoiding social media does not provide immunity from these efforts because friends, family, acquaintances provide sufficient data and associates that <a href="https://warontherocks.com/2018/09/social-media-as-war/">levers of influence are available</a> to those interested in and <a href="https://warontherocks.com/2018/05/what-did-russian-trolls-want-during-the-2016-election-a-closer-look-at-the-internet-research-agencys-active-measures/">committed to using</a> them.</p>
<p>Admittedly, many soldiers do not realize how <a href="https://warontherocks.com/2021/09/confronting-chaos-a-new-concept-for-information-advantage/">information operations</a> are maturing in the era of ubiquitous information technologies. In short, information is always-on, ubiquitous, porous, and presents dangers for soldiers.</p>
<h3>The Ether Is Everywhere</h3>
<p>Fifth, the success of multidomain operations is also under threat because of American dependence on the electromagnetic spectrum, which adversaries are actively seeking to deny the United States. Whether it is situational awareness, deception, denial, or destruction, <a href="https://warontherocks.com/2021/01/to-rule-the-invisible-battlefield-the-electromagnetic-spectrum-and-chinese-military-power/">freedom of action in the spectrum</a> is foundational.</p>
<p>American victory in future conflicts depends on <a href="https://warontherocks.com/2021/09/confronting-chaos-a-new-concept-for-information-advantage/">information advantage</a>&nbsp;by collecting and processing an overwhelming amount of data. Equipping every vehicle and soldier with sensors that can feed data into artificial intelligence-enabled networks that <a href="https://www.armytimes.com/news/your-army/2021/04/25/army-wants-robots-sensors-to-make-infantry-platoons-10-times-better/">organize, filter, and share</a> the “right” information with decision-makers is a central aspect of multidomain operations—with its dependence on fidelity electromagnetic spectrum sensors on platforms. This all occurs in an era where “<a href="https://warontherocks.com/2019/12/mosaic-warfare-small-and-scalable-are-beautiful/">every asset is a sensor</a>” is central to our new warfighting concept.</p>
<p>As the network of sensors required for joint all domain command and control and multidomain operations is developed, the United States can use different parts of the electromagnetic spectrum to see targets from different aspects and signatures. For example, a vehicle or artillery park may be camouflaged in one part of the spectrum (infrared), but radiofrequency or visual sensors may detect them. This ability to analyze a target in multiple parts of the spectrum reduces the effectiveness of deception.</p>
<p>Beyond preventing adversary electromagnetic spectrum jamming and spoofing, distilling, correlating, and presenting data in a useful format is the biggest challenge. Again, all of this depends on high-fidelity artificial intelligence to break down the data for decision-makers in a tactically relevant time. Failing to meet this time requirement surrenders the initiative to an adversary who can perform this feat.</p>
<p>Succeeding allows the United States military to think in terms of kill webs, which allows multiple sensors, shooters, and command and control nodes to prosecute an engagement. This capability creates resilience and allows commanders the flexibility to engage with various shooters, ensuring the most effective weapon system engages the target.</p>
<p>[bs-quote quote=&#8221;Fundamentally rethinking when and how war is fought is necessary. Anything less will leave the United States defeated before it ever recognizes war has begun.&#8221; style=&#8221;default&#8221; align=&#8221;right&#8221; color=&#8221;&#8221; author_name=&#8221;&#8221; author_job=&#8221;&#8221; author_avatar=&#8221;&#8221; author_link=&#8221;&#8221;][/bs-quote]</p>
<p>Multidomain operations require sensor systems of the future with <a href="https://www.defenseone.com/technology/2021/05/socoms-wish-list-competing-china-and-russia/174208/">capabilities</a> that include <a href="https://www.e-education.psu.edu/geog480/node/494">multi-spectral sensing</a> on a single platform or as part of a system of systems. There is a need to pick out a signal of interest from the background clutter and identify the emitter. The Russians, masters of electronic warfare, and the Chinese are all developing capabilities to thwart American success in this area, which makes the success of multidomain operations challenging.</p>
<p>The challenge for the Army and the joint force is overcoming Russian and Chinese electromagnetic spectrum jamming and spoofing efforts. The Russian Army, for example, is the best in the world at both and will certainly <a href="https://icds.ee/wp-content/uploads/2018/ICDS_Report_Russias_Electronic_Warfare_to_2025.pdf">further develop those capabilities</a> as the Department of Defense fields capabilities designed to enable multidomain operations.</p>
<h3>Recommendations</h3>
<p>The move away from irregular warfare and toward large-scale conventional operations and multidomain operations is certainly the right move for the Department of Defense and the US Army. <em>Field Manual 3-0, Operations</em>, the Army’s new multidomain operations-focused doctrine, is a forward-looking attempt to meet the challenges of an operational environment that is at an inflection point. Developing a warfighting approach that gets inside China and Russia’s OODA loop is certainly understandable.</p>
<p>However, neither China nor Russia has the same conception of war and peace as the United States—leaving the Army, and the joint force, at a distinct disadvantage. Overcoming these shortcomings requires the following changes.</p>
<p><strong>First, senior leaders must understand the United States is already at war with China and Russia in the cyber domain and information environment.</strong> Incorrectly describing war as “competition” leaves American forces to operate below the level of conflict, which signals a lack of resolve. Adversaries are specifically watching for the level of force employed in response to their attacks so they can evaluate the importance of interests at stake.</p>
<p><strong>Second, the Army needs to shift from a focus on cyber security to a focus on <a href="https://www.bcs.org/articles-opinion-and-research/adopting-cyber-mission-assurance-for-cyber-security/">mission assurance</a>.</strong> Cyber security is neither necessary nor sufficient for the success of multidomain operations. Yet, as shown above, it serves as a pillar for success across a range of multidomain operations capabilities. This is a mistake that China and Russia are exploiting.</p>
<p><strong>Third, the Army (and other services) must train soldiers in adversaries&#8217; information operations <a href="https://theintercept.com/2021/09/21/surveillance-social-media-police-microsoft-shadowdragon-kaseware/">methods and tactics</a> to influence service members.</strong> With China and Russia developing more effective ways to use information against American service members, failure in the information environment is certain to have implications in the cognitive and physical domains.</p>
<p>For the United States to succeed in multidomain operations, merely developing and fielding new technologies is insufficient for American success. Fundamentally rethinking when and how war is fought is necessary. Anything less will leave the United States defeated before it ever recognizes war has begun.</p>
<p><em>The views expressed in this article are the authors&#8217; alone and do not represent the views or policies of the United States government, the United States Department of Defense, the United States military, the United States Department of the Army, or the United States Army.</em></p>
<hr>
<p><sup>1&nbsp;</sup><em>FM 3-0, Operations</em> is planned for public release in the summer of 2022. The document may change before release.</p>
<p><a href="https://globalsecurityreview.com/defense-department-multidomain-operations-challenge/">The Department of Defense’s Multidomain Operations Challenge</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Conflict and Competition: Limited Nuclear Warfare and the New Face of Deterrence</title>
		<link>https://globalsecurityreview.com/conflict-competition-limited-nuclear-warfare-new-face-deterrence/</link>
		
		<dc:creator><![CDATA[Gerald Brown]]></dc:creator>
		<pubDate>Mon, 13 Jun 2022 16:57:26 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=13332</guid>

					<description><![CDATA[<p>This article was initially published on December 16, 2019.  &#8220;Nuclear weapons seem to be in almost everybody&#8217;s bad book, but the fact is that they are a powerful force for peace. Deterrence is most likely to hold when the costs and risks of going to war are unambiguously stark. The more horrible the prospect of [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/conflict-competition-limited-nuclear-warfare-new-face-deterrence/">Conflict and Competition: Limited Nuclear Warfare and the New Face of Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>This article was initially published on December 16, 2019.</em> </p>
<h4 class="has-text-align-center">&#8220;Nuclear weapons seem to be in almost everybody&#8217;s bad book, but the fact is that they are a powerful force for peace. Deterrence is most likely to hold when the costs and risks of going to war are unambiguously stark. The more horrible the prospect of war, the less likely war is. Deterrence is also more robust when conquest is more difficult. Potential aggressor states are given pause by the patent futility of attempts at expansion.&#8221;</h4>
<!-- /wp:post-content -->

<!-- wp:paragraph {"align":"center"} -->
<p class="has-text-align-center">John Mearsheimer, &#8220;<a href="https://www.theatlantic.com/past/docs/politics/foreign/mearsh.htm" target="_blank" rel="noreferrer noopener">Why We Will Soon Miss the Cold War</a>,&#8221; <em>The Atlantic, </em>August 1990</p>
<!-- /wp:paragraph -->

<!-- wp:separator --><hr class="wp-block-separator" /><!-- /wp:separator -->

<!-- wp:paragraph {"dropCap":true} -->
<p class="has-drop-cap">Since the detonation of Little Boy and Fat Man ended the war in the Pacific, nuclear weapons have occupied an increasingly critical place in international politics. The weapons captured both awe and terror across the globe, sending policymakers and scholars scrambling to discover how to properly manage and exploit this new power. Through no small effort, the world has not only seen an era without the further use of these weapons in war but one without great power conflict—a precarious period of relative peace through deterrence.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>However, to pretend that such peace was born automatically is folly. Such logic runs counter to humanity’s history of conflict and warfare. The current international landscape is changing greatly; as the world slides towards a multipolar world and return to great power politics, it must re-address the notion of nuclear conflict and deterrence in the modern world if peace is to be maintained. The use of nuclear weapons has become increasingly likely in the modern-era due to two primary reasons:</p>
<!-- /wp:paragraph -->

<!-- wp:list {"ordered":true} -->
<ol>
<li>Nuclear multipolarity and state competition, resulting in an increasing number of competing, nuclear-armed states with historical tensions, leading to instances of escalation and the security dilemma between multiple actors.</li>
<li>Nuclear modernization and proliferation, including the development of low-yield, counterforce nuclear weapons that can be utilized without threatening a state’s survival in a limited nuclear conflict, particularly when parity is not present at all levels of nuclear escalation.</li>
</ol>
<!-- /wp:list -->

<!-- wp:paragraph -->
<p>The possibility of escalation to a limited nuclear conflict at the tactical level, utilizing low-yield, counterforce nuclear weaponry is a plausible reality. Low-yield, counterforce nuclear weapons can be utilized in a limited fashion against an adversary’s military forces without threatening the survival of either state—particularly when there is a significant disparity between the nuclear capabilities of the states involved.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>Mearsheimer states that within the social sciences, “those who venture to predict… should, therefore, proceed with humility, take care not to exhibit unwarranted confidence, and admit that hindsight is likely to reveal surprises and mistakes.”<sup>[1]</sup> Within political sciences, the sheer number of unpredictable variables makes any prediction anything but certain. It is, therefore, more prudent to analyze the changing landscape of the international nuclear system and identify the challenges and risks that threaten to upend the relative peace that has been maintained for the last 70 years. To preserve and enhance peace within the international system, it is critical to evaluate these potential risks in an unbiased manner while exploring all plausible possibilities. The scope of this piece is primarily limited to intentional inter-state nuclear conflict, and will not address threats such as accidental war, nuclear terrorism, or other related matters.</p>
<!-- /wp:paragraph -->

<!-- wp:separator --><hr class="wp-block-separator" /><!-- /wp:separator -->

<!-- wp:heading {"level":3} -->
<h3>Competition Between Nuclear States</h3>
<!-- /wp:heading -->

<!-- wp:paragraph {"dropCap":true} -->
<p class="has-drop-cap">The structure of the international system has been one of conflict and anarchy for the entirety of human history. The world has never known an era without warfare; states compete to maximize their security and ensure their survival against one another. But in the modern era, this competition may have far more dire consequences. States now yield weapons with unimaginable destructive capabilities and are capable of delivering them at unprecedented speeds. While these weapons almost certainly cause states to act more cautiously, it does not undermine the competitive nature of international relations; states will still compete and seek primacy over one another, securing their own interests and security. While possessing nuclear weapons may raise the risk of failure and serve as a strong deterrent to other states, the weapons by themselves are not enough to prevent this competition between states. In some cases, they may go as far as to instigate it as states seek to ensure their security against another’s nuclear capabilities.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>To properly evaluate this concept, a baseline in neorealist theory should be established. Neorealism holds five relevant truths. First, the international system is one of anarchy, with states as the primary actors, competing against each other without a higher ruling authority. Of these states, great power states are the most critical and relevant actors. Second, states will inherently possess some military capability to secure their power and security, a capability that can be both defensive and offensive. Third, a state can never be truly certain about another’s intentions; if a rival state is building troops or weaponry, one can never be certain whether it is intended to be offensive or defensive, despite what they may claim. Fourth, a state’s basic drive is for survival and sovereignty. Fifth, states are rational actors who seek to survive and ensure their security within this anarchic system.<sup>[2]</sup></p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>The primary difference between nuclear weapons and other weapons of war is not their destructive power, but the ability to inflict this damage at unprecedented speeds, and to inflict it against an adversaries’ homeland without having to first engage their military and defensive forces.<sup>[3]</sup> If a state utilizes its nuclear arsenal against an opponent’s cities, the opposing side’s conventional forces and defenses are irrelevant. A state can be losing a conflict and decide to destroy the opposition with a speed unprecedented in history by escalating to nuclear conflict, completely bypassing the military and defenses of the opposing state.<sup>[4]</sup> Hence, the basis of Mutually Assured Destruction (MAD) is one of mutual vulnerability, with both states accepting that the other could cause immense damage to their own at any time if they utilize nuclear weapons, and thus deciding to avoid it. This has been the backbone of nuclear weapons policy since World War II. The idea is that nuclear weapons ultimately mitigate conflict and escalate the cost of nuclear war to one that is far too high to pay, “war becomes less likely as the cost of war rises in relation to possible gains.” The fear of a retaliatory response deters the aggressor from initiating nuclear conflict in the first place. Wars occurring between nuclear states are likely to be limited in scale for fear of pushing one past the nuclear brink—if they occur at all. The cost of a miscalculation that leads to nuclear conflict is a far greater risk than the same miscalculation with a conventional army.<sup>[5]</sup></p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>However, the idea that actors would accept this vulnerability runs contrary to previous assertions made within the theory of neorealism. If it is accepted that states seek to preserve their sovereignty and security, parity seems to be an unlikely position for a state to find acceptable. The security dilemma highlights some of these challenges; when a rival state rises to the point where it can threaten another’s security, this state will bolster its own military strength and try to prevent any threat to its own security and sovereignty. Sometimes this may escalate into an arms race and ultimately into conflict.<sup>[6]</sup> In this instance, accepting that another state can eliminate your own with the press of a button fails to be acceptable. The very existence of these weapons is incredibly threatening to other states, and a state will act in whatever way necessary to mitigate that threat and ensure their own security. This concept has led to cases of nuclear proliferation in the past. For example, Pakistan built nuclear weapons in response to India’s nuclear test, and North Korea built nuclear weapons to ensure their regime’s survival and security against powers like the United States.<sup><a href="#_edn7">[7]</a></sup></p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>Policymakers attempted to fix this problem during the Cold War with a secure second-strike capability. It was argued that if a state could still retaliate after suffering a fatal nuclear blow and deal the same fate to the aggressor, it would deter against preemptive strikes and force states to accept this mutual vulnerability and forego competition. As such, states sought to ensure their retaliatory capabilities through a combination of “hardening, concealment, and redundancy.”<sup>[8]</sup> Stationary weapons silos and shelters were hardened to improve survivability, submarine-based systems stayed concealed and mobile, and a massive number of nuclear weapons were produced and globally dispersed.<sup>[9]</sup></p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>However, this system was never truly accepted. If states had accepted this mutual vulnerability, the massive spending on modernization would fail to make sense. Even when these states claimed to accept MAD, their actions said otherwise. While the second-strike theory may have enhanced deterrence, it certainly did not stop states from competing to gain the nuclear edge over each other. Gavin asserts that even when quantitative parity was accepted between the two states, they still sought a qualitative edge over the other to secure nuclear primacy.<sup>[10]</sup></p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>The United States still pursued the ability to win a nuclear war with the USSR instead of accepting the status quo as expected and sought to be able to defeat the USSR&#8217;s second-strike capability. The U.S. engaged in programs to modernize its nuclear weapons, invest in missile defense technologies, nuclear submarine tracking, command and control technologies, as well as sought geopolitical advantage. Both states actively pursued the ability to outperform and outgun the other, to gain the edge and retain the capability to win a nuclear war.<sup>[11]</sup> The basic competition of realism did not change with the introduction of nuclear weapons. While states acted more cautiously, they still competed to secure their advantage and their security within the international system.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>As time moves forward, the security imposed by this has become increasingly fragile. Even during the Cold War, the U.S.  possessed a remarkable intelligence capability that would have been able to effectively find and target both stationary and mobile Soviet nuclear weapons. Long and Green authored an exquisite piece discussing now-declassified information that demonstrated our intelligence capabilities to track down enemy missiles with efficiency and precision via improvements in acoustics, ocean surveillance, and SIGINT (Signals Intelligence) technologies, capabilities that have significantly improved to this day.<sup>[12]</sup> Improvements in the targeting, accuracy, and reprogramming of weapons have further improved U.S. capabilities to destroy hardened targets. Elimination of fratricide from multiple strikes via these improvements has also allowed the U.S. to target and strike a hardened silo multiple times within a few seconds of each other. Lieber and Press claim that a strike against 200 Soviet silos utilizing two weapons per target in 1985 would have left approximately 42 silos still standing, while a similar strike today would destroy all 200.<sup>[13]</sup> Second-strike capabilities have become increasingly vulnerable in the modern age.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>This isn’t to say that nuclear weapons have no deterrent effect—the lack of nuclear conflict during the Cold War certainly can stand testament to that. Instead, the point is that this deterrent is not as simple of a system as was thought, or perhaps wished; states will still compete, go to war, and may even engage in a nuclear conflict. The security dilemma was never truly mitigated and is still alive and well within the international system. But nuclear weapons can raise the cost associated with conflict and cause states to act more cautiously. Attempting to destroy a state’s entire second-strike capability is a major act and not one to be taken lightly. While a state may decide to attempt this if it was prudent to ensure its own security, it would certainly be an extreme situation in which few would likely be willing to bear. While states still engage in this strategic competition and attempt to gain the upper edge in a nuclear exchange, escalation to this level still seems incredibly unlikely due to the costs of failure.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>Further, it is worth considering that the defending state may panic and retaliate upon the signal of the enemy launch, fearing for the security of its own second-strike capability. During the Cold War, policymakers steered away from these reactions, relying on the survivability of their second-strike systems to dissuade the benefits of preemption and secure deterrence. If faced with this situation in the modern era, knowing these systems may not be as secure as they once were, it would be difficult to judge what an actual reaction would be. This uncertainty may actually improve the traditional deterrence model, as states are fearful that their adversary will be pushed into a “use it or lose it” mentality. But this traditional view is primarily applied to a preemptive, large-scale strike against another state. Limited nuclear warfare may be a far more realistic scenario to consider. Limited nuclear warfare could be conducted in a manner that does not threaten a state’s immediate survival, and hence would not warrant an all-out nuclear response in retaliation. The concern of these attacks escalating to this level of large-scale nuclear conflict is a real one, but the initial use of a nuclear weapon at this limited level is a far more palatable option for governments to utilize.</p>
<!-- /wp:paragraph -->

<!-- wp:separator --><hr class="wp-block-separator" /><!-- /wp:separator -->

<!-- wp:heading {"level":3} -->
<h3>Nuclear Proliferation and Multipolarity</h3>
<!-- /wp:heading -->

<!-- wp:paragraph {"dropCap":true} -->
<p class="has-drop-cap">Nuclear weapon use in a limited manner may be a serious threat, and the proliferation of nuclear weapons and the changing state of the world into a multipolar nuclear order may encourage this. Despite tensions between the U.S. and USSR, they were ultimately able to manage this competition in a bipolar nuclear world; this competition for advantage and security ended with the eventual collapse of the USSR. The security dilemma ran its course without the use of nuclear weapons, and the U.S. rose to become the hegemon of a unipolar world. However, in a multipolar nuclear world, the challenges faced previously are significantly exacerbated. Currently, the nine known nuclear-weapon states are the United States, the United Kingdom, Russia, China, France, Israel, Pakistan, India, and North Korea.<sup>[14]</sup> Strategies that worked in a bipolar world may not be as effective in the modern landscape, thus preventing the failure of deterrence—and the subsequent use of a nuclear weapon—may be more challenging than before.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>The most recent nuclear state, North Korea, is one of the most troubling in the current group of nuclear states. North Korea is one of the world’s poorest states, facing harsh sanctions and isolation from much of the international community. Yet, despite the hardships, poverty, and poor economy of this autocratic state, it managed to defy the nonproliferation regime and create a fully operational nuclear arsenal.<sup>[15]</sup> Pyongyang is not bashful about its willingness to use its weaponry either, stating that it will use its weapons to “reduce the U.S. mainland to ashes and darkness.”<sup>[16]</sup> Such a clear security threat may increase proliferation elsewhere in response. Allison calls this the “nuclear cascade,” and suggests that if a state as weak and isolated as North Korea can defy the non-proliferation regime, other states are likely to follow suit.<sup>[17]</sup> If the United States is incapable of preventing such a clear security threat, why would Tokyo and Seoul rely on Washington to defend them in the face of a nuclear threat? Japan already has the capability to build nuclear weapons, possessing well-developed uranium enrichment and missile programs that could allow Japan to rapidly create a credible nuclear weapons program to defend itself and its national interests without the United States. According to The Council on Foreign Relations, there are thirty states that have the technological ability to quickly build nuclear weapons.<sup>[18]</sup></p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>While Pyongyang claims offensive intentions, it is incredibly unlikely to attempt to use its nuclear forces offensively against the United States. Doing so would be an act of suicide, the disparity between U.S. and North Korean forces is far too great. Instead, these weapons were more than likely obtained for defensive purposes. Pyongyang may not be able to destroy the United States, but it can ensure its own sovereignty. Forcibly trying to topple the Kim regime could escalate into the use of nuclear force if Pyongyang got desperate, and a strike designed to eradicate their nuclear weapons would again invoke this “use it or lose it” mentality. While Pyongyang may not be able to destroy the U.S. with its capabilities, it can undeniably cause immense harm to the US. It could cause even greater harm to smaller, closer countries such as U.S. allies Japan and South Korea. Knowledge of this is a strong deterrent against U.S. intervention, allowing Pyongyang to carry on less cautiously without fearing foreign intervention. The creation of this deterrent may have effectively ensured the sovereignty of the Kim regime for the time being, and they are unlikely to relinquish this guarantee. The establishment of this deterrent highlights some of the challenges in the modern nuclear era. North Korea’s outright defiance of the nonproliferation regime sends a signal that other states can build a nuclear capability as well and that such a force may be an effective way to guarantee their sovereignty against the Western world.<sup>[19]</sup></p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>Proliferation to autocratic states is a cause for concern, primarily because they are considerably less stable than democratic states and may be more willing to utilize a nuclear weapon. The inherently volatile nature of these regimes poses a significant challenge. North Korea has a very poor and impoverished populace, held under authoritarian rule. Regimes such as these are not known for their longevity and stability. The threat of regime change and revolt from within is a realistic consideration with autocratic states. If this occurred, it could result in the loss of a nuclear weapon, or their domestic use to quell a rebellion.<sup>[20]</sup> It could also escalate into conflict as Chinese and U.S. forces both seek to secure their nuclear assets and end up in conflict with each other. China would certainly not accept U.S. forces along the Yalu river, and both would want to immediately seek to ensure the stability of Pyongyang’s nuclear assets.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>Autocratic states could also safely assume that Western powers would prefer it if they were a democratic government friendly to the West. With the international liberal orders push for global democracy, autocratic rulers are likely to fear Western interference. After Pyongyang’s recent success, a nuclear weapons capability may appear to be an effective way to prevent Western interference and ensure its sovereignty.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>With smaller autocratic states, the constant external and internal threats to the stability of their regimes breed paranoia and volatility. Leading government officials tend to be promoted based on loyalty rather than competence, and disagreement or discontent with the dictator may be punished harshly, stifling progress and ingenuity. These regimes also tend to have strong military leadership directing the country. Pakistan is notable in this regard, where the military maintains significant control over the government and has a history of instigating a military coup when they dislike civilian leadership. Pakistan has had four separate military coups since its creation, with military dictators constantly consolidating their power into the executive branch.<sup>[21]</sup> Military leadership is far more likely to see nuclear weapons use as a viable option, which increases the instability of nuclear autocratic regimes even further. Civilian leadership has arguably been a key factor in preventing nuclear use thus far. Military officers often possess a different mindset and attitude on the subject than civilian leadership due to their career path. During the Cold War, there were numerous instances where the Joint Chiefs of Staff were far more willing to utilize nuclear weapons in a preventive war and were reined in by U.S. civilian leadership.<sup>[22]</sup></p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>Throughout the Cold War, there were numerous false alarms; equipment detected missile launches that did not exist, drills were confused for real launches, and communication cut-offs and the &#8220;fog of war&#8221; nearly led to nuclear use.<sup>[23]</sup> If faced with similar threats, it is less likely that an autocratic state will respond in such a level-headed manner. With shorter-range nuclear weapons, this could be exacerbated. These states are less likely to have a robust, survivable nuclear arsenal. If a state’s nuclear arsenal is threatened, it is likely to take action to ensure its survival or use. Without having the same geographic separation that the U.S. and USSR did, several states today rely on shorter-range weapons, like short-range missiles and multi-role fighter/bomber aircraft. Whether these weapons systems carry nuclear or conventional payloads may be unknown; being forced to make a rapid decision to respond to a potential threat may push a state over the edge to ensure its security.<sup>[24]</sup></p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>Particularly concerning, at least in regard to stability, is the smaller size and the heightened vulnerability of many arsenals compared to other states. The multipolar nuclear order lacks the same levels of parity both quantitatively and qualitatively that were present in the Cold War. The number of weapons between states varies significantly. While exact numbers are typically classified, experts have estimated a range varying from approximately 20 warheads in North Korea, to around 6,000 for both the U.S. and Russia.<sup>[25]</sup>  Destroying all the nuclear weapons in North Korea is significantly easier to do than performing the same action against the U.S. or Russia, and this may be especially true with an even newer autocratic state that develops a brand-new nuclear capability. The parity dilemma further extends to conventional capabilities. A state with inferior conventional capabilities such as North Korea compared to the U.S. or Pakistan compared to India, may feel pressured into utilizing, or at least threatening, to use its nuclear capabilities to make up for its inferiority. If a nuclear-armed state lacks an effective conventional response option and is faced with a crisis that threatens its security, it may decide to escalate with a limited nuclear strike to preserve its integrity and security.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>The primary barriers to the use of nuclear weapons in the Cold War were the second-strike capability and the threat of mutual destruction. But as has been discussed, this second-strike may not have been as effective as previously thought and is particularly less effective in the modern age. Such disparity between arsenal sizes eliminates many other concerns with a nuclear first strike. The chances of eliminating a second-strike capability are significantly higher in many circumstances, and the abolition of the Anti-Ballistic Missile (ABM) treaty has made the idea of intercepting any surviving nuclear weapons much more likely. While ballistic missile defense is a fickle and inconsistent technology, the prospect of defending against a few surviving second-strike weapons is much more realistic than trying to defend against a general nuclear war.<sup>[26]</sup> The disparity between military strength has led to conflict through all history, and this has not changed with nuclear weapons. If a state thinks it can successfully engage and win in a conflict that would bring great benefit and little harm to itself, the threat of this occurring is great. As Thucydides cited the Athenians telling the Melians during the Peloponnesian War, “the strong do what they can and the weak suffer what they must.”</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>Faced with this fact, the receiving state may very well utilize its weapons as discussed to prevent the loss of its second-strike. The knowledge of this possibility enhances deterrence, but with great disparity, it may not be enough. If the aggressor feels that it can effectively defend against such a limited strike, or that it would be able to conduct the strike prior to the launch of enemy weapons, it may decide to do so. The varying distances between states and shorter-range weapons that can be utilized in the modern era make a difference as well. Nuclear rivals like Pakistan and India can strike each other much quicker than the U.S. and USSR could strike each other in the Cold War. This gives even less reaction time to make such a large decision and increases the chance that a disabling first strike could be pulled off.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>The security dilemma is notable to mention here as well; the U.S. and Russia currently enjoy a considerable nuclear advantage over all other states. But another state building their nuclear deterrent or conventional forces, and hence threatening another’s superiority as happenstance, is likely to escalate into an instance of the security dilemma. In a multipolar world, this is especially relevant. Competition between two states is much simpler to manage, but when reacting to one state, a state may create escalation between several states simultaneously.<sup>[27]</sup> The recent abolition of the Intermediate-Range Nuclear Forces (INF) treaty serves as a useful example. The U.S. and Russia found this to be an acceptable state for several years; however, China’s rising conventional and nuclear power, including the development of intermediate-range weapons, may have threatened this. Russia, considering China’s proximity and fearing for its own security, hence develops intermediate-range weapons of its own to match this threat, pushing the U.S. to respond in kind as well.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>Bracken expands on this concept, explaining how decisions targeted towards one state could affect several, and the challenges this brings to nuclear strategy.<sup>[28]</sup> In his example, the U.S. deploys a precise conventional missile capability designed to penetrate and destroy North Korean and Iranian nuclear infrastructure on its submarines, a move being considered at the time Bracken wrote <em>The Second Nuclear Age</em>. However, this capability has been condemned by China, for fear that it will have the added effect of threatening their own nuclear deterrent. China responds to these deployments by remodeling its deterrent and deploys a more mobile nuclear force that is harder for the U.S. to track and destroy. In turn, this agitates India and threatens their security, so they decide to respond to the increased Chinese nuclear threat by improving their own nuclear forces.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>Any development to India’s nuclear doctrine or weapons program will surely affect Pakistan, and will surely escalate the already strenuous tensions between the states. The result is a cascading, delicate dynamic that is significantly more complex than the comparatively simple bipolar relationship deterrence theory was founded under. The security dilemma and realist competition between states aren&#8217;t so easily managed in a multipolar world and may very well escalate out of control. When a proper second-strike capability is not always present or a nuclear strike is unlikely to threaten the survival of a state and will serve its interests, the threat of such acts occurring is heightened. The multipolar nature of the world and challenges presented by the fog of war may make nuclear escalation in a crisis significantly more likely.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>Multipolar competition has become all too apparent in the modern-day. Both China and Russia have been increasing their military might and seeking to expand their influence, challenging U.S. hegemony. The return to great power politics makes the more precarious state of the multipolar nuclear order more dangerous. Some comfort can be taken in the notion that the ideas and strategies that deterred strategic nuclear warfare in the past are still in place. A strategic strike against a nuclear powers’ cities would be counterproductive and almost certainly result in likewise retaliation, an unacceptable consequence and a strong deterrent in the majority of situations. But this strategy does not prevent a state’s aggression and expansion elsewhere. While the U.S. may be committed to its strategy of extended deterrence, the bulk of its warfighting capability rests on its conventional power.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>While it may claim otherwise, a nuclear strike against an ally under the U.S. nuclear umbrella by a great power state is unlikely to be met with nuclear force, lest this escalates into strategic nuclear warfare between the two nations. The United States is unlikely to engage in a strategic nuclear war with another state to defend an ally’s security unless U.S. national security and the U.S. homeland is directly threatened. What is more likely to prevent a state from using a strategic strike against non-nuclear adversaries’ cities is the lack of necessity. There are few situations in which this is useful, as most goals can be accomplished nearly as easily with conventional forces. They certainly exist, the nuclear use in Japan highlights this, but if a state has a conventional option that is nearly as effective it would likely take it. While a strategic strike against a nuclear-armed adversaries’ cities is still unlikely, there are two more realistic options that should be considered: a counterforce strike against an adversaries’ nuclear forces, or a counterforce strike against an adversaries’ conventional military forces.</p>
<!-- /wp:paragraph -->

<!-- wp:separator --><hr class="wp-block-separator" /><!-- /wp:separator -->

<!-- wp:heading {"level":3} -->
<h3>Tactical Nuclear Conflict</h3>
<!-- /wp:heading -->

<!-- wp:paragraph {"align":"left","dropCap":true} -->
<p class="has-drop-cap has-text-align-left">Nuclear weapons cannot be lumped together in one class. The way they are used and the style of weapon are important distinctions. Reaching as far back as 1965, Kahn made these assertions in <em>On Escalation</em>, describing different levels of escalation in nuclear conflict instead of the presumed jump to all-out nuclear war. He asserted that nuclear conflict could be fought at a variety of different levels, escalating and de-escalating between them depending on the circumstances. One of the most important distinctions in the modern day is that of counterforce and countervalue weapons. Counterforce would be used at the tactical level, against a state’s conventional or nuclear military forces. Countervalue is what is thought of more traditionally in a nuclear conflict, a higher-yield attack used on the strategic level, against a state’s cities, industry, and personnel. The attacks against Hiroshima and Nagasaki were of this sort, strategic attacks designed to coerce the state of Japan into surrendering, knowing they could not retaliate.</p>
<!-- /wp:paragraph -->

<!-- wp:image {"align":"left","id":13364,"width":323,"height":246,"sizeSlug":"large"} -->
<div class="wp-block-image">
<figure class="alignleft size-large is-resized"><img loading="lazy" decoding="async" class="wp-image-13364" src="http://globalsecurityreview.com/wp-content/uploads/2019/12/tsar_bomba_mushroom_Cloud.jpg" alt="Mushroom cloud of the Tsar Bomba hydrogen bomb." width="323" height="246" srcset="https://globalsecurityreview.com/wp-content/uploads/2019/12/tsar_bomba_mushroom_Cloud.jpg 497w, https://globalsecurityreview.com/wp-content/uploads/2019/12/tsar_bomba_mushroom_Cloud-300x229.jpg 300w, https://globalsecurityreview.com/wp-content/uploads/2019/12/tsar_bomba_mushroom_Cloud-86x64.jpg 86w" sizes="(max-width: 323px) 100vw, 323px" />
<figcaption>The mushroom cloud of the Tsar Bomba hydrogen bomb.</figcaption>
</figure>
</div>
<!-- /wp:image -->

<!-- wp:paragraph -->
<p>While the conditions and necessity for a state to conduct a strategic strike may still be unlikely, a more recent trend in nuclear weaponry may be a far more realistic and pressing threat. During the Cold War, states focused on creating the largest, most awe-inspiring and outright terrifying arsenals they could, and fielding the largest, deadliest weapons that they could create. The USSR went as far as to create and test the largest nuclear weapon ever to exist, the Tsar Bomba, a multi-stage hydrogen bomb with a yield of 50 megatons. For perspective, this weapon possessed approximately 1,570 times the explosive power of the nuclear weapons detonated in Hiroshima and Nagasaki combined.<sup>[29]</sup> Such a massive weapon is terrifying, but also altogether unnecessary, and was unlikely to be used. Much of what was produced in the Cold War was an unbelievable threat. Instead, the modern nuclear age may see more utility in moving the exact opposite direction, fielding low-yield, precision, tactical nuclear weapons.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>One of the primary concerns with tactical nuclear weapons is they create a far more realistic threat, blurring the line between conventional and nuclear conflict.<sup>[30]</sup> Strategic nuclear weapons used against an opponent’s cities are unlikely to be used. At the minimum, this would invite great harm against each other’s respective states, certainly enough pain that one would seek to avoid it. Few gains are worth the risk of losing one’s major cities and infrastructure. Tactical, low-yield nuclear weapons may avert this obstacle, however. If these weapons are utilized against an adversaries’ conventional forces, and outside of an adversaries’ homeland, it is unlikely to cause massive nuclear retaliation; neither the aggressing nor defending states’ survival is ever threatened in this scenario. These weapons may have the added capability to target and destroy enemy forces and defenses more efficiently, more accurately, and without the heavy number of civilian casualties that may be present in a traditional nuclear strike.  If a state can vastly improve its warfighting capability without the threat to its survival that higher-yield, strategic weapons created, it could be expected to take advantage of these weapons.<sup>[31]</sup></p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>The most likely threat for nuclear weapons use would be a state escalating to tactical nuclear use against an adversaries’ conventional forces, attempting to coerce them into backing down, ensure victory, or deter foreign intervention.<sup>[32]</sup> For example, if China decided to retake Taiwan, it may be able to do so conventionally, but such a crisis has the potential to incite an American military response in defense of Taipei and have considerable Chinese casualties. If U.S. forces responded, Beijing may believe tactical nuclear strikes against those forces would be an effective means of creating military superiority against a conventionally superior force and that low-yield weapons could be utilized without threatening China’s survival. Such a measure would be incredibly unlikely to incite a nuclear response against China’s homeland, for fear of a similar response.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>In a different, albeit unlikely scenario, tactical nuclear strikes against Taiwanese defenses in an initial strike may have the added effect of deterring an American response in the first place, raising the threshold for American intervention. In this scenario, Beijing would be operating under the impression that the U.S. would be sent a message that coming to Taipei’s defense would not only mean great power war but nuclear conflict, as well. Without facing a threat to its own homeland, it would be far less likely to incur that risk. The use of a nuclear weapon against a non-nuclear weapons state will almost certainly not result in nuclear use against the aggressor.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>Similar situations could be seen by attacking a military base outside of a state’s homeland. The idea of such a strike occurring outside of ones’ homeland, on forward-deployed forces is critical. Yield differences mean nothing if the attack is directed at a state’s homeland, directly threatening its security. Escalation to this point is almost certain to result in strategic level escalation. An adversary cannot accurately guess the yield level of an opposing weapon in flight. While lower yield weapons are more useful for tactical level warfare, the target is the more important distinction.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>A state must be able to fight at both the tactical and strategic levels. If the aggressing state escalates to the tactical nuclear level, and the responding state is unable to respond at that level, it will be faced with two options: concede and yield or escalate to the strategic level. The latter of these creates a threat to their own security via reciprocation at the strategic level—and hence is an unlikely choice.<sup>[33]</sup> The possible exception to this would be if the aggressing state is unable to retaliate at the strategic level themselves. As such, a significant disparity between great power states at the tactical level may be a cause for concern. Strategic capabilities do not need to be vast to create an unacceptable level of harm to a state, all that’s needed to deter at the strategic level is a small, survivable arsenal. Certainly, a single nuclear strike on an American city is an unacceptable consequence, and it would take a very extreme situation for a state to be willing to risk that. Defending a foreign state such as Taiwan that will not impact the survivability of the United States is not such a situation.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>If a significant disparity at the tactical nuclear level exists, a state may be able to prevent foreign intervention when engaging in expansive conflict. If China maintained a far superior tactical nuclear capability than the U.S., and even a minimal strategic second-strike capability as described, it is very likely that it could escalate to the tactical nuclear level in an attempt to force the U.S. to de-escalate. With the initial use of tactical nuclear weapons against Taiwanese defenses, it is possible it could prevent U.S. intervention altogether if its capabilities were vastly superior at the tactical level of escalation. Taiwan is certainly not the only example; wherever a significant tactical nuclear disparity exists and state aggression against non-nuclear states cannot be deterred, the U.S. policy of extended deterrence will not hold any merit. The same could be seen with any state’s expansion, such as Russia reclaiming the Baltics, or China moving to use force seize territory claimed by both India and itself. If a state can utilize tactical nuclear weapons and would benefit more than it would risk, there is a possibility of it doing so.</p>
<!-- /wp:paragraph -->

<!-- wp:image {"align":"right","id":13353,"width":361,"height":258,"sizeSlug":"large"} -->
<div class="wp-block-image">
<figure class="alignright size-large is-resized"><img loading="lazy" decoding="async" class="wp-image-13353" src="http://globalsecurityreview.com/wp-content/uploads/2019/12/F-35A_fighter-1024x734.jpg" alt="A U.S. Air Force F-35A Lightning II Joint Strike Fighter" width="361" height="258" srcset="https://globalsecurityreview.com/wp-content/uploads/2019/12/F-35A_fighter-1024x734.jpg 1024w, https://globalsecurityreview.com/wp-content/uploads/2019/12/F-35A_fighter-300x215.jpg 300w, https://globalsecurityreview.com/wp-content/uploads/2019/12/F-35A_fighter-768x551.jpg 768w, https://globalsecurityreview.com/wp-content/uploads/2019/12/F-35A_fighter-1536x1102.jpg 1536w, https://globalsecurityreview.com/wp-content/uploads/2019/12/F-35A_fighter.jpg 1772w" sizes="(max-width: 361px) 100vw, 361px" />
<figcaption>A U.S. Air Force F-35A Lightning II Joint Strike Fighter (Photo: U.S. Air Force Master Sgt. Donald R. Allen)</figcaption>
</figure>
</div>
<!-- /wp:image -->

<!-- wp:paragraph {"align":"left"} -->
<p class="has-text-align-left">Unfortunately, this is not a mere theoretical threat. The most recent Nuclear Posture Review identified significant expansion and modernization of Russian and Chinese nuclear forces, while the U.S. has expanded only incrementally. Since 2010, the F-35A multirole fighter jet is the only new nuclear delivery system produced by the U.S., whereas Russia has developed a combined total of 14 new delivery systems across the nuclear-triad and China has fielded nine new ground and sea-based delivery systems. The 2018 Nuclear Posture Review further mentioned Russia’s vast expansion of tactical weapons systems that can hold either a conventional or nuclear payload.<sup>[34]</sup> These types of weapons systems are not held accountable under the START treaty. As of 2016, the only weapon in the U.S. arsenal designed for non-strategic purposes was the B61 gravity bomb, an air-based tactical nuclear weapons system, of which the U.S. maintains an inventory of approximately 500. These weapons have a max payload of about 50 kilotons, which may still be far too high to effectively target conventional forces and provide an effective tactical-level deterrent.<sup>[35]</sup> The U.S. does not have tactical nuclear weapons on any other level of the nuclear-triad, a gap which the 2018 Nuclear Posture Review addressed and called to fix.<sup>[36]</sup> While the U.S. has slowed down its nuclear programs and the development of tactical nuclear weapons, other countries have not followed this lead, and instead have been exploiting it as a weakness. Retired Vice Admiral Robert Monroe claims that Russia is around 20 years ahead of the U.S. in terms of its low-yield nuclear weapons capabilities.<sup>[37]</sup></p>
<!-- /wp:paragraph -->

<!-- wp:image {"align":"center","id":13352,"sizeSlug":"full"} -->
<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="1267" height="838" class="wp-image-13352" src="https://mk0globalsecuridd2hf.kinstacdn.com/wp-content/uploads/2019/12/nuclear-delivery-systems-since-2010.png" alt="" srcset="https://globalsecurityreview.com/wp-content/uploads/2019/12/nuclear-delivery-systems-since-2010.png 1267w, https://globalsecurityreview.com/wp-content/uploads/2019/12/nuclear-delivery-systems-since-2010-300x198.png 300w, https://globalsecurityreview.com/wp-content/uploads/2019/12/nuclear-delivery-systems-since-2010-768x508.png 768w, https://globalsecurityreview.com/wp-content/uploads/2019/12/nuclear-delivery-systems-since-2010-1024x677.png 1024w" sizes="(max-width: 1267px) 100vw, 1267px" />
<figcaption>Source: 2018 Nuclear Posture Review</figcaption>
</figure>
</div>
<!-- /wp:image -->

<!-- wp:paragraph -->
<p>There may be an upside though. Tactical nuclear weaponry, a far more believable threat, may be used to enhance deterrence if used properly.<sup>[38]</sup> Decisions to aggressively expand and enter into war are made by calculating that a state can win the encounter and the benefits outweighing the costs.<sup>[39]</sup> If Russia is to invade the Baltics, it must find that it has a high chance of success. Either it has the capability to defeat NATO defenses and responding forces via tactical nuclear conflict or be confident NATO will not come to their defense, whether this is from initial tactical-nuclear escalation or for other reasons. Strategic weaponry may work to deter a threat from an attack on a state’s homeland, but it remains too unbelievable of a threat to deter another nuclear state from expansion elsewhere. The proxy wars and conflicts against non-nuclear states since the end of World War II provide a solid historical precedent for this. Tactical nuclear weapons may be a more believable threat and be able to deter where strategic weapons could not. If the U.S. announces its commitment to defend Taipei and has an arsenal of tactical nuclear weapons at relative parity to China’s, then China is less likely to try to take Taiwan by force in the first place. The same goes for any other theoretical expansive military action taken by a nuclear state armed with a robust tactical nuclear capability.<sup>[40]</sup></p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>While the aggressing state’s survival is no longer threatened, the cost of war is heavily escalated and chances of success much lower. Tactical nuclear weapons will cause immense and swift destruction to conventional forces on both sides, a risk that is unlikely to be taken. With relative parity, these weapons greatly raise the threshold of military action and may make the risk of conflict even less prevalent if this parity is maintained amongst great powers. This is still not absolute, as even with tactical nuclear parity, the willingness to commit to such an act must be believable. The defense of another state without a direct impact on one’s own homeland may not be believable, and the aggressor may call the bluff. However, not knowing for sure and having the commitment of extended deterrence will cast enough doubt in the majority of situations, as the cost of being wrong would be immense. The best way to prevent such a threat from materializing is to credibly be prepared to fight at all levels if it does.<sup>[41]</sup> While this may not guarantee that these weapons will not be used and remain deterred, the lack of parity will almost certainly invite their use if it will give another state superiority over the United States. If a state can topple a stronger conventional force and achieve its goals with nuclear force, without threatening its survival, it will do so. With the competitive and fragile nature of a multipolar nuclear order, it will be of the utmost importance to be able to manage escalation at all levels of nuclear escalation.</p>
<!-- /wp:paragraph -->

<!-- wp:separator --><hr class="wp-block-separator" /><!-- /wp:separator -->

<!-- wp:heading {"level":3} -->
<h3><strong>Conclusion</strong></h3>
<!-- /wp:heading -->

<!-- wp:paragraph {"dropCap":true} -->
<p class="has-drop-cap">In the modern nuclear age, the use of these weapons is increasingly likely, particularly if doing so will give a state a significant advantage over another. Deterrence has merit, but it undoubtedly lies in the presence of a realistic, credible threat, across all levels of the threat spectrum that mitigate this potential advantage.  Nuclear multipolarity and increased interstate competition are resulting in an increasing number of competing, nuclear-armed states with historical tensions, leading to instances of escalation and the development of the security dilemma between multiple actors. Nuclear modernization and proliferation are prompting states to develop low-yield, counterforce nuclear weapons which can be utilized without threatening a state’s survival in a limited nuclear conflict—particularly when parity is not present at all levels of nuclear escalation.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p>Undeniably, the use of another nuclear weapon, either tactically or strategically, is a travesty that all states must try to avert. At the same time, the destructive power of these weapons does not fundamentally alter the landscape of relations between states. If this power is to be kept in check, this idea must be acknowledged and understood. If a state can get away with using these weapons to advance its position, it almost certainly will do so. Large disparities at different levels of nuclear escalation should be avoided if possible, particularly amongst great powers. While developing more destructive and lethal weapons may seem counterproductive to ensuring peace, doing so may not only be in the interest of sustained U.S. hegemony but to prevent the potential use of nuclear weapons and improve international stability.</p>
<!-- /wp:paragraph -->

<!-- wp:separator --><hr class="wp-block-separator" /><!-- /wp:separator -->

<!-- wp:paragraph -->
<p><sup>[1]</sup> Mearsheimer, John J. 2001. The Tragedy of Great Power Politics. New York: W.W. Norton &amp; Company.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[2]</sup> Mearsheimer, John J. 1994. “The False Promise of International Institutions.” <em>International Security</em> 19, no. 3 (Winter): 10.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[3]</sup> Schelling, Thomas C. 1966. Arms and Influence. New Haven: Yale University Press. 18-26.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[4]</sup> Wallander, Celeste A. 2013. &#8220;Mutually Assured Stability: Establishing US-Russia Security Relations for a New Century.&#8221; Atlantic Council. July 29, 2013. <a href="https://www.atlanticcouncil.org/publications/issue-briefs/mutually-assured-stability-establishing-us-russia-security-relations-for-a-new-century">https://www.atlanticcouncil.org/publications/issue-briefs/mutually-assured-stability-establishing-us-russia-security-relations-for-a-new-century</a>.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[5]</sup> Sagan, Scott D., and Kenneth N. Waltz. 2013. The Spread of Nuclear Weapons: An Enduring Debate. New York: W.W. Norton &amp; Company. 3-40.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[6]</sup> Dougherty, James E., and Pfaltzgraff, Robert L. 2001. Contending Theories of International Relations. Boston: Addison Wesley Longman. 64.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[7]</sup> Bracken, Paul J. 2013. <em>The Second Nuclear Age: Strategy, Danger, and the New Power Politics</em>. New York: St. Martin’s Griffin. 162-211.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[8]</sup> Leiber, Keir A., and Press, Daryl G. 2018. “The New Era of Nuclear Arsenal Vulnerability.” <em>Physics and Society </em>47, no. 1 (January): 2-6. <a href="https://www.aps.org/units/fps/newsletters/201801/nuclear-arsenal.cfm">https://www.aps.org/units/fps/newsletters/201801/nuclear-arsenal.cfm</a>.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[9]</sup> Ibid.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[10]</sup> Gavin, Francis J. 2019. &#8220;Rethinking the Bomb: Nuclear Weapons and American Grand Strategy.&#8221; <em>Texas National Security Review</em> 2, no. 1 (January). <a href="https://tnsr.org/2019/01/rethinking-the-bomb-nuclear-weapons-and-american-grand-strategy/?fbclid=IwAR3c7rtxlNthbwV-T8Cwa5FVcDg_wqOGvCCPXz_jd7WnRy3NG27M63hdeOg">https://tnsr.org/2019/01/rethinking-the-bomb-nuclear-weapons-and-american-grand-strategy/</a>.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[11]</sup> Jervis, Robert. 2009. &#8220;The Dustbin of History: Mutual Assured Destruction.&#8221; <em>Foreign Policy</em>. November 9, 2009. <a href="https://foreignpolicy.com/2009/11/09/the-dustbin-of-history-mutual-assured-destruction/">https://foreignpolicy.com/2009/11/09/the-dustbin-of-history-mutual-assured-destruction/</a>.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[12]</sup> Long, Austin, and Brendan R. Green. 2015. “Stalking the Secure Second Strike: Intelligence, Counterforce, and Nuclear Strategy.” <em>Journal of Strategic Studies</em> 38, no. 1-2: 38-73. <a href="https://doi.org/10.1080/01402390.2014.958150">https://doi.org/10.1080/01402390.2014.958150</a>.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[13]</sup> Leiber, Keir A., and Press, Daryl G. 2017. “The New Era of Counterforce.” <em>International Security</em> 41, no. 4 (Spring): 21-27.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[14]</sup> Kristensen, Hans M., and Robert S. Norris. 2018. “Status of World Nuclear Forces.” <em>Federation of American Scientists</em>. Accessed February 20, 2019. <a href="https://fas.org/issues/nuclear-weapons/status-world-nuclear-forces/">https://fas.org/issues/nuclear-weapons/status-world-nuclear-forces/</a>.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[15]</sup> Sagan, Scott D. 2018. &#8220;Armed and Dangerous.&#8221; <em>Foreign Affairs </em>97, no. 6 (November/December): 35-43. https://www.foreignaffairs.com/articles/north-korea/2018-10-15/armed-and-dangerous.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[16]</sup> U.S.  Department of Defense. 2018. <em>Nuclear Posture Review</em>. Washington DC. 32.  <a href="https://media.defense.gov/2018/Feb/02/2001872886/-1/-1/1/2018-NUCLEAR-POSTURE-REVIEW-FINAL-REPORT.PDF">https://media.defense.gov/2018/Feb/02/2001872886/-1/-1/1/2018-NUCLEAR-POSTURE-REVIEW-FINAL-REPORT.PDF</a>.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[17]</sup> Allison, Graham. 2010. &#8220;Nuclear Disorder.&#8221; <em>Foreign Affairs</em> 89, no. 1 (January/February): 74-85. <a href="https://www.foreignaffairs.com/articles/pakistan/2010-01-01/nuclear-disorder">https://www.foreignaffairs.com/articles/pakistan/2010-01-01/nuclear-disorder</a>.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[18]</sup> The Council on Foreign Relations. 2012. “The Global Nonproliferation Regime.” May 21, 2012. <a href="https://www.cfr.org/report/global-nuclear-nonproliferation-regime">https://www.cfr.org/report/global-nuclear-nonproliferation-regime</a>.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[19]</sup> Sagan, 2018.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[20]</sup> Ibid.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[21]</sup> Oberst, Robert C., Yogendra K. Malik, Charles H. Kennedy, Ashok Kapur, Mahendra Lawoti, Syedur Rahman, and Ahrar Ahmad. 2014. <em>Government and Politics in South Asia</em>. Boulder: Westview Press.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[22]</sup> Sagan and Waltz, 2013. 48-63.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[23]</sup> Sagan, 2018.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[24]</sup> Cimbala, Stephen J. 2015. &#8220;Deterrence in a Multipolar World.&#8221; <em>Air and Space Power Journal</em> 29, no. 4 (July/August): 54-60.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[25]</sup> Kristensen, Hans M., and Robert S. Norris. 2018.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[26]</sup> Colby, Elbridge. 2018. &#8220;If You Want Peace, Prepare for Nuclear War.&#8221; <em>Foreign Affairs </em>97, no. 6 (November/December): 25-32. <a href="https://www.foreignaffairs.com/articles/china/2018-10-15/if-you-want-peace-prepare-nuclear-war?fa_package=1123220">https://www.foreignaffairs.com/articles/china/2018-10-15/if-you-want-peace-prepare-nuclear-war?fa_package=1123220</a>.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[27]</sup> Bracken, 2014. 93-126.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[28]</sup> Ibid</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[29]</sup> Atomic Heritage Foundation. 2014. “Tsar Bomba.” Accessed February 20, 2019. <a href="https://www.atomicheritage.org/history/tsar-bomba">https://www.atomicheritage.org/history/tsar-bomba</a>.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[30]</sup> Doyle, James E. 2017. “Mini-Nukes: Still a Bad Choice for the United States.” <em>Bulletin of the Atomic Scientists</em>. April 17, 2017. <a href="https://thebulletin.org/2017/04/mini-nukes-still-a-bad-choice-for-the-united-states/">https://thebulletin.org/2017/04/mini-nukes-still-a-bad-choice-for-the-united-states/</a>.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[31]</sup> Colby, 2018.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[32]</sup> Carter, Ash. 2016. “Remarks by Secretary Carter to Troops at Minot Air Force Base, North Dakota.” <em>Department of Defense</em>. September 26, 2016. <a href="https://dod.defense.gov/News/Transcripts/Transcript-View/Article/956079/remarks-by-secretary-carter-to-troops-at-minot-air-force-base-north-dakota/">https://dod.defense.gov/News/Transcripts/Transcript-View/Article/956079/remarks-by-secretary-carter-to-troops-at-minot-air-force-base-north-dakota/</a>.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[33]</sup> Kyl, Jon and Michael Morell. 2018. “Why America Needs Low-Yield Nuclear Warheads Now.” <em>Washington Post</em>, November 29, 2018. <a href="https://www.washingtonpost.com/opinions/why-america-needs-low-yield-nuclear-warheads-now/2018/11/29/c83e0760-f354-11e8-bc79-68604ed88993_story.html">https://www.washingtonpost.com/opinions/why-america-needs-low-yield-nuclear-warheads-now/2018/11/29/c83e0760-f354-11e8-bc79-68604ed88993_story.html</a>.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[34]</sup> U.S.  Department of Defense. 2018.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[35]</sup> Kristensen, Hans M., and Robert S. Norris. 2018. “United States Nuclear Forces, 2017.” <em>Bulletin of the Atomic Scientists</em> 73, no. 1: 48-57. <a href="https://doi.org/10.1080/00963402.2016.1264213">https://doi.org/10.1080/00963402.2016.1264213</a>.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[36]</sup> U.S.  Department of Defense. 2018.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[37]</sup> Monroe, Robert. 2017. “Facing the Grave Nuclear Risk.” <em>Washington Times</em>, January 26, 2017. <a href="https://www.washingtontimes.com/news/2017/jan/26/america-must-resume-underground-nuclear-testing/">https://www.washingtontimes.com/news/2017/jan/26/america-must-resume-underground-nuclear-testing/</a>.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[38]</sup> Kyl and Morell, 2018.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[39]</sup> Waltz, 2013. 8.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[40]</sup> Colby, 2018.</p>
<!-- /wp:paragraph -->

<!-- wp:paragraph -->
<p><sup>[41]</sup> Ibid.</p>
<!-- /wp:paragraph --><p><a href="https://globalsecurityreview.com/conflict-competition-limited-nuclear-warfare-new-face-deterrence/">Conflict and Competition: Limited Nuclear Warfare and the New Face of Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A New Nuclear Deal with Iran Shouldn’t Be Accompanied by Terrorist Legitimization</title>
		<link>https://globalsecurityreview.com/a-new-nuclear-deal-with-iran-shouldnt-be-accompanied-by-terrorist-legitimization/</link>
		
		<dc:creator><![CDATA[John O&#039;Malley]]></dc:creator>
		<pubDate>Tue, 15 Mar 2022 16:02:18 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=24890</guid>

					<description><![CDATA[<p>Iran has a new demand for U.S. diplomats as they conclude what will hopefully be the final round of negotiations for a new nuclear agreement later this month: Remove the 2019 U.S. foreign terrorist organization (FTO) designation on Iran’s Islamic Revolutionary Guard (IRGC). The United States should reject this demand, even if it risks Iranian [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/a-new-nuclear-deal-with-iran-shouldnt-be-accompanied-by-terrorist-legitimization/">A New Nuclear Deal with Iran Shouldn’t Be Accompanied by Terrorist Legitimization</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Iran has a new demand for U.S. diplomats as they conclude what will hopefully be the final round of negotiations for a new nuclear agreement later this month: <a href="https://www.reuters.com/world/middle-east/iran-says-three-key-issues-remain-unresolved-vienna-nuclear-talks-2022-02-28/">Remove</a> the 2019 U.S. foreign terrorist organization (FTO) designation on Iran’s Islamic Revolutionary Guard (IRGC). The United States should reject this demand, even if it risks Iranian noncompliance with negotiations. Removing the terrorist stigma from the IRGC will embolden Iranian proxies and anger regional allies.</p>
<p>FTO designations can be assigned to groups if they meet three criteria under <a href="https://www.law.cornell.edu/uscode/text/8/1189#:~:text=8%20U.S.%20Code%20%C2%A7%201189%20%2D%20Designation%20of%20foreign%20terrorist%20organizations,-U.S.%20Code&amp;text=the%20terrorist%20activity%20or%20terrorism,security%20of%20the%20United%20States.">U.S. Code §1189</a>—the group must be foreign, engaged in terrorist activity, and threaten U.S. national security. By labeling a group as an FTO, the United States creates extraterritorial criminal and civil liability for parties engaged in providing them with material support. There are currently 73 groups listed, and their status is reviewed every five years by the U.S. State Department.</p>
<p>Maintaining the FTO designation applies political pressure on states that interact with the IRGC—namely Iraq, Syria, and Lebanon—to significantly alter their relationships or risk international pariah status. The Iranian marketplace becomes dangerous for prospective business partners, as any dealings with the country could be perceived as IRGC financing since it is state-sponsored. Designations also clarify U.S. attitudes toward international actors and let Iran know that the actions of its paramilitary organization are not tolerated by the United States, irrespective of any future diplomatic re-engagement.</p>
<p>FTO de-designations are less common, with the United States removing only 15 groups from the list since its inception. In most de-designation cases, the groups have been removed due to their outright disbandment, which would not be the case with a de-designation of the IRGC. Attempts to remove groups still active from the list, such as the Houthis, have had negative consequences for U.S. national security.</p>
<p>In February 2021, the United States <a href="https://www.state.gov/revocation-of-the-terrorist-designations-of-ansarallah/">removed</a> the FTO label from the Houthis, a Yemeni Shi’ite militia group that receives direct funding from the IRGC. The purpose of this de-designation was to better provide Yemeni civilians with humanitarian aid. The designation made it difficult for human rights groups and charitable individuals to donate food, medical supplies, and money while a Saudi-led blockade effectively starved the country. However, the Houthis did not provide any concessions, and less than a year later, the group took advantage of this gesture by <a href="https://www.npr.org/2022/01/25/1075493673/yemens-houthis-have-launched-two-attacks-against-the-u-a-e-heres-why">launching</a> drone strikes on the United Arab Emirates.</p>
<p>The backlash to this attack was swift. Within the month, the Saudis and Emiratis worked together to conduct lethal <a href="https://www.aljazeera.com/news/2022/1/18/yemen-more-than-a-dozen-people-killed-in-saudi-coalition-strike">airstrikes</a> on the Yemeni capital of Sanaa. The Houthis, using Iranian-supplied weapons, responded with strikes on Saudi airports and other civilian locations. The U.S. Treasury Department subsequently crafted new <a href="https://home.treasury.gov/news/press-releases/jy0603">sanctions</a> on the Houthis’ financial network, implicating the IRGC by name. De-designating the IRGC to return to a nuclear deal would send mixed messages from the Biden administration to the Arab world and encourage Iran to spend its newly sanctions-free assets on more excellent militia investment to counter Sunni influence.</p>
<p>Not only will the UAE and the Saudis feel abandoned by the United States if it takes this course of action, but Israel will also question the sincerity of the United States in its stated goal to preserve Israeli sovereignty, which Iran doesn’t recognize. Iranian Supreme Leader Ali Khamenei demands that “all Muslims must fight until the annihilation of Israel,” and easing Tehran’s ability to supply its most extreme fighting force with outside money will get the regime closer to that goal.</p>
<p>Instead of dropping the IRGC’s FTO designation without concessions, the United States should consider publicizing the non-statutory factors involved in assigning such a designation. This action would inform the international community about the objective criteria involved in U.S. counterterrorism strategies and prevent Washington from appearing disorganized on designation issues between presidential administrations.</p>
<p>Iran’s recent <a href="https://www.washingtoninstitute.org/policy-analysis/irans-next-budget-assumes-no-nuclear-deal">budget</a> and presidential cabinet <a href="https://www.fdd.org/analysis/2021/09/30/the-sanctioned-cabinet-of-ebrahim-raisi/">appointments</a> should inform the Biden administration that a nuclear agreement will not change Iran’s priorities to support the IRGC at the expense of the civilian population. Iran is spending more on the Guards than ever before. Removing the red tape around the IRGC as it expands its research and weapons production capacities would betray close relationships that have taken decades to build. No nuclear agreement should impact the FTO de-designation process, and past conduct by the Houthis justifies the hesitancy to cave to Iranian demands. Removing the label of terrorism should take effort on behalf of the offending party, something the Islamic Republic is unwilling to provide.</p>
<p><a href="https://globalsecurityreview.com/a-new-nuclear-deal-with-iran-shouldnt-be-accompanied-by-terrorist-legitimization/">A New Nuclear Deal with Iran Shouldn’t Be Accompanied by Terrorist Legitimization</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Escalate to De-Escalate: Russia&#8217;s Nuclear Deterrence Strategy</title>
		<link>https://globalsecurityreview.com/nuclear-de-escalation-russias-deterrence-strategy/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Mon, 07 Mar 2022 16:00:32 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=1350</guid>

					<description><![CDATA[<p>This article was originally published on August 20, 2018 as &#8220;Nuclear De-Escalation: Russia&#8217;s Deterrence Strategy.&#8221; Russia&#8217;s military doctrine dictates the use of nuclear weapons in response to any non-nuclear assault on Russian territory. Russia’s military doctrine encompasses a broad range of potential national security threats, including local, or small-scale wars, regional, or large-scale wars, internal [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/nuclear-de-escalation-russias-deterrence-strategy/">Escalate to De-Escalate: Russia&#8217;s Nuclear Deterrence Strategy</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>This article was originally published on August 20, 2018 as &#8220;Nuclear De-Escalation: Russia&#8217;s Deterrence Strategy.&#8221;</em></p>
<h2>Russia&#8217;s military doctrine dictates the use of nuclear weapons in response to any non-nuclear assault on Russian territory.</h2>
<p>Russia’s military doctrine encompasses a broad range of potential national security threats, including local, or small-scale wars, regional, or large-scale wars, internal and foreign military threats, the Russian military’s budget, and a host of military-related technical, political, social, and economic issues. Additionally, the doctrine defines the circumstances under which nuclear weapons are to be used by the Armed Forces of the Russian Federation in response to a threat to Russia’s national security.</p>
<p>The current edition of the Russian military doctrine—when compared to the national security strategy and military doctrine published in 1993—significantly lowers the threshold under which the use of nuclear weapons is permitted. While the 1993 <a href="https://www.armscontrol.org/act/2000_05/dc3ma00%23I8">doctrine</a> allowed the first use of nuclear weapons only when the “existence of the Russian Federation” is threatened, the versions published since 2000 explicitly state that Russia “reserves the right to use nuclear weapons to respond to all weapons of mass destruction attacks” on Russia and its allies.</p>
<p>Furthermore, the doctrine released in 2000—and all subsequent versions—allows for nuclear weapons use “in response to large-scale aggression utilizing conventional weapons in situations critical to the national security of the Russian Federation.” Succinctly put, Russia’s entire national security strategy is predicated on the concept of nuclear de-escalation.</p>
<h3>Historical Context: NATO Intervention in the Balkans</h3>
<p>In the year before the release of Russia’s 2000 military doctrine, Russia’s military and political leaders warily observed as NATO executed an efficient and precise conventional military operation in the former Republic of Yugoslavia. In 1999, Russia was facing renewed tensions in Chechnya in the aftermath of the disastrous war that broke out following the Soviet Union’s collapse.</p>
<p>It was clear that the United States (and its allies) possessed far greater conventional military capabilities than Russia. Plus, the underlying ethnic and religious issues in Kosovo which led to NATO taking action were seen by Russia as almost identical to those underlying the first Chechen war. These similarities, combined with Russia’s historical view of Serbia—the successor state to the Republic of Yugoslavia—as its “little brother,” led to Moscow developing deep anxiety that the United States would involve itself in another within Russian borders.</p>
<p>In 2000, Russia released an updated military doctrine in which it outlined the concept of de-escalation through a limited nuclear strike. This idea put forth the notion that if Russia were subjected to a major non-nuclear assault that exceeded its capacity for conventional defense, it would “de-escalate” the conflict by launching a limited—or tactical—nuclear strike. While this policy has never been publicly discussed with relation to any particular conflict, the concept of nuclear de-escalation undoubtedly was on the minds of Western leaders during Russia’s invasion of Georgia in 2008, and in the ongoing conflict in eastern Ukraine.</p>
<h3>Conventional and Nuclear Deterrence During the Cold War</h3>
<p>The Soviet Union’s collapse and the effective end of the Cold War in the 1990s left Russia and the United States with significantly less reason to fear that one would launch a massive, surprise strategic nuclear attack on the other. The role nuclear weapons played in the international geopolitical framework was fundamentally altered. Nuclear weapons no longer were the centerpiece of security relationship based on the concept of Mutually Assured Destruction (MAD).</p>
<p>Instead, they became status symbols; at the very most, they were considered the ultimate insurance policy against unforeseen aggression. Nuclear weapons maintained their role as the penultimate security guarantee; however, they had very much moved to the background of the international security stage. Many, particularly in the West, believed that global nuclear disarmament was an attainable goal.</p>
<p>During the Cold War, deterrence was effective in maintaining peace between the two superpowers because both states ensured that the other would be deterred on all levels in the event of escalating tensions. At the time, the security relationship between the U.S. and the U.S.S.R. was heavily dependent on the concept of parity.  Conventional forces were deterred with conventional forces of equal strength, while nuclear arsenals were positioned in support of mutually assured destruction.</p>
<p>As the Soviet Union broke apart, following years of economic stagnation, the United States and its allies were demonstrating their significant conventional military capabilities in their 1990-1991 campaign to expel Iraqi occupying forces from the oil-rich state of Kuwait.  Russia’s military and political leaders grew increasingly wary about the imbalance—to Russia’s disadvantage—in conventional power projection and efficacy.</p>
<h3>Shifting Security Perspectives in the Post-Cold War Era: Russia&#8217;s Asymmetric Deterrence Strategy</h3>
<p>This anxiety amongst the Russian military’s top brass further developed during the U.S.-led NATO 1999 intervention in Kosovo. The United States’ conventional military power became a clear and distinct threat to Russia. There were many similarities between the origins of the Kosovo conflict and Russia’s own internal war with Chechen separatists during the first Chechen War. What Russia feared most was that the U.S. would intervene in what Russia considered its’ internal affairs. If the U.S. were to launch a non-nuclear (i.e. conventional) assault against the newly formed Russian Federation, Russia’s conventional forces would be of little benefit.</p>
<p>As nuclear deterrence theory during the Cold War was predicated on the concept of “mutually assured destruction” (MAD), deterrence strategy required that effective and credible forces were maintained at every level—conventional and nuclear to be effective. The Soviet Union’s collapse decimated that military&#8217;s conventional force projection capabilities. The subsequent Russian military&#8217;s ability to deter any conventional U.S. or NATO military action against Russia was rendered ineffective.</p>
<p>The efficacy of the United States’ high-precision conventional weapons was demonstrated in both the Balkan and Iraqi campaigns of the 1990s. Unlike nuclear weapons, these precision-guided “smart bombs” were highly usable and effective—in stark contrast to nuclear weapons. Framed in this context, Russia’s military planners became painfully aware of their strategic disadvantage. Thus, the concept of nuclear de-escalation was born.</p>
<p>Before the conclusion of NATO’s Kosovo operation, Russia initiated the development of a new military doctrine that would deter any conventional or nuclear strike against Russia.  Responsible for the supervision of this effort was then-secretary of Russia’s Security Council, Vladimir Putin. Coincidentally, it was Putin who would sign this doctrine upon its release in 2000, having just become president.</p>
<p>De-escalation revises the scale of a possible nuclear strike. While Cold War deterrence was predicated on the threat of inflicting an overwhelming degree of damage on enemy military and civilian targets, de-escalation rests on the concept of “tailored damage.” The doctrine defines &#8220;tailored damage&#8221; as inflicting “damage subjectively unacceptable to the opponent [and] exceeds the benefits the [opponent] expects to gain as a result of the use of [conventional] military force.” In other words, Russia’s military planners believed that the threat of a limited or tactical nuclear strike against enemy targets would be an effective deterrence against a conventional attack by the United States or NATO.</p>
<p>Today, the concept of “nuclear de-escalation” continues to be in play, presenting a significant challenge to western military strategists. If Russia were to mount a successful invasion of the Baltic states, it is likely that Russia would consider these countries to be sovereign Russian territory, meaning that any conventional NATO military operation designed to restore the independence of the NATO members would likely be met with a limited nuclear strike. That is, of course, unless U.S. or NATO cyber or other non-kinetic capabilities can disrupt Russia&#8217;s nuclear command-and-control apparatus.</p>
<p><a href="https://globalsecurityreview.com/nuclear-de-escalation-russias-deterrence-strategy/">Escalate to De-Escalate: Russia&#8217;s Nuclear Deterrence Strategy</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Placing &#8220;Over-The-Horizon&#8221; Capabilities in Georgia</title>
		<link>https://globalsecurityreview.com/placing-over-the-horizon-capabilities-in-georgia/</link>
		
		<dc:creator><![CDATA[Miro Popkhadze]]></dc:creator>
		<pubDate>Tue, 16 Nov 2021 16:57:28 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=24556</guid>

					<description><![CDATA[<p>Senior U.S. diplomat Victoria Nuland&#8217;s visit to Moscow, attempting to get Russian assistance in establishing a military base in Central Asia—a move Russia has vehemently opposed—and the Gen. Mark Milley&#8217;s chairman of the U.S. Joint Chiefs of Staff, discussions with his Russian counterpart  Chief of the Russian General Staff Valery Gerasimov over the basing rights and potential Russian support in the fight against terrorist networks reconstituting in [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/placing-over-the-horizon-capabilities-in-georgia/">Placing &#8220;Over-The-Horizon&#8221; Capabilities in Georgia</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Senior U.S. diplomat Victoria <a href="https://www.newsweek.com/russia-says-unacceptable-us-maintain-military-central-asia-after-afghanistan-1638122">Nuland&#8217;s visit to Moscow, attempting to get Russian assistance</a> in establishing a military base in Central Asia—a move Russia has vehemently opposed—and the Gen. <a href="https://www.wsj.com/articles/u-s-asked-russia-about-offer-of-bases-to-monitor-afghan-terror-threat-11632767164">Mark Milley&#8217;s chairman of the U.S. Joint Chiefs of Staff</a>, discussions with his Russian counterpart  Chief of the Russian General Staff Valery Gerasimov over the basing rights and potential Russian support in the fight against terrorist networks reconstituting in Afghanistan indicates the fact that while the U.S. focuses on the great power competition with China and Russia, the international terrorism will remain a serious challenge to global and ultimately American security. Therefore, despite American withdrawal from Afghanistan, its ongoing drawdown in the Middle East, and its growing <a href="https://www.whitehouse.gov/briefing-room/speeches-remarks/2021/07/08/remarks-by-president-biden-on-the-drawdown-of-u-s-forces-in-afghanistan/">reliance on Over-the-Horizon Capabilities (OHC), </a>the United States will be forced to maintain and even look for new areas to establish its military presence in and around the Middle East.</p>
<p>With no troops on the ground in Afghanistan, the U.S. needs a military base nearby and an access point into the region to prevent al-Qaida and Islamic State militants from reconstituting in Taliban-led Afghanistan. Options being considered range from nearby countries to distant Arab states and Navy ships at sea. While the U.S. intends to rely on ISR forces and OHC-Satellites, U-2s unmanned aerial systems (UAS), and strategic airlift platforms-in the foreseeable future operating from the U.S. aircraft carriers and the U.S. bases located in the Middle East, their effectiveness will significantly depend on regional access points and strategically -distributed assets and capabilities. As the OHC is primarily constrained by distance and airspace access issues, finding new locations near Afghanistan for basing will help the United States identify and carry out counterterrorism strikes. The urgency of establishing American military facilities closer to Afghanistan increased markedly after U.S. drone strikes killed civilians.</p>
<p>Given Afghanistan&#8217;s landlocked geography, the composition of its neighbors-China, Iran, Pakistan, Uzbekistan, Tajikistan, Turkmenistan- and the U.S. decade-long disengagement from Central Asia, coupled with the fact that the U.S. has no bases in any of these countries, has created access crisis for the United States.</p>
<p>While access to Afghanistan via overflight of Iran and China is not viable, access to Afghanistan through Uzbekistan, Tajikistan, and Pakistan is possible. However, given the nature of the US-Pakistan&#8217;s constantly changing relationships and Islamabad&#8217;s long-standing ties and partnership with the Taliban, Pakistan&#8217;s permission to let planes through its airspace is a politically unstable and increasingly unreliable endeavor that could be revoked at any time.</p>
<p>The United States can get overflight approval and tolerance from Central Asian states for missions against terrorist networks in Afghanistan. However, overcoming the access crisis with the U.S. permanent military presence to Central Asian countries bordering Afghanistan is highly improbable. While American military installations housed in Uzbekistan and Tajikistan could allow quick access to Afghanistan, Russia&#8217;s expanding military foothold and China&#8217;s growing influence in Central Asia coupled with Taliban warnings and the Central Asian states&#8217; hesitance over whether to host the U.S. military facilities or not have proven to find hosts to the U.S. bases challenging endeavor in Central Asia.</p>
<p>History has proven that it&#8217;s not sustainable to have the U.S. military presence in Central Asia. Not long ago, <a href="https://www.reuters.com/article/us-kyrgyzstan-usa-manas/u-s-vacates-base-in-central-asia-as-russias-clout-rises-idUSKBN0EE1LH20140603">the U.S. used a military base at Manas in Kyrgyzstan, which it had to vacate because</a> of the growing insistence of Bishkek to do so. The U.S. had also leased the Karashi-Khanabad-military base in Uzbekistan. After several years of using it as a transit center, <a href="https://www.washingtonpost.com/archive/politics/2005/07/30/us-evicted-from-air-base-in-uzbekistan/ff9015af-04c5-459e-8136-8c9614719426/">Tashkent demanded the base closed in 2005 amid tensions with Washington</a>-portraying hosting foreign troops on Uzbekistan&#8217;s territory as unconstitutional.</p>
<p>The U.S. can overcome the access challenge by looking into Georgia as an alternative. The U.S. should build military facilities and the &#8220;Over the Horizon Capabilities&#8221;-for troops, drones, and rapid-moving equipment- in Georgia. This will provide easy access and a nearby friendly location from which the U.S. can effectively counter extremist and militant groups re-emerging in Afghanistan. The increased military footprint in Georgia will deter Russian continued aggression, contain Iran&#8217;s assertiveness and keep China&#8217;s growing influence at bay. While the development of the horizon capabilities in Georgia facilities the United States easy access to Afghanistan, it will provide strategic depth and operational capacity in times of conflict against state and non-state actions in the Middle East.</p>
<p>From the Cold War, Georgia inherited Soviet-built military infrastructure-airports, military bases, training centers, underground towns, training centers, hospitals, and rehabilitation centers. With American assistance, Georgia has spent sizable resources to rebuild, renovate, and modernize this very infrastructure in the last two decades. In addition to interoperable military infrastructure, Georgia features strategic geography. Given its proximity to Afghanistan and the Middle East, it&#8217;s an ideal location for the United States to store supplies, keep forces and respond to adversaries swiftly and decisively.</p>
<p>The U.S. should integrate Georgia into its over horizons capability infrastructure network. While American fighters, bombers, RQ-9s, and U-2s can be based and operated from U.S. military bases in the UAE and Qatar, the airlift, resupply, and tanker aircraft can be based and operated from Vaziani Air Base in Georgia. Georgia&#8217;s strategic location and proximity to Afghanistan (and the Middle East) will make the United States&#8217; strategic objectives easily attainable. While flight time from Vaziani Air Base to Central Asian countries ranges from 2 to 3 hours, the closest <a href="https://www.heritage.org/defense/report/us-over-the-horizon-capability-afghanistan">the U.S. airbase is one 500-plus mile from Uzbekistan or Tajikistan</a> entry. Georgia is even closer to northern and central Afghanistan than the distant Parisian Gulf States. While flying time from the <a href="https://www.heritage.org/defense/report/us-over-the-horizon-capability-afghanistan">UAE to Afghanistan is four to five hours, and Qatar five to six hours</a>, the flight from <a href="https://www.travelmath.com/flying-time/from/Tbilisi,+Georgia/to/Kabul,+Afghanistan">Georgia is much shorter, a little over three hours.</a></p>
<p><a name="m_-5584864511123175808__GoBack"></a><a href="https://www.washingtonexaminer.com/opinion/op-eds/us-military-presence-in-georgia-would-help-deter-russia-and-contain-iran">Georgia has already demonstrated its high value and strategic significance</a> by successfully <a href="https://csis-website-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/publication/091229_Kuchins_NDNandAfghan_Web.pdf">contributing to the Northern Distribution Network&#8217;s (NDN)</a> activities in Afghanistan and the U.S.&#8217;s recent Afghanistan evacuation efforts.  While Georgia played a crucial role in supplying NATO&#8217;s international security operations in Afghanistan, <a href="https://www.dailysabah.com/opinion/op-ed/georgias-role-in-afghanistan-crisis-for-regional-stability">Georgia played a critical role in the evacuation process from Taliban-controlled Afghanistan due to American withdrawal from Afghanistan.</a> The aircraft, including C-17 Globemaster III military transport aircraft of the Heavy Airlift Wing (HAW), operating as part of the Strategic Airlift Capability (SAC) program, has conducted regular flights on routes Tbilisi-Kabul-Tbilisi to evacuate military and civilian personnel from Afghanistan.</p>
<p>The United States forces will operate in a reliable, comfortable, and friendly environment in Georgia. Americans are welcome in Georgia. <a href="https://bm.ge/en/article/georgian-security-and-foreign-policy-community-addresses-mike-pompeo/68878">Over 90 percent of Georgians hold a favorable</a> view of the United States. According to the <a href="https://www.washingtonexaminer.com/opinion/op-eds/us-military-presence-in-georgia-would-help-deter-russia-and-contain-iran">Edison research&#8217;s survey, 64 percent of Georgians</a> support the idea of hosting the U.S. military base. Hence, unlike many states in Central Asia and the Middle East, Tbilisi is less likely to challenge the U.S. basing rights or deny access for operations.</p>
<p>Skeptics in the United States may fear that the development of American over the horizon capabilities in Georgia could lead to a direct great power clash between the U.S. and Russia. On the other hand, Isolationists may also argue that the South Caucasus is Russia&#8217;s backyard, and Moscow can always out-escalate and outplay Washington in any military encounter over Georgia. But, the United States&#8217; strategic edge over Russia, reflected in Washington&#8217;s superior economy, technology, military capabilities, and alliance system, will make Russia less likely to clash with America over its increased military footprint in Georgia. Moreover, America&#8217;s military buildup and its strong military commitment to European defense deterred the Soviet Union, and similar engagements in Georgia will deter Putin&#8217;s Russia.</p>
<p>This is why the United States should place its military facilities in Georgia and embrace Tbilisi&#8217;s opportunities against the challenges emanating both from Afghanistan and the broader Middle East. The U.S. military infrastructure in Georgia, integrated into the United States over the horizon capability architecture will provide the U.S. with more mussels and flexibility to deter Russia, contain Iran and keep China at bay while weakening and even preventing the reemergence of terrorist networks in Afghanistan.</p>
<p><a href="https://globalsecurityreview.com/placing-over-the-horizon-capabilities-in-georgia/">Placing &#8220;Over-The-Horizon&#8221; Capabilities in Georgia</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Connection Between AUKUS, the Franco-Greek Pact, and the EastMed Pipeline</title>
		<link>https://globalsecurityreview.com/aukus-franco-greek-pact-eastmed-pipeline-interrelated/</link>
		
		<dc:creator><![CDATA[Konstantinos Apostolou-Katsaros]]></dc:creator>
		<pubDate>Mon, 18 Oct 2021 14:53:39 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[Greece]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Turkey]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=24452</guid>

					<description><![CDATA[<p>In the wake of the AUKUS agreement, EU member states must come to terms with the loss of primacy and the shift of the U.S.&#8217;s geostrategic center of gravity to the East to counter Chinese expansionism. The old Eurocentric western security architecture is essentially in shambles, hindering NATO&#8217;s integrity as well. The emerging &#8220;Quad&#8221; alliance between the U.S., [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/aukus-franco-greek-pact-eastmed-pipeline-interrelated/">The Connection Between AUKUS, the Franco-Greek Pact, and the EastMed Pipeline</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div>
<p>In the wake of the AUKUS agreement, EU member states must come to terms with the loss of primacy and the shift of the U.S.&#8217;s geostrategic center of gravity to the East to counter Chinese expansionism. The old Eurocentric western security architecture is essentially in shambles, hindering<span class="apple-converted-space"> </span><a href="https://www.politico.eu/article/jens-stoltenberg-nato-eu-defense-plans-warning/">NATO&#8217;s integrity</a><span class="apple-converted-space"> </span>as well. The emerging &#8220;Quad&#8221; <a href="https://moderndiplomacy.eu/2021/10/06/aukus-the-indo-pacific-and-frances-role-fluctuat-nec-mergitur/">alliance</a> between the U.S., U.K., Australia, India, and Japan diminishes NATO&#8217;s importance in the Indo-Pacific. The French and other traditional allies and partners—members of EU and NATO—collectively appeared more enraged than China, highlighting the clumsy formation of AUKUS that was accelerated by the Afghanistan withdrawal debacle. AUKUS marks a turning point in global geopolitics that will have a domino effect on several parts of the world—one being the Eastern Mediterranean.</p>
<p><span style="text-transform: initial;">After the diplomatic blow of AUKUS and Angela Merkel&#8217;s retirement from frontline politics, France&#8217;s first reaction was to strengthen its ties with Greece and increase its presence in the Eastern Mediterranean by signing a rearmament</span><span class="apple-converted-space" style="text-transform: initial;"> </span><a style="text-transform: initial;" href="https://greekreporter.com/2021/10/04/aukus-undermines-nato-france-greece-cyprus/">deal</a><span class="apple-converted-space" style="text-transform: initial;"> </span><span style="text-transform: initial;">that modernizes the Hellenic Navy and commits to an important Defense Assistance Agreement. The latter includes a clause of mutual defense assistance—similar to the mutual defense clause (</span><a style="text-transform: initial;" href="https://www.europarl.europa.eu/meetdocs/2009_2014/documents/sede/dv/sede200612mutualdefsolidarityclauses_/sede200612mutualdefsolidarityclauses_en.pdf">Article 42.7 TEU</a><span style="text-transform: initial;">) of the Treaty of the European Union—in case one of the two states is attacked on its</span><span class="apple-converted-space" style="text-transform: initial;"> </span><a style="text-transform: initial;" href="https://www.tovima.gr/2021/09/28/international/greece-france-agreement-what-it-signals-the-mutual-defense-assistance-clause/">territory</a><span style="text-transform: initial;">.</span></p>
<p><span style="text-transform: initial;">Analysts note a</span><span class="apple-converted-space" style="text-transform: initial;"> </span><a style="text-transform: initial;" href="https://defence-point.com/2021/09/28/greece-france-and-aukus-frigates-a-new-western-strategy-and-the-prospect-of-china-s-semi-encirclement/?pop=1">relation</a><span class="apple-converted-space" style="text-transform: initial;"> </span><span style="text-transform: initial;">between AUKUS and U.S. support for France to pursue a more</span><span class="apple-converted-space" style="text-transform: initial;"> </span><a style="text-transform: initial;" href="https://slpress.gr/ethnika/o-axonas-gallia-ellada-sti-meta-amerikaniki-anatoliki-mesogeio/">proactive role</a><span class="apple-converted-space" style="text-transform: initial;"> </span><span style="text-transform: initial;">in the Eastern Mediterranean through the game-changing Franco-Greek deal that bolsters the Greek armed forces with three Belharra frigates (+1 option). Athens previously ordered 18 Rafale fighter jets and has plans to acquire six more in the future.</span></p>
<p><span style="text-transform: initial;">France already showed its intention to</span><span class="apple-converted-space" style="text-transform: initial;"> </span><a style="text-transform: initial;" href="https://fmes-france.org/greeces-new-regional-strategy-aris-marghelis/">support</a><span class="apple-converted-space" style="text-transform: initial;"> </span><span style="text-transform: initial;">Greece against Turkey during a prolonged 82-day crisis that brought Greece and Turkey (two historic rivals and NATO members) to the brink of conflict. Back in 2020, the Turks deployed their seismic research vessel Oruç Reis accompanied by a flotilla of warships to conduct surveys on the Greek continental shelf (as described in United Nations Convention on the Law of the Sea –</span><span class="apple-converted-space" style="text-transform: initial;"> </span><a style="text-transform: initial;" href="https://www.un.org/depts/los/convention_agreements/texts/unclos/unclos_e.pdf">UNCLOS III</a><span style="text-transform: initial;">) that Turkey claims with the unsubstantiated Mavi Vatan (Blue Homeland) naval doctrine. The Mavi Vatan opposes UNCLOS III provisions and is based on the arbitrary assumption that all islands are deprived of the right to exert jurisdiction on the continental shelf. However, the Law of the Sea is binding on all states to the extent that it represents customary international law, and although Turkey is not a signatory to it, it has to comply with it.</span></p>
<p><span style="text-transform: initial;">French President Emmanuel Macron openly criticizing Turkey&#8217;s activity on the Greek and Cypriot continental shelf/exclusive economic zone (EEZ)</span><span class="apple-converted-space" style="text-transform: initial;"> </span><a style="text-transform: initial;" href="https://www.reuters.com/article/us-france-macron-turkey-idUSKBN25O2OO">said</a><span style="text-transform: initial;">,</span><span class="apple-converted-space" style="text-transform: initial;"> </span><span style="text-transform: initial;">&#8220;I don&#8217;t consider that in recent years Turkey&#8217;s strategy is the strategy of a NATO ally&#8230; when you have a country which attacks the exclusive economic zones or the sovereignty of two members of the European Union.&#8221; In contrast, on another occasion, he</span><span class="apple-converted-space" style="text-transform: initial;"> </span><a style="text-transform: initial;" href="https://www.euronews.com/2021/03/24/macron-warns-against-turkish-interference-in-french-presidential-election">clarified</a><span class="apple-converted-space" style="text-transform: initial;"> </span><span style="text-transform: initial;">that &#8220;France has been very clear. When there were unilateral acts in the eastern Mediterranean, we condemned them with words, and we acted by sending frigates.&#8221; After signing the Franco-Greek deal in Élysée Palace, he also</span><span class="apple-converted-space" style="text-transform: initial;"> </span><a style="text-transform: initial;" href="https://apnews.com/article/business-middle-east-france-paris-greece-e0caad306c623c92be7d77679c8cf149">noted</a><span style="text-transform: initial;"> that &#8220;it will help protect the sovereignty, independence, territorial integrity of both states.&#8221;</span></p>
</div>
<div>
<p><figure id="attachment_24453" aria-describedby="caption-attachment-24453" style="width: 640px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-24453" src="http://globalsecurityreview.com/wp-content/uploads/2021/10/turkey-blue-homeland.jpeg" alt="" width="640" height="360" srcset="https://globalsecurityreview.com/wp-content/uploads/2021/10/turkey-blue-homeland.jpeg 960w, https://globalsecurityreview.com/wp-content/uploads/2021/10/turkey-blue-homeland-300x169.jpeg 300w, https://globalsecurityreview.com/wp-content/uploads/2021/10/turkey-blue-homeland-768x432.jpeg 768w, https://globalsecurityreview.com/wp-content/uploads/2021/10/turkey-blue-homeland-180x100.jpeg 180w" sizes="(max-width: 640px) 100vw, 640px" /><figcaption id="caption-attachment-24453" class="wp-caption-text">Turkey&#8217;s claimed maritime borders per the &#8220;Blue Homeland&#8221; Doctrine (Source: TRTWorld)</figcaption></figure></p>
</div>
<div>
<p>France&#8217;s intervention came as no surprise since it has<span class="apple-converted-space"> </span><a href="https://www.ifri.org/sites/default/files/atoms/files/jabbour_france_vs_turkey_eastmed_2021.pdf">competing interests</a><span class="apple-converted-space"> </span>with Turkey over Syria, Lebanon, and Africa. As Professor of Geopolitics Kostas Grivas<span class="apple-converted-space"> </span><a href="https://greekcitytimes.com/2020/09/03/greeces-strategic-alliance-with-france-is-a-game-changer-in-the-mediterranean/">explained</a>, France has a large presence and significant geopolitical interests in Africa. Its strategic depth is in Africa, incorporating more than the Francophone states.</p>
<p>The Mediterranean is bridging France with the African continent; thus is imperative to maintain control of it, especially after the recently discovered energy resources attracting a great deal of interest. This brings France closer to Greece, and the Republic of Cyprus in a<span class="apple-converted-space"> </span><a href="https://greekreporter.com/2021/10/04/aukus-undermines-nato-france-greece-cyprus/">containment</a><span class="apple-converted-space"> </span>effort against Turkey&#8217;s expansionism left unanswered by the EU&#8217;s inability to guard its outermost borders.</p>
<p><figure id="attachment_24454" aria-describedby="caption-attachment-24454" style="width: 691px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-24454" src="http://globalsecurityreview.com/wp-content/uploads/2021/10/Eastern_Mediterranean_EEZ_conflicts.svg.png" alt="" width="691" height="463" srcset="https://globalsecurityreview.com/wp-content/uploads/2021/10/Eastern_Mediterranean_EEZ_conflicts.svg.png 1024w, https://globalsecurityreview.com/wp-content/uploads/2021/10/Eastern_Mediterranean_EEZ_conflicts.svg-300x201.png 300w, https://globalsecurityreview.com/wp-content/uploads/2021/10/Eastern_Mediterranean_EEZ_conflicts.svg-768x515.png 768w, https://globalsecurityreview.com/wp-content/uploads/2021/10/Eastern_Mediterranean_EEZ_conflicts.svg-280x189.png 280w" sizes="(max-width: 691px) 100vw, 691px" /><figcaption id="caption-attachment-24454" class="wp-caption-text">Competing EEZ claims in the Eastern Mediterranean</figcaption></figure></p>
</div>
<div>
<p>The Turks, as expected, expressed their frustration with the newly formed Franco-Greek strategic alliance by putting pressure on Greece and the Republic of Cyprus. Turkish frigates<span class="apple-converted-space"> </span><a href="https://www.dailysabah.com/politics/diplomacy/turkish-navy-intercepts-greek-vessel-violating-continental-shelf/amp">obstructed</a><span class="apple-converted-space"> </span>the Maltese-flagged research vessel Nautical Geo hired to conduct research related to the EastMed gas pipeline. The ship attempted to work on the Greek continental shelf and Exclusive Economic Zone (<a href="https://www.ekathimerini.com/news/255573/greece-and-egypt-sign-agreement-on-exclusive-economic-zone/">delimitated</a><span class="apple-converted-space"> </span>with Egypt) and Cypriot EEZ (<a href="https://www.un.org/Depts/los/LEGISLATIONANDTREATIES/PDFFILES/TREATIES/EGY-CYP2003EZ.pdf">delimitated</a><span class="apple-converted-space"> </span>with Egypt). Turkey, however, is<span class="apple-converted-space"> </span><a href="https://www.reuters.com/world/europe/turkey-says-sent-cypriot-vessel-away-its-continental-shelf-2021-10-04/">claiming</a><span class="apple-converted-space"> </span>the same continental self with the Mavi Vatan doctrine.</p>
<p>With an increased military presence, the Turks aimed and succeeded in forcing the Americans on yet another equidistance statement. A State Department spokesman<span class="apple-converted-space"> </span><a href="https://www.ekathimerini.com/news/1169097/us-call-for-deescalation-of-tensions-in-eastern-mediterranean/">said</a><span class="apple-converted-space"> </span>the U.S. &#8220;encourages all states to resolve maritime delimitation issues through peaceful dialogue and in accordance with international law,&#8221; an announcement that overlooks the fact that the Turkish frigate obstructed Nautical Geo&#8217;s work on Greek and Cypriot delineated EEZs.</p>
<p><figure id="attachment_24455" aria-describedby="caption-attachment-24455" style="width: 622px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-24455" src="http://globalsecurityreview.com/wp-content/uploads/2021/10/gas-pipelines-in-east-mediterranean.png" alt="" width="622" height="589" srcset="https://globalsecurityreview.com/wp-content/uploads/2021/10/gas-pipelines-in-east-mediterranean.png 1228w, https://globalsecurityreview.com/wp-content/uploads/2021/10/gas-pipelines-in-east-mediterranean-300x284.png 300w, https://globalsecurityreview.com/wp-content/uploads/2021/10/gas-pipelines-in-east-mediterranean-768x727.png 768w, https://globalsecurityreview.com/wp-content/uploads/2021/10/gas-pipelines-in-east-mediterranean-1024x969.png 1024w" sizes="(max-width: 622px) 100vw, 622px" /><figcaption id="caption-attachment-24455" class="wp-caption-text">Natural gas infrastructure in the Eastern Mediterranean.</figcaption></figure></p>
</div>
<div>
<p>Ankara fueled tensions to test the Franco-Greek alliance&#8217;s credibility and the commitment of the states involved in EastMed. In an older statement, the Turkish Ambassador to Athens Burak Özügergin<span class="apple-converted-space"> </span><a href="https://www.estianews.gr/apopseis/pliges-sto-soma-tou-ethnoys/">said</a><span class="apple-converted-space"> </span>that &#8220;the cause of our troubles [between Greece and Turkey] is Cyprus and the<span class="apple-converted-space"> </span><a href="https://energypress.eu/trilateral-east-med-agreement-set-to-be-signed-in-athens-today/">trilateral agreement</a><span class="apple-converted-space"> </span>[Greece-Republic of Cyprus-Israel] on EastMed.&#8221; On the other hand, the Israeli Ambassador to Athens, Yossi Amrani, made an ambiguous<span class="apple-converted-space"> </span><a href="https://www.amna.gr/home/article/558447/Presbis-Israil-Oi-ellino-israilines-scheseis-tha-sunechisoun-na-einai-kales">statement</a><span class="apple-converted-space"> </span>about the pipeline clarifying that &#8220;if we do not do it now, it will not be realistic later.&#8221;</p>
<p><span style="text-transform: initial;">The Americans also expressed skepticism over the feasibility and construction costs of the pipeline. &#8220;We basically support the concept of a pipeline – it&#8217;s very appealing. The question is whether it is economically viable,&#8221; an American official</span><span class="apple-converted-space" style="text-transform: initial;"> </span><a style="text-transform: initial;" href="https://www.mcclatchydc.com/news/policy/environment/energy/article231114518.html">stated</a><span style="text-transform: initial;">. &#8220;If the pipeline makes the gas too expensive on the European market right now, obviously that should be considered,&#8221; he added.  These reservations fell into silence after Israeli interventions.</span></p>
</div>
<div>
<p>The EastMed pipeline has always faced issues with the gas<span class="apple-converted-space"> </span><a href="https://www.ekathimerini.com/news/1157014/eastmed-pipeline-viability-under-scrutiny/">deposits needed</a><span class="apple-converted-space"> </span>to support it. The Israeli-Egyptian<span class="apple-converted-space"> </span><a href="https://www.gov.il/en/departments/news/press_210221">agreement</a><span class="apple-converted-space"> </span>on the construction of a subsea gas pipeline from the Israeli Leviathan gas field (initially intended to be supplied through EastMed) to liquefaction facilities in Egypt and similar<span class="apple-converted-space"> </span><a href="https://www.gov.il/en/departments/news/press_210221">plans</a><span class="apple-converted-space"> </span>to transfer sizable quantities of gas from Aphrodite Cypriot gas field (also designed to be supplied through EastMed) to Egypt, raise further doubts on the project.</p>
<p><span style="text-transform: initial;">Dr. Charles Ellinas, a nonresident senior fellow with the Atlantic Council&#8217;s Global Energy Center,</span><span class="apple-converted-space" style="text-transform: initial;"> </span><a style="text-transform: initial;" href="https://politis.com.cy/apopseis/analyseis/o-agogos-eastmed-tha-perasei-apo-tin-aigypto/">counters</a><span class="apple-converted-space" style="text-transform: initial;"> </span><span style="text-transform: initial;">that &#8220;due to limited amount of gas at Leviathan, it is not feasible for other pipelines from Israel to Egypt to coexist with EastMed.&#8221;</span></p>
<p><span style="text-transform: initial;">Regardless of the potential shortcomings of EastMed, it yields a unique opportunity to assess the new Franco-Greek alliance. Utilizing the proposed pipeline may prove a valuable tool to contain the Mavi Vatan revisionist doctrine. Whether EastMed is techno-economically doable or not is irrespective of the need to defend it on site. This relates to Greece&#8217;s right to unilaterally extend its territorial waters from 6 to 12Nm (in compliance with</span><span class="apple-converted-space" style="text-transform: initial;"> </span><a style="text-transform: initial;" href="https://www.un.org/depts/los/convention_agreements/texts/unclos/unclos_e.pdf">UNCLOS III</a><span style="text-transform: initial;"> provisions) as well as exercising its sovereignty rights and jurisdiction over the</span><span class="apple-converted-space" style="text-transform: initial;"> </span><a style="text-transform: initial;" href="https://www.un.org/depts/los/convention_agreements/texts/unclos/part6.htm">continental shelf</a><span style="text-transform: initial;">/</span><a style="text-transform: initial;" href="https://www.un.org/depts/los/convention_agreements/texts/unclos/part5.htm">EEZ</a><span class="apple-converted-space" style="text-transform: initial;"> </span><span style="text-transform: initial;">that Turkey provocatively challenges.</span></p>
<p><span style="text-transform: initial;">From France&#8217;s point of view, defending Greece&#8217;s rights (interrelated with those of the Republic of Cyprus) deriving from the Law of the Sea serves its long-term geostrategic goal for Mediterranean naval supremacy and control.</span></p>
<p><span style="text-transform: initial;">Joint Franco-Greek action to defend EastMed&#8217;s ongoing works would voice a clear message to Turkey. On the contrary, leaving the Turkish offensive obstruction of Nautical Geo unanswered would diminish the Franco-Greek pact credibility forged in common rivalry with Turkey. Moreover, the new strategic deal can act as a pretext to adopt a much-needed confrontational approach against Turkish revisionism and neo-imperial tendencies that are known to consider strong measures rather than soft diplomatic strategies.</span></p>
<p><span style="text-transform: initial;">In any case, the security situation in the region is rapidly deteriorating. Ömer Çelik (spokesperson of Recep Tayyip Erdoğan&#8217;s AK Party)</span><span class="apple-converted-space" style="text-transform: initial;"> </span><a style="text-transform: initial;" href="https://www.dailysabah.com/politics/diplomacy/blue-homeland-doctrine-turkeys-red-line-ak-party-spokesperson">stated</a><span class="apple-converted-space" style="text-transform: initial;"> </span><span style="text-transform: initial;">on October 5, 2021, that the Mavi Vatan doctrine is Turkey&#8217;s &#8220;red line.&#8221; Days later, Turkish Foreign Minister Mevlüt Çavuşoğlu picked up the glove on the Franco-Greek alliance and increased the heat on Mediterranean waters</span><span class="apple-converted-space" style="text-transform: initial;"> </span><a style="text-transform: initial;" href="https://www.ekathimerini.com/news/1169480/cavusoglu-said-possible-to-declare-eez-in-eastern-mediterranean/">announcing</a><span class="apple-converted-space" style="text-transform: initial;"> </span><span style="text-transform: initial;">that Ankara could declare Turkey&#8217;s EEZ. How will the Greeks and French react to Turkish efforts to undermine the newly formed alliance?</span></p>
</div>
<p><a href="https://globalsecurityreview.com/aukus-franco-greek-pact-eastmed-pipeline-interrelated/">The Connection Between AUKUS, the Franco-Greek Pact, and the EastMed Pipeline</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Overlooked, Dangerous Nexus Between National Security and Public Health: The Case of Smallpox</title>
		<link>https://globalsecurityreview.com/the-overlooked-dangerous-nexus-between-national-security-and-public-health-the-case-of-smallpox/</link>
		
		<dc:creator><![CDATA[Danyale Kellogg]]></dc:creator>
		<pubDate>Tue, 11 May 2021 22:34:46 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Public Health]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=23930</guid>

					<description><![CDATA[<p>The World Health Organization (WHO) declared smallpox officially eradicated on May 8, 1980, ending the reign of one of history’s deadliest killers and marking the first, and only, human disease to ever have been eradicated. A decades-long global effort, which included collaboration between the United States and the Soviet Union, allowed ring vaccination campaigns to suffocate the disease. Smallpox and [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-overlooked-dangerous-nexus-between-national-security-and-public-health-the-case-of-smallpox/">The Overlooked, Dangerous Nexus Between National Security and Public Health: The Case of Smallpox</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="color: #333333;">The World Health Organization (WHO) declared smallpox officially </span><a href="https://www.cdc.gov/smallpox/history/history.html#:~:text=Almost%20two%20centuries%20after%20Jenner,achievement%20in%20international%20public%20health."><span style="color: #1155cc;">eradicated</span></a><span style="color: #333333;"> on May 8, 1980, ending the reign of one of history’s deadliest killers and marking the first, and only, human disease to ever have been eradicated. A decades-long global effort, which included</span><a href="https://www.brookings.edu/blog/order-from-chaos/2020/08/27/the-us-cooperated-with-the-soviets-on-smallpox-it-should-do-the-same-with-china-on-covid-19-vaccine-distribution/"><span style="color: #1155cc;"> collaboration between the United States and the Soviet Union</span></a><span style="color: #333333;">, allowed </span><a href="https://www.cdc.gov/smallpox/bioterrorism-response-planning/public-health/ring-vaccination.html"><span style="color: #1155cc;">ring vaccination</span></a><span style="color: #333333;"> campaigns to suffocate the disease. Smallpox and its causative agent, variola virus, were, ostensibly, no longer a public health threat. However, the disease’s eradication created a serious national security threat and potential public health disaster: by putting an end to ongoing vaccinations in civilian populations, smallpox became a much more dangerous bioweapon. Better understanding of this unintended consequence can inform a better understanding of the complex, yet critical relationship between public health and national security.</span></p>
<p>After smallpox was officially eradicated, the world’s remaining samples of variola virus were locked away in vaults in biosafety level 4 laboratories at CDC Headquarters in Atlanta, GA, and the Vector Research Institute in Novosibirsk, Siberia. An estimated <a href="https://ourworldindata.org/smallpox#costs-of-smallpox-and-its-eradication"><span style="color: #1155cc;">5 million lives annually</span></a><span style="color: #333333;"> since the disease’s eradication have been saved, a testament to the awesome power and great lengths taken to end this disease. However, even though the </span><a href="https://www.cdc.gov/mmwr/preview/mmwrhtml/mm5142a5.htm"><span style="color: #1155cc;">last known naturally occurring case</span></a><span style="color: #333333;"> was reported in Somalia in 1977, smallpox still poses a dramatic risk to United States national security.</span></p>
<p>If only the United States and Russia have variola virus samples and the use of biological weapons has the potential to trigger an epidemic or pandemic, one might conclude that state use of smallpox as a weapon is not a significant threat. However, multiple countries have unofficial samples of the variola virus, including <a href="https://www.nytimes.com/2019/01/15/science/north-korea-biological-weapons.html"><span style="color: #0563c1;">North Korea</span></a><span style="color: #333333;"> and </span><a href="https://www.nti.org/learn/countries/russia/biological/"><span style="color: #0563c1;">Russia</span></a><span style="color: #333333;">. Worse yet, the United States is not adequately prepared for a smallpox outbreak. Smallpox, a </span><a href="https://emergency.cdc.gov/agent/agentlist-category.asp"><span style="color: #1155cc;">Category A agent</span></a><span style="color: #333333;">, is considered easy to disseminate and transmits easily from person to person. Furthermore, despite the increased preparedness efforts taken after the 2001 </span><a href="https://www.fbi.gov/history/famous-cases/amerithrax-or-anthrax-investigation"><span style="color: #1155cc;">Amerithrax</span></a><span style="color: #333333;"> attacks, the United States is </span><a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6076891/#:~:text=Reports%20reveal%20that%20we%20are,policy%20makers%20about%20the%20threat."><span style="color: #1155cc;">not prepared</span></a><span style="color: #333333;"> for a bioterror attack. Though the United States </span><a href="https://www.fda.gov/emergency-preparedness-and-response/mcm-issues/smallpox-preparedness-and-response-updates-fda"><span style="color: #1155cc;">stockpiles smallpox vaccines</span></a><span style="color: #333333;">, the logistics of maintaining and rolling out the vaccine to the masses in a bioterror attack scenario would be incredibly difficult, as the </span><a href="https://www.cidrap.umn.edu/news-perspective/2021/02/covid-19-challenges-continue-across-us"><span style="color: #0563c1;">COVID-19 vaccine rollout</span></a><span style="color: #333333;"> has demonstrated. This could be further exacerbated by </span><a href="https://www.thelancet.com/journals/landig/article/PIIS2589-7500(20)30227-2/fulltext"><span style="color: #1155cc;">growing anti-vaccine sentiments</span></a><span style="color: #333333;">.</span></p>
<p>In addition to concerns that the countries in possession of smallpox samples could deploy them as a weapon, there are further valid concerns that artificial gene synthesis could allow for the <a href="https://web.archive.org/web/20160303170119/http:/www.biosafety-info.net/file_dir/413148854af122567.pdf"><span style="color: #1155cc;">re-creation of smallpox</span></a><span style="color: #333333;">. There is potentially precedence for this: in 2017, many </span><a href="https://www.liebertpub.com/doi/10.1089/hs.2017.0081"><span style="color: #1155cc;">scholars</span></a><span style="color: #333333;"> criticized a </span><a href="https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0188453"><span style="color: #0563c1;"><i>PLOS ONE</i> article</span></a><span style="color: #333333;"> providing details of how one Canadian lab reconstructed an infectious horse pox virus using chemically synthesized DNA, arguably providing a roadmap of how one might do the same for smallpox. </span><a href="https://www.ncbi.nlm.nih.gov/books/NBK458495/"><span style="color: #0563c1;">Dual-use research</span></a><span style="color: #333333;"> is certainly nothing new but, in a more interconnected world, the threats posed by infectious disease dual-use research are especially concerning. Furthermore, as community and private labs proliferate alongside concerns about who is in our university labs across the U.S., issues of who has access to this type of research could also pose greater national security risks than many presently estimate.</span></p>
<p>Today, a successful smallpox attack would be catastrophic, and ensuring we are prepared for an intentional release of variola virus will entail strengthening public health at all levels, ensuring the stability and efficacy of the <a href="https://www.phe.gov/about/sns/Pages/default.aspx"><span style="color: #1155cc;">Strategic National Stockpile</span></a><span style="color: #333333;">, and making sure healthcare providers and private healthcare systems are prepared should they be presented with a case. These public health steps are vital to national biosecurity preparations as well. Furthermore, cross-disciplinary collaborations in academia, industry, and government are critical to facilitate this preparation and to achieve better biosecurity in this country, particularly as some public health scholars have argued that </span><a href="https://www-ncbi-nlm-nih-gov.srv-proxy2.library.tamu.edu/pmc/articles/PMC1448511/"><span style="color: #1155cc;">increased bio-preparedness has harmed public health</span></a><span style="color: #333333;">.</span></p>
<p>Finally, while smallpox is a  unique case, this challenge highlights larger structural issues the United States and other countries must address such as the <a href="https://pubmed.ncbi.nlm.nih.gov/33040358/"><span style="color: #1155cc;">urban-rural healthcare divide</span></a><span style="color: #333333;">, </span><a href="https://www.ncbi.nlm.nih.gov/books/NBK425844/"><span style="color: #1155cc;">racial and ethnic disparities in health outcomes</span></a><span style="color: #333333;">, </span><a href="https://www.rand.org/news/press/2021/01/28.html#:~:text=Prescription%20drug%20prices%20in%20the%20United%20States%20are%20significantly%20higher,a%20new%20RAND%20Corporation%20report.&amp;text=%E2%80%9CWe%20found%20consistently%20high%20U.S.,regardless%20of%20our%20methodological%20decisions.%E2%80%9D"><span style="color: #0563c1;">rising prescription drug prices</span></a><span style="color: #333333;">, and ongoing crises like the </span><a href="https://www.hhs.gov/opioids/about-the-epidemic/index.html"><span style="color: #1155cc;">opioid</span></a><span style="color: #333333;"> and </span><a href="https://www.who.int/activities/controlling-the-global-obesity-epidemic#:~:text=As%20of%202000%2C%20the%20number,suffer%20from%20obesity%2Drelated%20problems."><span style="color: #1155cc;">obesity</span></a><span style="color: #333333;"> epidemics. While we lack clear, open-source information about smallpox and general biological weapons capabilities of other states and non-state actors, we can improve our </span><a href="https://www.researchgate.net/publication/253159643_Public_Health_Preparedness_The_Best_Defense_against_Biological_Weapons"><span style="color: #0563c1;">preparedness for possible attacks by improving our overall public health</span></a><span style="color: #333333;">. Regardless of if we face a future smallpox attack or not, and despite the lack of harmony between these two fields, such steps will improve our overall preparedness for future pandemics and emerging health threats.</span></p>
<p><a href="https://globalsecurityreview.com/the-overlooked-dangerous-nexus-between-national-security-and-public-health-the-case-of-smallpox/">The Overlooked, Dangerous Nexus Between National Security and Public Health: The Case of Smallpox</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Inevitability of the Taliban’s Resurgence in Afghanistan</title>
		<link>https://globalsecurityreview.com/the-inevitability-of-the-talibans-resurgence-in-afghanistan/</link>
		
		<dc:creator><![CDATA[Benjamin Cole]]></dc:creator>
		<pubDate>Mon, 10 May 2021 19:12:22 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Development]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=23916</guid>

					<description><![CDATA[<p>With the Biden Administration poised to withdraw US troops from Afghanistan a criticism and worries that Biden’s decision is a mistake because it will end up in the Taliban resurging and retaking control over Afghanistan are beginning to mount. The prospect of Afghanistan falling into the hands of the Taliban, the brutal and menacing insurgency [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-inevitability-of-the-talibans-resurgence-in-afghanistan/">The Inevitability of the Taliban’s Resurgence in Afghanistan</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>With the Biden Administration poised to withdraw US troops from Afghanistan a criticism and <a href="https://thehill.com/homenews/senate/548007-biden-sparks-bipartisan-backlash-on-afghanistan-withdrawal">worries that Biden’s decision is a mistake</a> because it will end up in the Taliban resurging and retaking control over Afghanistan are beginning to mount. The prospect of Afghanistan falling into the hands of the Taliban, the brutal and menacing insurgency that gave safe haven to al-Qaeda following the 9/11 attacks, is gut-wrenching to the American heart. But regardless of our perception of diminishing returns for all the lives, money, and resources invested into creating a free and democratic Afghanistan, a struggle for power between that new coalition-built government and the Taliban was always going to be the inevitable outcome of the US-led intervention.</p>
<h3>Setup for Failure</h3>
<p>The US-led invasion was intractable from the start. With the invasion occurring less than a month after the attacks on September 11<sup>th</sup>, 2001, the US did not give itself or its coalition partners much time to devise a plan of action for the invasion and to create peace after the invasion. Though the legal basis was clear – al-Qaeda led by Osama bin Laden committed the most devastating terror attack on US soil to date, the Taliban harbored bin Laden and much of his al-Qaeda network within Afghan territory, therefore, the Taliban was complicit – the US failed to develop a comprehensive regime of goals and objectives outside of finding bin Laden and destroying the Taliban for harboring him. The Bush administration did try to ‘<a href="https://www.jstor.org/stable/pdf/resrep10879.pdf?refreqid=excelsior%3Ab6d522db31bf4d8ad4fe9f89b385382f">provide the security that is the foundation for peace</a>,’ but failed to develop a functional strategy to achieve this because <a href="https://www.usip.org/publications/2015/12/poor-planning-coordination-cited-afghan-intervention">there was no real conceptualization of what that meant</a>.</p>
<p style="padding-left: 40px;"><em>&#8220;It was an accidental war&#8221; following September 11, 2001. &#8220;It was initially to punish those who committed the crime with no plans or strategy for what needs to happen after that.&#8221; </em></p>
<p style="padding-left: 40px;"><a href="https://www.usip.org/publications/2015/12/poor-planning-coordination-cited-afghan-intervention">Ali Jalali, former Afghan Interior Minister</a></p>
<p>Ultimately, without significant conceptualization of what a post-Taliban Afghanistan could or should look like, NATO was never going to be able to do more than temporarily disrupt the Taliban which proved more resilient and willing to wait out the Coalition in the short and medium terms.</p>
<h3>Development was Neither Afghan Centered nor Afghan Led</h3>
<p>Part of what seems to sting the most for Americans critical of the withdrawal is the prospect of losing all of the progress that was made in Afghanistan towards building a democratic future for the country. But that was always impermanent. The development work in Afghanistan, from democratization initiatives, government capacity building, to infrastructure development, was always NATO-led, and <a href="https://www.usip.org/publications/2015/12/poor-planning-coordination-cited-afghan-intervention">therefore fragile when it came time for NATO to leave</a>. Rather than empowering the Afghans to build organic political structures and institutions and security agreements and forces, NATO laid much of the groundwork itself. By imposing governmental structures and administrative procedures and making deals and agreements with local and regional leadership, <a href="https://www.mei.edu/publications/political-legitimacy-afghanistan">NATO never allowed the new government to build a sense of legitimacy</a> it would need to govern and keep Afghanistan secure by keeping those relationships and agreements intact after the occupation ended. This was probably done to prevent corruption and ensure capacities were built in ways that NATO could understand and quantify to continue justifying to publics back home. But this left the new Afghan government without its own roots and struggling with a perception of being a product of outside occupiers that would crumble once NATO left.</p>
<p>This is similar to what the US saw in Iraq. The US created partnerships between different regional and tribal groups to help bring security to the more turbulent regions of Iraq. But when US troops left the country, the bonds that held these regional coalitions together quickly snapped under the pressure of the inevitable power vacuum. Militias and warlords raced for arms and control of resources, ultimately devolving the country into civil war because the new Iraqi government was not yet stable enough to fill it. Because the new Afghan government hasn’t been at the helm creating its own security and stability, the same power vacuum is almost inevitable in Afghanistan as well. And the Taliban has been lying in wait for the day that NATO leaves and that vacuum opens up.</p>
<h3>Is Afghanistan Better Off?</h3>
<p>We must also question, like in Iraq, if Afghanistan is better off today than it was before NATO’s occupation. It is easy to look at democratization efforts and infrastructure projects like building schools and hospitals and say “yes, clearly.” But in reality, the NATO-backed government in Afghanistan only holds control of about 50% of Afghanistan’s total territory right now. The rest is controlled by the Taliban and aligned warlords. The reach of that development has not spread across the entire country. Further, what good has this development done if the people of Afghanistan are still captured in crossfire. Estimates from 2019 say that as many as <a href="https://watson.brown.edu/costsofwar/costs/human/civilians/afghan">43,000 civilians</a>, including women and children, have died as direct casualties of the occupation. As many <a href="https://apnews.com/article/a2a8d7a4f89ec0515379dc4d4a38b56a">as 100,000 more received</a> injuries directly from occupation operations, not to mention mental trauma and indirect deaths and injuries. There are some positive outcomes from the occupation. But those outcomes aren’t widespread, sustainable post-occupation; and there’s a legitimate argument that these positive outcomes are offset or outsized by the brutal cost of the conflict in total.</p>
<h3><strong>Could the US &amp; NATO Endure?</strong></h3>
<p>This article is not intended as a cynical endorsement of President Biden’s plan to withdraw US troops from Afghanistan. Rather, it is meant as a reckoning with the reality of the situation in Afghanistan over grandiose ideations of some undefined victory over the Taliban. The Taliban is dug in. It is fighting for what it sees as a righteous homeland. It knows how to extract resources from the environment in Afghanistan, <a href="https://www.mei.edu/publications/political-legitimacy-afghanistan">including maintaining legitimacy with which foreign occupiers cannot compete. </a>NATO can weaken it, but the Taliban can, has, and will endure in the shadows until the NATO tires. The US &amp; NATO cannot endure, not the same way the Taliban can. The occupation is costly in lives and money and NATO partners must constantly justify these costs to publics at home that do not want to continue paying.</p>
<h3><strong>What is a Better, More Feasible Alternative?</strong></h3>
<p>Unfortunately, there are no good alternatives for NATO. The returns from the occupation continue to diminish as the Taliban gains more territory. And continuing the occupation will only prolong the inevitable. However, there may be some hope for a long-term shift in strategy that won’t dismantle the Taliban but may help build stability and give the chance for peace in the future. The Biden administration has begun the process – <a href="https://foreignpolicy.com/2021/03/25/india-afghanistan-peace-talks-pakistan-russia-china-biden/">regional security cooperation between Afghanistan, the US, Pakistan, India, Russia, and China through the United Nations</a>. It’s not clear exactly what roles each of these partners will have in promoting peace in post-occupation Afghanistan, but there is potential here. The security of the Central Asian region depends on the security of Afghanistan. Continued instability and insecurity in Afghanistan threaten the security of Pakistan and China directly, as they share land borders with Afghanistan and spillover effects could threaten regional dynamics destabilizing security dynamics for the others as well.</p>
<p>If this cooperation centers on the needs and capacities of Afghanistan and is led by Afghanistan, then there is hope that the democratic Afghan government can create crucial legitimacy-building and capacity-building initiatives. This would allow Afghan security forces to better counter Taliban operations and resource networks and disrupt the Taliban’s social, tribal, and cultural ties that help entrench its power. It would also show Afghans that they can have confidence that their government can provide good governance for them, not the foreign occupiers who are providing or dictating over them. But that would mean great care would need to be taken in this new security cooperation to ensure that Afghan forces lead and construct security operations and Afghan politicians and public servants need to develop, lead, and guide development initiatives following the needs and desires of the Afghan people. More specifically, that means Afghans need to be in charge of how development aid is distributed and used. This is a sharp change to how development aid is normally done – conventionally, how development aid is used and distributed is dictated by the aid giver- But this limits the aid recipient from being able to tailor that aid to the dynamic needs of the people it’s supposed to help, forcing them to either return of not use the aid or use it outside of its prescriptions and then face accusations of corruption. But if this new security cooperation can center the needs, interests, and leadership of Afghans first, then there is a that it will be able to push back against the Taliban over time. This won’t be overnight, or probably not even over the course of months or a year. But a long-term process of development, security cooperation, and resource investment into Afghan governance and economy may ultimately be the key to finally dismantling the Taliban rather than pushing them into the shadows.</p>
<p><a href="https://globalsecurityreview.com/the-inevitability-of-the-talibans-resurgence-in-afghanistan/">The Inevitability of the Taliban’s Resurgence in Afghanistan</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bio-Security in the Age of Global Pandemics</title>
		<link>https://globalsecurityreview.com/bio-security-in-the-age-of-global-pandemics/</link>
		
		<dc:creator><![CDATA[Joanna Rozpedowski]]></dc:creator>
		<pubDate>Tue, 20 Apr 2021 21:10:49 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=23805</guid>

					<description><![CDATA[<p>Since the fall of the Berlin Wall on November 9th, 1989, the United States held an unparalleled political, economic, and military position in the post-communist era. For nearly three decades, liberal values propped up by an unrivaled technological superiority outpaced its European allies and dwarfed the concerted efforts of Asian and Latin American developing nations. [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/bio-security-in-the-age-of-global-pandemics/">Bio-Security in the Age of Global Pandemics</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div>
<p class="Body">Since the fall of the Berlin Wall on November 9th, 1989, the United States held an unparalleled political, economic, and military position in the post-communist era. For nearly three decades, liberal values propped up by an unrivaled technological superiority outpaced its European allies and dwarfed the concerted efforts of Asian and Latin American developing nations. International organizations, such as NATO, the World Bank, the World Trade Organization facilitated cooperation among nations and created incentives for states to work together.<sup><span lang="DE">[i]</span></sup> Consecutive international agreements, treaties, and conventions aimed to stabilize regions, resolve disputes and deep conflicts of interest, and remedy residual power imbalances which thwarted institutional cohesion and domestic prosperity. The rising tides of economic globalization promised to lift all boats.<span lang="DE"> </span></p>
<p class="Body"><span lang="DE" style="text-transform: initial;">Yet, </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">instead of a peaceful world order and near-universal acceptance of benevolent U.S. leadership,</span><span lang="DE" style="text-transform: initial;">” </span><span style="text-transform: initial;">as one well-regarded international scholars has indicated, </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">the post-Cold War world continued to operate according to the more traditional dictates of realpolitik</span><span lang="DE" style="text-transform: initial;">”</span><sup><span lang="DE">[</span></sup><sup><span lang="DE">i</span></sup><sup><span lang="DE">i]</span></sup><span style="text-transform: initial;"> necessitating extensive budgetary commitments to the U.S. security and military. The increase in total global wealth failed to sufficiently proof emerging democracies against the likelihood of war and the 2001 treaty of friendship and cooperation between the United States and China came to yield contrasting dividends in 2020. The U.S.</span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">’ “</span><span style="text-transform: initial;">constructive relationship</span><span lang="DE" style="text-transform: initial;">” </span><span style="text-transform: initial;">with China and a </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">special relationship</span><span lang="DE" style="text-transform: initial;">” </span><span style="text-transform: initial;">with Russia have been outpaced by Chinese appropriation and near-monopolistic power over global supply chains, aggressive Russian exercise missions in the Arctic, the Baltic, and the outer space, and further exacerbated by the pandemic-affected social, political, and economic realities on the ground.</span><span lang="DE" style="text-transform: initial;"> </span></p>
<p style="position: absolute; top: -9999px;"><a href="https://www.buydiazepamuk.com">buydiazepamuk.com</a></p>
<p class="Body"><span style="text-transform: initial;">The National Defense Strategies issued in the past three years have acknowledged an </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">increasingly complex global security environment, characterized by overt challenges to the free and open international order.</span><span lang="DE" style="text-transform: initial;">”</span><sup><span lang="DE">[iii]</span></sup><span style="text-transform: initial;"> For the authors of the NDS 2018, it has become gradually more apparent that China and Russia strive to shape a world that is consistent with their authoritarian model, while Iran and North Korea seek to guarantee regime survival and increased leverage by seeking nuclear, biological, chemical, conventional, and unconventional weapons.</span><sup><span lang="DE">[iv]</span></sup></p>
<p class="Body"><span style="text-transform: initial;">The new millennium has thus been marked by rapid technological and social change provoking geopolitical realignments, regional power struggles, and unabated military, research, and economic rivalry. The United States recognizes that international strategic competition between trade partners as well as political foes is on the rise and that it must adjust its national security and defense strategies to unilaterally meet the emerging challenges.</span><sup style="text-transform: initial;"><span lang="DE">[v]</span></sup></p>
<h3 class="Body"><span style="text-transform: initial;">What’s at issue</span></h3>
<p class="Body"><span style="text-transform: initial;">In the next great power competition, traditional forms of kinetic warfare will undoubtedly give way to simulated but not less effective non-military methods involving close collaboration between civilian and military sectors of the economy and society. These phantom warfare scenarios will likely occur in the cybersphere through unmanned agents of surveillance, manipulation of algorithmic data, and advanced use of Artificial Intelligence and drone technologies. Scientific advances will breed a new generation of sophisticated biotechnologies enabling synthetic engineering of pathogens and biological compounds which will permanently alter the national security landscape and their use for offensive and defensive purposes, will make the conduct of future conflicts a permanent feature in the military toolkit of industrialized and highly developed nations as well as developing and rising or revisionist powers seeking strategic advantage via non-traditional means.</span><span lang="DE" style="text-transform: initial;"> </span></p>
<p class="Body"><span style="text-transform: initial;">The resulting cool war </span><span lang="DE" style="text-transform: initial;">– or </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">an on-going conflict that involves constant offensive measures that seek to damage the economic health of a rival and the targeting of </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">‘</span><span style="text-transform: initial;">cutting edge technologies</span><span lang="DE" style="text-transform: initial;">’”</span><sup><span lang="DE">[vi]</span></sup><span lang="DE" style="text-transform: initial;"> – </span><span style="text-transform: initial;">sets as its goal the maintenance of a stable thermal equilibrium preventing the conflict from turning hot or resulting in full kinetic or nuclear engagement.</span><span lang="DE" style="text-transform: initial;"> </span></p>
<p class="Body"><span style="text-transform: initial;">Non-kinetic violence unleashed to maximize political and economic goals will be accompanied by a considerable diffusion of power across networks of state and non-state actors capable of inflicting damage to vital state interests without the possibility of being traced, actively monitored, or prevented by current legal and extra-legal systems in place. Future theaters or war will undoubtedly blur conventional lines of distinction drawn in international law between civilians and combatants, international and non-international conflicts as well as challenge states</span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">’ </span><span style="text-transform: initial;">responses to asymmetric warfare and the degree of proportionality required to effectively repel unconventional attacks on state-owned infrastructure and resources.</span></p>
<p><figure id="attachment_23824" aria-describedby="caption-attachment-23824" style="width: 824px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-23824" src="http://globalsecurityreview.com/wp-content/uploads/2021/04/national-research-labs.png" alt="" width="824" height="454" srcset="https://globalsecurityreview.com/wp-content/uploads/2021/04/national-research-labs.png 824w, https://globalsecurityreview.com/wp-content/uploads/2021/04/national-research-labs-300x165.png 300w, https://globalsecurityreview.com/wp-content/uploads/2021/04/national-research-labs-768x423.png 768w, https://globalsecurityreview.com/wp-content/uploads/2021/04/national-research-labs-180x100.png 180w" sizes="(max-width: 824px) 100vw, 824px" /><figcaption id="caption-attachment-23824" class="wp-caption-text">Source: Joanna Rozpedowski, Collated Data on the Intelligence and Research Eco-system</figcaption></figure></p>
</div>
<div>
<p class="Body"><span style="text-transform: initial;">The post-9/11 intelligence threat assessments focused heavily on biological weapons in the hands of terrorist groups. Substances such as anthrax, smallpox, and other conventional biological agents comprised a list of the most likely culprits instigating terror on a global scale. As late as 2017, Homeland Security cited concerns with threats of bioterrorism which included high-profile disease outbreaks, such as Ebola and viruses like dengue, chikungunya, and Zika.</span><sup><span lang="DE">[vii] </span></sup><span style="text-transform: initial;">Highly virulent compounds and substances resulting from marked improvements in nanotechnologies and bio-engineering can also constitute a novel form of asymmetrical </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span lang="DE" style="text-transform: initial;">hybrid” </span><span style="text-transform: initial;">conflict defined by the NATO 2014 Wales Summit Declaration as a specific set of challenges and threats (including cyber and terrorism) </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">where a wide range of overt and covert military, paramilitary, and civilian measures are employed in a highly integrated design.</span><span lang="DE" style="text-transform: initial;">”</span><sup style="text-transform: initial;"><span lang="DE">[viii]</span></sup></p>
<p class="Body"><span style="text-transform: initial;">There is a reason, therefore, to assume that bio- incidents will, in the future as much as they had in their disreputable past, become once again more fully integrated into the </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span lang="DE" style="text-transform: initial;">hybrid” </span><span style="text-transform: initial;">warfare design and constitute, along with cyber and terrorism, a (re)emerging threat paradigm in the new state-power competition.</span><span lang="DE" style="text-transform: initial;"> </span></p>
<p class="Body"><span style="text-transform: initial;">The White House</span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">’</span><span style="text-transform: initial;">s 2018 Biodefense Strategy in alignment with the 2018 National Defense Strategy identifies biological threats </span><span lang="DE" style="text-transform: initial;">– </span><span style="text-transform: initial;">whether naturally, occurring, accidental, or deliberate in origin </span><span lang="DE" style="text-transform: initial;">– </span><span style="text-transform: initial;">as among the most serious challenges facing the United States and the international community.</span><sup><span lang="DE">[ix]</span></sup><span style="text-transform: initial;"> The document puts significant emphasis on enhancing the national bio-defense enterprise to protect the United States and its partners abroad from biological incidents. It sets out five goals and objectives for ameliorating the risks stemming from the evolving biological risk landscape. They are: (i) Enabling risk awareness to inform decision-making across the bio-defense enterprise; (ii) Ensuring bio-defense capabilities to prevent bio-incidents; (iii) Ensuring bio-defense enterprise preparedness to reduce the impacts of bio-incidents; (iv) Rapidly responding to limit the impacts of bio-incidents; (v) Facilitating recovery to restore the community, the economy, and the environment after a bio-incident.</span><span lang="DE" style="text-transform: initial;"> </span></p>
<p class="Body"><span style="text-transform: initial;">The United States Government Accountability Office</span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">’</span><span lang="DE" style="text-transform: initial;">s </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">National Biodefense Strategy</span><span lang="DE" style="text-transform: initial;">” </span><span style="text-transform: initial;">report underscored, however, several lapses in the 2018 Biodefense Strategy Report, such as lack of </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">clearly documented methods, guidance, processes, and roles and responsibilities for enterprise-wide decision-making</span><span lang="DE" style="text-transform: initial;">”</span><sup><span lang="DE">[x]</span></sup><span style="text-transform: initial;"> complicating coordination of response mechanisms to bio-incidents thus putting the initiative in danger of failing to meet its long-term bio-defense objectives.</span><span lang="DE" style="text-transform: initial;"> </span></p>
<p class="Body"><span style="text-transform: initial;">In recognition of the changing threat environment, the Trump Administration</span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">’</span><span style="text-transform: initial;">s 2021 budget priority requests call for $740.5 billion for national security, $705.4 billion of which will be dedicated to the Department of Defense</span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">’</span><span style="text-transform: initial;">s investment priorities, which include building a more lethal, agile, and innovative joint force.</span><sup style="text-transform: initial;"><span lang="DE">[xi]</span></sup></p>
<p class="Body"><span style="text-transform: initial;">An overview of funds allocation demonstrates an emphasis on traditional tools and methods of warfare, such as nuclear modernization ($28.9 billion), missile defeat and defense ($20.3 billion); munitions ($21.3 billion) as well as newer frontiers of potential conflict, including cyberspace ($9.8 billion) and the space domain ($18.0 billion). The proposed budget also anticipates expenditures in bio-research but does not explicitly support or articulate specific bio-weapons defense research and development objectives. Its investments in bio-technologies focus on (1) </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">$1.3 billion for the Agricultural Research Service, which conducts in-house basic and applied research, develop vaccines, and provide enhanced diagnostic capabilities to protect against emerging foreign animal and zoonotic diseases that threaten the Nation</span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">’</span><span style="text-transform: initial;">s food supply, agricultural economy, and public health.</span><span lang="DE" style="text-transform: initial;">”</span><sup><span lang="DE">[xii]</span></sup><span lang="DE" style="text-transform: initial;"> (2) </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">$14 billion investment in DOD science and technology programs that support key investments in industries of the future, such as artificial intelligence, quantum information science, and biotechnology.</span><span lang="DE" style="text-transform: initial;">” (3) </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">HHS bio-defense and emergency preparedness procurement through the BioShield program and the Strategic National Stockpile, and includes $175 million to support Centers for Disease Control</span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">’</span><span style="text-transform: initial;">s global health security activities, an increase of $50 million compared to the 2020 enacted level.</span><span lang="DE" style="text-transform: initial;">”</span><sup><span lang="DE">[xiii]</span></sup></p>
<p class="Body"><span style="text-transform: initial;">The United States continues to invest heavily in medical intelligence under the auspices of the Department of Defense to monitor the research terrain in order to identify the known knowns and known unknowns.</span></p>
<p><figure id="attachment_23825" aria-describedby="caption-attachment-23825" style="width: 333px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class=" wp-image-23825" src="http://globalsecurityreview.com/wp-content/uploads/2021/04/research-spending.jpg" alt="" width="333" height="345" srcset="https://globalsecurityreview.com/wp-content/uploads/2021/04/research-spending.jpg 324w, https://globalsecurityreview.com/wp-content/uploads/2021/04/research-spending-290x300.jpg 290w" sizes="(max-width: 333px) 100vw, 333px" /><figcaption id="caption-attachment-23825" class="wp-caption-text">Source: Quirin Schiermeier, “Russia Aims to Revive Science after Era of Stagnation,” Nature 579, no. 7799 (March 18, 2020): 332–36, https://doi.org/10.1038/d41586-020-00753-7.</figcaption></figure></p>
<h3 class="Body"><span style="text-transform: initial;">Bio-events: Who’s in Charge?</span></h3>
<p class="Body"><span style="text-transform: initial;">The Departments of Health and Human Services, Homeland Security, and Agriculture have been tasked with bio-surveillance responsibilities, which include developing personnel, training, equipment, and systems to support a national bio-surveillance capability.</span><span class="None"><sup><span lang="DE">[xiv]</span></sup></span><span style="text-transform: initial;"> As of May 2020, Homeland Security has been working on future-oriented enhancements comprising of:</span><span lang="DE" style="text-transform: initial;"> </span></p>
<ol>
<li class="Body"><span style="text-transform: initial;">The Enhanced Passive Surveillance program geared toward delivering a </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">surveillance system for identifying endemic, transboundary and emerging disease outbreaks in livestock&#8230;and</span><span lang="DE" style="text-transform: initial;"> </span><span style="text-transform: initial;"> identify trigger points to alert officials for action.</span><span lang="DE" style="text-transform: initial;">” </span></li>
<li class="Body"><span style="text-transform: initial;">The BioThreat Awareness APEX program will </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">develop affordable, effective and rapid detection systems and architectures to provide advance warning of a biological attack at indoor, outdoor and national security events.</span><span lang="DE" style="text-transform: initial;">” </span></li>
<li class="Body"><span style="text-transform: initial;">The Bio-surveillance Information and Knowledge Integration Program seeks to develop a Community of Practice (COP) Platform</span><span lang="DE" style="text-transform: initial;"> </span><span style="text-transform: initial;">prototype that integrates multiple </span><span lang="NL" style="text-transform: initial;">data</span><span style="text-transform: initial;"> streams to support decision</span><span lang="DE" style="text-transform: initial;"> </span><span style="text-transform: initial;">making during a biological event as well as inform training tools for</span><span lang="DE" style="text-transform: initial;"> </span><span lang="IT" style="text-transform: initial;">state responders.</span><span lang="DE" style="text-transform: initial;">”</span><span class="None"><sup><span lang="DE">[xv]</span></sup></span></li>
</ol>
<p><span style="text-transform: initial;">The programs here enumerated aim to complement the existing systems in place, including the BioWatch program managed by the Department of Homeland Security</span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">’</span><span style="text-transform: initial;">s Office of Health Affairs monitoring aerosol releases of select biological agents, natural and man-made as well as the Department of Defense</span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">’</span><span style="text-transform: initial;">s Airbase/Port Detector System or Portal Shield System designed to provide early warning of biological threats to high-value assets, such as air bases and port facilities.</span><span class="None"><sup><span lang="DE">[xvi]</span></sup></span></p>
<p><span style="text-transform: initial;">The 2010 Report to Congress issued by the US Government Accountability Office claims, however, that </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">there is neither a comprehensive national strategy nor a focal point with the authority and resources to guide the effort to develop a national bio-surveillance capability&#8221; and that </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">efforts to develop a bio-surveillance system could benefit from a focal point that provides leadership for the interagency community.</span><span lang="DE" style="text-transform: initial;">”</span><span class="None" style="text-transform: initial;"><sup><span lang="DE">[xvii]</span></sup></span></p>
</div>
<div>
<h3 class="Body"><span style="text-transform: initial;">From bio-surveillance to bio-security</span></h3>
<p class="Body"><span style="text-transform: initial;">The bio-engineering and disease outbreak threat environment has called for streamlining of knowledge and intelligence sharing to detect and effectively respond to bio-hazards. In the United States, bio-surveillance defined as </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">the process of gathering, integrating, interpreting, and communicating essential information related to all hazards, threats, or disease activity affecting human, animal, or plant health to achieve early detection and warning, [which] contribute to overall situational awareness of the health aspects of an incident, and to enable better decision-making at all levels</span><span lang="DE" style="text-transform: initial;">”</span><span class="None"><sup><span lang="DE">[</span></sup></span><span class="None"><sup><span lang="DE">x</span></sup></span><span class="None"><sup><span lang="DE">viii]</span></sup></span><span style="text-transform: initial;"> is regulated by three legislative measures </span><span lang="DE" style="text-transform: initial;">– </span><span style="text-transform: initial;">The Implementing Recommendations of the 9/11 Commission Act of 2007 (IRCA), the FDA Food and Safety Modernization Act (FSMA), and the Pandemic and All-Hazards Preparedness Reauthorization Act of 2013 (PAHPRA).</span><span class="None"><sup><span lang="DE">[xix]</span></sup></span><span style="text-transform: initial;"> At the national level, the bio-surveillance regime functions include: (i) gathering, integrating, analyzing, interpreting, and disseminating data utilizing a coordinated governance structure; (ii) monitor incidents, threats, or activities in the human, animal, and plant environment; and (iii) enable early detection of threats and mounting an integrated response.</span><span class="None"><sup><span lang="DE">[xx]</span></sup></span><span style="text-transform: initial;"> Globally, International Health Regulations aim to promote national-level surveillance, detection, dissemination of incident-related information to World Health Organization members, ensure verification, and put in place response protocols.</span><span class="None"><sup><span lang="DE">[xxi]</span></sup></span></p>
<h3 class="Body"><span style="text-transform: initial;">Global outlook</span></h3>
<p class="Body"><span style="text-transform: initial;">Global Health Security Index prepared by Johns Hopkins Center for Health Security in collaboration with NTI found that the international preparedness for epidemics and pandemics of natural or synthetic occurrence remains very weak with an average overall GHS Index score of 40.2 out of a possible 100.</span><span class="None"><sup><span lang="DE">[xxii]</span></sup></span><span style="text-transform: initial;"> High-income countries demonstrate greater preparedness and score higher on disease prevention, bio-safety, and bio-security measures. While public health and economic resilience as well as political and security risks challenge developing nations and regions.</span></p>
</div>
<div>
<p><figure id="attachment_23826" aria-describedby="caption-attachment-23826" style="width: 806px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-23826" src="http://globalsecurityreview.com/wp-content/uploads/2021/04/global-health-security-index.png" alt="" width="806" height="516" srcset="https://globalsecurityreview.com/wp-content/uploads/2021/04/global-health-security-index.png 806w, https://globalsecurityreview.com/wp-content/uploads/2021/04/global-health-security-index-300x192.png 300w, https://globalsecurityreview.com/wp-content/uploads/2021/04/global-health-security-index-768x492.png 768w" sizes="(max-width: 806px) 100vw, 806px" /><figcaption id="caption-attachment-23826" class="wp-caption-text">Source: Johns Hopkins University. 2019.Global Health Security Index https://www.ghsindex.org/</figcaption></figure></p>
</div>
<div>
<h3 class="Body">The art of the possible</h3>
<p class="Body"><span style="text-transform: initial;">The National Academies of Sciences, Engineering, and Medicine</span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">’</span><span style="text-transform: initial;">s 2018 Bio-defense in the Age of Synthetic Biology Report enumerates ways in which synthetically engineered pathogens can alter the national security landscape. Advances in genetics, may &#8220;soon make possible the development of ethnic bio-weapons that target specific ethnic or racial groups based upon genetic markers.</span><span lang="DE" style="text-transform: initial;">”</span><span class="None"><sup><span lang="DE">[xxiii]</span></sup></span><span style="text-transform: initial;"> Targeted bio-weapons systems might favor ethnically heterogeneous nations i.e. the USA over homogeneous ones such as China or Russia.</span><span class="None"><sup><span lang="DE">[xxiv]</span></sup></span></p>
<p class="Body"><span style="text-transform: initial;">Concerns over the speed of scientific advances and acceleration in the ability to create or modify biological organisms is an area of significant interest to the defense community. A new generation of bio-weapons can target specific animals or plants, crippling agricultural output, sabotaging supply chains, and threatening the stability of political systems and continuity of economic activities. Herbicidal warfare intended to destroy crops and defoliate vegetation has already been used in the 1960s and </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">’</span><span style="text-transform: initial;">70s Sino- Soviet and Vietnam counterinsurgency operations and the United States sabotaged Soviet agricultural output with chemical and entomological capabilities during the Cold War.</span><span lang="DE" style="text-transform: initial;"> </span></p>
<p class="Body"><span style="text-transform: initial;">The 1976 Convention on the Prohibition of Military or Any Other Hostile Use of Environmental Modification Techniques, while a legal deterrent meant to bring about general and complete disarmament and thus </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">saving mankind from the danger of using new means of warfare</span><span lang="DE" style="text-transform: initial;">”,</span><span class="None" style="text-transform: initial;"><sup><span lang="DE">[xxv]</span></sup></span><span style="text-transform: initial;"> does not thwart scientific research, testing, development, and use of tactical herbicides for peaceful purposes.</span><span lang="DE" style="text-transform: initial;"> </span></p>
<p class="Body"><span style="text-transform: initial;">Meanwhile, biotechnological innovations offer new and improved capabilities. Experts see the emerging field of synthetic biology as a highly malleable science enabling (i) modifications to the human immune system; (ii) modifications to the human genome; (iii) re-creating known pathogenic viruses; (iv) making existing bacteria more dangerous; and (v) creating new pathogens.</span><span class="None"><sup><span lang="DE">[xxvi]</span></sup></span><span style="text-transform: initial;"> Each of these comes with its own set of expertise requirements, levels of usability as a bio-weapon, and a specific set of risks outlined in the enclosed graphic.</span><span lang="DE" style="text-transform: initial;"> </span></p>
<p class="Body"><span style="text-transform: initial;">While advances in synthetic biology promise to account for a wide range of biological anomalies by providing revolutionary diagnostic and therapeutic tools, they can also increase the power of malicious actors intent on creating tailor-made harmful biological agents and expand what is possible in the creation cycle of new bio-weapons.</span><span lang="DE" style="text-transform: initial;"> </span></p>
<h3 class="Body"><span style="text-transform: initial;">Bio-events: Legality and liability</span></h3>
<p class="Body"><span style="text-transform: initial;">The Hague Declaration of 1899 lays down principles preventing the use of certain methods of combat that are outside of the scope of civilized warfare and reiterated in the 1925 Geneva Protocol. Chief among them was the prohibition on the use and dispersal of asphyxiating, poisonous or deleterious gases, and bacteriological methods of warfare. Following World War I, the international community further banned the use of chemical and biological weapons, and the 1972 Biological and Toxin Weapons Convention (BTWC) and the 1993 Chemical Weapons Conventions further prohibited the development, production, stockpiling, and transfer of these weapons and the use of biological agents in armed conflict constitutes a war crime under the 1998 Rome Statute of the International Criminal Court.</span><span class="None"><sup><span lang="DE">[xxvii]</span></sup></span></p>
<p class="Body"><span style="text-transform: initial;">The BTWC does not explicitly prohibit the &#8220;use&#8221; of biological weapons, however, the Final Declaration of the 1996 Treaty Review Conference reaffirmed that under Article I of the BTWC, any alleged &#8220;use&#8221; is tantamount to a violation of the Convention.</span><span class="None"><sup><span lang="DE">[xxviii]</span></sup></span></p>
<p class="Body"><span style="text-transform: initial;">The UN Security Council Resolution 1540 calls upon countries to establish and enforce laws prohibiting and preventing the acquisition and transfer of biological weapon-related materials and equipment. There are, however, limited formal verification mechanisms and biological and chemical weapons still pose a significant threat to national security as do synthetically manufactured compounds resulting from scientific and bio-engineering advancement and innovation.</span><span class="None"><sup><span lang="DE">[xx</span></sup></span><span class="None"><sup><span lang="DE">i</span></sup></span><span class="None" style="text-transform: initial;"><sup><span lang="DE">x]</span></sup></span></p>
<h3 class="Body"><span style="text-transform: initial;">Remedies</span><span lang="DE" style="text-transform: initial;"> </span></h3>
<p class="Body"><span style="text-transform: initial;">Short of risky and questionable military intervention, states adversely affected by a bio- event can seek remedies in international fora. Legal mechanisms in existence permit state parties to international treaties, agreements, and conventions to utilize pathways created by international arbitration mechanisms to seek reparations for breaches of international law.</span><span lang="DE" style="text-transform: initial;"> </span></p>
<p class="Body"><span style="text-transform: initial;">Thus, state parties injured by </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">wrongful acts</span><span lang="DE" style="text-transform: initial;">” </span><span style="text-transform: initial;">of a state can rely upon the remedial mechanisms contained in the 2005 International Health Regulations (IHR). Parties seeking a remedy can take advantage of Article 56 of IHR (2005) setting out procedures for the settlement of disputes through negotiation, mediation, or conciliation. And in the instance of deep conflicts, refer the case to the World Health Organization</span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">’</span><span lang="PT" style="text-transform: initial;">s Director-General.</span><span lang="DE" style="text-transform: initial;"> </span></p>
<p class="Body"><span style="text-transform: initial;">Second, the International Court of Justice and Permanent Court of Arbitration in The Hague can offer venues for settling legal disputes to all members of the United Nations who accept the court&#8217;s jurisdiction. Litigation between state parties can proceed based on relevant treaties.</span><span lang="DE" style="text-transform: initial;"> </span></p>
<p class="Body"><span style="text-transform: initial;">Third, the World Trade Organization</span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">’</span><span style="text-transform: initial;">s dispute resolution mechanism can be mobilized to settle trade-related disputes but also, based on the previous precedent, establish grounds for holding state parties accountable for deviations from the WTO obligations.</span><span lang="DE" style="text-transform: initial;"> </span></p>
<p class="Body"><span style="text-transform: initial;">Fourth, bilateral Investment Treaties provide mechanisms for settlement and dispute resolution of inter-state nature between parties to the agreement.</span><span lang="DE" style="text-transform: initial;"> </span></p>
<p class="Body"><span style="text-transform: initial;">Lastly, legal remedies at the domestic level are limited by the principle of sovereign immunity, </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">however, cases implicating individuals,</span><span lang="DE" style="text-transform: initial;"> </span><span style="text-transform: initial;">corporations, and state parties that caused widespread injuries and damages&#8221; can be pursued, with varying degrees of success, in U.S. Federal Courts.</span><span class="None"><sup><span lang="DE">[xxx]</span></sup></span></p>
<p class="Body"><span style="text-transform: initial;">In the above mentioned, questions of jurisdiction, admissibility of claims, and sovereign immunity will condition the legal prospects and factual merits of the case. Response to state crimes is governed by four principal punishment mechanisms: (1) retribution; (2) deterrence; (3) rehabilitation; and (4) incapacitation.</span><span class="None" style="text-transform: initial;"><sup><span lang="DE">[xxxi]</span></sup></span><span style="text-transform: initial;"> Their selective implementation seeks to achieve a modicum of restorative justice. Practical tools available to state parties pursuing remedies for damaging bio-events, short of military action, can include visa and financial sanctions and imposition of detrimental export-import tariffs.</span><span lang="DE" style="text-transform: initial;"> </span></p>
<h3 class="Body"><span style="text-transform: initial;">The path forward</span></h3>
<p class="Body"><span style="text-transform: initial;">To mitigate the risks issuing from a rapid pace of technological and biotechnological progress, the international community must invest in the promotion and enforcement of norms of responsible conduct and strengthening the public health infrastructure to detect and effectively respond to disease outbreaks of natural and synthetic nature.</span><span class="None" style="text-transform: initial;"><sup><span lang="DE">[xxxii]</span></sup></span></p>
<p class="Body"><span style="text-transform: initial;">Because it is often difficult to distinguish between legitimate research laboratories of national, private/commercial, or academic character and non-legitimate ones, dual-use research is going to remain a compounding challenge. With growing knowledge of the human genome and the human immune system, the risk of synthetic manipulations to modulate human physiognomy increases proportionally as do varying ways of arming pathogens, biochemicals, and toxins to usher in the age of geopolitical realignment.</span><span lang="DE" style="text-transform: initial;"> </span></p>
<p class="Body"><span style="text-transform: initial;">In sum, the latest advances in genetics and bio-engineering as well as growing ambitions of revisionist states — including China, Iran, North Korea, and Russia — require that a new conceptual and real frontier of great and emerging power competition in the area of biological warfare commands renewed attention. While advances in synthetic biology promise to account for a wide range of biological anomalies by providing revolutionary diagnostic and therapeutic tools, they can also increase the power of malicious actors intent on creating tailor-made harmful biological agents. Synthetically engineered pathogens can significantly alter the national security landscape. </span></p>
<p class="Body"><span style="text-transform: initial;">The digitalization of life sciences and the rise of accessible gene-editing tools introduce vulnerabilities that should be of concern to policy-makers and the national bio-security community. Global Health Security Index prepared by Johns Hopkins Center for Health Security found that the international preparedness for epidemics and pandemics of natural or synthetic occurrence remains very weak. The weaponization of viruses and bio-engineered genetic mutation of existing diseases and pathogens to inflict maximum harm will be a preferred weapon of choice for revisionist powers seeking to destabilize democratic regimes, topple governments, cripple supply chains, and shock economic cycles. Strengthening international investigatory and legal mechanisms to hold perpetrators of first-use of biological weapons criminally and financially liable for the harms inflicted and damages done should therefore be a top priority for the international community and its global increasingly wavering governance institutions.</span></p>
<h4 class="Body"><span style="text-transform: initial;">Selected Bibliography</span></h4>
</div>
<div>
<p class="Body"><span lang="DE"> </span></p>
</div>
<div>
<p class="Body"><span lang="DE">Huff, A.G. et al., </span><span dir="RTL" lang="AR-SA">“</span>Biosurveillance: a systematic review of global infectious disease surveillance systems from 1900 to 2016<span lang="DE">”, </span><span class="None"><span lang="FR">Revue Scientifique et Technique</span></span><span lang="DE">, 36(2). </span></p>
</div>
<div>
<p class="Body"><span lang="DE"> </span></p>
</div>
<div>
<p class="Body">International Committee of the Red Cross. 2013. <span dir="RTL" lang="AR-SA">“</span>Chemical and Biological Weapons<span lang="DE">” </span>https://www.icrc.org/en/document/chemical-biological-weapons<span lang="DE"> </span></p>
</div>
<div>
<p class="Body"><span lang="DE"> </span></p>
</div>
<div>
<p class="Body">National Academy of Sciences. 2018. <span dir="RTL" lang="AR-SA">“</span>Biodefense in the Age of Synthetic Biology<span lang="DE">”</span>. https://www.nap.edu/read/24890/chapter/1.<span lang="DE"> </span></p>
</div>
<div>
<p class="Body"><span lang="DE"> </span></p>
</div>
<div>
<p class="Body">Rothkopf, David, &#8220;The Cool War&#8221;, Foreign Policy, 2013. https://foreignpolicy.com/2013/02/20/the- cool-war/<span lang="DE"> </span></p>
</div>
<div>
<p class="Body"><span lang="DE"> </span></p>
</div>
<div>
<p class="Body">United States Government Accountability Office. 2020. National Biodefense Strategy &#8211; Report to Congress. https://www.gao.gov/assets/710/704698.pdf.<span lang="DE"> </span></p>
</div>
<div>
<p class="Body"><span lang="DE"> </span></p>
</div>
<div>
<p class="Body"><span lang="DE">Walt, Stephen M. </span><span class="None">The Hell of Good Intentions: America</span><span class="None"><span dir="RTL" lang="AR-SA">’</span></span><span class="None">s Foreign Policy Elite and the Decline of U.S. Primacy</span>, (New York: Ferrar, Str<span lang="FR">aus &amp; Giroux, 2018).</span></p>
</div>
<hr align="left" size="1" width="33%" />
<h4>References</h4>
<p><sup>[i]</sup> Stephen M. Walt, The Hell of Good Intentions: America’s Foreign Policy Elite and the Decline of U.S. Primacy, (New York: Ferrar, Straus &amp; Giroux, 2018). p. 71.</p>
<p><sup style="text-transform: initial;">[ii]</sup><span style="text-transform: initial;"> Stephen M. Walt, The Hell of Good Intentions: America</span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">’</span><span style="text-transform: initial;">s Foreign Policy Elite and the Decline of U.S. Primacy, (New York: Ferrar, Str</span><span lang="FR" style="text-transform: initial;">aus &amp; Giroux, 2018). p. 74.</span></p>
<p><sup style="text-transform: initial;">[iii]</sup><span style="text-transform: initial;"> United States Department of Defense. 2018. National Defense Strategy: Summary. <a href="https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf">https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf</a> p. 2.</span></p>
<div>
<div id="edn1">
<p class="Endnotes"><sup style="text-transform: initial;">[iv]</sup><span style="text-transform: initial;"> United States Department of Defense. 2018. National Defense Strategy: Summary. <a href="https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf">https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf</a> p. 2.</span></p>
<p class="Endnotes"><sup style="text-transform: initial;">[v]</sup><span style="text-transform: initial;"> Anthony Cordesman, </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span lang="DE" style="text-transform: initial;">China</span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">’</span><span style="text-transform: initial;">s New 2019 Defense White Paper” Center for Strategic and International Studies, <a href="https://www.csis.org/analysis/chinas-new-2019-defense-white-paper">https://www.csis.org/analysis/chinas-new-2019-defense-white-paper</a></span></p>
<p class="Endnotes"><sup style="text-transform: initial;">[vi]</sup><span style="text-transform: initial;"> David Rothkopf, &#8220;The Cool War&#8221;, Foreign Policy, 2013. <a href="https://foreignpolicy.com/2013/02/20/the-cool-war/">https://foreignpolicy.com/2013/02/20/the-cool-war/</a></span></p>
<p class="Endnotes"><sup style="text-transform: initial;">[vii]</sup><span style="text-transform: initial;"> United States Government Accountability Office, &#8220;National Biodefense Strategy &#8211; Report to </span><span style="text-transform: initial;">Congress&#8221;, 2020. <a href="https://www.gao.gov/assets/710/704698.pdf">https://www.gao.gov/assets/710/704698.pdf</a>. p. 50.</span></p>
<p class="Endnotes"><sup style="text-transform: initial;">[viii]</sup><span lang="IT" style="text-transform: initial;"> Antonio Missiroli, </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">From Hybrid Warfare to </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">‘</span><span style="text-transform: initial;">Cybrid</span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">’ </span><span style="text-transform: initial;">Campaigns. The New Normal?” CSS ETH Zurich, 2019. <a href="https://css.ethz.ch/en/services/digital-library/articles/article.html/a59d89dd-1179-453b-ab02-ade9097cf646">https://css.ethz.ch/en/services/digital-library/articles/article.html/a59d89dd-1179-453b-ab02-ade9097cf646</a></span></p>
<p class="Endnotes"><sup style="text-transform: initial;">[ix]</sup><span style="text-transform: initial;"> U.S. Homeland Security. 2018. The National Biodefense Strategy. https://www.hsdl.org/?abstract&amp;did=815921. p. i. [10] United States Government Accountability Office, &#8220;National Biodefense Strategy &#8211; Report to Congress&#8221;, 2020. <a href="https://www.gao.gov/assets/710/704698.pdf">https://www.gao.gov/assets/710/704698.pdf</a>. p. 1.</span></p>
<p class="Endnotes"><sup style="text-transform: initial;">[x]</sup><span style="text-transform: initial;"> United States Government Accountability Office, &#8220;National Biodefense Strategy &#8211; Report to </span><span style="text-transform: initial;">Congress&#8221;, 2020. <a href="https://www.gao.gov/assets/710/704698.pdf">https://www.gao.gov/assets/710/704698.pdf</a>. p. 1.</span></p>
<p class="Endnotes"><sup style="text-transform: initial;">[xi]</sup><span style="text-transform: initial;"> DOD Releases Fiscal Year 2021 Budget Proposal https://www.defense.gov/Newsroom/Releases/Release/Article/2079489/dod-releases-fiscal-year-2021-budget-proposal/</span></p>
<p class="Endnotes"><sup style="text-transform: initial;">[xii]</sup><span style="text-transform: initial;"> Office of Management and Budget, &#8220;Budget of the United States Government&#8221; Fiscal Year 2021, <a href="https://www.whitehouse.gov/wp-content/uploads/2020/02/budget_fy21.pdf">https://www.whitehouse.gov/wp-content/uploads/2020/02/budget_fy21.pdf</a></span></p>
<p class="Endnotes"><sup style="text-transform: initial;">[xiii]</sup><span style="text-transform: initial;"> Office of Management and Budget, &#8220;Budget of the United States Government&#8221; Fiscal Year 2021, <a href="https://www.whitehouse.gov/wp-content/uploads/2020/02/budget_fy21.pdf">https://www.whitehouse.gov/wp-content/uploads/2020/02/budget_fy21.pdf</a></span></p>
<p class="Endnotes"><span class="None" style="text-transform: initial;"><sup>[xiv]</sup></span><span style="text-transform: initial;"> United States Government Accountability Office, Report to Congressional Committees, &#8220;BIOSURVEILLANCE: Efforts to Develop a National Biosurveillance Capability Need a National Strategy and a Designated Leader&#8221;, 2010, <a href="https://www.gao.gov/assets/310/306362.pdf">https://www.gao.gov/assets/310/306362.pdf</a></span></p>
<p class="Endnotes"><span class="None" style="text-transform: initial;"><sup>[xv]</sup></span><span style="text-transform: initial;"> U.S. Homeland Security, &#8220;CBD Focus Areas &#8211; Biosurveillance&#8221;, 2020, <a href="https://www.dhs.gov/science-and-technology/biosurveillance">https://www.dhs.gov/science-and-technology/biosurveillance</a></span></p>
<p class="Endnotes"><span class="None" style="text-transform: initial;"><sup>[xvi]</sup></span><span style="text-transform: initial;"> United States Government Accountability Office, Report to Congressional Committees, &#8220;BIOSURVEILLANCE: Efforts to Develop a National Biosurveillance Capability Need a National Strategy and a Designated Leader&#8221;, 2010, <a href="https://www.gao.gov/assets/310/306362.pdf">https://www.gao.gov/assets/310/306362.pdf</a>, p. 69.</span></p>
<p class="Endnotes"><span class="None" style="text-transform: initial;"><sup>[xvii]</sup></span><span style="text-transform: initial;"> United States Government Accountability Office, Report to Congressional Committees, &#8220;BIOSURVEILLANCE: Efforts to Develop a National Biosurveillance Capability Need a National Strategy and a Designated Leader&#8221;, 2010, </span><a href="https://www.gao.gov/assets/310/306362.pdf"><span class="Hyperlink1" style="text-transform: initial;">https://www.gao.gov/assets/310/306362.pdf</span></a><span style="text-transform: initial;">, preface.</span></p>
<p class="Endnotes"><span class="None" style="text-transform: initial;"><sup>[xviii]</sup></span><span style="text-transform: initial;"> A.G. Huff et al., </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">Biosurveillance: a systematic review of global infectious disease surveillance systems from 1900 to 2016”</span><span lang="FR" style="text-transform: initial;">, Revue Scientifique et Technique, 36(2), p. 513.</span></p>
<p class="Endnotes"><span class="None" style="text-transform: initial;"><sup>[xix]</sup></span><span style="text-transform: initial;"> Amanda J. Kim and Sangwoo Tak, </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">Implementation System of a Biosurveillance System in the Republic of Korea and its Legal Ramifications”, Health Security Vol 17 (6). p. 463.</span></p>
<p class="Endnotes"><span class="None" style="text-transform: initial;"><sup>[xx]</sup></span><span style="text-transform: initial;"> Amanda J. Kim and Sangwoo Tak, </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">Implementation System of a Biosurveillance System in the Republic of Korea and its Legal Ramifications”, Health Security Vol 17 (6). p. 463.</span></p>
<p class="Endnotes"><span class="None" style="text-transform: initial;"><sup>[xxi]</sup></span><span style="text-transform: initial;"> Amanda J. Kim and Sangwoo Tak, </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">Implementation System of a Biosurveillance System in the Republic of Korea and its Legal Ramifications”, Health Security Vol 17 (6). p. 464.</span></p>
<p class="Endnotes"><span class="None" style="text-transform: initial;"><sup>[xxii]</sup></span><span style="text-transform: initial;"> Johns Hopkins University. 2019.Global Health Security Index <a href="https://www.ghsindex.org/">https://www.ghsindex.org/</a></span></p>
<p class="Endnotes"><span class="None" style="text-transform: initial;"><sup>[xxiii]</sup></span><span lang="FR" style="text-transform: initial;"> J.M. Appel, </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">Is all fair in biological warfare? The controversy over genetically engineered biological weapons,&#8221; </span><span class="None" style="text-transform: initial;">Global Medical Ethics </span><span style="text-transform: initial;">(2009: 35), p. 429.</span></p>
<p class="Endnotes"><span class="None" style="text-transform: initial;"><sup>[xxiv]</sup></span><span lang="FR" style="text-transform: initial;"> J.M. Appel, </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">Is all fair in biological warfare? The controversy over genetically engineered biological weapons,&#8221; </span><span class="None" style="text-transform: initial;">Global Medical Ethics </span><span style="text-transform: initial;">(2009: 35), p. 430.</span></p>
<p class="Endnotes"><span class="None" style="text-transform: initial;"><sup>[xxv]</sup></span><span style="text-transform: initial;"> Adam Roberts and Richard Guelff. 2010. Documents on the Laws of War. Oxford: Oxford University Press. p. 155.</span></p>
<p class="Endnotes"><span class="None" style="text-transform: initial;"><sup>[xxvi]</sup></span><span style="text-transform: initial;"> National Academy of Sciences. 2018. </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">Biodefense in the Age of Synthetic Biology”, <a href="https://www.nap.edu/read/24890/chapter/1">https://www.nap.edu/read/24890/chapter/1</a>. p. 117.</span></p>
<p class="Endnotes"><span class="None" style="text-transform: initial;"><sup>[xxvii]</sup></span><span style="text-transform: initial;"> International Committee of the Red Cross. 2013. </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">Chemical and Biological Weapons” <a href="https://www.icrc.org/en/document/chemical-biological-weapons">https://www.icrc.org/en/document/chemical-biological-weapons</a></span></p>
<p class="Endnotes"><span class="None" style="text-transform: initial;"><sup>[xxviii]</sup></span><span style="text-transform: initial;"> NTI, &#8220;The Biological Weapons Convention&#8221; , 2003, <a href="https://www.nti.org/analysis/articles/biological-weapons-convention/">https://www.nti.org/analysis/articles/biological-weapons-convention/</a></span></p>
<p class="Endnotes"><span class="None" style="text-transform: initial;"><sup>[xxix]</sup></span><span style="text-transform: initial;"> Office of Disarmament Affairs, &#8220;UN Security Council Resolution 1540&#8221;, <a href="https://www.un.org/disarmament/wmd/sc1540/">https://www.un.org/disarmament/wmd/sc1540/</a></span></p>
<p class="Endnotes"><span class="None" style="text-transform: initial;"><sup>[xxx]</sup></span><span style="text-transform: initial;"> Matthew Henderson et al. &#8220;Corona-virus Compensationn? Assessing China&#8217;s Potential Culpability and Avenues of Legal Response&#8221;, (April, 2020), <a href="https://henryjacksonsociety.org/wp- content/uploads/2020/04/Coronavirus-Compensation.pdf">https://henryjacksonsociety.org/wp- content/uploads/2020/04/Coronavirus-Compensation.pdf</a></span></p>
<p class="Endnotes"><span class="None" style="text-transform: initial;"><sup>[xxxi]</sup></span><span style="text-transform: initial;"> Jennifer Marson, &#8220;The History of Punishment: What Works for State Crime?&#8221;, The Hilltop Review , (Spring 2015: 2:7).</span></p>
<p class="Endnotes"><span class="None" style="text-transform: initial;"><sup>[xxxii]</sup></span><span style="text-transform: initial;"> National Academy of Sciences. 2018. </span><span dir="RTL" lang="AR-SA" style="text-transform: initial;">“</span><span style="text-transform: initial;">Biodefense in the Age of Synthetic Biology”. <a href="https://www.nap.edu/read/24890/chapter/1">https://www.nap.edu/read/24890/chapter/1</a>. p 13.</span></p>
</div>
</div>
<p><a href="https://globalsecurityreview.com/bio-security-in-the-age-of-global-pandemics/">Bio-Security in the Age of Global Pandemics</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Arctic Great Power Competition: The United States, Russia and China</title>
		<link>https://globalsecurityreview.com/great-power-competition-the-united-states-russia-china/</link>
		
		<dc:creator><![CDATA[Gabriella Gricius]]></dc:creator>
		<pubDate>Mon, 12 Apr 2021 15:16:00 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Arctic]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=23787</guid>

					<description><![CDATA[<p>As the Arctic grows warmer, so too does the potential for great power competition amongst the United States, China, and Russia. While a historic Arctic power like Russia is militarizing its waters, so-called near-Arctic China is extending its commercial reach to Greenland and Russia with the Polar Silk Road component of its Belt and Road [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/great-power-competition-the-united-states-russia-china/">Arctic Great Power Competition: The United States, Russia and China</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As the Arctic grows warmer, so too does the potential for great power competition amongst the United States, China, and Russia. While a historic Arctic power like Russia is militarizing its waters, so-called near-Arctic China is <a href="https://www.thearcticinstitute.org/return-great-power-competition-arctic/">extending</a> its commercial reach to Greenland and Russia with the Polar Silk Road component of its Belt and Road Initiative (BRI). The United States sees both as competitors in a renewed geopolitical competition for power and influence in the High North. For now, this competition has been limited to posturing and more broadly, assertive statements of intent. However, looking forward, it may be useful to identify key national interests of the players in order to better predict potential flashpoints.</p>
<h3>Russia – Militarization, Oil, and Gas</h3>
<p>Russia’s approach to the Arctic is heavily informed by its geographic and historic place as an Arctic power. Fifty-three percent of Russia’s coastline is in the Arctic, which makes it a prime place to project power. Russia also has the largest population of Indigenous People in the Arctic, numbering around 1.4 million. Most importantly, however, Russia has a huge economic interest in oil and gas extraction in the Arctic as well as the further economic development of the Northern Sea Route. For Russia, then, the Arctic is a place of high stakes. Over the past few years, Russia has been steadily <a href="https://www.thearcticinstitute.org/return-great-power-competition-arctic/">increasing</a> its military and commercial presence in the Arctic, developing new bases as well as refurbishing old ones. Further, Russia is also constructing new icebreakers and submarines – some of which are nuclear powered – making it the country that likely has a distinct advantage in terms of actual military equipment.</p>
<p>Although Russia’s current military buildup in the Arctic is primarily defensive, some of its actions can be <a href="https://mwi.usma.edu/great-power-competition-snow-far-off-northern-lands-need-new-approach-arctic-security/">perceived</a> as dually offensive and defensive. For example, in 2014, Russia <a href="https://www.thearcticinstitute.org/return-great-power-competition-arctic/">established</a> a new Strategic Command center for the Arctic both to increase Arctic security as well as to defend its interests – leading to an increase in Arctic exercises. Russia has also <a href="https://www.thearcticinstitute.org/return-great-power-competition-arctic/">built</a> more than 475 new military outputs and 16 new deep-water ports.</p>
<p>While this militarization might paint a very aggressive picture, it’s important to note that Russia’s interest in the Arctic also revolves around oil and gas. Much of the untapped resources in Russia’s territorial boundaries lies in the Arctic, leading the region to be extraordinarily economically important to the country. As a country that historically has prided itself on resource exports, Russia’s aggressive control over the Northern Sea Route, <a href="https://mwi.usma.edu/great-power-competition-snow-far-off-northern-lands-need-new-approach-arctic-security/">twenty icebreakers</a>, and interest in the Arctic makes more sense. Regardless, Russia’s Arctic focus is certainly notable and will play an important role as the ice continues to melt, and resources become easier to access.</p>
<h3>China: The Near-Arctic Newcomer</h3>
<p>China plays another interesting role in the Arctic. Notably, it is not one of the Arctic Eight represented in the Arctic Council. Instead, it considers itself a near-Arctic power, joining the Arctic Council as an observer in 2013 – and in 2018 released its first white paper on Arctic Strategy. In this paper, China presented its Polar Silk Road component of its Belt and Road Initiative (BRI). Most importantly, the white paper <a href="https://www.reuters.com/article/us-china-arctic/china-unveils-vision-for-polar-silk-road-across-arctic-idUSKBN1FF0J8">claims</a> that China will develop new shipping lanes that have been opened by global warming. Beyond that, China sees the development of oil, gas, fishing, and tourism as key industries to become involved in as global warming progresses.</p>
<p>Although China’s interest appears to be economic and commercial for now, other states do not view it as such. Former US Secretary of State Pompeo, for example, <a href="https://www.thearcticinstitute.org/return-great-power-competition-arctic/">called</a> China a threat to Arctic peace and pointed to its actions in the South China Sea as an example of what could happen in the Arctic if China’s inroads were allowed to continue. Another flashpoint between the US and China is Greenland. Recently, China <a href="https://www.thearcticinstitute.org/return-great-power-competition-arctic/">attempted</a> to buy an older naval base and build a new airport in Greenland – an effort that was halted by the US government, who allegedly has claimed they will invest in these projects instead of China. However, China is still moving forward to build investment relationships with Greenland, Iceland, and Finland concerning geothermal energy and potentially a data silk road.</p>
<p>Another partner in the Arctic for China may be Russia. Russia and China are increasingly <a href="https://foreignpolicy.com/2020/12/15/arctic-competition-defense-militarization-security-russia-nato-war-games-china-power-map/">working</a> together on Arctic development, where China has been providing funding for Russian infrastructure and energy project in the Arctic. It remains to be seen whether these two powers, who arguably do not have a historically close relationship, will continue to work together moving forward.</p>
<h3>The United States – Reactor-in-Chief</h3>
<p>Out of the US China, and Russia, the US is likely the most reactive of the three powers. Most of its policies are in response to what it sees as unwelcome incursions of China and Russia. The American approach to the Arctic is to see the region as the next theatre in great power competition, slowly increasing its presence militarily and economically. For example, the US recently commissioned the construction of two new icebreakers. With the advent of the Biden administration, however, the US has shown a growing interest in the region. Both the US Navy and the US Department of Homeland Security released new Arctic strategies for the first time this year – illustrating the country’s renewed Arctic focus. In short, while the US is not nearly as aggressive as Russia, American rhetoric is becoming more pointed at keeping Chinese influence low and containing what it sees as Russian militarization.</p>
<p>While the three powers certainly are not going to head to total war anytime soon, it bears watching that rhetoric on all sides of the region is becoming more bellicose and sharper. With the new Biden administration, it will be interesting to watch the extent to which American rhetoric may change or whether temperatures and pressures will continue to rise in the Arctic.</p>
<p><a href="https://globalsecurityreview.com/great-power-competition-the-united-states-russia-china/">Arctic Great Power Competition: The United States, Russia and China</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Sun Never Sets on Postwar America</title>
		<link>https://globalsecurityreview.com/the-sun-never-sets-on-postwar-america/</link>
		
		<dc:creator><![CDATA[Christopher Mott]]></dc:creator>
		<pubDate>Thu, 11 Mar 2021 19:35:55 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=23658</guid>

					<description><![CDATA[<p>Stephen Wertheim, Tomorrow The World: The Birth of U.S. Global Supremacy, Belknap Press Press, 2020. “And what, I said, will be the best limit for our rulers to fix when they are considering the size of the State and the amount of territory which they are to include, and beyond which they will not go?” [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-sun-never-sets-on-postwar-america/">The Sun Never Sets on Postwar America</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="color: #333333;"><b>Stephen Wertheim,</b> </span><a href="https://www.hup.harvard.edu/catalog.php?isbn=9780674248663"><span style="color: #0563c1;"><b>Tomorrow The World: The Birth of U.S. Global Supremacy</b></span></a><b><span style="color: #333333;">, Belknap Press Press, 2020.</span></b></p>
<p><span style="color: #333333;"><i>“And what, I said, will be the best limit for our rulers to fix when they are considering the size of the State and the amount of territory which they are to include, and beyond which they will not go?”</i></span></p>
<p><span style="color: #333333;"><i>“What limit would you propose?”</i></span></p>
<p><span style="color: #333333;"><i>“I would allow the State to increase as far as is consistent with unity, that, I think, is the proper limit.”</i></span></p>
<p><span style="color: #333333;"><i>“Very good,” he said.</i></span></p>
<p><span style="color: #333333;">~Plato, <i>The Republic</i></span></p>
<p>When was the last time the general public had a truly open discussion on to what the limits to Washington’s global frontier are and what they should be? Where does the global power projection of the United States end? Have the post-World War II and post-Cold War settlements made the United States the world’s indispensable nation, or has it put itself in a remarkable state of over-expansion and decline as it stretches its security commitments above and beyond those of any other power in history?</p>
<p><span style="color: #333333;">There has never yet been a truly global great power in world history in the universal sense. No nation has ever been able to have its way across the entire planet without significant reversals and eventual decline. A strong case could be made that the United States came the closest of any great power to total global hegemony. But now </span><a href="https://www.rand.org/pubs/perspectives/PEA232-1.html"><span style="color: #0563c1;">sees the signs a post-peak decline</span></a><span style="color: #333333;"> relative to other powers as well as greater assertion by rivals. It certainly seems like a mythology of exceptionalism is not going to alter the United States’ fate as a subject of history like those who came before.</span></p>
<p><span style="color: #333333;">As Americans we are almost uniformly taught a specific story about the rise of our country from reluctant industrial powerhouse to omnipresent globe-straddling power. This traditional narrative tells us that the United States failed to engage with the rest of the world in the aftermath of the First World War, and that this failure created the conditions that would necessitate us seizing the mantle of leadership during the Second World War lest the process repeat itself. The public, in this story, was against a worldly presence and remained resolutely and shortsightedly isolationist until Pearl Harbor forced the issue. The implication is often that if constant interventionism is not upheld that the general public will return to this view. Thus, the rhetoric of many foreign policy elites has come to continue to assert that the </span><a href="https://fx.substack.com/p/the-american-empire-and-existential"><span style="color: #0563c1;">United States is beset by enemies that threaten it on an existential level</span></a><span style="color: #333333;">, even though such paradigms have long been rendered obsolete. Where this historiography correct it would still be about a specific era with quite different variables than today, and a case can be made that story of America’s reluctant rise is not even correct in the first place.</span></p>
<p><span style="color: #333333;">Of course, Pearl Harbor was not some freakish and unprovoked event, but rather the culmination of a breakdown in U.S.-Japanese diplomatic relations related to an economic blockade imposed upon Tokyo in retaliation for its occupation of much of China, an expansionist policy that the U.S. vigorously opposed. The militarists in Japan, no longer able to rely on trade for growth, convinced themselves the only way to break out and establish autarky was through expansion into Southeast Asia, something that would inevitably cause war with Britain and (it was assumed in Tokyo) the United States. Combined with the massive neutrality violating policies of Lend/Lease that the U.S. pursued towards the British and against the Germans, it is obvious that isolationism wasn’t quite the omnipresent policy we were told it was.</span></p>
<p><span style="color: #333333;">This mythology of an absolute binary between constant militarized engagement with the world and total isolationism begins in this era, but it has now evolved into assumptions about Grand Strategy to all of U.S. foreign policy. As Stephen Wertheim’s new book, </span><a href="https://www.hup.harvard.edu/catalog.php?isbn=9780674248663"><span style="color: #0563c1;"><i>‘Tomorrow The World: The Birth of U.S. Global Supremacy’</i></span></a><i></i><span style="color: #333333;"> shows us, isolationism is largely a canard. The specter of isolationism is largely a rhetorical weapon used to demonize a largely non-existent policy position in order to quash all criticism of endless American expansionism. One does not need to be universally opposed to all of American policy since the Second World War to see the immense value of this book in showing the ideological lineage we have inherited that distorts how we talk about Grand Strategy through the present.</span></p>
<p><span style="color: #333333;">Wertheim’s first task is to rebuild the discourse of interwar America as it really was, not as it is retroactively imagined to be. He does this by using archival research that shows, in the very words of people alive at the time, how international the United States was before the Second World War. This internationalism was (excepting the obvious fact that the foundation of the country itself had been built on expansion at the expense of the indigenous population and Mexico) largely non-militaristic. Exceptions occurred of course, most notably during the war with Spain in 1898, but compared to other major powers of the time the United States was much more interested in diplomacy and commerce than it was in militarized competition. This did not change after the First World War, where, despite not joining the League of Nations, the U.S. remained diplomatically active and invested in international trade. Its actions around the Kellog-Briand Pact and the Washington Naval Treaty show an engaged but not militaristic power.</span></p>
<p><span style="color: #333333;">It is often said that generals tend to start each conflict by trying to fight that last war. The same can be said for geostrategists gauging great power competition. Britain and France were largely responsible for defeating the Central Powers in 1918, so it was reasoned in Washington that they could at least contain if not outright defeat the 3rd Reich in 1939. France had, on paper, the strongest army in Europe. It had had the strongest and arguably most important army in World War I, despite a rocky start. The Germans had been beaten before; they would at least be checked again.</span></p>
<p><span style="color: #333333;">But then the unthinkable happened. France fell after a six-week onslaught starting in May of 1940. Britain was left alone, and Germany now controlled the resources and population of an additional major power. One with huge ports and naval assets on the Atlantic Coast. It was this event, the upsetting of all geopolitical assumptions by American strategists, that brought forth the need to sell the public on the idea of the U.S. being a powerbroker not just in the Western Hemisphere, but in Europe and Asia if not the entire world.</span></p>
<p><span style="color: #333333;">The first tactic was to build up the ideology of Anglo-American solidarity. The United States might not be ready to directly intervene in the war, but it could do everything shy of fighting directly to bulk up the British Empire in ‘defense of the English-speaking peoples and their values.’ The League of Nations had failed, so any future collaborative effort would clearly need to be guided by the firm hand of a unified and militarized Anglo-American bloc. This new selling point in the media came about by castigating those opposed to this as ‘isolationists.’ An especially ironic charge given </span><a href="https://www.polthought.cam.ac.uk/seminar/introductions/introductions-2015-1016/wertheim-intro-7-3-16.pdf"><span style="color: #0563c1;">the pro-diplomacy position of most people classified as such</span></a><span style="color: #333333;">. In effect, to refuse to defend the British Empire was now viewed by many as the same position as wanting to turn away from the world entirely.</span></p>
<p><span style="color: #333333;">1941 would change everything yet again. American policymakers had over-estimated trade as a value of a nations power in wartime and under-estimated industrial output. In the Second World War it was Russia who would stand strong rather than France, an inversion of the initial assumptions that came from the first war. When the Germans invaded the Soviet Union and their initial successes stalled in front of Moscow, it soon became apparent that the Soviet Union was an especially important ally for making the postwar future. The fact that the British were the past, not the future, was then shown clearly later that same year when the Japanese attack on Malaysia, Singapore, and Burma produced a military collapse as calamitous for the British position in Asia as the fall of France had been in Europe. The future would not be between London and Washington, but between Washington and Moscow. And it would not be collaborative.</span></p>
<p><span style="color: #333333;">By the time the U.S. was fully committed to fighting on both fronts for total victory it was obvious that backing up the British Empire behind the lines to keep a favorable balance of power would not be the future of American strategy. As the end of the war came the United States realized it now had half of the planet’s industrial and economic power. Obviously, the United States was going to inherit an unprecedented level of influence in global affairs. The question was, “how much, and to what extent?” It was here that the rhetorical tactics of those who had fought against “isolationism” would be deployed in a new and more expansive way. The United States would replace and surpass the British Empire. The sun would never set on the stars and stripes.</span></p>
<p><span style="color: #333333;">Wertheim deserves immense credit for keeping his personal opinions quite close to the chest. His main point is not to say U.S. policy was entirely wrong in the postwar era or to define a specific point where it went off the rails. He is interested in how events in history circumscribed how we, as a society, discuss issues of grand strategy and the American role in the world. Specifically, how these events created an ideological monopoly for political factions in both major parties whose desire is to see a ceaseless expanding and militarized U.S. foreign policy and </span><a href="https://www.washingtonpost.com/us-policy/2019/04/18/us-military-spending-set-increase-fifth-consecutive-year-nearing-levels-during-height-iraq-war/"><span style="color: #0563c1;">ever increasing defense budgets despite there being no existential threat to American security</span></a><span style="color: #333333;">.  Even if you, (like myself) believe that U.S. leadership over the immediate postwar world was largely an inevitable and initially positive thing, if you question any subsequent events to that or the logic of a continuing expansion you will be</span> <a href="https://foreignpolicy.com/2019/07/22/restraint-isnt-isolationism-and-it-wont-endanger-america-offshore-balancing-quincy-institute/"><span style="color: #0563c1;">subjected to accusations of “isolationism”</span></a><span style="color: #333333;"> or failing to uphold the true American values of perpetual messianic conversion of as much of the world as possible to our economic and political system. We have seen the results of the of the militarized post-9/11 strategic stance for most of the Twenty-First Century as well as the numerous refugee flows and state collapses fueled by regime change and proxy war operations in Iraq, Libya, Yemen, and Syria.</span></p>
<p><span style="color: #333333;">Perhaps more critically for a DC-based policymaking audience is the question of setting limits in the name of a sustainable national security stance. A simple look over the history of great powers begs the question: what major power in history, be it empire or not, has not been fatally undermined by over-expansion? As commitments expand further and further from core areas of interest the expense of military deployment increases and the desire for the average citizen to support those deployments decreases. With this comes a militarization of the overall political culture and the rise of mercenaries. That leads us here, to policies of endless war that enrich private contractors and support politicians tied to their lobbyists, but of no provable benefit to the average citizen at home, and outright chaos and destruction imposed on people abroad. Just taking the </span><a href="https://watson.brown.edu/costsofwar/"><span style="color: #0563c1;">War on Terror alone</span></a><span style="color: #333333;">, its apparent there is an enormous cost and very little, if any, gain to be had in the present strategic posture. What we face now is not an existential question of state survival due to foreign threats, but a choice between endless expansion for its own sake or a more sustainable path that has been delegitimized by the rhetoric of a vastly different time with completely dissimilar security imperatives. The call of threatening global militarism in today’s age is revealed to be coming from inside of the house.</span></p>
<p><span style="color: #333333;">One of the most eye-opening parts of Wertheim’s book is a map near the end that shows the global reach of potential future U.S. military bases as imagined by strategists in 1945. Even in that time of unprecedented American power, far more than the U.S. has today compared to our its rivals, it was </span><a href="https://www.rand.org/content/dam/rand/pubs/research_reports/RR200/RR201/RAND_RR201.sum.pdf"><span style="color: #0563c1;">nowhere near the number as currently exists</span></a><span style="color: #333333;">. As U.S. power relative the rest of the planet has declined, it has increased, rather than decreased, the military nature of its presence abroad. This tends to trap us in quagmires with policymakers often unwilling to extract us from due to fear of looking defeatist or beholden to the chimera of isolationism. Furthermore, the assumption that power vacuums abroad are net benefits to U.S. rivals can be thoroughly debunked seeing the dangerous and intractable nature of conflicts in many of these regions are</span> <a href="https://defense360.csis.org/bad-idea-fearing-power-vacuums/"><span style="color: #0563c1;">more likely to become a burden than a positive gain</span></a><span style="color: #333333;"> for them. <i>“Tomorrow The World”</i> reminds us that it wasn’t always this way, and it doesn’t have to remain so either. If we can expand the options of discourse on grand strategy, we can find a superior and more sustainable path out of our present predicaments.</span></p>
<p><a href="https://globalsecurityreview.com/the-sun-never-sets-on-postwar-america/">The Sun Never Sets on Postwar America</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Déjà Vu: Hacked Again</title>
		<link>https://globalsecurityreview.com/deja-vu-hacked-again/</link>
		
		<dc:creator><![CDATA[Matthew J. Fecteau]]></dc:creator>
		<pubDate>Mon, 01 Feb 2021 14:52:48 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=23652</guid>

					<description><![CDATA[<p>This is getting old. Yet again, Russian-backed agents have hacked the United States. The United States can only sanction and indict so many people before discovering that this alone will neither prevent nor deter future cyberattacks. The United States must have a unified plan to confront cyberaggression through defensive and offensive action in the cyber [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/deja-vu-hacked-again/">Déjà Vu: Hacked Again</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This is getting old. Yet again, Russian-backed agents have <a href="https://www.nytimes.com/2020/12/08/technology/fireeye-hacked-russians.html">hacked the United States</a>.</p>
<p>The United States can only sanction and indict so many people before discovering that this alone will neither prevent nor deter future cyberattacks. The United States must have a unified plan to confront cyberaggression through defensive and offensive action in the cyber realm. This position may mean protecting fragile democratic allies and conducting coordinated cyber strikes against malignant state and non-state actors.</p>
<p>While the latest cyberattack is still under investigation, authorities suspect that a Russian-backed group known as <a href="https://www.washingtonpost.com/national-security/russian-government-spies-are-behind-a-broad-hacking-campaign-that-has-breached-us-agencies-and-a-top-cyber-firm/2020/12/13/d5a53b88-3d7d-11eb-9453-fc36ba051781_story.html">Cozy Bear</a> hacked a management company called <a href="https://www.solarwinds.com/">SolarWinds</a> via its Orion tool, which is used to monitor outages. Then, between <a href="https://d18rn0p25nwr6d.cloudfront.net/CIK-0001739942/57108215-4458-4dd8-a5bf-55bd5e34d451.pdf">March and June 2020, this group inserted malware</a> into its updates, impacting countless federal and private systems.</p>
<p>It was only when cybersecurity firm FireEye discovered the breach that the hack was revealed. FireEye noted that this attack was conducted by <a href="https://www.nytimes.com/2020/12/08/technology/fireeye-hacked-russians.html">&#8220;a nation with top-tier offensive capabilities.&#8221;</a> Indeed, Russia has previously used malware to steal critical information, but this attack was much different, focusing on &#8220;supply-side&#8221; vulnerabilities, including SolarWinds&#8217; monitoring products. <a href="https://www.gao.gov/assets/700/693405.pdf">In 2018, the Government Accountability Office outlined</a> the cybersecurity challenges related to supply-side risks (though they admitted that an attack of this magnitude was left out).</p>
<p>This &#8220;sophisticated&#8221; attack reportedly used IP addresses located in the United States, all while evading the <a href="https://www.cisa.gov/">Cybersecurity and Infrastructure Security Agency&#8217;s</a> costly and sophisticated intrusion detection system called <a href="https://www.cisa.gov/einstein">Einstein</a>. The malware sat dormant until activated, sending sensitive information to the hackers.</p>
<p>This cyberattack is concerning due to Russia&#8217;s interference in the <a href="https://www.intelligence.senate.gov/sites/default/files/documents/Report_Volume1.pdf">2016 U.S. election through a coordinated information operations campaign</a> that included a sophisticated social media strategy, hacking, and the release of compromising information via Wikileaks. Russian-backed agents also allegedly attempted to hack voting systems in nearly all 50 states. These agents could delete or change voter data. Russia also used a quasi-private company known as the Internet Research Agency to create a &#8220;troll farm&#8221; to influence social media.</p>
<p>According to a <a href="https://www.intelligence.senate.gov/sites/default/files/documents/Report_Volume2.pdf">congressional report</a>, the 2016 meddling intended to &#8220;sow discord in American politics and society.&#8221; The response to the Russian interference was lukewarm. <a href="https://www.justice.gov/file/1080281/download">The United States indicted 12 Russians for operating a military agency</a> called the Main Intelligence Directorate of the General Staff, and the U.S. Treasury Department sanctioned some Russian entities and individuals. Clearly, these penalties didn&#8217;t go far enough because here we are again.</p>
<p>The United States isn&#8217;t Russia&#8217;s only target. The Russian-backed group <a href="https://www.crowdstrike.com/blog/who-is-fancy-bear/">Fancy Bear</a> (the same group involved in 2016&#8217;s Russian meddling) hacked <a href="https://balkaninsight.com/2018/03/05/russia-s-fancy-bear-hacks-its-way-into-montenegro-03-01-2018/">Montenegro&#8217;s government</a> apparatus, hoping to influence the country&#8217;s impending NATO membership. In 2007, Estonia—which introduced online voting in 2001 and was considered one of the most technologically advanced nations globally—<a href="https://www.bbc.com/news/39655415">was also a victim of a Russian information operations</a> campaign involving hacking and disinformation. Russia also conducted coordinated information operation campaigns involving social media and hacking in countries like Ukraine.</p>
<p>Nation-states such as China, Iran, North Korea, and Russia are operating with impunity in the cyber domain. Each of these respective countries has carried out cyberattacks on the United States, its allies, or private-sector entities. It is almost like the Wild West in the cyber realm, and these world powers have proven time and time again that no matter how much in good faith the United States acts, they will cooperate only in words alone.</p>
<p>There are some realistic options on the table to prevent and deter further cyberaggression. In 2011, <a href="https://obamawhitehouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf">President Obama defined attacks in the cyber realm as potential acts of war</a>. With this in mind, the United States can respond with conventional means but is highly unlikely to react in such a manner. On the other hand, the United States has other tools in its arsenal for an appropriate response.</p>
<p>First, the United States needs an oversight board that can proactively and expeditiously identify government vulnerabilities, make recommendations, and penalizes contracted companies for security violations. While valuable, the report on Russian meddling took years to produce. In theory, an oversight board would be flexible enough to both produce reports and perform risk assessments.</p>
<p>While the hack is still under investigation, there are some red flags that cannot be ignored. SolarWinds&#8217;s server was left relatively unprotected with a weak password (solarwinds123), and the sign-in certificate was somehow manipulated to hack the systems. SolarWinds&#8217;s server was continuously exposed since at least 2018, thereby allowing anyone with a valid sign-in certificate to log onto its network. A government oversight board would have the ability to investigate and penalize a company or an individual for placing such compromising information online.</p>
<p>Second, a comprehensive systems upgrade is critical. Current U.S. cyber defenses — such as the Cybersecurity and Infrastructure Security Agency&#8217;s Einstein — failed because they didn&#8217;t have sensors to recognize and neutralize malicious traffic or an information-sharing agreement with agencies to identify servers that shouldn&#8217;t be sending information internationally. Likewise, the Pentagon&#8217;s cloud-based software is antiquated and vulnerable to attack (an upgrade is well in order). Of course, such upgrades require both funding and congressional will.</p>
<p>Third, cyber-offensive activities should be an option in the future. The National Security Agency has the capability and the know-how to conduct cyberattacks through the agency&#8217;s elite hacking unit known as <a href="https://www.washingtonpost.com/world/national-security/nsa-employee-who-worked-on-hacking-tools-at-home-pleads-guilty-to-spy-charge/2017/12/01/ec4d6738-d6d9-11e7-b62d-d9345ced896d_story.html">Tailored Access Operations</a>. However, such operations are rarely acknowledged, and that should change. There should be known penalties for cyberaggression.</p>
<p>The National Security Agency conducted a cyberattack against Iran using the Stuxnet virus, but the operation received little acknowledgment from the U.S. government. The Stuxnet virus destroyed thousands of Iran&#8217;s centrifuges at the Natanz powerplant that could have been used to make a nuclear weapon.</p>
<p>Additionally, in 2018, the U.S. Cyber Command conducted <a href="https://www.washingtonpost.com/opinions/2020/07/10/trump-confirms-an-interview-us-cyberattack-russia/">an attack against Russia&#8217;s Internet Research Agency</a>, successfully disrupting Russia&#8217;s information operations campaign during that year&#8217;s U.S. mid-term elections. This attack was acknowledged by the U.S. government and also sent a message that cyber aggression will not be tolerated.</p>
<p>The United States must be ready to respond to further cyber aggression in the future. The United States must shore up its cyber defenses and leverage cyber offense as an option for deterrence. Countries like Russia don&#8217;t seem to care too much for the carrot approach. Perhaps it is time for the stick.</p>
<div>
<p><em>Thanks go to Thomas Lawrence of </em><a href="https://www.lawrencesystems.com/">Lawrence Technology Services</a><em> for his technical expertise in writing this article. </em></p>
</div>
<div>
<p><em> </em></p>
</div>
<div>
<p><i>The views expressed in this report are those of the author and do not necessarily reflect the official policy or position of the Department of the Army, the Department of Defense, or the U.S. Government.</i></p>
</div>
<p><a href="https://globalsecurityreview.com/deja-vu-hacked-again/">Déjà Vu: Hacked Again</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber World War: The People&#8217;s Republic of China, Anti-American Espionage, and the Global Cyber Arms Race</title>
		<link>https://globalsecurityreview.com/cyber-world-war-china-anti-american-espionage-global-cyber-arms-race/</link>
		
		<dc:creator><![CDATA[Joshua E. Duke]]></dc:creator>
		<pubDate>Tue, 06 Oct 2020 21:05:44 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=22834</guid>

					<description><![CDATA[<p>&#8220;O divine art of subtlety and secrecy! Through you, we learn to be invisible, through you inaudible; and hence we can hold the enemy&#8217;s fate in our hands.&#8221; &#8211; Sun Tzu, c.500 BC The flood gates of the information age have been blasted open forever. Short of global electrical failure, robots taking over the world, [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/cyber-world-war-china-anti-american-espionage-global-cyber-arms-race/">Cyber World War: The People&#8217;s Republic of China, Anti-American Espionage, and the Global Cyber Arms Race</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: center;"><em>&#8220;O divine art of subtlety and secrecy! Through you, we learn to be invisible, through you inaudible; and hence we can hold the enemy&#8217;s fate in our hands.&#8221;</em></p>
<p style="text-align: center;">&#8211; Sun Tzu, c.500 BC</p>
<p>The flood gates of the information age have been blasted open forever. Short of global electrical failure, robots taking over the world, or mankind&#8217;s evacuation of the planet, global connectivity, instant communications, and massive information accessibility are here to stay, along with all the dangers and benefits related. The internet and network connectivity have become too integrated within the basic daily functions of societies and nations for information services to be overly regulated or censored, and as the world becomes perpetually more dependent on networks to function, more technologically adept generations grow up with the entire history of human knowledge at their fingertips. The entire cyber warfare enterprise of Computer Network Attack (CNA) and Computer Network Defense (CND) is blossoming, along with telecommunications and other vital industries, which means more and more people will be trained in these areas, in addition to information technology and computer sciences. As people are trained to operate in a network-centric world, more of the world will be under a perpetual threat from cyberattacks, and more people will be employed to defend it.</p>
<p>The global cyber arms race is in full swing, and American leadership is necessary to ensure the future of freedom of thought and individuality in cyberspace. The alternative is a sharp contrast, centered around the People&#8217;s Republic of China&#8217;s (PRC) communist censorship and propaganda machine, combined with their allies around the world, intent on securing ultimate power and crushing the United States in the process. This article examines the physical and cyberspace dangers posed by the PRC and its allies, detailing a long-term strategic trend of anti-American actions taken in recent history that have not been adequately addressed or publicized. This article begins with an examination of a variety of actions the PRC has taken against America over multiple decades and the extent of their success. An interconnected multinational web of espionage, cyber warfare, and targeted actions designed to collapse the United States is then exposed, highlighting the need for renewed American leadership in cyberspace and on the world stage. Any action taken against any entity with the purpose of degrading their capabilities, manipulating them, or spying on them, using the realm of cyberspace as the primary conduit, is cyber warfare. A short explanation of cyber warfare basics is provided at the end of this article, with examples of what the cyber battlespace consists of.</p>
<h3>The People&#8217;s Republic of China (PRC) and the Titan Rain Hackers</h3>
<p>The PRC is the largest cyber threat on Earth, with the most extensively trained cyber espionage personnel, and the longest history of practical hacking expertise. The United States government did not prioritize cyber advancements until faced with the threat of other states, China, in particular, developing attack mechanisms in cyberspace that the United States had no defense against. This has set the U.S. behind in the cyber arms race, allowing the PRC to take the lead in cyber developments, perpetually. Unless the U.S. catches up with the PRC&#8217;s cyber developments and surpasses them, Americans and American organizations will continue to be targeted, manipulated and exploited by PRC cyber espionage efforts, unable to defend themselves, unable to distinguish between what is real or fake online, and unable to establish effective cybersecurity. The PRC&#8217;s success in cyber activities targeting the United States additionally exposes U.S. national security vulnerabilities within the U.S. cyber infrastructure which can be exploited, illustrating to the world how easy targeting the U.S. is and will continue to be until the U.S. cyber infrastructure is hardened, and until cyber actors begin to be publicly attributed and punished. The People&#8217;s Liberation Army (PLA) is the branch of the Chinese Communist Party that maintains control over cyber operations, primarily through its Unit 61398.<sup>1</sup> The PLA has additionally enhanced their intelligence operations by adapting their Signals Intelligence (SIGINT) capabilities to cyberspace by using networks for signals collections.</p>
<p>Advances in technology that allow communications technologies such as microphones and cameras to be combined with network interfaces like cell phones and laptop computers have further contributed to the potential damage cyber actors can have, improving the collection capabilities of intelligence organizations around the world as they are developed. With the combinations of these technologies, any device with a network interface, or that is connected in any way to any device with a network interface, which is also used for communications, can be compromised through cyberspace. The PRC has taken advantage of this factor by refocusing the signals intelligence collection element of the PLA&#8217;s military-technical reconnaissance bureau to cyber espionage.<sup>2</sup> The PRC&#8217;s focus continues to shift further towards cyber elements for both offensive, defensive, and espionage-related operations due to the digitization of information becoming widespread and inevitable as the world progresses forward in the information age. The process of global digitization is both beneficial and dangerous, simultaneously creating a wealth of information more readily available to the public than ever before, as well as a multitude of separate caches of information available to competent hackers that know how to infiltrate databases for cyberespionage.</p>
<p>The People’s Republic of China is a particularly effective threat due to the adaptation of their extensive intelligence collection techniques to cyber espionage. The PRC has been actively engaging in large scale and continuous espionage against American corporations and United States government organizations for decades to accelerate their own economic and military developments.<sup>3</sup> These efforts have been extremely successful over the years, yielding top-level nuclear weapon designs, satellite and rocket technical information, and a wide range of government and corporate trade secrets.<sup>4</sup>As technologies have advanced, and the world has become networked, PRC espionage efforts have shifted into cyberspace, giving them more effective plausible deniability, greater overall access to sensitive information, and a larger field of targets to penetrate and steal from. While the PRC denies direct involvement, the Titan Rain espionage activities which took place in the first years of the twenty-first century, are widely believed to be the work of the PRC&#8217;s PLA.<sup>5</sup> The cyber actors involved in Titan Rain successfully penetrated some of the most sensitive organizations in the United States.<sup>6</sup></p>
<p>Tracked and documented by Shawn Carpenter for a year and a half, the Titan Rain cyber thieves penetrated a large number of secure networks, including the &#8220;systems of the U.S. Army Information Engineering Command, Defense Information Systems Agency, U.S. Army Space and Strategic Command, Army Aviation and Missile Command, Department of Energy, Homeland Security, State Department, and Naval War College,&#8221; extracting 10-20 terabytes of sensitive Department of Defense information.<sup>7</sup> In addition to stealing more data than is contained in the entire Library of Congress,<sup>8</sup> Titan Rain hackers also targeted the World Bank, and the National Aeronautics and Space Administration (NASA).<sup>9</sup> The Titan Rain attackers, operating out of the Guangdong province of China, used Trojan horses to infiltrate systems, hijacked portions of hard drives in target systems to use for file encryption, erased their electronic fingerprints when finished, and left a reentry beacon to facilitate easy access at a later time.<sup>10</sup></p>
<p>The PRC has long had a foreign espionage goal of advancing its economic and military status, and cyberspace has provided the opportunity for them to realize their vision of total &#8220;control of the world economic sector&#8221;,<sup>11</sup> which they’ve sought for some time. Chinese strategies for cyber warfare suggest the PRC believes that nothing is off-limits that does not create physical damage, that war is already happening in cyberspace on multiple levels and with multiple nations, and that &#8220;information systems are weapons&#8221; to be used to fight this ongoing war.<sup>12</sup> The extensive PRC space program and aspirations for developments in space technologies, in addition to the notable targets of NASA and the U.S. Army Space Command, suggest that the PRC is also engaging in cyber espionage to advance its space capabilities. Space-related targets likely include satellite developments, Anti-Satellite weapon technologies, dual-use space launch, and ballistic missile capabilities, space transportation developments, and technologies required to finish bringing the Chinese nuclear triad online with long-range strategic bombers. Titan Rain should be viewed as a major success for the Chinese hackers involved as well as the PRC government, who not only directly benefited the most from the stolen data but were able to maintain plausible deniability throughout years of operations, avoiding any kind of retribution.</p>
<p>The attackers were extremely effective at erasing evidence of their presence after completing operations. Shawn Carpenter&#8217;s rogue counter-hacking exploits which led him on a chase around the world are possibly the only reason Titan Rain was ever traced back to the Guangdong province of China and the PLA.<sup>13</sup> Titan Rain&#8217;s exposure helps illuminate the repeating echo-chamber cycle of Chinese espionage against the United States, coming only a few years after the 1999 Congressional &#8216;Cox Committee&#8217; investigation revelations about Chinese espionage campaigns. The &#8216;Cox Committee&#8217; investigation showed the theft of various types of information and classified data, including highly sensitive thermonuclear weapons data being siphoned out of multiple National Weapons Laboratories by PRC operatives. The extent of their espionage effectively catapulted the PRC&#8217;s nuclear arsenal capability into a new and far more threatening era of strategic and miniature nuclear weaponry, data and technology, through successful technical data acquisition and the successful theft of &#8220;classified information&#8221; pertaining to &#8220;every currently deployed thermonuclear warhead&#8221; developed by the United States at that time.<sup>14</sup></p>
<p>PRC operations have been uncovered at nearly every level of American society—from satellite corporations to national weapons laboratories dealing with nuclear data and advanced technologies. PRC espionage campaigns have led to the theft of advanced nuclear weapon design information from the U.S. on several known occasions, in addition to many likely unknown occasions due to the methods and practices used by the PRC being so effective and successful.<sup>15</sup> By stealing information instead of producing it themselves, the PRC has been able to capitalize on American results that have taken &#8220;hundreds of millions of dollars,&#8221; and a multitude of tests to achieve.<sup>16</sup> A frightening picture is painted when realizing that PRC collections activities in the U.S. are incalculable due to the nature of PRC collections procedures, which potentially make every American citizen of Chinese descent, every PRC immigrant, and every foreign national from the PRC potential collection agents according to PRC doctrine.<sup>17</sup> By adapting these techniques to cyber espionage, the PRC minimizes their potential for failure, essentially sending armies of hackers to target small amounts of information each, echoing again the revelations from the &#8216;Cox Committee&#8217; that showed many hundreds of Chinese spies each targeting small pieces of information across the United States.</p>
<p>This method is highly effective in the cyber arena. More hackers being used means more computers operating, which allows more targets to be targeted, and ultimately makes every target easier to infiltrate and exploit. The PRC&#8217;s cyberspace strategy would fail without their international calling card of denying everything, which falls in line with ancestral doctrines of Chinese strategy, most notably Sun Tzu&#8217;s declarations that &#8220;all warfare is based on deception,&#8221; and that the best way to defeat an enemy is to defeat them without a fight.<sup>18</sup> The PRC leadership, including President Xi Jinping when he met with President Obama in 2013, consistently denies any involvement with any hostile cyber activities traced back to China,<sup>19</sup> including the Titan Rain hackers. In response to the Titan Rain attacks, and a large number of other incidents involving the PRC, the United States and the world have raised cybersecurity and cyber warfare to one of the most important topics facing the world, along with the legislation, policies, and cybersecurity initiatives to go with it.</p>
<p>While a direct response to Titan Rain was not possible due to a lack of positive attribution of the incidents, several measures have been taken in response to the escalation of cyber threats, in large part due to the extensive success of Titan Rain, and the PRC&#8217;s official stance on cyber espionage. Since Titan Rain&#8217;s exposure, the United States has initiated its Comprehensive National Cybersecurity Initiative, which focuses on enhancing cooperation, intrusion detection, cyber counterintelligence, and research and development of new cybersecurity tools and tracking technologies which will enable the U.S. intelligence community to more effectively attribute cyber incidents, and enhance U.S. national and economic security.<sup>20</sup> Part of the focus of the U.S. has also significantly shifted to defending private sector economic partners which directly impact the U.S. government and Americans, in a response to the massive PRC targeting of the corporate sector of the United States for economic gain.<sup>21</sup> Unfortunately, the PRC does not act alone against the United States and was named alongside Russia, Iran, and North Korea as a &#8220;strategic threat&#8221; to the &#8220;prosperity and security&#8221; of the United States, in the <em>2018 Department of Defense Cyber Strategy</em> (2018).<sup>22</sup></p>
<h3>The Cyber Threat Alliance: Is the friend of my enemy my enemy—or my friend?</h3>
<p>China&#8217;s neighbor and nominal ally, North Korea, has also enhanced its presence in cyberspace. North Korea has established a cell phone network in the country and has also been &#8220;implicated in malicious cyber activity … since 2009,&#8221; including being credited with erasing &#8220;critical data,&#8221; from government, media, and banking networks in South Korea in 2013.<sup>23</sup> With the combined technologies of cell phones and network access, North Korea has the ability to conduct cyber operations, including espionage operations. North Korea&#8217;s reliance on the PRC for connectivity has also integrated them into the Chinese cyber infrastructure, allowing them to operate worldwide. Developing cyber warfare capabilities is inevitable and highly desirable for North Korea. Their development and implementation of an intranet is substantial progress in this area, and because it exists in combination with both a &#8220;national fiber-optic network,&#8221; and the national cell phone network, North Korea has everything needed to conduct cyber warfare operations.<sup>24</sup> To demonstrate this, North Korea released a &#8220;hard drive erasing malware&#8221; attack on Sony Pictures Entertainment in November of 2014.<sup>25</sup> After the Sony hacks, multiple targets were hit in South Korea, including a &#8220;power and nuclear operator&#8221;,<sup>26</sup> which is a concerning shift in focus from entertainment to critical infrastructure. If this shift in North Korea&#8217;s broader international focus of cyber targets continues, North Korea will become a substantial threat to U.S. national security through cyberspace.</p>
<p>The North Korean General Reconnaissance Bureau&#8217;s Unit 121 is &#8220;strongly suspected of having a presence in China,&#8221; and participates actively in cyber activities for North Korea.<sup>27</sup> North Korea uses cyber operatives in other countries as well to take advantage of those nations&#8217; networks, making tracing and attributing cyber acts to the North Korean government very difficult. Unit 121 being primarily based out of China essentially gives North Korea access to the Chinese cyber infrastructure while minimizing the potential for international repercussions for North Korea if caught conducting cyber warfare activities. At the same time, Chinese cyber agents can use the North Korean cyber bureau as a cover to conduct PRC cyber operations, providing PRC operatives with plausible deniability if caught, thereby avoiding the same international repercussions that would have a much greater impact for the PRC than for North Korea. Advances in North Korean government-sponsored cybercrime have grown quickly, leading to financial institutions being targeted around the world, to include a &#8220;successful cyber heist&#8221; from a New York Federal Reserve bank account in Bangladesh, costing &#8220;an estimated $81 million.&#8221;<sup>28</sup></p>
<p>Across the ocean in America&#8217;s backyard, the PRC has another substantial cyber ally – Cuba. The Castro Regime pursued a strategic course of action aimed at facilitating the long term internal combustion of the United States of America for decades, along with significant allies that have participated with them on a global scale, including Iran, the Russian Federation (RF), and the PRC, who has assisted in upgrading their outdated SIGINT technologies. Cuba is &#8220;perfectly located&#8221; to intercept &#8220;all U.S. communications,&#8221; in &#8220;the only place outside of Fort Meade in the Western Hemisphere&#8221; that provides access to &#8220;large-scale interception of [U.S.] communications.&#8221;<sup>29</sup> When combined with the communist government&#8217;s endless need for finances to continue operating and surviving, the &#8220;trafficking of U.S. secrets&#8221; to the rest of the international community provides an enticing and lucrative business opportunity for the nation.<sup>30</sup></p>
<p>Cuba is a significant cyber force, partially because of its location, and partially because of their associations and allies. One major threat factor from Cuba is their deeply rooted cooperation with Iranian intelligence operatives pervading Latin America, including active involvement with established Quds Force &#8220;operations units in Venezuela&#8221;,<sup>31</sup> where &#8220;Cuban intelligence involvement … is deep and wide.&#8221;<sup>32</sup> Another threat factor is Cuban cooperation with the strategic goals of Russian and Chinese subversion operations within the United States and around the world. When these nations&#8217; forces are combined and viewed as a single cooperating threat, the following disturbing threat landscapes become clearly intertwined:</p>
<ul>
<li>The Cuban Military Intelligence Directorate&#8217;s premium communications interception capabilities;</li>
<li>Iranian Quds Force operatives&#8217; ability to freely multiply across America&#8217;s southern border, after being trained by Cuban intelligence to act, speak and present themselves as Hispanic in order to hide their Middle Eastern origins;</li>
<li>Combined Cuban and Iranian interests in supporting Hezbollah and other terrorist organizations;<sup>33</sup></li>
<li>Massive offensive Chinese and Russian cyber operations targeting the American economic, political, election and technological infrastructures;<sup>34</sup></li>
<li>Russian espionage training and nuclear technology expertise exported to America&#8217;s enemies around the world.</li>
</ul>
<p>When these forces are viewed as a whole, the market for intelligence trading of United States-based information is a very black market indeed.</p>
<p>For instance, Russia trained the Cuban intelligence service. Cuba supports Hezbollah in Venezuela, with Iran, who is on the verge of becoming a nuclear power due to Russia and China. North Korea&#8217;s governance is in flux due to COVID-19, with power changes potentially shifting the nation away from peace. Russia continuously takes action to facilitate, and advocates for, America leaving the Middle East, with Iran&#8217;s help, including targeting American proxy forces around the world while incentivizing agitators where American forces operate, most notably in Iraq and Afghanistan. Iran partially controls Iraq, Cuba and Iran control Venezuela, and China has become the single most dominant force in cyberspace, working with Russia and other actors to subvert American stability. The global melting pot is about to start boiling, and if the United States does not re-establish itself as the global leader in cyberspace, technological advancements, and network security, the world of tomorrow could turn into a very unpleasant place. Active cyber engagements against the United States are not unique to the PRC and Russia, and another underappreciated cyber player needs to be addressed – Iran.</p>
<p>The Islamic Republic of Iran maintains a high degree of control over its society, including the business world of Iran, which provides the Iranian government and its cyber organization, the Iranian Cyber Army (ICA), with cyber assets working inside and outside the government.<sup>35</sup> In March 2016, the Federal Bureau of Investigation (FBI) indicted seven Iranians working for two Iranian companies, ITSecTeam and Mersad Company, who were engaged in cyber warfare activities against the United States on behalf of the Iranian government.<sup>36</sup> The hackers and the companies have known ties to the Iranian government, which gives them access to the State cyber infrastructure in addition to the business cyber infrastructure that their organizations use to conduct daily business. The Iranian government has used a combination of government and State-sponsored hackers for a variety of cyber activities since 2009, including targets in the United States. The attacks for which the Iranians mentioned above were indicted for involved a successful penetration of the Bowmen Dam in New York&#8217;s Supervisory Control and Data Acquisition (SCADA) system. The access gained by the hackers would have provided them, and the Iranian government, with full control of the dam&#8217;s control functions, had the dam not been fortuitously offline for maintenance at the time.<sup>37</sup></p>
<p>The ICA, acting as an arm of the Iranian Islamic Revolutionary Guard Corps (IRGC), has also targeted online financial assets, such as bank websites. According to the FBI indictment, the organizations were assaulted over a long period of time on a regular basis with Distributed Denial of Service (DDoS) attacks, costing American financial institutions &#8220;tens of millions of dollars&#8221; to fix.<sup>38</sup> Victims of these attacks included 46 major American financial institutions and &#8220;hundreds of thousands&#8221; of American customers.<sup>39</sup> The ICA also targeted Twitter in 2009, started a cyber war with China by attacking a Chinese search engine in 2010 called Baidu, and has targeted anti-Iranian government and anti-Islamic websites in Europe and around the world for defacement.<sup>40</sup> In 2016, Iranian hackers also compromised &#8220;15 million Iranian users&#8221; through the messaging program, Telegram, targeting anti-Iranian activists, and using tactics similar to the IRGC&#8217;s cyber tactics.<sup>41</sup> The Iranian government declined to comment.</p>
<p>Iran&#8217;s connections with various terrorist organizations around the world, including funding and material support to them,<sup>42</sup> also suggest that cyber capabilities, cyber training, or cyber tools may be shared between the ICA and cyber terrorists. The world&#8217;s leading state sponsor of transnational radical Islamic terrorism gaining cyber capabilities that allow them to successfully penetrate the command and control systems of infrastructure networks and facilities within the United States is a scary concept and should be a top concern for the intelligence community and policymakers in America. Adversarial nations, including Russia, Iran, China, North Korea, and Cuba, have formed a massive global alliance to take advantage of perceived vulnerabilities in U.S. national security, and have the potential to establish themselves as the leading force in the world if left unchecked in cyberspace. These authoritarian cyber-threat nations do not care about individual liberties, viewing freedoms as a threat to their continued existence. It is therefore in their interest to eliminate freedom and liberty wherever they can, and many of them have attempted to do so in the U.S. through election interference down to the city level, infiltration of campaigns, and influence operations designed to subvert one of the most important tenets of American independence – the right to vote.</p>
<p>In the relatively near future, governments, corporations, and individuals may lose the ability to effectively keep their own secrets and personal information safe, the ability to ensure secure and accurate democratic election processes, and the ability to control or monitor the massive quantities of information that are constantly flowing through cyberspace. The field of cryptanalysis is on track to perpetually surpass advances in cryptology unless mathematics revelations start to happen that allow more complex algorithms to be applied to the encryption process. This would leave the field of CND perpetually behind the realm of CNA that attackers use to exploit systems. If America does not shift this trend and break the global encryption algorithms first, U.S. leadership in the world will suffer, and individual liberties will be put at great risk. Individual citizens of the United States and the rest of the free world have a responsibility that has been widely neglected as the world moves into the information age—to protect themselves against authoritarian subversion of their freedoms.</p>
<p>Cyberspace is not inherently safe, it is inherently unsafe, and the carefree use of electronic devices contributes to authoritarian goals of eliminating liberty from the world. Americans must gain a better understanding of network security by enhancing their education and knowledge of the vulnerabilities inherent in using electronic devices in order to secure their freedoms in cyberspace and maintain democracy in the world. Without fair and secure elections, liberty will die. America must re-establish itself as a global leader on the world stage, militarily, in cyberspace, and with regards to human advancements and expansion into space, in order to maintain and advance the principles of individual freedom and humanitarianism in the international community. The international community, for its part, has responded to these increased cyber threats with the creation of the Tallinn Manual, which correlates existing international laws with cyberspace activities in an attempt to apply the existing laws of war to cyber espionage and cyberattacks.<sup>43</sup> By enhancing the authority of law over cyberspace, law enforcement organizations and national governments will be better prepared and capable of addressing future cyber activities targeting their nations or their people. While the Tallinn Manual is a good first step, the staircase keeps climbing, and it is up to the people to move forward, step by step into the future.</p>
<hr />
<h2 style="text-align: left;">Defining the Cyber Battlespace: Cyber Warfare, Networks and Threats</h2>
<p>Cyber warfare is divided into offensive and defensive activities. Offensive cyber warfare activities encompass the developing field of CNA operations, the purpose of which is to cause physical or operational damage to an adversary, either using solely cyber capabilities, or in conjunction with other activities of warfare.<sup>44</sup> CND operations encompass defensive cyber activities, including cyber counterintelligence initiatives designed to detect, prevent, and counter CNA activities directed against the defender. Cyber defenses include protective software and hardware, white-hat hackers who search for weaknesses in order to secure them, and other measures taken against unauthorized network access or malicious activity. Cyber Network Exploitation (CNE), or cyberespionage, however, is the most prominent form of cyber warfare today. CNE is conducted on a regular basis by every nation in the world with a cyber capability, in addition to many non-state actors that use nation-state infrastructures to carry out operations. Stealing information is not a just cause for conventional war, which results in a variety of relatively low risk CNE operations with potentially high payoffs, depending on the situation. This dynamic makes CNE operations an enticing and widespread activity that is desirable and lucrative for nations and individuals to engage in.</p>
<p>Networks are one of the primary methods of entry for CNE operations, and access to them needs to be protected to ensure information security. Networks are essentially circuits of devices linked together. Networks can either be closed or open. A closed network is contained within itself with no external access, such as the internal computer network of a business, where users can only access the network from a computer physically connected to that network. An open network, on the other hand, can be accessed by anyone from anywhere, so long as they know how to gain access or have access to a device that is authorized. The internet is an open network, and as such, provides a conduit for access to all other networks connected to it. The SIPRNet is a Secret-level classified internet network used by the U.S. military, which is an open network like the internet, but which is not connected to the internet and cannot be accessed by devices not authorized to access it. Networks can be accessed through other networks, through software, through hardware, or through direct interface, which means every network can be compromised through a variety of paths, all of which must be protected and monitored.</p>
<p>Networks can be compromised through inadequate software security, compromised hardware components, through the internet or another device on the same network, or directly by manual interface. Hackers and programmers can manipulate the software supply chain of a target in order to gain access to a closed network through software programming designed to create a back door into the system. By compromising hardware components, access can also be granted in much the same way. When supply chains for electronics are outsourced to foreign countries by the United States, end-users of American electronics are immediately put at risk for being compromised by whichever nation the supply components are being manufactured in. Closed networks of computers consist of multiple devices connected to one another. By gaining access to one device on the network, the entire network can be compromised. All of these methods of network exploitation must be constantly and perpetually secured and monitored in order to detect and prevent threats to the network&#8217;s integrity. Threats can be posed by essentially anyone with a computer and an internet connection to any network that is connected to the internet, or connected to any device directly or indirectly which is in turn connected to the internet or connected to any device that has the <em>capability</em> of logging onto the internet through WiFi.<sup>45</sup></p>
<p><sup>1</sup>   Phillip Pool, &#8220;War of the Cyber World: The Law of Cyber Warfare,&#8221; <em>The International Lawyer</em> 47, no. 2 (2013): 299-323.</p>
<p><sup>2</sup>   James Hughes, &#8220;China&#8217;s Place in Today&#8217;s World,&#8221; <em>The Journal of Social, Political, and Economic Studies</em> 35, no. 2 (2010): 167-223.</p>
<p><sup>3</sup>   Select Committee of the United States House of Representatives, “Report of the Select Committee on U.S. National Security and Military/Commercial Concerns with the People&#8217;s Republic of China,” <em>U.S. House of Representatives</em> (Washington D.C.; U.S. Government Printing Office, 1999): ii-xxxvii, https://www.gpo.gov/fdsys/pkg/GPO-CRPT-105hrpt851/pdf/GPO-CRPT-105hrpt851.pdf.</p>
<p><sup>4</sup>   Select Committee of the United States House of Representatives, “Report of the Select Committee on U.S. National Security and Military/Commercial Concerns with the People&#8217;s Republic of China,” ii-xxxvii.</p>
<p><sup>5</sup>   Gary Adkins, &#8220;Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism,&#8221; <em>Journal of Strategic Security</em> 6, no. 5 (2013): 6.</p>
<p><sup>6</sup>   Timothy Thomas, &#8220;Google Confronts China&#8217;s &#8220;Three Warfares&#8221;,&#8221; <em>Parameters</em> 40, no. 2 (2010): 101-113.</p>
<p><sup>7</sup>   Adkins, &#8220;Red Teaming the Red Team,” 6.</p>
<p><sup>8</sup>   Pool, “War of the Cyber World.”</p>
<p><sup>9</sup>   Thomas, &#8220;Google Confronts China&#8217;s &#8220;Three Warfares&#8221;.&#8221;</p>
<p><sup>10</sup> Nathan Thornburgh, “The Invasion of the Chinese Cyberspies (And the Man Who Tried to Stop Them),” <em>Time</em> (2005), http://courses.cs.washington.edu/courses/csep590/05au/readings/titan.rain.htm.</p>
<p><sup>11</sup> Thomas, &#8220;Google Confronts China&#8217;s &#8220;Three Warfares&#8221;.&#8221;</p>
<p><sup>12</sup> Thomas, &#8220;Google Confronts China&#8217;s &#8220;Three Warfares&#8221;.&#8221;</p>
<p><sup>13</sup> Thornburgh, “The Invasion of the Chinese Cyberspies.”</p>
<p><sup>14</sup>  Select Committee of the United States House of Representatives, “Report of the Select Committee on U.S. National Security and Military/Commercial Concerns with the People&#8217;s Republic of China,” 60-95.</p>
<p><sup>15</sup>  Select Committee of the United States House of Representatives, “Report of the Select Committee on U.S. National Security and Military/Commercial Concerns with the People&#8217;s Republic of China,” ii-xxxvii.</p>
<p><sup>16</sup>  Select Committee of the United States House of Representatives, “Report of the Select Committee on U.S. National Security and Military/Commercial Concerns with the People&#8217;s Republic of China,” ii-xxxvii.</p>
<p><sup>17</sup>  Select Committee of the United States House of Representatives, “Report of the Select Committee on U.S. National Security and Military/Commercial Concerns with the People&#8217;s Republic of China,” 2-57.</p>
<p><sup>18</sup> Sun Tzu, <em>The Art of War</em>, Translated by Lionel Giles, (London, UK: Luzac and Co., 1910): 2, 5, http://www.artofwarsuntzu.com/Art%20of%20War%20PDF.pdf.</p>
<p><sup>19</sup> Emilio Iasiello, &#8220;China&#8217;s Three Warfares Strategy Mitigates Fallout from Cyber Espionage Activities,&#8221; <em>Journal of Strategic Security</em> 9, no. 2 (2016): 53.</p>
<p><sup>20</sup> Barack Obama, “The Comprehensive National Cybersecurity Initiative,” <em>The White House</em> (2011), https://obamawhitehouse.archives.gov/sites/default/files/cybersecurity.pdf.</p>
<p><sup>21</sup> Obama, “The Comprehensive National Cybersecurity Initiative.”</p>
<p><sup>22</sup> Department of Defense, “2018 Department of Defense Cyber Strategy Summary,” <em>Department of Defense</em> (2018): 1, https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF.</p>
<p><sup>23</sup> Department of Defense, “Military and Security Developments Involving the Democratic People’s Republic of Korea 2013,” <em>Department of Defense</em> (2014): 11, https://www.ncnk.org/sites/default/files/content/resources/publications/North_Korea_Military_Power_Report_2013-2014.pdf.</p>
<p><sup>24</sup> Department of Defense, “Military and Security Developments Involving the Democratic People’s Republic of Korea 2013,” 14.</p>
<p><sup>25</sup> James Clapper, “Worldwide Threat Assessment of the U.S. Intelligence Community, Statement for the Record,” <em>Senate Select Committee on Intelligence</em> (2015): 3, http://www.dni.gov/files/documents/Unclassified_2015_ATA_SFR_-_SASC_FINAL.pdf.</p>
<p><sup>26</sup> Stephen Haggard and Jon Lindsay, &#8220;North Korea and the Sony Hack: Exporting Instability through Cyberspace,&#8221; <em>Asia &#8211; Pacific Issues</em> no. 117 (2015): 1-8.</p>
<p><sup>27</sup> Haggard and Lindsay, &#8220;North Korea and the Sony Hack.”</p>
<p><sup>28</sup> Daniel Coats, “Statement For the Record: Worldwide Threat Assessment of the US Intelligence Community,” <em>Office of the Director of National Intelligence</em> (2019): 6, https://www.dni.gov/files/documents/Newsroom/Testimonies/2018-ATA&#8212;Unclassified-SSCI.pdf.</p>
<p><sup>29</sup> U.S. Congress, House, Committee on Foreign Affairs, <em>Cuba&#8217;s Global Network of Terrorism, Intelligence, and Warfare</em>, 112th Cong., 2d sess., May 17, 2012, serial 112-158: 26, https://www.govinfo.gov/content/pkg/CHRG-112hhrg74240/pdf/CHRG-112hhrg74240.pdf.</p>
<p><sup>30</sup> U.S. Congress, <em>Cuba&#8217;s Global Network of Terrorism, Intelligence, and Warfare</em>, 19.</p>
<p><sup>31</sup> Dan Dickerson, “Iran Would Strike First,” <em>Journal of Counterterrorism and Homeland Security International</em> 16, no. 3 (2010): 30-36.</p>
<p><sup>32</sup> U.S. Congress, <em>Cuba&#8217;s Global Network of Terrorism, Intelligence, and Warfare</em>, 14.</p>
<p><sup>33</sup> U.S. Congress, <em>Cuba&#8217;s Global Network of Terrorism, Intelligence, and Warfare</em>, 22-23.</p>
<p><sup>34</sup> Coats, “Statement for the Record,” 5-6.</p>
<p><sup>35</sup> James Farwell and Darby Arakelian, &#8220;What does Iran&#8217;s Cyber Capability Mean for Future Conflict?&#8221; <em>The Whitehead Journal of Diplomacy and International Relations</em> 14, no. 1 (2013): 49-65.</p>
<p><sup>36</sup> USAO – New York, Southern, “Manhattan U.S. Attorney Announces Charges Against Seven Iranians for Conducting Coordinated Campaign of Cyber Attacks Against U.S. Financial Sector on Behalf of Islamic Revolutionary Guards Corps-Sponsored Entities,” <em>Department of Justice</em>(2016), https://www.justice.gov/usao-sdny/pr/manhattan-us-attorney-announces-charges-against-seven-iranians-conducting-coordinated.</p>
<p><sup>37</sup> Loretta Lynch, “Attorney General Loretta E. Lynch Delivers Remarks at Press Conference Announcing Seven Iranians Charged for Conducting Cyber Attacks Against U.S. Financial Sector,” <em>Justice News</em> (2016), https://www.justice.gov/opa/speech/attorney-general-loretta-e-lynch-delivers-remarks-press-conference-announcing-seven.</p>
<p><sup>38</sup> Federal Bureau of Investigation, “Iranians Charged with Hacking U.S. Financial Sector,” <em>FBI News</em> (2016), https://www.fbi.gov/news/stories/iranians-charged-with-hacking-us-financial-sector.</p>
<p><sup>39</sup> USAO – New York, Southern, “Manhattan U.S. Attorney Announces Charges Against Seven Iranians for Conducting Coordinated Campaign of Cyber Attacks Against U.S. Financial Sector on Behalf of Islamic Revolutionary Guards Corps-Sponsored Entities.”</p>
<p><sup>40</sup> Farwell and Arakelian, &#8220;What does Iran&#8217;s Cyber Capability Mean for Future Conflict?&#8221;</p>
<p><sup>41</sup> Joseph Menn and Yeganeh Torbati, “Exclusive: Hackers Accessed Telegram Messaging Accounts in Iran – Researchers,” <em>Reuters</em> (2016), http://www.reuters.com/article/us-iran-cyber-telegram-exclusive-idUSKCN10D1AM.</p>
<p><sup>42</sup> Library of Congress, “Iran’s Ministry of Intelligence and Security: A Profile,” <em>Federal Research Division</em> (2012), http://fas.org/irp/world/iran/mois-loc.pdf.</p>
<p><sup>43</sup> Michael Schmitt, “Tallinn Manual on the International Law Applicable to Cyber Warfare,” <em>NATO Cooperative Cyber Defence Centre of Excellence</em> (2013), http://d-russia.ru/wp-content/uploads/2013/08/tallinnmanual.pdf.</p>
<p><sup>44</sup> Mike Chapple and David Seidl, <em>Cyberwarfare: Information Operations in a Connected World</em> (Massachusetts: Jones and Bartlett Learning, 2014), 17-18.</p>
<p><sup>45</sup> Chapple and Seidl, <em>Cyberwarfare</em>, 187.</p>
<p><a href="https://globalsecurityreview.com/cyber-world-war-china-anti-american-espionage-global-cyber-arms-race/">Cyber World War: The People&#8217;s Republic of China, Anti-American Espionage, and the Global Cyber Arms Race</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>COVID-19 and the Increasing Risk of Terrorism</title>
		<link>https://globalsecurityreview.com/covid-19-and-the-increasing-risk-of-terrorism/</link>
		
		<dc:creator><![CDATA[Mohamed ELDoh]]></dc:creator>
		<pubDate>Fri, 02 Oct 2020 20:23:00 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Al Qaeda]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[Iraq]]></category>
		<category><![CDATA[ISIS]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=22792</guid>

					<description><![CDATA[<p>There is no doubt that the global COVID-19 pandemic has disrupted nearly every aspect of life. From how we interact with one another to how we commute and work, people now are facing new realities that were not present just six months ago. Though the main concerns for many policymakers, government officials, and business leaders [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/covid-19-and-the-increasing-risk-of-terrorism/">COVID-19 and the Increasing Risk of Terrorism</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There is no doubt that the global COVID-19 pandemic has disrupted nearly every aspect of life. From how we interact with one another to how we commute and work, people now are facing new realities that were not present just six months ago. Though the main concerns for many policymakers, government officials, and business leaders include managing the ongoing global health crisis and its economic ripple effects, other unanticipated risks may already be shaping up. These include a growing threat of extremism and terrorism.</p>
<p>The terms of extremism and terrorism have been used interchangeably. However, there is a crucial distinction between the terms: all terrorists are extremists, but not all extremists are terrorists. Despite the latter, a fine line separates extremists from the turning point of embracing violence—thus becoming terrorists. This is because extremism is generally regarded as <em>&#8220;the vocal or active opposition to our fundamental values, including democracy, the rule of law, individual liberty, and respect and tolerance for different faiths and beliefs&#8221; </em>as per the 2015 UK&#8217;s Counter-Extremism <a href="https://www.gov.uk/government/publications/counter-extremism-strategy">Strategy</a>. Furthermore, extremists may resort to terrorism to coerce governments and the general public to give in to their cause.</p>
<p>Over the past couple of decades, extremism and terrorism were mostly associated with religious causes, especially Islamic extremism, which present a persistent threat to numerous states. Yet, the current pandemic crisis may fuel such a risk and threats from other extremism categories. This includes the right-wing, left-wing, and single-issue extremism. While clearly articulating from now why and how the case is cumbersome, government and national security leaders can relate early warning signs to counter these threats.</p>
<p>Some arguments are claiming that terrorist groups are currently preoccupied with protecting their members against the coronavirus. However, different incidents that took place over April 2020 points to the direct opposite. In fact, in its mid-March al-Naba newsletter, ISIS <a href="https://www.timesofisrael.com/islamic-terror-groups-see-opportunity-in-global-chaos-from-virus/">urged</a> its followers to launch attacks in times of crisis and show no mercy.</p>
<p>Earlier in April, 25 soldiers in Mali were <a href="https://www.france24.com/en/20200407-25-soldiers-killed-suspected-jihadist-attack-in-northern-mali-says-government">killed</a> in a jihadist attack. On the 14th of April, in an operation where one police officer killed, Egyptian security forces exchanged fire. They eliminated <a href="https://egyptianstreets.com/2020/04/15/egypt-police-kill-terrorists-planning-easter-attacks/">seven</a> terrorists who were part of a cell planning to conduct attacks during the Easter holiday in Egypt. Also during mid-April, the Tunisian security authorities <a href="https://www.dailymail.co.uk/news/article-8230393/Jihadist-arrested-plot-followers-infect-Tunisian-police-coronavirus.html">foiled</a> a terrorist plan to spread the coronavirus to Tunisian security forces by coughing, sneezing, and spitting.</p>
<p>On the 21st of April 2020, it was announced that one of Europe&#8217;s most wanted terrorists and ISIS affiliate, Abdel Majed Abdel Bary, was <a href="https://www.dailymail.co.uk/news/article-8253101/British-ISIS-rapper-caught-Spain-identified-EARS-hid-mask.html">recently</a> arrested by the Spanish police in Almeria where he settled in during the coronavirus lockdown. Abdel Bary reached Spain via a boat, and local newspapers indicated that he intended to return to the UK. The return intentions of Abdel Bary – who was arrested with another two persons in his apartment – remains unclear. In France, on the 27th of April, a 29-year-old Frenchman was also arrested. The man, who was not identified, has slammed his car into police cars and motorcycles, injuring three officers. It was found that the man has <a href="https://www.bgdailynews.com/news/international/france-terrorism-probe-into-car-attack-that-hurt-3-police/article_f5e741e5-3abd-5b9d-a96e-25bec7d9662a.html">pledged</a> allegiance to ISIS in a letter found in his car. A couple of days later, in a statement by the Danish authorities on the 30th of April, the police in Denmark <a href="https://www.dw.com/en/danish-police-thwart-plans-for-terror-attack/a-53294963">prevented</a> a terrorist attack with a possible &#8220;militant Islamic motive.&#8221; The arrested man was already suspected of attempting to obtain ammunition and firearms. On the 30th of April, in one of the deadliest attacks that month, ten Egyptian army personnel were killed in a terrorist attack. The incident, which included an officer, a non-commissioned officer, and eight soldiers, had an improvised explosive device (IED) detonated under their armored vehicle in Bir El-Abd in North of Sinai.</p>
<p>Looking at Iraq, we can see a <a href="https://www.ft.com/content/abbdcd29-fe66-4be2-b35e-efcfca536ce1">rise</a> in ISIL (ISIS) operations over the past few months, wherein the first three months of 2020, 566 attacks were conducted by the group in Iraq. Not only that, the group&#8217;s attacks have intensified, but the group appears to be <a href="https://www.ict.org.il/Article/2565/ISIS_Strengthens_in_Iraq#gsc.tab=0">strengthening</a>. Given their recent attacks in Syria and Iraq, it is <a href="https://thesoufancenter.org/intelbrief-recent-islamic-state-attacks-demonstrate-its-durability-and-resilience/">argued</a> that the current pandemic has already demonstrated how durable and resilient ISIS ais In addition to that, other armed extremist groups are scaling up their targeted attacks. This can be evident by the recent <a href="https://www.washingtonpost.com/world/leading-iraqi-researcher-assassinated-outside-his-house-in-baghdad/2020/07/06/aa43942e-bfb7-11ea-8908-68a2b9eae9e0_story.html">assassination</a> of Hisham al Hashimi, 47, who was fatally shot outside his house in Baghdad. Hisham was among the world&#8217;s leading security experts on ISIS and other armed groups. Iraqi officials <a href="https://www.aljazeera.com/news/2020/07/iraq-armed-groups-expert-hisham-al-hashemi-shot-dead-baghdad-200706194213891.html">indicated</a> that Hisham received threats recently from Iran backed militias.</p>
<p>Because of the abovementioned incidents – even if they may appear minor and sporadic to some security strategists – it is worth noting that terrorist groups may take advantage of the global focus of countering the pandemic and launch attacks. Furthermore, terrorist groups may view the global pandemic crisis as an opportunity to win more recruits, supporters, sympathizers, and then strike harder than before should the right moment be presented. In this regards, Al-Qaeda suggested in its <a href="https://www.haaretz.com/middle-east-news/isis-al-qaida-see-global-chaos-from-coronavirus-as-an-opportunity-to-mobilize-1.8734789">statement</a> on the 30th of March, that non-Muslims use their time in quarantine to learn about Islam. In addition, these groups have never failed to exploit social media to advance their cause and propaganda. That said, as the pandemic continues, people are spending more time online, terrorist groups are likely to amplify their utilization of social media to further spread their dangerous rhetoric along with widely used hashtags of the terms: #Coronavirus, #COVID2019 or #COVID19 to ensure a wider audience reach for their social media posts.</p>
<p>Not only that, terrorist groups may use the time of the pandemic crisis to propagate their ideology or launch attacks but also use the time to reinforce their bases to remerge in a more potent form after the pandemic crisis. This can be specifically true given that most terrorist groups are taking some of the African and Middle Eastern countries like Libya, Chad, Mali, Nigeria, Somalia, Syria, Iraq, Afghanistan, and others as their hubs and operational base. Most of these nations are developing countries, so it is possible that while these nations&#8217; authorities and security forces are focusing their capabilities on curbing the coronavirus spread, that terrorist groups would utilize such a window period to harness their abilities. This is particularly evident from the very recent <a href="https://www.express.co.uk/news/world/1277458/coronavirus-isis-news-Iraq-Syria-attacks-terrorists-Baghdad-suicide-bombing-Kirkuk">series</a> of terrorist attacks launched by ISIS in Syria and Iraq, killing dozens of soldiers. The attacks probably took advantage of the local authorities scaling back the number of troops on the ground due to the coronavirus pandemic. A similar expansionary approach is also<a href="https://www.pam.int/welcome.asp?m=news&amp;id=908"> seen</a> by jihadists in the Sahel region. Thus, further confirming the threat resurgence of organized terrorist groups as a result of the pandemic crisis.</p>
<p>Although the terrorism threat appears to be relatively regional, it requires intergovernmental and a multinational collective counterterrorism approach. With many of the terrorist groups and affiliates adopting a horizontal structure, one group in one country might be influencing the actions of other groups in many other different countries. Not to forget lone wolf terrorism, which would only take the individual perpetrator to be radicalized by merely reading and following the propaganda and extremist ideologies widely available online.</p>
<p>While intergovernmental counterterrorism frameworks, cooperation, and efforts already exist, the current pandemic crisis still presents an unprecedented challenge to many countries. This includes the redirection of security forces and militaries&#8217; actions in curbing the pandemic spread, implementing lockdowns, curfews, regulating borders entry, and supporting the national overwhelmed healthcare authorities. Though the latter is important to ensure the general public safety, security bodies mustn&#8217;t lose their focus on countering terrorism, reinforcing border security, and stepping up surveillance and intelligence activities to anticipate any risks or terrorism plots. Additionally, extremist – but nonviolent – groups should be closely monitored during the pandemic and economic crisis to counter how such groups might use the pandemic to <a href="http://nycfpa.org/blog/the-pandemic-crisis-economic-recession-and-the-rise-of-extremism/">advance</a> their propaganda and gain more sympathy from the general public. This includes right-wing, left-wing, and single-issue extremism groups such as <a href="https://www.economist.com/the-world-if/2020/07/04/what-if-climate-activists-turn-to-terrorism">climate</a> activists who turn to terrorism.</p>
<p>Furthermore, as the economic recession builds up, different countries may implement spending cuts and reduce budgets dedicated to national security, intelligence, military, and law enforcement concerning various security programs, including counterterrorism. Accordingly, this should not be the case at all. Even if the economic recession is currently taking its toll on all sectors, government spending, and budgets dedicated to national security, intelligence, military, and law enforcement, counterterrorism efforts should not be reduced. As extremists and terrorist groups are likely to exploit the coronavirus pandemic and post-pandemic economic crisis for their benefit and incite violence, national governments should not undermine such a dormant yet imminent threat while tackling the economic consequences of the pandemic crisis. In this respect, military, national security, intelligence, and law enforcement bodies across the world should increase, and hone their counterterrorism capabilities, intelligence sharing, and international cooperation.</p>
<p><a href="https://globalsecurityreview.com/covid-19-and-the-increasing-risk-of-terrorism/">COVID-19 and the Increasing Risk of Terrorism</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Are The U.S. And Its Partners Losing Their Grip On Syria&#8217;s North East?</title>
		<link>https://globalsecurityreview.com/are-us-partners-losing-grip-deir-ez-zor/</link>
		
		<dc:creator><![CDATA[Ahmad al-Khaled]]></dc:creator>
		<pubDate>Fri, 07 Aug 2020 19:48:20 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=22285</guid>

					<description><![CDATA[<p>The oil-rich province of Deir ez-Zor, located in Eastern Syria, has witnessed another escalation between the local Arab populace and the Kurdish-dominated Syrian Democratic Forces (SDF). Unexpectedly for the SDF and the U.S. military, the protesters have established control over several towns, and it seems they are willing to go further. Sources close to the [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/are-us-partners-losing-grip-deir-ez-zor/">Are The U.S. And Its Partners Losing Their Grip On Syria&#8217;s North East?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><i>The oil-rich province of Deir ez-Zor, located in Eastern Syria, has witnessed another escalation between the local Arab populace and the Kurdish-dominated Syrian Democratic Forces (SDF). Unexpectedly for the SDF and the U.S. military, the protesters have established control over several towns, and it seems they are willing to go further.</i></p>
<p>Sources close to the SDF initially <a href="https://twitter.com/RojavaIC/status/1290612388195119105">reported</a> that the protesters limited their demands by requesting a solution to many minor issues. Still, soon enough, it became evident that it was not the case and the problem—and a major one—was the presence of SDF in the area. The demonstrators were quick to turn from chanting slogans to taking control of towns: in a single day, they captured all of Shuhayl, Al-Hawayej, Diban and forced the SDF members to leave before blocking the roads.</p>
<p>The protests were sparked by <a href="https://www.kurdistan24.net/en/news/5f6a561a-1ab6-47fc-a350-a98b0e27e96a">a series of assassinations</a> of influential leaders of the Al-Aqidat and Al-Baqara tribes. Three Deir ez-Zor sheikhs were killed in less than a week: Sheikh Suleiman Khalaf al-Kassar from Al-Aqidat was shot in Busayra village on July 30th. The next day Sheikh Suleiman Al-Weis who belonged to Al-Baqara, was shot in the head by two gunmen on a motorcycle in Al-Dahla. Finally, Sheikh Muttshar al-Hamoud al-Hifl was shot in the outskirts of Al-Hawayej on Sunday, August 2. His relative, Sheikh Ibrahim al-Hifl, was also wounded in the incident but survived.</p>
<p>In a peculiar coincidence, a few weeks before the assassinations, the tribal leaders were invited to a meeting with the SDF Commander Mazloum Abdi with the U.S. servicemen also present. The <a href="https://sdf-press.com/?p=32498">agenda</a> reportedly included co-operation between the tribes and the SDF. It was reported that at least one of the victims, Muttshar al-Hifti, declined to participate and to engage with the Americans.</p>
<p>An insight into the details of these meetings can be gained through the <a href="https://www.iraqoilreport.com/this-week/u-s-backed-oil-deals-in-basra-and-syria-42970/">reports</a> about an <a href="https://www.al-monitor.com/pulse/originals/2020/07/us-oil-company-deal-syria-kurds-kobani-turkey-russia-sdc-sdf.html">oil deal</a> allegedly struck by the SDF and a little-known American oil developer Delta Crescent LLC. Delta Crescent was granted exclusive rights for production, refinement, and export of the oil from Deir ez-Zor fields, potentially bringing the participants an annual profit of hundreds of millions of dollars, according to statements made by U.S. officials. The deal was met with a harsh response from the Syrian government, which labeled it a &#8220;deal between thieves.&#8221;</p>
<p>According to sources on the ground, the implication is that those who fell victim to the assassinations shared this view and opposed the deal. Their removal, however, has clearly failed to deliver the results intended by the masterminds behind their deaths, yet another time when the Kurds were thrown to the wolves by the U.S. who is accustomed to making their allies bear the consequences of the reckless pursuit of the American interests.</p>
<p>Meanwhile, the SDF started to amass forces in the vicinity of the areas shaken by the unrest. The reinforcements sent from Al-Shadadi, Al-Sousa, and Baghuz are gathering at the U.S. military base near the Al-Omar oil field. Moreover, two U.S. Apache attack helicopters were spotted patrolling the area. These developments, combined with a lack of report on any negotiations between the protesters and the SDF leadership, paint a grim picture, indicating that the SDF likely intends to use force to disperse the protests.</p>
<p>It is not the first time the SDF resorts to the use of force when faced with the discontent of the local populace in north-eastern Syria, although this approach had never brought the desired result. All areas affected by the protests have been subjected to dozens of raids by the SDF and U.S. special forces. Reports on these operations unfailingly mentioned arrests of ISIS terrorists. They failed to mention, however, what the Pentagon files under the category of &#8220;collateral damage&#8221;—the deaths of civilians killed as a result of the actions of the U.S. military and its allies.</p>
<p>The upheaval in Deir ez-Zor is yet another evidence that the SDF, initially an independent movement, has degraded to a tool or a lever of American influence in Syria, and now finds itself fighting consequences instead of locating the root cause of the unrest – widespread corruption among the officials of the Kurdish administration and dramatic deterioration of the living conditions.</p>
<p>The regional turbulence created by Washington&#8217;s constantly shifting stance—or rather a lack of stance—on Syria has grown so strong it finally turned against the American interests. The latest escalation in Deir ez-Zor should be considered nothing but a byproduct of this ill-designed policy and, perhaps, marks the beginning of the end of the US and SDF hegemony in Syria&#8217;s North East.</p>
<p><a href="https://globalsecurityreview.com/are-us-partners-losing-grip-deir-ez-zor/">Are The U.S. And Its Partners Losing Their Grip On Syria&#8217;s North East?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>With the U.S.-Taliban Deal in place, IS-K seeks to build a reign of terror in Afghanistan</title>
		<link>https://globalsecurityreview.com/with-the-us-taliban-deal-in-place-is-k-seeks-new-reign-of-terror-afghanistan/</link>
		
		<dc:creator><![CDATA[Ahmad Shah Katawazai]]></dc:creator>
		<pubDate>Fri, 07 Aug 2020 19:32:22 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[ISIS]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Taliban]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=22279</guid>

					<description><![CDATA[<p>Last Sunday evening, a large prison in eastern Afghanistan was stormed by IS-K militants resulting in dozens of casualties and hundreds of prisoners escaping. The sophisticated attack continued for almost 20 hours leading to the deaths of at least 29 individuals.  The attack began hours before a three-day cease-fire between the Afghan government and the Taliban [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/with-the-us-taliban-deal-in-place-is-k-seeks-new-reign-of-terror-afghanistan/">With the U.S.-Taliban Deal in place, IS-K seeks to build a reign of terror in Afghanistan</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Last Sunday evening, a large prison in eastern Afghanistan was stormed by IS-K militants resulting in dozens of casualties and hundreds of prisoners escaping. The sophisticated attack continued for almost 20 hours leading to the deaths of at least 29 individuals.  The attack began hours before a three-day cease-fire between the Afghan government and the Taliban was set to expire. Though the Taliban denied responsibility for the attack, IS-K soon claimed that the assault was their work.</p>
<p>In order to gain attention and to distinguish itself from the Taliban, IS-K is employing new tactics like targeted killing, as well as complex attacks designed to instill as much fear as they can. Targeted killings has increased in major cities, especially in Kabul. IS-K has been capable of launching heart-wrenching, high-profile complex assults, killing hundreds of people.</p>
<p>Last May, IS-K militants stormed a maternity hospital in Kabul, killing newborn babies, mothers, nurses, and a police officer. On the same day, they targeted a funeral gathering in Nangarhar through a suicide attack, killing dozens of people. Similarly, they conducted a complex attack on a Sikh temple in March, killing 25 worshippers, in a ruthless targeting of the Hazara minority. The group also claimed responsibility for an attack on the U.S. military Bagram airbase in Parwan province.</p>
<p>With the U.S.-Taliban peace agreement, IS-K stands ready to inherit the role of violent spoiler. It poses a serious danger as it attracts fighters from across the region. IS-K, with its global agenda has been able to recruit fighters from more than a dozen countries. Militants from the Middle East under pressure in the Syria war have joined IS-K in Afghanistan. Foreign fighters from India, Iraq, Jordan, Saudi Arabia, and Syria have joined their ranks in Afghanistan. Surprisingly, the suicide attacks on Sikh minorities was attributed to one of their Indian fighters, who hailed from Kerala. Battle hardened, educated, and professional fighters in the thousands are skillful in attracting foot soldiers and brainwashing the poverty-stricken illiterate population of the country.</p>
<p>In addition to ideological propaganda, IS-K has been using coercion, force, intimidation, and empty promises of finances to recruit local fighters. One major challenge for IS-K has been the xenophobic nature of Afghans and hate among local residents regarding their brutal tactics they used from the outset of their operations in the country. Moreover, extortion, taxation, and mineral resources exploitation, which are major sources of revenue for IS-K has also caused concerns among local Afghans.</p>
<p>With their fighters coming from Pakistan, Uzbekistan, Tajikistan, IS-K has the capacity to destabilize Central Asia, once it gets a firm foothold in Afghanistan. This remains one of the major concerns of Russia and Iran who view IS-K as a group driven by Salafi ideology, working to destabilize Central Asia. Most of IS-K fighters come from the middle class and are operative in far flung areas. They have been successful in getting safe havens in the capital, Kabul.</p>
<p>IS-K has been active in nine provinces from Nangarhar and Kunar in the east, Jawzjan, Faryab, and Badakhshan in the north and Ghor in the center west. IS-K is viewed sympathetically by some ethnicities in the north. Key Tajik and Uzbek commanders like Mawlawi Satar and Mawlawi Abdullah Majid have already joined IS-K. Who are actively involved in the recruitment of ethnic Tajik and Uzbek fighters in their ranks. When their regional leader Aslam Farooqi was captured in Kandahar along with 12 Pakistani nationals—including 4 women, a Bangladeshi man, and 2 Russian speaking women—it is believed Farooqi was engaged in an effort to contact groups in the South in order to bring  them to their ranks.</p>
<p>Some security experts believe that IS-K lacks the capability to launch complex attacks on its own. Taliban&#8217;s hardline wing, the Haqqani network, is suspected of providing technical assistance to IS-K in conducting complex attacks. IS-K and Haqqani network share a mutual interest—to undermine the Kabul government control and credibility by conducting attacks in major cities. Thus, on one hand, the Taliban takes the blame out of itself while, on the other hand, they portray the weakness of the government, meanwhile, IS-K relevance is served better. Afghan Government calls IS-K as the new face of the Haqqani network.</p>
<p>IS-K is an emerging threat, which represents itself as a replacement of the Taliban. It seeks to establish a Caliphate beginning in South and Central Asia, which will expand as Muslims across the globe join. This will be horrendous not only for U.S. national security interests but can destabilize the whole region. With their recent brutal attacks, IS-K has proved the fact that we are faced with a renewed threat, a new reign of terror, limited but far more complex and violent.</p>
<p><a href="https://globalsecurityreview.com/with-the-us-taliban-deal-in-place-is-k-seeks-new-reign-of-terror-afghanistan/">With the U.S.-Taliban Deal in place, IS-K seeks to build a reign of terror in Afghanistan</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Paid to Kill: An Examination of the Evolution of Combatants for Hire</title>
		<link>https://globalsecurityreview.com/paid-to-kill-combatants-for-hire/</link>
		
		<dc:creator><![CDATA[Joshua E. Duke]]></dc:creator>
		<pubDate>Thu, 06 Aug 2020 19:56:50 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[Al Qaeda]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Iraq]]></category>
		<category><![CDATA[ISIS]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Private Military Companies]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=22259</guid>

					<description><![CDATA[<p>Throughout world history, as long as there has been conflict among people, there have been people willing to pay others to carry out violence. From assassins and mercenaries to bounty markers and paramilitary organizations, humans have found limitless ways to pay for their dirty work to be carried out by others. This process is one [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/paid-to-kill-combatants-for-hire/">Paid to Kill: An Examination of the Evolution of Combatants for Hire</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Throughout world history, as long as there has been conflict among people, there have been people willing to pay others to carry out violence. From assassins and mercenaries to bounty markers and paramilitary organizations, humans have found limitless ways to pay for their dirty work to be carried out by others. This process is one of the most common threads in human history and has been used by people in every position, of every origin, and in every location on the planet for thousands of years. The issue of pay for violence has entered the spotlight again in the modern age, as humanity moves closer together through information and technology proliferation. The world is growing smaller, and conduct unbecoming of a civilized society is finding fewer and fewer places to hide. This article examines, in part, the historical evolution of the roles of paid actors in the business of war and violence. A complete examination is not presented, as it would require detailing a complete history of humankind. The author instead focuses on the primary themes and points throughout history that explain the origin, necessity, and permanence of paid-for violence, framed by supporting historical and modern-day references to illustrate the concept of combatants for hire and their impact on human society.</p>
<h3>Point of Order</h3>
<p>Payment comes in many forms, not just money, and over time violence has always been paid for by the cheapest means possible, sometimes even just by allowing life to continue or through advancing promises of ideological or moral philosophies. Jihad, for example, is a direct bounty from Allah on the heads of all infidels, the reward being not financial at all, but promises of luxurious life after death. The most common form of payment is, of course, money and has been used widely for thousands of years to incentivize the public into helping catch or kill criminals or declared criminals of various forms. From wanted posters in the wild west to the modern-day Federal Bureau of Investigation’s (FBI) most wanted list, American law enforcement has continuously been a significant end-user of various types of bounty systems. Technically, all modern military forces are also a party to the payment-for-violence system as well, as the primary function of all militaries is either offensive or defensive killing operations, and they all receive payment from participating. Assassins, since humanity’s early days, have often performed their art for a variety of forms of payment, including revenge, land, influence, or positions in leadership, and of course, money. Some assassins and mercenaries have proven this point to the extreme by conducting operations for opposing factions of a single conflict, sometimes even simultaneously working for both. No matter which way the issue is framed, payment for death is a long-standing human tradition, and it is here to stay until the concept of violent conflict is eliminated.</p>
<h3>Assassins</h3>
<p>Assassination has commonly been used as a form of political terrorism. From a historical context, assassinations have been used to instigate larger movements, such as insurrections, rebellions, revolutions, and other events over time designed to conquer a social system or ideology of an era or region on Earth. In 1933, the attack on President-elect Roosevelt by an Italian immigrant, Giuseppe Zangara, was an attack on the concept of leadership itself. Zangara professed that it didn’t matter who held the office and that his target was the symbol of the Head of State—any Head of State—as he admitted to considering other U.S. Presidents and the King of Italy as targets as well.<sup>1</sup> The modern term ‘character assassination’ is based on this historical and persistent type of motivation for actual assassinations, where the ultimate goal is to target a public figure in a way that moves the public ideology surrounding the target in the desired way, which has become common in today’s political environment.</p>
<p>More to the point of payment for death, assassinations have been one of the most effective and persistent tools of ruling bodies, always. The first known writing describing methods of assassination is Kautilya’s <em>Arthashastra</em> (1915), an ancient text from India dated to somewhere between 300 BC and 300 AD. The text encompasses many areas of governing, including chapters concerning war strategy, poisons, spy techniques, and strategies for assassination-style killings.<sup>2</sup> While payment is not explicitly discussed, the text is clear that the persons used in these operations are employed as a form of combatants. Sun Tzu’s <em>The Art of War </em>(1910), believed to be written in the 5th century BC, also briefly mentions assassination as a type of mission assigned to paid spies.<sup>3</sup> Echoing the ancient Indian <em>Arthashastra</em>(1915), a Central Intelligence Agency (CIA) file, <em>A Study of Assassination</em> (1953), that was declassified in 1997, likewise details modern versions of assassination techniques, potential weapon ideas, and methods to be used for killing,<sup>4</sup> and presumably was used as a training doctrine for paid employees of the Agency from its estimated publication in 1953 until the assassination ban encompassed in Executive Order 12333, signed by President Ronald Reagan in 1981.</p>
<p>Impacts achieved from assassinations, or other forms of paid-for violence, can vary from insignificant, like the Italian who failed to assassinate President-elect Roosevelt, to toppling governments or starting a major war. World War I, for example, was initiated by just such an act. Chief of Serbian Military Intelligence and leader of The Black Hand organization, Dragutin Dimitrijević, was the head of the snake that took a bite out of the Habsburg Monarchy by orchestrating the assassination of the heir presumptive, Archduke Franz Ferdinand, on 28 June 1914. The same Dragutin Dimitrijević had led an overthrow of the Serbian Monarchy just a decade prior, in 1903, to install a puppet on the throne to enhance his power and political relations with Russia.<sup>5</sup> The Black Hand, a unified “Serbian nationalist organization,” also known as “Unification or Death,”<sup>6</sup> was recognized as an arm of the Serbian military, acting as an early twentieth-century clandestine organization much like modern Private Military Companies (PMC), with civilian members who could offer plausible deniability to the government when necessary.</p>
<p>Archduke Franz Ferdinand was an advocate for peace,<sup>7</sup> and at the time, most Serbians wanted to retaliate against Austria-Hungary for annexing Bosnia-Herzegovina in 1908. The Archduke was; therefore, the primary obstacle preventing a war that Dimitrijević and many Serbians wanted to start. Ferdinand was also the heir to the throne, and the Emperor was dying, which provided Russia an opportunity to eliminate a Monarchy standing in the way of Russian expansionist ideas as well. This opportunity incentivized Russian approval of the assassination, even if it meant going to war as Serbia’s ally. War could not be achieved with the Archduke constantly advocating for peace and preventing any Austro-Hungarian aggression, so The Black Hand assassins, controlled by Dimitrijević, launched their operation. Ferdinand was attacked in his motorcade on his way to give a speech in Sarajevo, but the attack did not go as planned. The first assassin shot at Franz from a distance and missed; the second threw an explosive that ricocheted off the Archduke’s car and exploded under the vehicle following behind.<sup>8</sup> This first attack failed, and the Archduke survived to give his speech, only to be targeted on the next leg of his journey through the city by the remaining assassins. As the motorcade came to a halt, Gavrilo Princip walked up to the vehicle and shot Franz in the neck, and his wife in the gut.<sup>9</sup> Both died of their wounds shortly thereafter.</p>
<p>After the assassination of the Archduke, there was a military escalation of forces between Austria-Hungary, Serbia, and all of their allies. Austria-Hungary declared war on Serbia on 28 July 1914, one month after the assassination of the Archduke, after Serbia refused extraordinary terms offered by Austria-Hungary, which were not expected to be met anyway. Russia, allied with Serbia, mobilized its military upon this declaration of war, and Germany responded by declaring war on Russia, which caused Russia’s ally, France, to declare war on Germany. Then Germany invaded Belgium to get to Paris, instigating Britain, allied to Belgium and France, to declare war on Germany, followed a few weeks later by Japan, bound by a military treaty with Britain – Voila, World War I.<sup>10</sup> While this is a unique assassination in the history of assassination because the goal was achieved, this is not an unprecedented success in the theme of payment for death, or of payment for death in war, as the history of mercenaries changing the tides of battle clearly shows.</p>
<h3>Mercenaries</h3>
<p>Mercenaries have been participating in violence for likely the same amount of time as assassins, though generally on a more public and destructive scale, without much in the ways of stealth and treachery. Before countries began fielding standing armies, mercenaries were the primary method of large-scale combat. Being a mercenary was a regular job. Groups of mercenaries would sell their services to the highest bidder, always aware that nations would continue to find reasons to use their services. When problems became scarce, and nobody wanted to pay them, they would create problems of their own, extorting their hosts in the process. Throughout most of history up to the signing of the Peace of Westphalia treaties in 1648, which were the origin of the modern-day nation-state with recognized national borders, mercenaries were the primary forces used for war.<sup>11</sup> Mercenaries grew primarily to fill a skill void in the area of combat expertise. Before the creation of standing armies, the duties of war were rotated among individuals too often to retain the necessary experience and skill to achieve efficiency, which led to the rise of experienced warriors willing to sell their services to the highest bidder.</p>
<p>Eventually, mercenaries became a global industry, attracting violent, greedy people with the sole motive of money as their driving purpose. The only logical outcome of this scenario is chaos and tyranny, if for no other reason than that the existence of a large permanent mercenary population creates a strong incentive for constant war. In peace, mercenaries posed a threat to the general population, often resorting to extortion for protection to continue their livelihood when their services were not required, as happened in France in the late 15th century following the end of the Hundred Years War.<sup>12</sup> Despite the drawbacks associated with mercenaries, the industry itself survived long after the Peace of Westphalia, and even into the modern world, as supplemental forces to a standing national army have often been seen as desirable for several reasons, from bolstering force size to match an enemy force to bending the rules of national militaries to provide plausible deniability.</p>
<p>Force size has been a constant issue in war, often leading to hiring mercenaries to supplement militaries. This method is not always successful, however, as Great Britain learned during the American Revolutionary War. Unable to maintain security throughout the British Empire around the world and quell the American uprising simultaneously with available military forces, Britain hired approximately 10,000 Native Americans and 30,000 German mercenaries to help fight the American Continental Army.<sup>13</sup> The Revolutionary War highlights the fact that mercenaries are only as good as the money they are paid, illustrated by the fact that the American Congress instigated the distribution of “leaflets offering the Germans land and livestock” to switch sides.<sup>14</sup> The nature of the Revolutionary war itself also highlights a more general flaw in the use of mercenaries, in that the Revolutionary war, in the words of Benjamin Franklin, had “no cause but malice against liberty.”<sup>15</sup> This stance points out that the cause of a war, if not properly sold to the participants, can cause a severe undermining within the ranks of the combatants, in turn hurting morale, fostering dissent, and decreasing efficiency, which was experienced significantly on the side of the British. Ultimately, the British use of mercenaries failed to win the war; however, the resulting Constitutional debate was greatly informed by the use of paid actors in warfare, strengthening the Constitutional guidelines for military force regulation in America.</p>
<p>As America grew throughout the transition of the world from mercenary warfare to national militaries, mercenaries became less and less acceptable to the international community. Mercenaries became used primarily to provide plausible deniability to governments and avoid regulations, in much the same way assassins have been used to further objectives of leaders over time. The controversy over the use of mercenaries in warfare grew so extensively that the United Nations decided to institute a new international law, in the form of a treaty titled the <em>International Convention Against the Recruitment, Use, Financing and Training of Mercenaries</em>, signed in 1989.<sup>16</sup> The treaty is interesting in that while signed by many countries, neither the United States nor Russia, the two primary superpowers at the time, has signed onto it since its creation, and the language used in the treaty leaves significant room for interpretation, specifically with regards to the treaty’s definition of a mercenary.<sup>17</sup> These flaws have led to the continuation of non-military payment for violence, both with the continued use of bounties and bounty hunters and in the case of carefully labeled paramilitary forces that don’t fit within the legal parameters of the treaty definition for mercenaries.</p>
<h3>Bounty Systems</h3>
<p>In the late 19th century, after the American civil war, the Pinkerton National Detective Agency, a precursor to the American FBI, established what amounts to the first criminal database in history, with mug shots, wanted posters, and descriptions of criminals and their crimes, all circulating in newspapers across the country and filed with the agency until the death of the criminal.<sup>18</sup> Bounties have also been used extensively since the signing of the 1989 UN treaty as an incentive for individual citizens to assist law enforcement and governments in capturing or killing wanted persons, from criminals to terrorists. The most widely known examples of this in America are the FBI’s most-wanted lists, which are updated regularly, and put price tags on fugitives at large in the United States and around the world. Among the lists, the FBI provides a top ten list of fugitives and a top ten list of terrorists, with price tags ranging from thousands to millions of dollars in rewards for information leading to capture.<sup>19</sup> While the FBI’s bounty lists today are generally for capture, not killing, some infamous outlaws in American history, like Frank and Jesse James, were the targets of wanted posters that promised a reward whether the criminals were brought in dead or alive.<sup>20</sup></p>
<p>The American justice system outlined in the U.S. Constitution eventually eliminated the use of dead or alive wanted posters, as they are illegal under the Constitutional Bill of Rights that provides for a fair trial before sentencing. Still, the bounty system remained intact for capture. During the American-led invasion of Iraq in 2003, another bounty-style system was used to target the most important members of the Iraqi forces and government, in the form of a deck of cards. The Defense Intelligence Agency, after years of research, developed a target/value identification system based on the standard value system assigned to a deck of cards in poker games to assist ground forces in identifying targets of value in Iraq.<sup>21</sup> Saddam Hussein occupied the highest value position, the ace of spades, with consecutively lower-valued individuals identified in succession throughout the deck, aces first, then kings down to twos. While money was not directly associated with this example, prestige was undoubtedly a motivating factor for ground forces capturing high-value targets, and the system set the stage for non-government paramilitary forces to participate directly in ongoing military operations during an active war.</p>
<h3>Private Military Companies (PMC)</h3>
<p>Blackwater quickly emerged as one of the first major controversies of the 21st century, as a PMC working for the United States government in active military combat zones in Iraq and Afghanistan, without oversight from Congress equal to that of U.S. military forces, but with missions encompassing the same areas as the American military.<sup>22</sup> Acting independently of the military, the organization participated in defensive and offensive combat operations to help accomplish military missions of the United States. Without military oversight, and acting directly on behalf of the Executive Branch of government, PMCs like Blackwater are nearly identical to historical mercenary organizations working for pay in combat environments. The United States is not the only country with PMCs. The practice has become widespread since the signing of the 1989 UN treaty banning mercenaries and includes the Russian PMC, The Wagner Group, which is essentially the Russian version of Blackwater. The authoritarian government of Russia, however, has resulted in a much more dangerous version of a PMC than Blackwater and has included domestic operations within Russia as well as foreign operations.<sup>23</sup></p>
<p>Iranian governing practices have given rise to a very different type of PMC. Iran’s military, paramilitary, and intelligence organs are all essentially PMCs in the way that they operate due to the nature of Iran’s government structure, and they are all directly controlled by the Supreme Leader. The primary arms of these enterprises are the Ministry of Intelligence and Security (MOIS) and the Iranian Revolutionary Guard Corps (IRGC). These organizations work together in directing and supporting the PMC-like Quds Force operatives around the world in support of collection efforts, intelligence operations, paramilitary operations, assassinations, and terrorist activities. While the Quds Force advances Iranian efforts to export revolution around the world, their local PMC-like organization, known as the Basij, works to subvert independence within Iran, assisting in tyrannical oppression of free speech and liberty within the country and violently suppressing any attempt to cause disturbances against the Supreme Leader. Iran targets enemies abroad using a decentralized system of third-party actions and efforts, combining the principles of the bounty system and PMC architecture instead of engaging directly in combat efforts. In 2006, for example, when the Islamic State terror organization was still called Al-Qaeda in Iraq (AQ-I),<sup>24</sup> the MOIS provided “financial, material, technological, and other support” to their leader, Abu Musab al-Zarqawi, directly supporting the terrorist’s war against U.S. personnel in Iraq.<sup>25</sup></p>
<p>The contrast between Blackwater and the Iranian Quds Force is extreme, but the core issue inherent in their existence is nearly identical. With the rise in popularity of PMCs around the world after their successful use by the United States in the War on Terror, the core issue of their existence needs attention from the world. The international community recognized that even though Blackwater was targeted for their deeds, their success in achieving mission goals was undeniable. China, Pakistan, Great Britain, Australia, India, and many other countries have worked to develop similar types of organizations in their countries to take advantage of the gray area of contractor combat operations. These organizations are primarily in the employ of the Executive Branch of government or its national equivalent. They are generally not under the structure of the national military for legal purposes or oversight. They are mercenaries, being used in the modern-day to bolster force size that otherwise cannot grow and to skirt existing national and international laws with regards to combat operations and security. While the attention drawn to Blackwater caused them to change their name to Academi, the core issue of the existence of PMCs, in general, has not been significantly addressed in the international community.</p>
<h3>Conclusion</h3>
<p>The practice of paying people to kill has been around for a long time and is likely to stay, absent total world peace. The question that comes to mind isn’t whether or not this process exists, or even how to eliminate it, but rather, what the best way forward is for the United States and the international community, knowing that this process is an inherent part of world politics and international relationships. Attention, publicization, and regulation are likely the most effective weapons against barbarity in warfare, as has been shown throughout history. Attention drawn to assassins led to a ban on the practice of assassination. Attention drawn to mercenaries led to a ban on mercenaries. Attention drawn to the American Constitutional justice system led to the elimination of dead or alive bounties. Attention drawn to PMCs led to a restructuring of the relationship between the United States government and third-party contractors and continues to shape the potential future of PMCs. When the people of the world pay attention, publicize rights and wrongs perpetrated by governments and leaders, and work to create effective regulations to ensure that human dignity and individual liberty are the primary goals of such regulations, freedom succeeds, and tyranny fails.</p>
<p><em>The views and opinions expressed in this article are those of the author and do not necessarily reflect the official policy or position of any U.S. government agency, including but not limited to the Department of Defense, the Department of the Army, the Department of the Navy, or the Marine Corps. Assumptions made within the analysis are not reflective of the position of any U.S. government entity.</em></p>
<hr />
<h4>References</h4>
<p><sup>1</sup> William Crotty, &#8220;Presidential Assassinations,&#8221; <em>Society</em> 35, no. 2 (1998): 102-103.</p>
<p><sup>2</sup> Kautilya, <em>Arthashastra</em>, Translated by R. Shamasastry, (Bangalore: Government Press, 1915), 461-474.</p>
<p><sup>3</sup> Sun Tzu, <em>The Art of War</em>, Translated by Lionel Giles, (London, UK: Luzac and Co., 1910), 34.</p>
<p><sup>4</sup> Central Intelligence Agency, “A Study of Assassination,” <em>Central Intelligence Agency</em> (1953), Accessed on July 2, 2020, https://archive.org/details/CIAAStudyOfAssassination1953/mode/2up.</p>
<p><sup>5</sup> Donald Yerxa, &#8220;July 1914: An Interview with Sean McMeekin,&#8221; <em>Historically Speaking</em> 14, no. 3 (2013): 12-16.</p>
<p><sup>6</sup> Elena Kosmach, &#8220;Serbs and Russians,&#8221; <em>Canadian Slavonic Papers</em> 43, no. 1 (2001): 109-114.</p>
<p><sup>7</sup> Ian Beckett, &#8220;Franz Ferdinand,&#8221; <em>Historian</em> no. 120 (2014): 18-22.</p>
<p><sup>8</sup> Geoffrey Wawro, <em>Mad Catastrophe: The Outbreak of World War I and the Collapse of the Habsburg Empire</em>, (Boulder, CO, USA: Basic Books, 2014), 104-106.</p>
<p><sup>9</sup> Wawro, <em>Mad Catastrophe</em>, 106.</p>
<p><sup>10</sup> Martin Levinson, &#8220;Mapping the Causes of World War I to Avoid Armageddon Today,&#8221; <em>Et Cetera</em> 62, no. 2 (2005): 157-164.</p>
<p><sup>11</sup> Matthew Underwood, “Jealousies of a Standing Army: The Use of Mercenaries in the American Revolution and its Implications for Congress’s Role in Regulating Private Military Firms,” <em>Northwestern University Law Review</em> 106, no. 1 (2012): 317-349.</p>
<p><sup>12</sup> <em>Ibid.</em></p>
<p><sup>13</sup> <em>Ibid.</em></p>
<p><sup>14</sup> <em>Ibid.</em></p>
<p><sup>15</sup> Benjamin Franklin, <em>The Life and Letters of Benjamin Franklin</em>, (Eau Claire: E.M. Hale &amp; Company, nd), 253.</p>
<p><sup>16</sup> United Nations, “International Convention Against the Recruitment, Use, Financing and Training of Mercenaries,” <em>United Nations</em> (1989).</p>
<p><sup>17</sup> <em>Ibid.</em></p>
<p><sup>18</sup> Pinkerton, “Our History,” <em>Pinkerton</em> (2020), Accessed on July 6, 2020, www.Pinkerton.com/our-story/history.</p>
<p><sup>19</sup> FBI, “Most Wanted,” <em>FBI</em> (2020), Accessed on July 6, 2020, www.FBI.gov/wanted.</p>
<p><sup>20</sup> Sophie Tanno, “$5,000 for Jesse James ‘Dead or Alive’ and $100,000 for Lincoln’s Three Killers: The Fascinating Wanted Posters for America’s Biggest 19th Century Criminals,” <em>Daily Mail</em> (2019), Accessed on July 8, 2020, www.dailymail.co.uk/news/article-7280265/the-fascinating-wanted-posters-americas-biggest-19th-century-criminals.html.</p>
<p><sup>21</sup> Doug Sample, “The Faces Behind the Faces on the ‘Most Wanted’ Deck,” <em>American Forces Press Service</em> (2003), Accessed on July 6, 2020, archive.defense.gov/news/newsarticle.aspx?id=29017.</p>
<p><sup>22</sup> Underwood, “Jealousies of a Standing Army.”</p>
<p><sup>23</sup> Kimberly Marten, “Russia’s Use of Semi-State Security Forces: The Case of the Wagner Group,” <em>Post-Soviet Affairs</em> 35, no. 3 (2019): 181-204.</p>
<p><sup>24</sup> Kenneth Katzman, &#8220;Iraq: Politics, Governance, and Human Rights,&#8221; <em>Current Politics and Economics of the Middle East</em> 5, no. 4 (2014): 415-476.</p>
<p><sup>25</sup> Library of Congress, “Iran’s Ministry of Intelligence and Security: A Profile,” <em>Federal Research Division</em> (2012), 37.</p>
<p><a href="https://globalsecurityreview.com/paid-to-kill-combatants-for-hire/">Paid to Kill: An Examination of the Evolution of Combatants for Hire</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>After Almost Twenty Years, America’s “War on Terrorism” Resembles Insanity</title>
		<link>https://globalsecurityreview.com/after-almost-twenty-years-americas-war-on-terror-resembles-insanity/</link>
		
		<dc:creator><![CDATA[John Arias]]></dc:creator>
		<pubDate>Fri, 17 Jul 2020 15:11:38 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[Iraq]]></category>
		<category><![CDATA[ISIS]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=15777</guid>

					<description><![CDATA[<p>September 11th, 2020 will mark the nineteenth year since the attacks in New York and Washington, D.C. For those nineteen years, terrorism underpinned U.S. foreign policy decision making. As a result, the United States and its allies have conceptualized and fought terrorism through a military-focused approach, or a finite strategy. This de facto paradigm has proven [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/after-almost-twenty-years-americas-war-on-terror-resembles-insanity/">After Almost Twenty Years, America’s “War on Terrorism” Resembles Insanity</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>September 11th, 2020 will mark the nineteenth year since the attacks in New York and Washington, D.C. For those nineteen years, terrorism underpinned U.S. foreign policy decision making. As a result, the United States and its allies have conceptualized and fought terrorism through a military-focused approach, or a finite strategy. This de facto paradigm has proven seldomly successful despite its longevity. And as the world returns towards great power competition, terrorism and how to fight it has scaled back in countries’ foreign policy priorities. This presents a momentous opportunity to shift how the United States conceptualizes terrorism and how it fights it, from a finite to an infinite strategy. In the reshuffling of strategic priorities, raising counterterrorism to one of the pillars of U.S. grand strategy will ensure that the U.S. moves away from the erroneous idea that terrorism can be defeated entirely, and enable it to suppress it through an infinite strategy.</p>
<h3>A Finite Strategy</h3>
<p>In game theory, there are finite and infinite games. In a finite game, the objective of the game is to win, thereby ending the game. In the infinite game, the goal is the perpetuation of the game. Since 9/11, the U.S. has implemented a finite approach to fighting terrorism. The “War on Terrorism (WoT)” archetype highlights this finite approach.</p>
<p>Three premises underpinned the WoT archetype: the theoretical idea that terrorism can be <em>completely</em> defeated, the militarization of the response to terrorism, and by extension, the overzealousness to targeted killing, especially of leaders.</p>
<p>As a rhetorical tactic, framing terrorism as a defeatable concept certainly helped galvanize the U.S. population and international community in the wake of the attacks. But as a theoretical approach, it is at best ill-conceived and, at worst futile. First, there is little sense to the idea of defeating terrorism completely. As scholars Arie W. Kruglanski and Shira Fishman have argued, terrorism is merely a tool.<sup>1</sup> As a tool, terrorism has and is <em>used</em> by most non-state actors<sup>2</sup>across the political violence spectrum to achieve their goals.</p>
<p>Therefore, conceptualizing terrorism as something that can be defeated is as illogical as declaring war on a hammer. Second, and as alluded to earlier, the WoT archetype ignores the longevity of terrorism. In other words, it frames or at least creates the perception of terrorism as a sudden and unique phenomenon that rose to prominence <em>only after</em> 9/11. But one can look to terrorism’s history and longevity to dismiss this claim. During the Roman Empire, the Sicarii<sup>3</sup> used terrorism to reject Roman rule over Judea, and the etymology of the word takes us as far back to the French revolution. Moreover, David Rapport, a scholar, demonstrated how terrorism has evolved in different waves through different geopolitical contexts since the late 1800s.<sup>4</sup> The point is that terrorism has been used throughout history and will almost certainly continue to be used by groups around the world for generations to come.</p>
<p>Because the concept has erroneously been conceived as something defeatable, the U.S. foreign policy blob assumed militarizing the response would inherently resolve the problem by overwhelming the adversary. It is not hard to see why they assumed this. The U.S military has demonstrated an ability to fight and win in multiple theatres against a variety of opponents. The U.S has been most comfortable fighting finite games such as in the Second World War, and Korea. And even, erroneously, framing infinite wars like Vietnam into finite approaches.</p>
<p>As such and in response to 9/11, Congress quickly enacted the Authorization for Use of Military Force (AUMF). Three Presidents since Mr. Bush have used the AUMF to start, perpetuate, and expand military-led counterterrorism (CT) operations around the world. In a closer analysis, the AUMF<sup>5</sup> has been loosely interpreted to include almost any terrorist organization. And true to form, today the U.S. leads or is a partner to military-led CT operations in Yemen, Somalia, Iraq, Syria, Afghanistan<sup>6</sup>, and Pakistan. The operations are as global as they are diverse in targets. The U.S. prosecutes a wide range of terrorist groups, including Al Qaeda core, Al Qaeda in the Arabian Peninsula (AQAP), ISIS, and affiliates in North and East Africa, Al Shabab, and others. This expansion and continuation of operations have cost the U.S. approximately 6.4 trillion dollars,<sup>7</sup> according to Brown University estimates. This militarization has led in turn to overzealousness in disrupting terrorist networks through the targeted killing of leaders.</p>
<p>This, by extension has transformed the premise of military-led operations into statically focused campaigns. Since 2004, the U.S. military has conducted approximately 14,040 strikes in various countries, according to Bureau of Investigative Journalism data,<sup>8</sup> and has formed at least two coalitions<sup>9</sup> of countries to fight terrorist groups.</p>
<p>But as it will be demonstrated next, the finite approach has severe limitations that, at a minimum, raise the important question of why it is still the de facto strategy after almost 20 years.</p>
<h3>A Not-So-Effective Finite Strategy</h3>
<p>The finite framework, one built on the premise of completely defeating terrorism, has not worked. The failure of this finite strategy is not an inherent weakness of the U.S. CT capabilities. Thanks to fast innovation, competent intelligence agencies, and superior technology, the U.S. has become overtly good at finding and fixing targets. The most recent example the death of Iranian General Qasem Soleimani in January of this year<sup>10</sup>.</p>
<p>Instead, the failure is symptomatic of a finite player competing with finite methods and goals against infinite players in what is an <em>infinite game.</em> ISIS is the best example of this clash.<sup>11</sup> Since 2003, the U.S. and its allies have led on and off military-led CT operations against ISIS, fervently focusing on killing its top leaders. It is important to note that the U.S also led counterinsurgency operations (COIN) in 2006–2007 and from 2014–2017 — often in parallel to the CT operations — against ISIS in a response to their evolution from terrorist group to insurgency. These were narrowly successful in territorially defeating ISIS but fell short in “defeating” the group altogether. Even during COIN operations, where finite goals such as defeating ISIS territorially were achieved, the infinite strategy of the group was not sufficiently considered. This led to the continued finite approach of killing ISIS leaders. As such, in June 2006, U.S. forces killed Abu Musab al-Zarqawi,<sup>12</sup> the founder of AQI. Subsequent leaders, Abu Ayyub al-Masri, and Abu Omar al-Baghdadi met the same fate in April 2010<a><sup>13</sup></a>, and on 27 October 2019, Abu Bakr al-Baghdadi was killed in Northern Syria.<sup>14</sup></p>
<p>While there should be no sympathy for dead terrorist leaders, the merit of this aspect of the finite approach is questionable when one looks at the resiliency of ISIS’s operational behavior after the death of its leaders. The decapitation approach claims to deal calamitous blows to organizations, ultimately leading to their demise by dismantling the figurehead that holds the organization together. But Audrey Kurth Cronin’s findings raise questions about this premise. Kronin found that the decapitation approach seldom works and arresting rather than killing leaders tends to be more effective in ending terrorist campaigns.<sup>15</sup></p>
<p>Kronin’s findings can certainly be demonstrated when one looks at ISIS after the death of its leaders. Despite their deaths, the killings never achieved their finite goal of dismantling or ending the terrorist group. After the death of its overall founder Zarqawi and despite heavy territorial losses in, during the U.S.-led surge in 2007, ISI<sup>16</sup> rebounded and was able to inflict extraordinary terrorist attacks throughout Iraq. From 2008–2010, the three years after the COIN operations (or Surge), over 200 people were killed per month by terrorism in Iraq.<sup>17</sup> Before and after the death of Omar Al Baghdadi, ISI assassinated over 1345 Awakening leaders according to one estimate, <sup>18</sup> and launched its infamous “Breaking the Walls” campaign where it carried out 24 bombings and eight prison breaks.<sup>19</sup> By the same extension, and since the death of Abu Bakr Al Baghdadi, ISIS has conducted approximately 285 attacks in Iraq, according to a review of the Armed Conflict Location &amp; Event Data Project (ACLED). Even after the death of its top leader and U.S. claims that it had dealt catastrophic and “final” blows to the organization, the organization mustered the necessary capabilities to continue their terror campaigns, remain relevant, and at times outdo what it had done in previous years. This resiliency demonstrates that the finite approach of targeted killings has been futile in its efforts to “defeat” terrorism.</p>
<p>The ISIS example also highlights terrorist organizations’ infinite doctrine. Part of the ability, in this case of ISIS, to continue despite the endless cycle of dead leaders is the infinite framing of its goals. While external factors helped ISIS <sup>20</sup>, the “infiniteness” of ISIS goals allowed it to turn defeats to victories as part of a longer “infinite” struggle. In the aftermath of its Iraqi territorial defeat, Abu Bakr Al Baghdadi stated,</p>
<p>“For the Mujahideen holy warriors, the scale of victory or defeat is not dependent on a city or town being stolen or subject to that who has aerial superiority, intercontinental missiles or smart bombs…… “Oh, Caliphate soldiers… trust in God’s promise and His victory… for with hardship comes relief and a way out.”<sup>21</sup></p>
<p>If one strips away the religiosity, what is evident in Baghdadi’s rhetoric is that deaths and loss of territory do not amount to detrimental finite loses, instead they represent loses as part of a predetermined plan (in this case formulated by God according to Baghdadi) that will “ultimately” lead them to victory. The “ultimately” is worthy of closer analysis. It is this word that represents the infinite mentality ingrained in groups like ISIS. Stated differently, it does not matter how much they lose, insofar as they continue their path, “they will ultimately” be rewarded. In this regard, ISIS is not seeking to achieve finite metrics or goals, they seek an almost abstract infinite goal that might never materialize. By this logic, the U.S. inability to recognize this, and continue with a finite military-led CT approach of maiming and bombing ISIS leaders, only played to what ISIS expected and was/is “comfortable” dealing with.</p>
<h3>Towards an Infinite Approach</h3>
<p>However, insufficient the finite strategy has proven to be, some argue that it has and will continue to work. They point to the lack of 9/11 like attacks, something they attribute to sustained military-led CT pressure in countries that offered haven to terrorist groups.</p>
<p>Indeed, the U.S. has not suffered 9/11-like attacks. But the role of military-led CT operations is surely overestimated while the vast changes to airport security, intelligence capabilities, international law enforcement cooperation, and other safety mechanisms, are underestimated.</p>
<p>Proponents have also not sufficiently explained why the threat of attacks, or attacks that have not materialized continue to exist. In December 2019, an al-Qaeda operative shot eleven people at a U.S. military base in Florida.<sup>22</sup> The December 2019 al-Qaeda attack is just one of many attacks since 9/11 that have been at the lower end of the extraordinary scale, failed to materialize, or were foiled before they occurred. Moreover, al-Qaeda media continues to call for attacks against the United States, including in statements from regional al-Qaeda leaders, reflecting the network’s enduring efforts to pursue or inspire attacks in the West.<sup>23</sup></p>
<p>This is to say that if the premise of the finite approach was to “defeat terrorism,” the evidence in the sheer number of intended attacks since 9/11 dismisses this. The threat is well and alive, and the finite approach has not been sufficient in quelling or even stopping it. The recent statements by the U.S. State Department’s coordinator for counterterrorism, Ambassador Nathan Sales, effectively kills any debate.</p>
<p>When asked by the BBC, “whether this war — as originally conceived by the Bush administration — about the War on Terrorism is over?” He said, “No, the fight is very much ongoing, we’re winning the fight, but we’re continuing to fight against a determined enemy, or I should say a determined group of enemies.”<sup>24</sup></p>
<p>Calls to change how the U.S. conceptualizes and fights terrorism are not new. Analysts, policymakers, and the public generally recognize that a continuation of the finite approach will prolong military-led CT operations with little or no long-term solution to the threat of terrorism. What is new, however, is the shifting tectonic plates of geopolitics. And as the U.S. foreign policy blob construes a grand strategy to answer this shift, the choice presented would be at best to leave the current CT approach intact and at worst drop CT; neither are viable options for U.S. long term security interest.</p>
<p>Despite changing geostrategic priorities, developing and implementing an infinite CT strategy is easier said than done. Terrorism is poorly understood. This leads to criminal acts being incorrectly labeled as terrorism, effectively politicizing it. For example, in late March, the U.S. Department of Justice warned that “people who intentionally spread COVID-19 could be charged with terrorism,” arguably a stretch of interpretation.<sup>25</sup> Moreover, the political clime is such that politicians look strong in supporting military-led CT policies, and weak when they do not. When coupled with the fear terrorism generates, it is easy to see why change will be difficult.</p>
<p>Notwithstanding, the time to course-correct is now. An infinite strategy emphasizes a whole-of-government approach that folds finite metrics within an infinite or abstract vision. It starts with accepting terrorism can never be completely defeated; acknowledging its relatively low threat level; and it particularly means employing all aspects of national power to combat terrorism, including diplomatic, economic, military, and others.</p>
<p>It also means using those elements of national powers towards what the research points to as most effective in ending terrorist campaigns. Research shows that terrorist groups and their terrorism campaigns most often end when they implode from within or when splinter groups challenge the main group’s narrative. They are also particularly weak during generational shifts and when non-violent alternatives are created that facilitate underlying social movement to express their political grievances.<sup>26</sup></p>
<p>As such, an infinite strategy calls for a sustained and prolonged multifaceted approach. It focuses on a strong role for the U.S. Department of State and the U.S. Agency for International Development (U.S.AID) to fund and work with marginalized groups in politically unstable countries. Their work should focus on alternative non-violent social movements. Likewise, the U.S. should increase efforts to bolster intelligence and law enforcement cooperation and create international law enforcement and intelligence task forces that are not under military purview, using military-led CT operations as complementary elements. Equally important is the need to build alternative narratives to the religious interpretations used by religious terrorist groups. An alternative narrative seeks to implode groups from within, loosening the bolts of religious interpretation these groups use to justify their actions. None of these few examples are short-term or finite, easily measured, and tangible. But this is the nature of truly fighting terrorism through an infinite strategy — the actions are not easy to measure and there are no fast wins. Instead, it’s a long, slow, and prolonged approach that will challenge groups’ infinite mentality.</p>
<p>In all, the time is now to change how the U.S fights terrorism. An infinite strategy will ensure the U.S. reduces its dependency on military-led CT operations and starts leveraging all realms of its national power to effectively suppress the threat. If the U.S does not correct course now, then its surely proximus to insanity: continuing to do the same thing, expecting different results.</p>
<hr />
<p><sup>1</sup> Arie W. Kruglanski &amp; Shira Fishman (2006) The Psychology of Terrorism: “Syndrome” Versus “Tool” Perspectives, Terrorism and Political Violence, 18:2, 193–215, DOI: 10.1080/09546550600570119 ;</p>
<p><sup>2</sup> Scholars in the Critical Studies of Terrorism field have argued that States can also and do use terrorism. I take the majority view and focus primarily on non-state actors who employ terrorism.</p>
<p><sup>3</sup> It&#8217;s been widely cited that the Sicarii were considered the first political violent group that used terrorism. See Stewart J. D’Alessio &amp; Lisa Stolzenberg in (1990) Sicarii and the Rise of Terrorism, Terrorism, 13:4–5, 329–335, DOI: 10.1080/10576109008435840; as well as Donathan Taylor, Yannick Gautron. 02 Apr 2015, Pre-Modern Terrorism from The Routledge History of Terrorism Routledge</p>
<p><sup>4</sup> See David Rapport’s <em>Four Waves of Modern Terrorism</em> (2001)</p>
<p><sup>5</sup> The original text of the AUMF authorized the U.S. military to “ that the President is authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, to prevent any future acts of international terrorism against the United States by such nations, organizations or persons.” It was always mostly focused against those responsible for 9/11 i.e. AQ. It has since been broadly interpreted to mean almost any terrorist organization.</p>
<p><sup>6</sup> The U.S. CT operations against ISIS-K and Taliban leaders are different than the NATO-led mission that emulates elements of a counterinsurgency strategy and also of other U.S.-led missions training the ISF.</p>
<p><sup>7</sup> This number includes appropriated and obligated money towards 2020. Afghanistan, which as mentioned above, has three different mission sets. While the article focuses on the CT operations, the numbers account for the COIN, and broader missions.</p>
<p><sup>8</sup> The BIJ started to collect data since 2004, and it includes a wide range of U.S military activity, not just targeted killings. See the full methodology at thebureauinvestigates.com; the numbers are estimative and cannot be independently confirmed.</p>
<p><sup>9</sup> This again accounts for coalitions that were formed to defeat ISIS when it was an insurgency from 2014–2017</p>
<p><sup>10</sup> Iranian General Qasem Soleimani was the leader of Iran’s Quds forces, considered by the U.S. to be a terrorist organization. The designation might be more political than true to what terrorist groups are. Still, the Quds forces do support groups that commit acts of terrorism in line with Iran’s foreign policy objectives.</p>
<p><sup>11</sup> ISIS is the most contemporary example, but the finite vs. infinite clash can also be demonstrated with AQ core and other terrorist groups.</p>
<p><sup>12</sup> <a href="https://www.nytimes.com/2006/06/08/world/middleeast/08cnd-iraq.html">https://www.nytimes.com/2006/06/08/world/middleeast/08cnd-iraq.html</a></p>
<p><sup>13</sup> <a href="https://www.reuters.com/article/us-iraq-violence-alqaeda/al-qaedas-two-top-iraq-leaders-killed-in-raid-idU.S.TRE63I3CL20100419">https://www.reuters.com/article/us-iraq-violence-alqaeda/al-qaedas-two-top-iraq-leaders-killed-in-raid-idU.S.TRE63I3CL20100419</a></p>
<p><sup>14</sup> <a href="https://www.whitehouse.gov/briefings-statements/statement-president-death-abu-bakr-al-baghdadi/">https://www.whitehouse.gov/briefings-statements/statement-president-death-abu-bakr-al-baghdadi/</a></p>
<p><sup>15</sup> See <em>How Terrorism Ends: Understanding the Decline and Demise of Terrorist Campaigns</em></p>
<p><sup>16</sup> AQI became ISIS in 2007.</p>
<p><sup>17</sup> See Brian H. Fishman in <em>The Master Plan: ISIS, al-Qaeda, and the Jihadi Strategy for Final Victory</em></p>
<p><sup>18</sup> This estimate is from retired LTC, Craig Whiteside, cited in # 17.</p>
<p><sup>19</sup> <a href="https://www.wilsoncenter.org/article/timeline-the-rise-spread-and-fall-the-islamic-state">https://www.wilsoncenter.org/article/timeline-the-rise-spread-and-fall-the-islamic-state</a></p>
<p><sup>20</sup> U.S invasion of Iraq in 2003, the subsequent withdrawal in 2011, etc.</p>
<p><sup>21</sup> The audio was released in August 2018 before the <a href="https://www.bbc.com/news/world-middle-east-45277322">https://www.bbc.com/news/world-middle-east-45277322</a></p>
<p><sup>22</sup> <a href="https://www.nytimes.com/2020/05/18/us/politics/justice-department-al-qaeda-florida-naval-base-shooting.html">https://www.nytimes.com/2020/05/18/us/politics/justice-department-al-qaeda-florida-naval-base-shooting.html</a></p>
<p><sup>23</sup> <a href="https://www.dni.gov/files/ODNI/documents/2019-ATA-SFR---SSCI.pdf">https://www.dni.gov/files/ODNI/documents/2019-ATA-SFR&#8212;SSCI.pdf</a></p>
<p><sup>24</sup> Frank Gardner — BBC- <a href="https://www.bbc.com/news/world-53156096">https://www.bbc.com/news/world-53156096</a></p>
<p><sup>25</sup> <a href="https://www.cnn.com/2020/03/25/politics/coronavirus-terrorism-justice-department/index.html">https://www.cnn.com/2020/03/25/politics/coronavirus-terrorism-justice-department/index.html</a></p>
<p><sup>26</sup> See Martha Crenshaw, Audrey Kurth Kronin, and others.</p>
<p><a href="https://globalsecurityreview.com/after-almost-twenty-years-americas-war-on-terror-resembles-insanity/">After Almost Twenty Years, America’s “War on Terrorism” Resembles Insanity</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Kastellorizo is the Key to Turkish &#038; Greek Ambitions in the Eastern Mediterranean</title>
		<link>https://globalsecurityreview.com/kastellorizo-key-to-turkish-greek-ambitions-eastern-mediterranean/</link>
		
		<dc:creator><![CDATA[Jack Dulgarian]]></dc:creator>
		<pubDate>Wed, 15 Jul 2020 12:50:08 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Greece]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Turkey]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=15745</guid>

					<description><![CDATA[<p>“Greece can live inside the dream world of its past… Now it is time to sit at the table for the solution of chronic problems in the Aegean.” – Retired Admiral Cem Gürdeniz via Aydinlik Recent statements by US Ambassador to Greece, Geoffrey Pyatt, support the notion that Greek islands have rights to an Exclusive [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/kastellorizo-key-to-turkish-greek-ambitions-eastern-mediterranean/">Kastellorizo is the Key to Turkish &#038; Greek Ambitions in the Eastern Mediterranean</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: center"><i>“Greece can live inside the dream world of its past… Now it is time to sit at the table for the solution of chronic problems in the Aegean.”</i> – <a href="https://uwidata.com/experts/cem-gurdeniz/">Retired Admiral Cem Gürdeniz</a> via <i><a href="https://www.aydinlik.com.tr/haber/yunanistan-ne-yapmali-205896">Aydinlik</a></i></p>
<p><a href="https://gr.usembassy.gov/amb-pyatts-comments-to-journalists-on-islands-continental-shelves/">Recent statements</a> by US Ambassador to Greece, <span style="color: #333333">Geoffrey</span> Pyatt, support the notion that Greek islands have rights to an Exclusive Economic Zone (EEZ) and continental shelf. If Greece were to act upon these claims, Greece’s held small island of Kastellorzio cuts Turkey’s EEZ claims in half. But what if Turkey enforces its claimed maritime boundaries? How would Greece, neighboring states, and the US respond?</p>
<p>The Hellenic Armed Forces (HAF) face an increasingly complex operational environment. Athens sits in an increasingly hostile region replete with irredentist neighbors, such as Turkey, and growing interest from the great powers, particularly from China and Russia. Despite common NATO membership, relations between Turkey and Greece have ebbed and flowed throughout the past 40 years, recently, intensifying over Cyprus, Aegean Sea, and Eastern Mediterranean. The transatlantic security partnership is buckling, under the weight of political nativism and the competing national interests of its member states.</p>
<p>In this new geopolitical environment, the HAF are outmatched in terms of size, military capabilities, and technology, I posit a scenario wherein Turkey decides to act on its territorial claims on the Greek islands in the Mediterranean Sea. In such a scenario, Ankara displays both the willingness and capability to carry out while a thorough examination of some of the HAF’s operational shortcomings, finally, what Athens can do to close the widening security gap with its hostile neighbors.</p>
<p>Turkey-Greece relations are arguably at their worst since 1974. In May, Greek and international media <a href="https://www.armyvoice.gr/2020/05/%ce%ad%ce%b2%cf%81%ce%bf%cf%82-%ce%ba%ce%bb%ce%b9%ce%bc%ce%ac%ce%ba%cf%89%cf%83%ce%b7-%cf%86%ce%ad%cf%81%ce%b5%cf%82/">reported</a> movement of Turkish special armed forces upon Greek sovereign territory along the Evros river, spanning the area of about 10 football fields. This followed heightened levels of <a href="https://www.youtube.com/watch?v=URZzaMAcdP8">Turkish aerial incursions</a> into Greek airspace, which in recent years have become a near-daily occurrence. <a href="http://www.mod.mil.gr/synenteyxeis-mme/synenteyxi-yetha-nikolaoy-panagiotopoyloy-sto-kentriko-deltio-eidiseon-toy-ts-0">According</a> to the Greek Ministry of Defense, Turkey has violated Greek airspace “thousands of times.”</p>
<p>Under the leadership of President Recep Tayyip Erdoğan, Turkey is demonstrating an increased willingness to use military power in pursuing its policy objectives,&nbsp; Some key examples of this are Ankara’s <a href="https://www.aljazeera.com/news/2019/10/turkey-begins-ground-offensive-northeastern-syria-191009212025006.html">invasion</a> of northern Syria and deployment of Turkish military frigates to secure <a href="http://globalsecurityreview.com/illegal-turkish-oil-drilling-cyprus-eez-threatens-destabilize-eastern-mediterranean/">illegal oil drilling</a> EEZ. President Erdoğan’s actions and rhetoric have provoked an immense backlash from many actors such as <a href="https://www.egypttoday.com/Article/2/88776/Tobruk-government-welcomes-Egypt-s-call-for-Arab-League-meeting">Egypt</a>, Israel, and Greece who have been forced to ramp up elocutions as Turkey flexes its Mediterranean reach.</p>
<p>All these events have led to today’s crucial stakes, where the HAF finds itself in an entirely new defensive situation juxtaposed to a Turkish military that increasingly uses military power to further strategic goals in the Mediterranean. Turkey’s <a href="https://www.al-monitor.com/pulse/originals/2019/12/libya-government-national-accord-turkey-russia-agreement.html">new agreement </a>with the Tripoli Government (GNA) now places aggressive claims upon Greek islands, <a href="https://www.aa.com.tr/en/politics/turkish-libyan-maritime-pact-a-game-changer-in-emed/1671447">claiming maritime boundaries</a> across the Eastern Mediterranean. These new boundaries have been condemned by the international community, despite the Tripoli Government’s recognition by the United Nations. President Erdoğan has also pushed Turkish armed forces to set up a base in Misrata, Libya, a front in the <a href="https://www.politico.eu/article/the-libyan-conflict-explained/">Libyan Civil War</a>.</p>
<p><img loading="lazy" decoding="async" src="http://globalsecurityreview.com/wp-content/uploads/2020/07/turkey-continental-shelf.png" class="alignright wp-image-15746" alt="" width="450" height="254" srcset="https://globalsecurityreview.com/wp-content/uploads/2020/07/turkey-continental-shelf.png 321w, https://globalsecurityreview.com/wp-content/uploads/2020/07/turkey-continental-shelf-300x169.png 300w" sizes="(max-width: 450px) 100vw, 450px" /></p>
<p>Greece has attempted to curtail Turkey’s rise in the Eastern Mediterranean through <a href="https://www.operationirini.eu/about-us/#mission">Operation IRINI</a> and aggressive appeals to the EU and the United States, but these have been mainly unsuccessful. Greek Prime Minister Kyriakos Mitsotakis’ direct bilateral talks with President Erdoğan also have shown no progress. In July of 2020, Prime Minister Mitsotakis&nbsp;<a href="https://www.youtube.com/watch?v=jTdoA_45jn0&#038;feature=youtu.be">openly stated</a>&nbsp;that Turkey’s new claims with the Tripoli Government are a “totally illegal memorandum of understanding” in international law.</p>
<p>Among the Turkish claims in the Eastern Mediterranean is the contentious and tiny island Kastellorizo and its smaller satellites, Ro and Stroggeli. These were granted to the Mussolini’s Italy through a <a href="http://www.hri.org/MFA/foreign/bilateral/italturc.htm">series of agreements</a> with Turkey and secured by Greece through the 1947 Treaty of Paris, a treaty that Turkey did not participate in, and thus, has never recognized Greece’s claims upon the island. The island is lightly defended by a small army base and an airstrip, and it has a population of fewer than 500 people. Still, its isolated location, far away from the major Greek islands, makes it a critical strategic location for Turkey to support its desired ambitions in the Mediterranean.</p>
<p>Over the past decade, Turkey has been increasing its amphibious war capabilities, continually improving its technologies to provide for sea-to-land invasions. One such example is the <a href="https://www.forbes.com/sites/hisutton/2020/05/13/turkeys-new-assault-carrier-will-transform-navy/#4b32050c9f1d">TCG-Anadolu,</a> which can serve as a <a href="https://mavivatan.net/hizli-cikartma-araclari-lctler/">landing vehicle</a> launched from nearby Aksaz Naval Base for Turkish <a href="https://www.youtube.com/watch?v=r87XlJw_QjU">Special Forces</a> and <a href="https://www.globalsecurity.org/military/world/europe/tu-amfibi.htm">marines</a>, who have recently gained combat experience according to unclassified reports. Under the <em><a href="https://mavivatan.net/hakkimizda/">Mavi Vatan</a></em> or “Blue Homeland” <a href="https://www.msu.edu.tr/mavivatandanacikdenizleredergisi/mavivatan_baski.pdf">grand strategy</a>, Turkey’s increased investments in the naval capabilities are a deliberate effort to expand its reach into the Aegean.</p>
<p>Greece is enforcing an EEZ in the region of Kastrellorizo that is four times its square meter area. Still, Turkey has ardently argued against this, pointing to the Turkish <a href="https://mavivatan.net/kita-sahanligi-ve-onemi/">precedent</a> against international accords, which state that islands <em>cannot</em> create EEZ’s. Weeks after the Turkey-GNA agreement, Turkish Foreign Ministry <a href="https://www.in.gr/2019/12/01/politics/diplomatia/nea-proklisi-tis-tourkias-amfisvitei-anoixta-tin-yfalokrypida-sto-kastelorizo/">affirmed this view</a>:</p>
<p>“The [Greek] islands cannot influence the coastal projection of Turkey, the country with the longest coastline in the Eastern Mediterranean and that the islands on the opposite side of the middle line between two mainland areas cannot create maritime jurisdiction beyond their territorial waters.&#8221;</p>
<h3>Notional Scenario, Phase 0: Turkey Prepares for the Operation</h3>
<p>The year is 2023. &nbsp;Due to a resurgent wave of opposition, President Erdoğan’s reelection chances are grim. His efforts to members within his own party and the crackdowns on <a href="https://stockholmcf.org/112-journalists-given-various-jail-sentences-in-turkey-in-2018/">journalists</a> have not halted his domestic adversaries. Meanwhile, the economic situation has grown worse. At the same time, the <em>Lyra </em>declines in potency, and Turkey’s GDP stagnates. <a href="https://foreignpolicy.com/2020/04/08/the-coronavirus-will-destroy-turkeys-economy/">Predictions</a> from world economists that damage from SARS-COV-2 could make the domestic economy collapse prove to be true.</p>
<p>Using the power of <a href="https://ahvalnews.com/press-freedom/turkey-remains-ranked-157-among-180-countries-press-freedom-index">domestic media</a> to his advantage, President Erdoğan disseminates anti-Greek propaganda and ramps up rhetoric about the unfair Treaty of Lausanne (the binding agreement that currently forms Greco-Turkish relations). He stokes nationalist morale against the upstart Greeks who have used their status as an EU member to pressure Turkey with its aggressive EEZ claims.</p>
<p>Inside Ankara, discussions occur that Turkey is not only capable of capturing a small, lightly-defended&nbsp; &nbsp;&nbsp;Greek island like Kastellorizo, but the West’s lack of real response to powers’ seizure of territory (i.e., Russia and Crimea, China and Hong Kong) has set a new standard of apathy towards aggression. Surely, attacking the Greek capital of Athens would create an Article V, united NATO forceful response and possible additional responses from non-NATO nations such as Serbia, an Orthodox country, and nearby Egypt and Israel. Therefore, President Erdoğan must hammer the narrative on the international stage that Kastellorizo and its near satellites are (1) unjustly in Greek hands, (2) rightfully Turkish due to an agreement with the GNA, and (3) an encroachment of the West’s right to claim lands within non-Western nation-states.</p>
<h3>Notional Scenario, Phase 1: “Checkmate”</h3>
<p>Ankara&#8217;s tactical checkmate will rely on speed to get Athens to surrender its holdings on Kastellorizo in order to protect its small civilian population. The Turkish Air Force uses their classic antagonistic air tactics to create a diversion in the northern Aegean with fighter jets out of Balikesir Air Base. From naval ports near Marmaris, Turkey administers a naval blockade cutting off the potential for Greek authorities to intervene without shooting first.</p>
<p><figure id="attachment_15747" aria-describedby="caption-attachment-15747" style="width: 550px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" src="http://globalsecurityreview.com/wp-content/uploads/2020/07/checkmate-plan.png" class="wp-image-15747" alt="" width="550" height="262" srcset="https://globalsecurityreview.com/wp-content/uploads/2020/07/checkmate-plan.png 468w, https://globalsecurityreview.com/wp-content/uploads/2020/07/checkmate-plan-300x143.png 300w" sizes="(max-width: 550px) 100vw, 550px" /><figcaption id="caption-attachment-15747" class="wp-caption-text">The “checkmate” plan with notable naval bases.</figcaption></figure></p>
<p>The Turkish Armed Forces could use their superior firepower and special forces to attack the island of Kastellorizo within hours. Still, it is more likely Turkey will opt not to use force and instead encircle it in a hostage maneuver.</p>
<p>Athens is aware that the Turkish infantry is highly experienced due to recent campaigns in Syria and Libya. The Greeks could not risk a devastating loss if they fight for Kastellorizo, while an attack elsewhere on Turkey could jeopardize other Greek islands such as Rhodes, Lesvos, Chos, and Chios. Greece’s underfunded military could not last in such a considerable conflict that encompasses the entire Aegean. Therefore, Turkey’s “checkmate” tactic is accomplished without a single weapon being fired.</p>
<h3>Notional Scenario, Phase 2: Diplomatic Unrest</h3>
<p>Athens attempts to invoke NATO Article V, but member states are divided as the conflict is between two “allies.” Specifically, Germany, an unofficial foreman in EU-Turkey dialogues on the Syrian Refugee Crisis, would likely call for Turkish appeasement as President Erdoğan continues to press the threat of unleashing new immigration rhetorically.</p>
<p>Meanwhile, in Washington, D.C., the U.S. would be forced into an awkward position of taking another stance in the Aegean Dispute. Although U.S. Ambassador Pyatt’s <a href="https://gr.usembassy.gov/amb-pyatts-comments-to-journalists-on-islands-continental-shelves/">recent statements</a> supported the notion of Greek EEZ’s on islands (thereby rejecting the Turkish view), American <a href="https://www.dur.ac.uk/ibru/publications/download/?id=84">rhetoric</a> in the 1996 Imia/Kardak dispute would likely follow the same precedent of <em>status quo ante</em>. The U.S. is non-party to <a href="https://www.un.org/Depts/los/convention_agreements/texts/unclos/unclos_e.pdf">UNCLOS</a>, the standard that created EEZ’s; therefore, the U.S. would have no choice but to side against Greece’s claim on Kastellorizo.</p>
<p>Outside of the NATO alliance, new allies to Athens, Egypt, and Israel would not be in a position to respond due to the sheer speed of the Turkish Armed Forces. Aggressive hostility and possible drills would occur, yet neither states would make any drastic attempts to assist with force.</p>
<h3>Notional Scenario, Phase 3: A Renegotiation of Lausanne</h3>
<p>While maintaining a blockade on Kastellorizo and her satellites, President Erdoğan calls Athens to the table. The 1923 borders are at stake. States friendly to Turkey, such as Azerbaijan, Pakistan, and Qatar, now recognize Kastellorizo as Turkish sovereign territory. Meanwhile, Turkish media proclaims President Erdoğan to be a hero for reclaiming so-called lost territory. His approval ratings skyrocket, ensuring a more extended claim on authority for years to come.</p>
<p>As an ongoing standoff in the Aegean continues, the western press loses interest. EU and NATO members such as France and Poland may spark pro-Greek rhetoric while outsiders such as Serbia call for attention, yet Greece will remain alone in negotiations. Depending on the situation, Turkey would call for (1) the end of Greece’s use of EEZs on offshore islands, such as Kastellorizo, Chios, Chos, and Lesvos, and (2) the recognition of its occupied portion of Cyprus as the independent Turkish Republic of Northern Cyprus.</p>
<h3>How Can Greece Improve Readiness?</h3>
<p>The HAF lacks two critical qualities that can be remedied: a quick reaction force (QRF) that can respond to a Turkish attack on its islands and sufficient deterrent capabilities to forestall a Turkish invasion. Although the HAF has special operations troops, including the noteworthy <em><a href="https://www.tactical-life.com/firearms/greek-raiders/">Raider Forces</a></em>, they are too small to defend a 400 mile (643 km) coastline of islands in the Aegean.</p>
<p>Policymakers in Athens and HAF command should look to Israel as examples of a nation with a pristine QRF that can respond to any threat immediately. Although the two are not exactly similar in size, the Greek government could ask the Israeli Defense Forces (IDF) for development and assisted training of a QRF in exchange for Israeli use of its airspace for its training purposes. The QRF would be amphibious, highly mobile, and able to deploy within hours from designated locations on strategic Greek islands, such as but not limited to Kastellorizo, Rhodes, Crete, Lesvos, Chios, Limnos, or Samos. This new group of HAF volunteers or conscripts who have opted for the assignment can be deployed by sea or rotary-wing aircraft.</p>
<p>To challenge a naval blockade and amphibious assault on Kastellorizo, Greece could purchase the Israeli <em><a href="https://missilethreat.csis.org/missile/gabriel/">Gabriel</a></em> anti-ship missile system, which is capable of deployment from the island and its satellites. Variants of the <em>Gabriel </em>have already been exported to nations with similar defense budgets (by fiscal dollars, not per GDP) such as <a href="https://www.globalfirepower.com/countries-comparison-detail.asp?form=form&#038;country1=greece&#038;country2=argentina&#038;Submit=COMPARE">Argentina</a>, <a href="https://www.globalfirepower.com/countries-comparison-detail.asp?form=form&#038;country1=greece&#038;country2=chile&#038;Submit=COMPARE">Chile</a>, and <a href="https://www.globalfirepower.com/countries-comparison-detail.asp?form=form&#038;country1=greece&#038;country2=south-africa&#038;Submit=COMPARE">South Africa</a>.</p>
<p>Greece also needs more assistance on the possible threat of Turkish warships entering its waters. Perhaps <a href="https://nationalinterest.org/blog/buzz/how-sink-battleship-why-sea-mines-can-sink-any-navy-war-80246">the oldest and cheapest</a> way to do so is through sea mines. The <a href="http://www.aiad.it/aiad_res/cms/documents/MN103MANTA.pdf">MANTA</a>, an Italian shallow water sea mine, has a proven <a href="https://news.usni.org/2012/07/17/iranian-mines-strait-hormuz-not-showstoppers">record of success</a> against multi-billion dollar ships and is cost-effective for the underfunded Greeks.</p>
<p>Athens can also strengthen its relationship with the U.S. diplomatically, financially, and militarily. After the entrance of China into the European community, Prime Minister Mitsotakis can pivot to Silicon Valley and U.S.-based military companies by proclaiming his country to be the most technologically ambitious nation in Southern Europe. He would use the Huawei-U.S. technology competition to bargain a financial deal on technology and communications improvements designed to watch over the Aegean. Military industry contractors looking for procurement deals with the Pentagon could be encouraged to make agreements in efforts to test new technology, including 5G, for the benefit of the HAF.</p>
<p><figure id="attachment_15749" aria-describedby="caption-attachment-15749" style="width: 800px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" src="http://globalsecurityreview.com/wp-content/uploads/2020/07/7204539614_2e5edf99b8_c.jpg" class="size-full wp-image-15749" alt="" width="800" height="532" srcset="https://globalsecurityreview.com/wp-content/uploads/2020/07/7204539614_2e5edf99b8_c.jpg 800w, https://globalsecurityreview.com/wp-content/uploads/2020/07/7204539614_2e5edf99b8_c-300x200.jpg 300w, https://globalsecurityreview.com/wp-content/uploads/2020/07/7204539614_2e5edf99b8_c-768x511.jpg 768w" sizes="(max-width: 800px) 100vw, 800px" /><figcaption id="caption-attachment-15749" class="wp-caption-text">A U.S. Navy training exercise at Souda Bay, Crete (U.S. Navy photo by Mass Communication Specialist 1st Class Brian A. Goyak)</figcaption></figure></p>
<p>Finally, Greece has a valuable port in Souda Bay, Crete, in which the NATO Maritime Interdiction Operational Training Center [<a href="https://www.cnic.navy.mil/regions/cnreurafcent/installations/nsa_souda_bay.html">NMIOTC</a>] <a href="https://twitter.com/USSOCOM/status/1283005293136187393/photo/1">trains</a> allied operators (as seen above) for modern combat. Greece should leverage the base for a long-term deal with Washington to affirm the U.S.’s geostrategic interests in the region. As Russia now operates freely from warm Syrian waters, Libya continues its civil war, and anti-Western terrorist groups maneuver in Africa and the near east, the port is irreplaceable for the U.S. Prime Minister Mitsotakis, although contradictory to his persona, could ramp up rhetoric against the U.S. much in the same way that <a href="https://www.wsj.com/articles/summit-looms-for-a-strained-nato-alliance-1531080102?mod=hp_lead_pos1">President Trump</a> did with NATO, asking for extra spending. Mitsotakis could follow suit and use Trump’s tactic for Greece’s benefit.</p>
<h3>Conclusion</h3>
<p>Turkey can quickly seize Kastellorizo and her satellites without repercussions. Claims to the islands, unchallenged military defense, an unstable domestic economy, a robust military, and apathy from Western powers on the global stage are all significant factors that can push President Erdoğan into this operation.</p>
<p>Taking Kastellorizo could also be a final play by Turkish grand strategists to get Greece to renegotiate the defining principles of the 1923 Treaty of Lausanne, which resulted in a Greek EEZ in the Aegean and Turkey ceding Cyprus (an agreement that Turkey has already broken). If Greece remains unprepared, it will lose territory, Turkey will gain a stronger foothold in quasi-internationally recognized Greek waters, NATO will remain submissive to an ally gone rogue, and Erdoğan will emerge as the dominant player in Eastern Europe and the Middle East.</p>
<p><a href="https://globalsecurityreview.com/kastellorizo-key-to-turkish-greek-ambitions-eastern-mediterranean/">Kastellorizo is the Key to Turkish &#038; Greek Ambitions in the Eastern Mediterranean</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>COVID-19 &#038; Global Cybersecurity: Urgent Action is Needed</title>
		<link>https://globalsecurityreview.com/covid-19-global-cybersecurity-urgent-action-is-needed/</link>
		
		<dc:creator><![CDATA[Leo S.F.  Lin]]></dc:creator>
		<pubDate>Mon, 13 Jul 2020 21:16:03 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=15741</guid>

					<description><![CDATA[<p>COVID-19 has impacted our lives in many aspects; one of them is the emerging trend in cybersecurity threats on a global scale. Many governments have reported an increase in cyber threats since the outbreak of the COVID-19. Just recently, the Federal Bureau of Investigation (FBI) and the Department of Justice (DoJ) have recently warned that [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/covid-19-global-cybersecurity-urgent-action-is-needed/">COVID-19 &#038; Global Cybersecurity: Urgent Action is Needed</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>COVID-19 has impacted our lives in many aspects; one of them is the emerging trend in cybersecurity threats on a global scale. Many governments have reported an increase in cyber threats since the outbreak of the COVID-19. Just recently, the Federal Bureau of Investigation (FBI) and the Department of Justice (DoJ) have recently warned that the <a href="https://www.fbi.gov/coronavirus">coronavirus-related cyber threat</a> is growing and a massive spike in hackers and scammers using the COVID-19 crisis is targeting Americans for financial or informational gain. For example, the FBI&#8217;s Internet Crime Complaint Center (IC3) has received at least <a href="https://thehill.com/policy/cybersecurity/504389-fbi-sees-major-spike-in-coronavirus-related-cyber-threats">20,000 coronavirus-related cyber threat reports</a> this year; it is between <a href="https://thehill.com/policy/cybersecurity/493198-fbi-sees-spike-in-cyber-crime-reports-during-coronavirus-pandemic">3,000 and 4,000</a> complaints per day. The European Union (EU) officials have already stated that the EU cybersecurity<a href="https://www.euronews.com/2020/03/24/covid-19-eu-cybersecurity-at-risk-from-hackers"> &#8220;at risk from hackers</a>&#8221; and asks for joint actions with the Members States and other stakeholders to improve cybersecurity capabilities.</p>
<p>At the international level, top <a href="https://www.hindustantimes.com/world-news/600-increase-in-malicious-emails-amid-covid-19-crisis-un-official/story-YAcXHHIuDsxQ7l5KaIerEJ.html">United Nations officials </a>have warned that &#8220;cybercrime is also on the rise, with a 600 percent increase in malicious emails during the current crisis.&#8221; The United Nations (UN) officials described the COVID-19-related cyber threats as an <a href="https://www.un.org/en/un-coronavirus-communications-team/un-tackling-%E2%80%98infodemic%E2%80%99-misinformation-and-cybercrime-covid-19">&#8220;infodemic&#8221; of misinformation.</a> It is a situation where people received misinformation, disinformation, and rumors during a health emergency.  Cybercriminals have been conducting attempted ransomware attacks in which their<a href="https://www.forbes.com/sites/daveywinder/2020/03/22/healthcare-workers-targeted-by-dangerous-new-windows-ransomware-campaign-using-coronavirus-as-bait/#4c1beda62212"> phishing and ransomware campaigns</a> are using the coronavirus pandemic to actively target healthcare workers. The International Criminal Police Organization (<a href="https://www.interpol.int/en/How-we-work/COVID-19">INTERPOL) </a>also sees an increase in counterfeit medical products, fraud, and cybercrime. Cybercriminals would disguise themselves as the World Health Organization (WHO) to conduct scams or to steal personal and sensitive information.</p>
<p>One direct and obvious factor contributing to the rise of cyber threats is the drastic increase of internet users &#8211; from students, teachers, government workers, to private-sector employees and politicians. After the shutdown of schools and many governmental and non-government sectors, all face-to-face meetings were transferred into online platforms. The Internet has become the primary tool for many people to conduct their works. The amount of time that people spend on the Internet increased, exposing themselves to the risks of cyberthreats. Private-sector data revealed <a href="https://www.forbes.com/sites/jessedamiani/2020/03/26/google-data-reveals-350-surge-in-phishing-websites-during-coronavirus-pandemic/#45842c1819d5">a 350% surge in phishing websites since the start of the pandemic</a>.</p>
<p>Another factor is the inadequate cybersecurity education to raise public awareness in many countries, including the United States. With the sudden change of people&#8217;s online-using habits before and after the outbreak of the COVID-19, people (old and young) have not yet realized that they could be in danger online &#8211; even staying at home. This is not a new problem. For example, <a href="https://www.securitymagazine.com/articles/90748-healthcare-employees-lack-cybersecurity-education-and-awareness">one article</a> pointed out that employees of healthcare organizations in North America lack cybersecurity education and awareness in three main areas: regulation, policy, and training.</p>
<p>With the increasing number of internet users in the event of COVID-19, there are three areas that we need to take immediate action. First, one of the most vulnerable groups during COVID-19 is school-aged children. Most of the school children had to used e-learning in the past spring semester and now have entered their summer vacation, and it is difficult to have a comprehensive study about how much time they spend in front of the &#8220;screens.&#8221; The amount of time they use electronic devices has drastically increased. Since they could not quickly distinguish between the real and virtual worlds, there has been an immediate risk of falling prey to cybercriminals.</p>
<p>The second area is the protection of information and finance for enterprises and workers. The world&#8217;s dependence on information and telecommunication technologies is unprecedented. The Business Email Compromise (BEC) is on the rise, especially during the pandemic, and there is much work to be done. The growth of digital dependency in the workforce worldwide has increased the vulnerability to companies and their employees.</p>
<p>The third area is the cybersecurity infrastructure in many developing countries are not strong enough. According to the <a href="https://www.financialexpress.com/world-news/top-un-official-warns-malicious-emails-on-rise-in-pandemic/1968351/">International Telecommunication Union</a>, nearly 90 countries are still only at the early stages of making commitments to cybersecurity.&#8221; It relies on multi-national efforts to assist those countries, including adjusting national legal and regulatory frameworks in the cyberspace and unifying cybersecurity awareness campaigns, despite it is challenging to conduct on-site capacity building during this situation.</p>
<p>As the COVID-19 pandemic continues to change our way of life, it is a daunting alarm that people are exposing more to the increasing cybersecurity threats while not having enough awareness and education. For the private sector, the improvement of data management, IT security, and employee education are critical to prevent cyber hacking and BECs. We need to push governments to work more with private sectors and international partners toward feasible and effective campaigns.</p>
<p>The worst-case scenario is that the governments are more concerned about the economy than the increasing level of cybersecurity threats.  Whether governments and companies learn security lessons from the COVID-19 pandemic remains to be seen.</p>
<p><a href="https://globalsecurityreview.com/covid-19-global-cybersecurity-urgent-action-is-needed/">COVID-19 &#038; Global Cybersecurity: Urgent Action is Needed</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Social Media&#8217;s Role in Disaster Preparedness &#038; Crisis Management</title>
		<link>https://globalsecurityreview.com/critical-role-social-media-intelligence-defense-law-enforcement-preparedness/</link>
		
		<dc:creator><![CDATA[Mohamed ELDoh]]></dc:creator>
		<pubDate>Thu, 02 Apr 2020 15:47:03 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[International Security]]></category>
		<category><![CDATA[Public Health]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=14879</guid>

					<description><![CDATA[<p>There were over 4.5 billion active internet users around the world as of January 2020—roughly 60 percent of the global population. In an average month, over 3 billion are active on social media platforms. This scale means individuals can disseminate an unprecedented amount of information more efficiently than ever. On Facebook alone, more than 300 [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/critical-role-social-media-intelligence-defense-law-enforcement-preparedness/">Social Media&#8217;s Role in Disaster Preparedness &#038; Crisis Management</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There were over 4.5 billion active internet users around the world as of January <a href="https://www.statista.com/statistics/617136/digital-population-worldwide/">2020</a>—roughly 60 percent of the global population. In an average month, over 3 billion are <a href="https://wearesocial.com/blog/2018/01/global-digital-report-2018">active</a> on social media platforms. This scale means individuals can disseminate an unprecedented amount of information more efficiently than ever. On Facebook alone, <a href="https://www.omnicoreagency.com/facebook-statistics/">more</a> than 300 million photos are uploaded each day—while every 60 seconds, <a href="https://zephoria.com/top-15-valuable-facebook-statistics/">approximately</a> 510,000 comments and 293,000 status updates are posted. On Twitter, an <a href="https://www.dsayce.com/social-media/tweets-day/">average</a> of 350,000 tweets are sent per minute—equivalent to 500 million each day, or 200 billion per year.</p>
<p>The decentralization of the ability to disseminate information at scale poses a challenge in the event of national and global security threats and incidents like terrorism, instability in post-conflict states, natural disasters, and public health crises, such as the pandemic we are currently experiencing. In all the examples above, without exception, individuals use social media to share opinions, news, photos, and videos of the incident and its aftermath. First responders and the relevant authorities—whether defense, intelligence, national security, law enforcement, and public health agencies—require accurate information in real-time, and can use social media as a tool for such information to assist in planning and response.</p>
<p>While social media is already widely used by law enforcement and national security agencies as to gather and disseminate information, this author argues there is an essential need to advance the use of social media in the public sector as a source of real-time information to enhance situational awareness, crisis preparedness, and disaster response efforts.</p>
<p>Social media is already utilized in counter-terrorism, criminal investigations, threat forecasting, and information operations. However, social networks can be even further harnessed by public sector agencies as a continuous, real-time source of intelligence, if leveraged appropriately, particularly given that improvements in technology applications mean that any individual with a basic camera-equipped smartphone can serve as a source of on-the-ground information at the epicenter of a significant incident.</p>
<p>Many would argue that continuous, in-depth analysis of social media content infringes on civil liberties and is invasive to the privacy of individuals, yet such an argument exposes a double standard relating to the use of information on social networks by public sector agencies. Many social media users share content publicly, therefore, analysis of publicly-available social media content by public sector agencies wouldn&#8217;t be a violation of user privacy. In the Intelligence Community, the use of social networks as a source of intelligence falls into the OSINT (Open Source Intelligence) category.</p>
<p>Regardless, whether used by law enforcement, defense agencies, the intelligence community, or the general public, social media is an immeasurably powerful tool for reaching and connecting people at scale. Relevant social media content and &#8220;hashtags&#8221; trend around the globe within minutes of a crisis event—such as an act of terrorism, political violence, a natural disaster, or a public health emergency—particularly when an incident rapidly escalates and is unpredictable in nature.</p>
<p>It&#8217;s therefore critical that defense, intelligence, and law enforcement agencies, as well as first responders, maintain and have access to continuous monitoring of social media trends as they develop in real-time. In high priority incidents, individuals on the scene are likely to share photographs, videos, and text updates—information of great value in a crisis. Intelligence gathered from real-time analysis of social networks would include, but not be limited to, preliminary assessments of the situation&#8217;s complexity and the response required, as well as forecasting future consequences that could arise.</p>
<p>Citizen journalism and &#8220;whistleblowing&#8221; over social media can also serve as a critical indicator and a warning sign of worsening situations. A recent example of this was Dr. Li Wenliang, the Chinese doctor who issued a <a href="https://www.bbc.com/news/world-asia-china-51364382">warning</a> in a message shared on the Chinese social media platform Weibo on December 30th, 2019 about a “strange new virus,” which is now a pandemic impacting nearly <a href="https://coronavirus.jhu.edu/map.html">every</a> country in some way. In hindsight, had his post been viewed by intelligence agencies as an early warning sign, many states may have taken stricter measures earlier on to limit the impact of <a href="https://www.cdc.gov/coronavirus/2019-nCoV/index.html">COVID-19</a>.</p>
<p>In addition to systematic social media monitoring, automated text, and sentiment analysis of publicly shared user posts can provide crucial insights into the attitude of the general public and reactions towards an incident. This would further help first responders and security authorities when communicating with the public in an emergency, such as implementing enhanced security screening, border closures, and evacuations. Moreover, automated analysis of social media posts would assist first responders in their response factoring to avoid contributing to a public panic.</p>
<p>Social media in a crisis is a double-edged sword. As a crisis takes hold, a state&#8217;s adversaries are likely to take advantage of the situation and unleash a barrage of online disinformation and propaganda through social media channels in an attempt to foment public unrest. Such campaigns, usually initiated with a political agenda in mind to use the general public as unwitting proxy actors, present an additional challenge that further emphasizes the importance of maintaining continuous, real-time monitoring of publicly available user-generated social media content. Such a capability would effectively reinforce the efforts of first responders on-the-ground, and allow for public sector authorities to better mitigate the consequences of malicious disinformation campaigns.</p>
<p>Furthermore, continuous monitoring of social media platforms by a state&#8217;s security agencies enables those agencies to anticipate and counter unintentional misinformation. The spread of inaccurate rumors may have an adverse impact on public safety, a possible reason for the Director-General of the World Health Organization (WHO), Tedros Ghrebreysus, <a href="https://theconversation.com/covid19-social-media-both-a-blessing-and-a-curse-during-coronavirus-pandemic-133596">advocated</a> for urgent measures to be taken to mitigate the fallout from the coronavirus &#8220;infodemic.&#8221;</p>
<p><a href="https://globalsecurityreview.com/critical-role-social-media-intelligence-defense-law-enforcement-preparedness/">Social Media&#8217;s Role in Disaster Preparedness &#038; Crisis Management</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Post-Soleimani, Iran is a Major Cyber Threat to the U.S., Europe, and the Middle East</title>
		<link>https://globalsecurityreview.com/iran-cyber-threat-us-eu-middle-east/</link>
		
		<dc:creator><![CDATA[Mohamed ELDoh]]></dc:creator>
		<pubDate>Fri, 31 Jan 2020 20:44:15 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=14082</guid>

					<description><![CDATA[<p>An overview of recent public unrest in Iran and the elimination of Qasem Soleimani Civil unrest in Iran has been mounting for the past several months. Sparked by an increase in fuel prices on November 15, 2019, demonstrations grew into nationwide anti-government protests. The regime’s response to protestors was brutally violent. The United Nations reported [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/iran-cyber-threat-us-eu-middle-east/">Post-Soleimani, Iran is a Major Cyber Threat to the U.S., Europe, and the Middle East</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>An overview of recent public unrest in Iran and the elimination of Qasem Soleimani</h2>
<p>Civil unrest in Iran has been mounting for the past several months. Sparked by an increase in <a href="https://www.vox.com/world/2019/11/25/20980775/iran-protests-gas-prices">fuel</a> prices on November 15, 2019, demonstrations grew into nationwide anti-government protests. The regime’s response to protestors was brutally violent. The United Nations <a href="https://edition.cnn.com/2019/12/06/middleeast/iran-un-protest-deaths-intl/index.html">reported</a> that at least 208 people were killed, including 12 children.</p>
<p>Additionally, at least 7,000 protesters have been arrested. Amidst the crackdown, the Iranian government cut off <a href="https://www.washingtonpost.com/outlook/2019/12/09/iran-cutting-off-its-internet-wasnt-show-strength-it-was-sign-panic/">internet</a> access for almost a week, probably in an attempt to prevent the global dissemination of information and videos of the civilian protests and (or) the human rights abuse by the government. This may indicate the degree to which the Iranian government was in a panic by deciding to shut down the internet and its access for its people. However, with complete disregard for its own economic slowdown, the head of Iran&#8217;s Islamic Revolutionary Guard Corps <a href="https://apnews.com/06745859562d490aac26c5fe22f0d9a2">threatened</a> the U.S. and its allies, including Middle Eastern nations, while addressing a demonstration denouncing the anti-government protests that took place in November 2019. However, anti-government protests were further <a href="https://edition.cnn.com/2020/01/13/world/iran-protest-analysis-intl/index.html">gained further traction</a> after Iran shot down “mistakenly” a Ukrainian passenger jet, killing <a href="https://edition.cnn.com/2020/01/10/middleeast/iran-plane-crash-intl-hnk/index.html">all</a> on board.</p>
<p>In general, setting aside the Islamic Republic’s nuclear ambitions, the Iranian threat have always been present to the U.S., EU and, the majority of Arab Middle Eastern states, especially with the Iranian involvement and <a href="https://en.wikipedia.org/wiki/Iran%E2%80%93Saudi_Arabia_proxy_conflict">proxy</a> roles that it orchestrated in Syria, Yemen, Lebanon, and Iraq. However, amid the civil unrest that Iran experienced recently, the Iranian threat has been getting more imminent. The recent U.S. targeted operation that eliminated General <a href="https://www.haaretz.com/middle-east-news/.premium-who-is-qasem-soleimani-the-head-of-iran-s-quds-force-that-attacked-israel-1.6075565">Qasem</a> Soleimani and Abu Mahdi al-Muhandis can be viewed as a strategic countermeasure to the rising Iranian threat or as a deterrence against further Iranian aggression. Soleimani was <a href="https://www.cnbc.com/2020/01/03/who-was-iranian-general-qasem-soleimani-and-why-his-killing-matters.html">considered</a> to be Iran’s most powerful military general and was the leading commander of the Quds force, the Islamic Revolutionary Guard Corps (IRGC) unit responsible for extraterritorial operations.</p>
<p>The IRGC actively supports non-state actors and militia groups in several countries. This includes Shiite militias in Iraq and Syria, Houthis in Yemen, Hamas, and Palestinian Islamic Jihad groups in Gaza Strip and the West Bank, as well as the Lebanese Hezbollah. It is worth to indicate that mos oft—if not all—the groups above are designated as terror groups internationally. Generally speaking, Soleimani spearheaded the Iranian clandestine operations in the Middle East. On the other hand, the Iraqi-Iranian Jamal Jaafar Ibrahimi (a.k.a Abu Mahdi al-Muhandis) was the leader of the Iranian sponsored Shiite militia group “Kata’eb Hezbollah” operating from Iraq as well as “al Hashd al Shaabi”. <a href="https://www.counterextremism.com/extremists/jamal-jaafar-ibrahimi-aka-abu-mahdi-al-mohandes">Al- Muhandis</a> is believed to have played a key role in smuggling armaments to his militias in Iraq from Iran.</p>
<p>Though debatable in terms of the extent of the strike’s impact, the elimination of such two key figures that lead the Iranian influence in the region is definitely a strategic win for the U.S. and its allies, especially Middle Eastern partners that see Iran as a direct threat. In a similar vein, the former commander of U.S. Central Command and CIA director retired General David Petraeus <a href="https://foreignpolicy.com/2020/01/03/petraeus-on-qassem-suleimani-killing-says-trump-helped-reestablish-deterrence/">stated</a> that the killing of Soleimani is more significant than the killing of Bin Laden or ISIS leader Abu Bakr al-Baghdadi. Yet, many would argue that Iran would aggressively <a href="https://time.com/5758750/iran-us-qasem-soleimani/">retaliate</a> and that risks may outweigh the potential rewards of killing Soleimani as indicated in an <a href="https://www.msnbc.com/rachel-maddow/watch/rice-risks-likely-outweigh-benefits-of-killing-qassem-soleimani-76039749935">interview</a> with former UN ambassador and former U.S national security advisor, Susan Rice. Already after only a few hours of the U.S. operation that eliminated Soleimani, Iran’s supreme leader Ali Khamenei <a href="https://www.haaretz.com/middle-east-news/iran/.premium-iran-s-crushing-revenge-may-prove-formidable-challenge-for-soleimani-s-successor-1.8351650">announced</a> a  successor to Soleimani, Esmail Ghaani promising a “crushing revenge”.</p>
<p>Furthermore, Iranian President Hassan Rouhani <a href="https://www.nbcnews.com/news/world/iran-vows-revenge-harsh-retaliation-after-u-s-kills-its-n1109856">tweeted</a> that Iran will take revenge. Though such reaction would be probably anticipated for prior to the conduction of a high level operation that eliminated Soleimani and while arguments are developing on <a href="https://www.nbcnews.com/news/world/iran-s-options-retaliation-against-u-s-americans-span-globe-n1109966">how</a> Iran may retaliate against the U.S. and its allies, <a href="https://www.bloomberg.com/news/articles/2020-01-03/as-iran-seeks-to-avenge-slain-general-its-options-look-narrow">some</a> strategists believe that Iran cannot risk an “all-out” war and that the options Iran have for revenge appears to be narrow. The latter is also in-line with Gen. Petraeus <a href="https://foreignpolicy.com/2020/01/03/petraeus-on-qassem-suleimani-killing-says-trump-helped-reestablish-deterrence/">view</a> that Iran’s “very fragile” situation may limit its response. However, <a href="https://www.theguardian.com/world/2020/jan/07/trump-iran-suleimani-threats-retaliation">targeting</a> Erbil base in northern Iraq and Ain al-Asad airbase in the province of Anbar with ballistic missile strikes, Iran did militarily retaliate against U.S. forces in Iraq on 8<sup>th</sup> of January 2020. However, no fatalities were reported, which might further confirm Iran’s weak status of its conventional military capabilities as well as assumptions that Iran cannot risk full-scale conflict, given its fragile economy and military. Despite Iran&#8217;s shortcomings, it is <a href="https://edition.cnn.com/2020/01/08/middleeast/iran-base-strikes-logic-intl/index.html">possible</a> that the Iranian missile strikes might have been intended only to provide a false sense of security to the U.S. and its allies that Iran’s military is in a weak position, while actually Iran may be planning an asymmetrical response,  which it has long <a href="https://www.brookings.edu/blog/order-from-chaos/2020/01/10/irans-next-move/">history</a> of doing.</p>
<p>In any case and in preparation to possible confrontation scenarios, the U.S., EU and Middle Eastern allies should definitely step up their intelligence cooperation collectively in order to counter and mitigate any asymmetrical warfare risks posed by Iran’s military, paramilitary groups and militias. Especially militias which are used as a proxy actors by Iran in Syria, Iraq, Yemen, and Afghanistan. Such collective transnational intelligence cooperation would certainly support the U.S. and its allies intelligence, law enforcement, and military agencies to mitigate potential risks and eliminate any potential threat on an international, regional, and domestics scale. Such potential risks from Iran can have diverse forms. These includes but not limited to:</p>
<ol>
<li>Risks for the shipping and oil industry across the Strait of Hormuz, especially considering that almost 21% of the global petroleum shipments <a href="https://www.eia.gov/todayinenergy/detail.php?id=39932">flow</a> through this region. That said, Iran already has <a href="https://www.thenational.ae/world/mena/iran-seizes-another-vessel-in-strait-of-hormuz-1.910968">history</a> of harassing shipping vessels and oil tankers passing by Hormuz Strait. That said, it is expected that western and GCC militaries would increase its navy presence in the area to ensure the safety of transiting ships. In this respect, we can already see that the U.K. is deploying navy ships to <a href="https://www.theguardian.com/uk-news/2020/jan/04/royal-navy-vessels-sent-to-protect-shipping-in-strait-of-hormuz">protect</a> ships passing through the Hormuz Strait as announced in a <a href="https://www.thenational.ae/world/uk-defence-secretary-sends-warships-to-patrol-the-strait-of-hormuz-to-protect-citizens-1.959805">statement</a> by the U.K. defense minister Ben Wallace.</li>
</ol>
<ol start="2">
<li>Iraq’s civilian and political unrest, due to the fact that almost 66% of the Iraqi population are Shiite Muslims whom probably might sympathize more towards Iran, where Shiite Muslims comprise 90 percent of the population. That said, violent reactions may take place between Shiite militias in Iraq and organizations and businesses associated originating from the U.S. and allied nations. Therefore, the economic situation of Iraq might get worse as a result of western companies evacuating from Iraq fearing an increase in escalation.</li>
</ol>
<ol start="3">
<li>The possible resurgence of ISIL/ISIS (a Sunni Muslim group) in Iraq as a result of the political instability and the western military vacuum Iraq may face. Furthermore, ISIS may possible attempt to use the opportunity to rebrand themselves as actors against the Iranian interests in Iraq. Additionally, the Iraqi armed forces alone might not be able to counter such feared resurgence which would then have serious negative implications on regional neighboring countries especially that we can already see that the NATO <a href="https://www.militarytimes.com/news/your-military/2020/01/04/nato-suspends-training-iraqi-soldiers-over-security-concerns/">suspended</a> its training of Iraqi soldiers over security concerns. Similar action was <a href="https://www.stripes.com/news/middle-east/us-suspends-training-mission-in-iraq-heightens-security-at-bases-1.613515">taken</a> by the U.S. as well amid the recent Iran tensions. This might create an additional challenging front of countering the ISIL/ISIS resurgence threat in Iraq.</li>
</ol>
<ol start="4">
<li>Exposure of the western companies to security risks in countries where Iran have a control of militias. These include Iraq, Yemen, Syria, and Southern Lebanon.</li>
</ol>
<ol start="5">
<li>Iran’s breach or deviation from the Joint Comprehensive Plan of Action 2015 agreement (JCPOA), or as more publicly known, the “Nuclear Deal”. Such action by Iran can be possibly viewed as a  measure to exert pressure on the EU in order to compel the latter to influence the U.S. to return to the negotiations table. In fact, Iran’s President Rouhani <a href="https://edition.cnn.com/2020/01/16/middleeast/rouhani-iran-uranium-enrichment-intl/index.html">announced</a> that the country is enriching more uranium than it was before the 2015 JCPOA agreement. Recently, the U.K., France, and Germany <a href="https://www.theguardian.com/world/2020/jan/14/european-states-trigger-dispute-mechanism-iran-nuclear-deal">triggered</a> the dispute mechanism that can lead to sanctions on Iran by the United Nations in response to Iran’s violation of the agreement. While unlikely, given Iran&#8217;s willingness to violate limits on <a href="https://www.businessinsider.com/how-close-is-iran-to-producing-a-nuclear-bomb-2020-1#how-close-is-iran-to-having-a-bomb-now-2">uranium</a> enrichment and utilize advanced centrifuges, the Islamic Republic could—theoretically, should it decide to enrich weapons-grade uranium—be on track to posess a nuclear bomb in less than twelve months.</li>
</ol>
<ol start="6">
<li>The risk of regional war as a result of the escalation and retaliation scenarios that Iran might adopt including the <a href="https://www.vox.com/world/2020/1/16/21069361/iran-nuclear-uranium-enrichment-rouhani-trump">recent</a> irresponsible behavior of the JCPOA violation which is neither acceptable to the regional nor international community.</li>
</ol>
<p>Though all the above mentioned risks are so far hypothetical and experts believe that Iran’s retaliation options are <a href="https://www.theguardian.com/commentisfree/2020/jan/05/soleimani-death-huge-blow-to-iran-plans-for-regional-domination">limited</a> to its usual pattern of asymmetrical warfare and proxy confrontations. Yet, a clearly critical Iranian threat that is most probably a more imminent threat due to its nature of having a much broader attack surface than a physical conventional threat is the cyberthreat. Cyberwarfare is typically asymmetrical, and confrontation in cyberspace can provide its perpetrators a degree of plausible deniability and possible anonymity while at the same time inflicting severe cyber-damage upon its victim. Furthermore, cyber-attacks can easily be global in nature and negatively impacting millions of citizens worldwide.</p>
<p>Over the past decade, Iran have been categorized as one of the most malicious internet <a href="https://www.politico.eu/article/irans-retaliation-could-be-hacking-not-bombs/">actors</a> with an increasing level of sophisticated cyber weapons, which can be a multiplying power in asymmetrical warfare. That said, Iran has a rich history with regards to its illicit hacking and cybercriminal groups <a href="https://www.wired.com/story/iran-apt33-industrial-control-systems/">targeting</a> critical infrastructures and industrial control systems globally. These groups include APT33, APT39, Charming Kitten, Cleaver, Copykittens, Group5, Leafminer, Magic Hound, MuddyWater, and OilRig. Most of these groups have a history of targeting governments globally as well as private sector industries. Each of these previously mentioned Iranian linked <a href="https://attack.mitre.org/groups/">groups</a> have their own identified tactics and techniques. Given the history of attacks of these groups, especially those with a widescale <a href="https://www.cnbc.com/2016/03/24/us-charges-iranians-with-cyber-attacks-on-banks-and-dam.html">sabotage</a> and destruction motive, we can clearly state that after the recent events, the Iranian cyberthreat level can be equally high to governments (including military infrastructures) as well as private sector industries. Thus, if any organization is part of a critical function or a strategically important sector, then it is crucial to immediately reassess its cyber defenses against the methods leveraged by Iranian linked groups.</p>
<p>Furthermore, many of these groups primarily utilizes large scale phishing campaigns as well as targeted spear-phishing as their entry mode to the targeted victim. Accordingly, it is essential that organizations raise the cyber awareness and vigilance level of their employees in an attempt to minimize human error when countering a possible cyber threat over the coming months in wake of the likely reaction scenarios that Iran may adopt. Additionally, cyber intelligence analysts should increasingly monitor any potential cyber-attack disguises where Iranian hacking groups might utilize the hacking tools utilized by their Russian or Chinese peers in a possible attempt to enlarge the cyber confrontation and involve other notorious hacking groups of different <a href="https://www.ft.com/content/b947b46a-f342-11e9-a79c-bc9acae3b654">origins</a>.</p>
<p>Finally, while warnings and alerts are <a href="https://www.tripwire.com/state-of-security/security-data-protection/cisa-irans-cyber-threat-review-cyber-security-posture/">already</a> elevated concerning the current Iranian cyberthreat, it is possible from a strategic security perspective and deception doctrine that Iran may be only luring the U.S. and its allies into believing that it will not, not does it intend to engage in any impactful cyber operations. In actuality, the Islamic Republic might be only waiting for the right moment to launch a sophisticated campaign of cyber-attacks. Thus, a cybersecurity-centric culture should be embedded and embraced at all levels of any organization to manage and mitigate the risk of <a href="https://www.infosecurity-magazine.com/next-gen-infosec/geopolitical-threats-business-1-1/">geopolitical cyber threats</a> .</p>
<p><a href="https://globalsecurityreview.com/iran-cyber-threat-us-eu-middle-east/">Post-Soleimani, Iran is a Major Cyber Threat to the U.S., Europe, and the Middle East</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Nuclear Damage Limitation in an Era of Great Power Competition</title>
		<link>https://globalsecurityreview.com/nuclear-damage-limitation-great-power-competition/</link>
		
		<dc:creator><![CDATA[Richard Purcell]]></dc:creator>
		<pubDate>Thu, 23 Jan 2020 22:54:14 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=13952</guid>

					<description><![CDATA[<p>Editor&#8217;s note: This is the second piece in a two-part series examining the role of damage limitation strategy in U.S. nuclear war planning. Read part one here. With the apparent reemergence of great power competition in recent years, the possibility of military conflict with a nuclear-armed adversary has rekindled old debates about the role that [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/nuclear-damage-limitation-great-power-competition/">Nuclear Damage Limitation in an Era of Great Power Competition</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Editor&#8217;s note: This is the second piece in a two-part series examining the role of damage limitation strategy in U.S. nuclear war planning. <a href="http://globalsecurityreview.com/history-damage-limitation-us-nuclear-war-planning/">Read part one here</a>.</em></p>
<p>With the apparent reemergence of great power competition in recent years, the possibility of military conflict with a nuclear-armed adversary has rekindled old debates about the role that damage limitation should play in U.S. nuclear planning.</p>
<p>Nuclear damage limitation involves reducing the U.S.’s vulnerability to an adversary’s nuclear weapons.  It is a warfighting capability intended to enable the United States to prevail in a nuclear conflict, should one arise.  There are a number of ways to achieve damage limitation, but most discussions of this topic focus on two in particular: neutralizing an adversary’s nuclear missiles before they can be fired, generally known as counterforce, and intercepting incoming missiles after they have been launched but before they reach their targets.</p>
<p>Current American policy states that damage limiting capabilities are an important component of the nation’s overall strategic posture.  The most recent U.S. <a href="https://media.defense.gov/2018/Feb/02/2001872886/-1/-1/1/2018-NUCLEAR-POSTURE-REVIEW-FINAL-REPORT.PDF">Nuclear Posture Review</a>, released in February 2018, asserts that if U.S. strategic forces fail to deter an enemy attack, the U.S. “will strive to end any conflict at the lowest level of damage possible and on the best achievable terms for the United States, allies, and partners.  U.S. nuclear policy for decades has consistently included this objective of limiting damage if deterrence fails.”  It adds that “U.S. missile defense and offensive options provide the basis for significant damage limitation” in the event of a nuclear conflict.</p>
<p>The Pentagon’s <a href="https://media.defense.gov/2019/Jan/17/2002080666/-1/-1/1/2019-MISSILE-DEFENSE-REVIEW.PDF">Missile Defense Review</a>, issued in January 2019, echoes this approach.  It affirms that in the event of a conflict, the United States would seek “to prevent and defeat adversary missile attacks through a combination of deterrence, active and passive missile defenses, and attack operations to destroy offensive missiles prior to launch.”</p>
<p>These official assertions are a far cry from the long-held conventional wisdom among U.S. civilian leaders that, as Ronald Reagan once put it, “a nuclear war cannot be won and must never be fought.”  Maintaining some damage-limitation capabilities, as the United States has always done, is sensible in that it provides U.S. policymakers with flexibility in the event of a nuclear crisis.  However, emphasizing damage limitation as a primary element of U.S. strategic posture carries considerable risk.  Damage limiting capabilities may seem like prudent investments in self-protection by a nation that adopts them, but rival nuclear powers tend to see them as threatening and provocative.  While such capabilities do have the potential to reduce the costs of a nuclear war, they also increase the likelihood that one will occur.</p>
<p>There are two main arguments in favor of emphasizing damage limitation.  The most obvious is that it enhances the U.S.’s ability to defend itself and its allies if a nuclear war happens.  Damage limitation proponents believe that since there is always a possibility that nuclear deterrence will fail, it would be irresponsible for the United States to forego nuclear warfighting capabilities.  They contend that if a conflict were to arise, damage limiting options would be necessary to minimize a nuclear-armed opponent’s ability to impose unacceptable costs on the United States.</p>
<p>The second argument for damage limitation is that it enhances extended deterrence by strengthening the credibility of U.S. security commitments to its allies overseas.  These commitments, which are intended both to deter aggression by hostile actors and reassure American allies of U.S. support, may seem uncertain if the attacking nation possesses nuclear weapons.  Other countries, both friends and foes, might reasonably question whether the United States could be counted on to intervene on an ally’s behalf if its adversary had the ability to destroy American cities.</p>
<p>Nuclear-armed opponents would not need to have a nuclear arsenal as powerful as that of the United States to deter American military intervention.  They would only need the ability to credibly threaten to inflict more costs on the United States than Washington would be willing to bear.  Crisis outcomes often turn on the question of which side possesses greater resolve.  Superior resolve corresponds to greater acceptance of risk, and in a crisis or conflict, the side that is more risk-tolerant has a significant advantage.  It can credibly threaten to escalate—or, if need be, actually escalate—to a point where the danger of an unacceptable outcome for the opposing side exceeds its willingness to contest the first side’s actions.</p>
<p>Advocates for emphasizing damage limitation see it as a way to compensate for a perceived lack of American resolve.  Any U.S. confrontation with a nuclear-armed adversary would take place far from American shores.  The adversary, being much closer to the scene, would likely believe that it cared more about the confrontation’s outcome than the U.S., and it might well be correct in making such an assessment.  (For instance, it is generally recognized that in the event of a crisis or conflict over Taiwan, the outcome would matter much more to China than it would to the U.S.)  As a result, the adversary might be more willing to take escalatory actions that risked a nuclear exchange than would the U.S., giving it an advantage in any brinkmanship contest.</p>
<p>According to damage limitation proponents, this advantage would be negated if the United States possessed sufficiently effective damage limiting capabilities.  Such capabilities would reduce the costs the U.S. could expect to incur if a nuclear conflict did happen and would, therefore, weaken a hostile nuclear power’s ability to deter the U.S. from intervening on behalf of an ally.  If U.S. allies and potential enemies both believed that the United States could substantially reduce its nuclear vulnerability, then the credibility of U.S. extended deterrence would be greatly enhanced—or so goes the thinking.</p>
<p>One of the specific ways the U.S. has sought to use damage limitation to strengthen extended deterrence is by deploying a variety of missile defense systems.  Some of these systems are likely more effective than others.  The conventional wisdom is that the longer the range of the inbound missile, the more difficult it is to shoot down.  U.S. continental missile defenses have demonstrated a fifty percent success rate in testing over the last decade, but the tests have been highly scripted and have not simulated actual wartime conditions.  In addition, the system relies on an array of radars and other sensors located in space and on the ground that would be vulnerable to attack.</p>
<p>It’s unclear what perceptions in Washington and foreign capitals would be regarding the effectiveness of U.S. strategic defenses if push came to shove.  It does seem fair to say that for the foreseeable future, the system will be unable to provide anything approaching “leakproof” protection to the U.S. homeland against even a modest-sized nuclear attack.  As a result, nuclear plans that emphasize damage limitation require extensive capabilities for neutralizing an opponent’s weapons before they can be employed.</p>
<p>There is significant debate within the national security community about the potency of U.S. counterforce capabilities.  Current U.S. nuclear delivery systems are generally accurate enough to destroy an adversary’s nuclear forces if their locations can be determined.  However, North Korea, Russia, and China all possess mobile, land-based missiles which could be difficult to find, particularly during a crisis when they would likely be dispersed and concealed in order to increase their survivability.  In order to execute an effective counterforce attack, the U.S. would also need to overcome an enemy’s efforts to disrupt the U.S.’s ability to locate, track, and destroy the correct targets in a timely manner.  Nonetheless, some modern observers contend that U.S. intelligence, reconnaissance, and surveillance capabilities have become so advanced that launching a <a href="https://www.tandfonline.com/doi/pdf/10.1080/01402390.2014.958150">disarming first strike</a> against an opponent is a realistic option.</p>
<p>The main problem with emphasizing damage limitation in U.S. nuclear war planning is that it undermines stability and risks making nuclear war more likely.  While it is theoretically true that damage limitation options may enhance stability by strengthening deterrence, this assumes that a crisis or conflict would necessarily occur as a result of large-scale aggression by an adversary.  It further assumes that potential U.S. opponents see nuclear weapons primarily as tools for coercion or aggression.  Many American observers fail to appreciate the fact that hostile regimes genuinely fear the United States.</p>
<p>While the U.S. views China, Russia, and North Korea as potential aggressors, these nations likewise view the United States as a serious threat.  The latter two appear to view it as an existential one.  In all three cases, the primary purpose of their nuclear forces is to deter a U.S. nuclear attack and, in the cases of North Korea and <a href="http://globalsecurityreview.com/nuclear-de-escalation-russias-deterrence-strategy/">Russia</a>, a conventional one as well.  Failing that, they could utilize their nuclear arsenals to either deny the U.S. the ability to achieve its objectives or impose sufficiently high costs on it that it feels compelled to cease its military operations.</p>
<p>This is not to deny that nations like North Korea, China, and Russia have revisionist aims.  Rather, it is to point out that belligerent actions on their part would likely stem from more than just a sudden desire for conquest or expansion.  A crisis or conflict could arise because of an accident, misunderstanding, or because a low-level confrontation led to unanticipated escalation (for instance, the United States and North Korea nearly came to blows in August 1976 over the removal of a <a href="https://www.theatlantic.com/international/archive/2018/06/axe-murder-north-korea-1976/562028/">poplar tree</a> in the Korean Demilitarized Zone).  Under such circumstances, an adversary could make undesirable decisions that are motivated less by greed or conquest than by fear of U.S. intentions.  While American damage limiting capabilities might be useful for deterring the former, they can also contribute to the latter.</p>
<p>In the context of an international security crisis between two nuclear powers, the concept of stability pertains to the likelihood of nuclear escalation.  Crisis stability is high when neither side has an incentive to initiate the use of nuclear weapons against its opponent.  Typically, this condition is met when both sides possess a significant number of nuclear weapons that can survive an opponent’s first strike and be used for retaliation.  Thus, when the state of affairs is characterized by mutual deterrence, stability is enhanced.</p>
<p>Crisis <em>instability</em> is high when one or both sides possess capabilities that allow them to threaten the opponent’s ability to retaliate.  In a period of heightened tensions, the risk of war would already be significantly higher than during normal peacetime conditions.  If the chances of war seemed high enough, each side would likely perceive there to be advantages in engaging in nuclear first use and disadvantages in not doing so, even if there were significant asymmetries between the two sides’ arsenals.  The side with larger nuclear forces would have an incentive to mount a counterforce first strike before its opponent could employ its nuclear weapons. The side with the smaller arsenal would be incentivized to go nuclear early, before any of its nuclear forces could be destroyed.  In this way, U.S. emphasis of counterforce in its nuclear planning would greatly undermine stability during a crisis, something that is highly undesirable.</p>
<p>U.S. strategic missile defenses would also exacerbate crisis instability.  Most knowledgeable observers believe that these systems would only be partially effective at best.  The smaller the inbound attack, the more effective they would be.  In a security crisis in which the likelihood of nuclear conflict seemed high, this situation would further incentivize striking first.  A counterforce first strike by the U.S. would reduce the number of missiles the adversary could launch against U.S. targets, making the task of American missile defenses more manageable.  The adversary, in turn, would have an incentive to launch its missiles before that could happen, knowing that a larger first strike against the United States would have a better chance of overwhelming U.S. defenses than would a smaller retaliatory one.</p>
<p>The Missile Defense Review is fairly clear that it envisions U.S. counterforce strikes occurring <em>after</em> an adversary engages in first use.  This is consistent with the U.S. claim that the primary purpose of its nuclear arsenal is to deter nuclear attacks against it and its allies.  However, the United States also publicly reserves the right to initiate the use of nuclear weapons if it believes circumstances warrant it.  American counterforce options could easily be employed in a first strike backstopped by U.S. missile defenses, and potential adversaries may well conclude that they are intended for this purpose.</p>
<p>If the goal is to limit nuclear damage, a U.S. counterforce attack would make much more sense as a first strike rather than as an act of retaliation.  It’s unclear what circumstances would prompt the U.S. to take such action.  In the early stages of an emergent security crisis, the risk of nuclear escalation would seem low.  This would reduce the impetus for a U.S. first strike, since no rational American leader would want to start a nuclear war that could be avoided.  At the same time, the effectiveness of a U.S. counterforce attack would likely be higher near the beginning of a crisis than it would be later on, since the adversary would almost certainly take steps to improve its arsenal’s survivability as the crisis intensified.  This would incentivize an early U.S. preemptive strike, especially since American leaders would know that the opponent might resort to nuclear escalation anyway even if the U.S. initially exercised restraint.</p>
<p>The effectiveness of U.S. damage limiting capabilities in a shooting war would be highly uncertain.  Conflicts rarely unfold in ways that conform to pre-war expectations, new weapons do not always work as anticipated, and the fog of war can never be completely eliminated.  A nuclear counterforce attack has never been attempted in human history, and no missile defense system has ever been used in action against a large-scale missile attack.  These considerations alone should raise questions about the wisdom of emphasizing damage limitation in U.S. nuclear planning.</p>
<p>This uncertainty about the effectiveness of U.S. damage limitation capabilities creates the worst of all possible worlds.  In a crisis or conventional conflict, the possibility that the United States could launch a disarming first strike would incentivize first use by the adversary, as described above.  However, recognition on all sides that no damage limitation system could ever be 100 percent effective would limit damage limitation’s contribution to extended deterrence because Washington would likely view the risk of just one American city being destroyed as intolerable.</p>
<p>Deemphasizing damage limitation in U.S. nuclear war planning would enhance crisis stability without undermining extended deterrence.  Global perceptions about the strength of U.S. security commitments are informed by a number of factors, including U.S. policy declarations, conventional military power, the strength of its alliances, and its ability to respond in kind to an adversary’s first use.  It’s worth noting that even though the Soviet Union was capable of inflicting enormous devastation on the United States during the Cold War, Washington was still able to deter Moscow from attacking vital American interests, despite the fact that the U.S. possessed only a modest damage limiting capability.</p>
<p>Fears that a hostile nation might view its ability to launch nuclear attacks against the U.S. homeland as a license to engage in aggression are also not supported by historical evidence.  The last 75 years have demonstrated that nuclear weapons are not terribly useful for achieving offensive aims that seek to alter the status quo.  They are, on the other hand, extremely useful in deterring an adversary from engaging in first use.  Even if the United States altered its strategic posture to deemphasize damage limitation, its nuclear arsenal would still constitute a potent deterrent to any nation contemplating nuclear escalation.  As a result, an adversary of the United States would be unlikely to initiate the use of nuclear weapons unless it believed it had no other choice.</p>
<p>Fundamentally, the debate over whether or not U.S. nuclear policy should emphasize damage limitation is between those who believe the United States should possess the ability to win a nuclear war and those who prioritize the stability of mutual deterrence.  This is an argument that dates back to the 1960s when the Soviet Union first began to approach nuclear parity with the United States.  Many nuclear experts hold views that lie somewhere between these two perspectives.</p>
<p>The truest believers in damage limitation tend to be individuals who hold hawkish views about U.S. foreign policy in general, and they have been influential under the Trump administration in setting U.S. nuclear policies.  They see damage limitation as a trump card that can negate an opponent’s ability to deter the United States with nuclear weapons. It will never be possible to fully eliminate U.S. vulnerability to nuclear attack, and efforts to enhance the U.S.’s ability to fight and win a nuclear war only serve to make such a conflict more probable. Avoiding that outcome should be the overriding goal of U.S. nuclear planning.</p>
<p><a href="https://globalsecurityreview.com/nuclear-damage-limitation-great-power-competition/">Nuclear Damage Limitation in an Era of Great Power Competition</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A History of Damage Limitation in U.S. Nuclear War Planning</title>
		<link>https://globalsecurityreview.com/history-damage-limitation-us-nuclear-war-planning/</link>
		
		<dc:creator><![CDATA[Richard Purcell]]></dc:creator>
		<pubDate>Wed, 22 Jan 2020 22:07:56 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=13937</guid>

					<description><![CDATA[<p>The concept of nuclear damage limitation dates back to the early 1960s.  Robert McNamara, Secretary of Defense during the Kennedy and Johnson administrations, described it as “the ability to reduce the weight of the enemy attack by both offensive and defensive measures and to provide protection for our population against the effects of nuclear detonations.”  [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/history-damage-limitation-us-nuclear-war-planning/">A History of Damage Limitation in U.S. Nuclear War Planning</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The concept of nuclear damage limitation dates back to the early 1960s.  Robert McNamara, Secretary of Defense during the Kennedy and Johnson administrations, described it as “the ability to reduce the weight of the enemy attack by both offensive and defensive measures and to provide protection for our population against the effects of nuclear detonations.”  In both internal documents and public statements, he asserted that the primary objective of U.S. strategic forces was to deter a nuclear attack on the United States and its allies.  If they failed to achieve that objective, however, and nuclear war did occur, their <a href="https://history.state.gov/historicaldocuments/frus1964-68v10/d103">second goal</a> would be to “limit damage to our population and industrial capacity.”</p>
<p>Then, as now, damage limitation could take many forms, including counterforce attacks on an opponent’s nuclear arsenal, ballistic missile defense, air defenses against enemy bombers, anti-submarine warfare, and civil defense.  Air defense was emphasized by U.S. planners during the 1950s and early 1960s, but it fell by the wayside once it became clear that Moscow intended to rely primarily on missiles to deliver its strategic nuclear weapons.  The U.S. Navy possessed (and likely still possesses) a potent ability to hunt and destroy enemy ballistic missile submarines, but the bulk of the USSR’s strategic forces resided in its fleet of land-based ICBMs.  Not long after taking office, the Kennedy administration launched a campaign to invigorate U.S. civil defense programs. However, the initiative fizzled due to a lack of public support.  As a result, most discussions of damage limitation during the Cold War focused on counterforce and missile defense.</p>
<p>Deterring a Soviet nuclear attack required the U.S. to have enough survivable weapons to inflict an “unacceptable” amount of damage on the USSR in a retaliatory strike.  It was presumed that Moscow, too, sought to ensure that it possessed such a capability. The possession of an assured destruction capability by each side helped ensure nuclear stability, thereby reducing the likelihood of war.  Each superpower was deterred from attacking the other by the knowledge that its opponent could launch a devastating counterattack.  Thus, U.S. policymakers viewed maintaining the nation’s nuclear deterrent as paramount.</p>
<p>At the same time, there was a widespread view in Washington that the U.S. should also possess some ability to limit damage to itself in case deterrence failed.  This was an understandable desire since relying solely on deterrence left the United States vulnerable to a Soviet attack.  No one could guarantee that deterrence would always prevail since it ultimately depended on a potential adversary’s state of mind.</p>
<p>The question of what role damage limitation should play in U.S. nuclear planning and the form it should take was—and still is—the subject of considerable debate within the national security community.  Some policymakers prioritized it more than others during the Cold War.  However, because the U.S. strategic arsenal always could strike an opponent’s nuclear forces, there has never been a time over the last seven decades when the United States has not had some damage limiting capability, even if public officials have not always referred to it as such.</p>
<p>Yet damage limitation turned out to be a very complicated concept.  One issue stemmed from the realization that no damage limitation system could be 100 percent effective.  If a strategic nuclear conflict with the USSR arose, a certain number of Soviet bombs would inevitably reach U.S. soil no matter what.  The resulting death toll would likely number in the tens of millions.</p>
<p>Such a scenario raised a difficult question for policymakers: How much damage limitation capability should the U.S. seek?  If a given U.S. damage limiting capability were sufficient to limit U.S. fatalities in an all-out war to, say, 80 million, would it make sense to pay the high costs associated with enhancing that capability further to reduce the expected death toll to 50 million?  For those who viewed nuclear war as a real possibility, and who therefore believed that the U.S. should possess the ability to win if one occurred, saving 30 million Americans seemed like a worthwhile goal no matter what the cost.</p>
<p>To those who viewed nuclear war as unthinkable, and who therefore rejected nuclear warfighting as a concept, enhancing U.S. damage limiting capabilities seemed pointless since it did little to strengthen the country’s nuclear credibility.  In a crisis in which critical U.S. interests were at stake, would a U.S. president really feel freer to act to protect those interests if he knew that “only” 50 million American lives were at risk rather than 80 million?  Would the Soviets actually be more deterred if that were the case?</p>
<p>The two primary forms of damage limitation available to the United States during the Cold War, counterforce and missile defense, each presented their own set of challenges.  The ability of the U.S. to use its strategic offensive forces to limit damage to the American homeland depended on its ability to destroy Soviet nuclear weapons before they could be launched.  If the Soviets were able to attack first, U.S. missiles and bombers would be unable to limit the initial damage.</p>
<p>A damage-limiting counterforce strike by the U.S. would, therefore, be vastly more effective if the U.S. struck first.  However, launching a first strike meant initiating strategic nuclear war, the very thing that U.S. nuclear forces were ostensibly intended to prevent.  Indeed, U.S. declaratory policy in the later years of the Cold War seemed to rule out this option.  The Pentagon’s 1983 <a href="https://history.defense.gov/Portals/70/Documents/annual_reports/1984_DoD_AR.pdf?ver=2014-06-24-151113-310">annual report</a> to Congress stated that U.S. strategy “excludes the possibility that the United States would initiate a war or launch a pre-emptive strike against the forces or territories of other nations.”</p>
<p>If the U.S. was attacked first, it could launch a retaliatory counterforce attack.  The conventional wisdom was that if the Soviets did launch a first strike, they would likely do so with only a part of their arsenal, keeping many of their strategic weapons in reserve.  If so, the U.S. could hit the residual Soviet nuclear forces in a second strike in an attempt to reduce any further damage that could be inflicted on the United States.  This option, however, would hardly be straightforward.</p>
<p>If the Soviet first strike were a counterforce attack, it would leave the U.S. with a diminished ability to retaliate against hardened targets (such as ICBM silos).  If it were a counter value strike against American cities, U.S. strategic forces would remain intact, but damage to the United States in terms of casualties and economic destruction would be enormous.  The U.S. president would then have to decide whether to retaliate against Soviet cities or the USSR’s remaining strategic arsenal.</p>
<p>The possibility of achieving damage limitation through anti-ballistic missile (ABM) defense also received a great deal of attention during the Cold War, just as it does today.  Unlike counterforce, it offered a way to actively defend the U.S. homeland from a Soviet attack after it had been launched.  Nevertheless, missile defense had its downsides.  For one, many strategic planners had severe doubts as to how well such a system would work.  It was generally recognized that even an elaborate missile defense system could only be partially effective against a major Soviet attack.  Moreover, the tracking radars needed to guide ABM interceptors to their targets would themselves be vulnerable to a Soviet attack.  If the Soviets were able to destroy U.S. radar installations in advance of the main attack on the United States, the ABM system would be crippled.</p>
<p>Additionally, developing and deploying a missile defense system was a costly proposition.  A 1965 Pentagon study determined that a system capable of protecting 75 percent of the U.S. population in an all-out nuclear war would cost $35 billion, or more than two-thirds of the defense budget at the time.  Furthermore, even if such a system were able to protect three-quarters of the U.S. population in an all-out nuclear war, American fatalities would number close to 50 million.  Opponents of missile defense also pointed out that the USSR would almost certainly respond to a U.S. ABM deployment by expanding the size of its strategic arsenal or by implementing relatively inexpensive countermeasures such as equipping its existing ICBMs with decoy warheads or <u>multiple independently targetable reentry vehicles (MIRVs)</u>.</p>
<p>The most compelling argument against emphasizing damage limitation in nuclear planning was that it made war more likely. As noted, each side possessed enough survivable nuclear weapons that it would be able to inflict great devastation on its adversary in retaliation for a first strike.  Under normal peacetime conditions, both the U.S. and the Soviet Union had the option of either starting a nuclear war by launching a “bolt-from-the-blue” surprise attack on its opponent or maintaining the status quo.  However, even if the attacking country believed that launching a sudden first strike would enable it to emerge from the conflict stronger than its adversary, the opposing state’s assured destruction capability would ensure that the attacking state suffered catastrophic damage, leaving it worse off than before the war.  Inaction would, therefore, be the wiser choice.</p>
<p>That calculus could easily change in a crisis, however.  During a period of acute tension in which both sides possessed a significant damage-limiting counterforce capability, each nation would have some incentive to strike preemptively to limit the amount of damage that could be inflicted on it.  The risk that one side would act preemptively under such circumstances would correspond to the perceived likelihood of war.  If nuclear war seemed inevitable—or even highly likely—the apparent choice for each side would then be between launching a preemptive attack that would destroy a large number of its opponent’s strategic forces, thereby limiting (but not eliminating) the adversary’s ability to inflict harm on the attacking state, or permitting the opponent to act first and do the same thing.</p>
<p>Furthermore, worst-case assumptions could lead to a negative feedback loop, further undermining crisis stability.  The U.S., for instance, would be aware that the Soviet leadership might believe that Soviet fatalities could be dramatically reduced by launching a first strike against the United States. Soviet leadership would know that the U.S. was aware of the Soviet leadership’s belief that a first strike would significantly reduce Soviet fatalities. The U.S, in turn, would then know that the Soviet Union knew that the United States was aware that the Soviets could launch a first strike to reduce its fatalities. In this way, decision making in a nuclear crisis would resemble a hall of mirrors.  A war could easily occur under such circumstances even if both sides preferred to avoid one.</p>
<p>In a hypothetical crisis, worst-case scenario thinking could lead one side or the other to believe that a first strike by the opposing side was imminent and launch a pre-emptive counter-force first strike, under the impression, correctly or not, that it was acting in self-defense to preempt action by a perceived aggressor. In this scenario, both sides could perceive themselves to be the defending state while casting the opposing state as the aggressor.</p>
<p>The possession of an ABM system by one side and not the other would further contribute to crisis instability.  Ballistic missile defenses are fundamentally defensive, but defensive weapons can be made to serve offensive purposes.  Then-U.S. President Ronald Reagan, arguably history’s most ardent proponent of missile defense, acknowledged as much during his March 1983 speech unveiling his <a href="https://www.reaganlibrary.gov/research/speeches/32383d">Strategic Defense Initiative</a>.  He noted that “if paired with offensive systems, [missile defenses] can be viewed as fostering an aggressive policy, and no one wants that.”</p>
<p>Had the U.S. deployed a missile defense system that was perceived by both sides as being partially effective, and had the Soviets lacked any comparable system of their own, each side would have been presented with an added incentive to strike first during a period of heightened tension.  The Soviets’ incentive would stem from their knowledge that if they launched a major counterforce first strike against the United States, they could likely overwhelm U.S. missile defenses and destroy some portion of the U.S. strategic arsenal, thereby limiting the amount of damage they would experience from an American attack.  The U.S. would be incentivized to launch a counterforce first strike by the knowledge that its ABM system could significantly reduce the effectiveness of a diminished Soviet retaliatory attack.  Again, each side would be aware of the incentive facing its opponent.</p>
<p>In the end, of course, the nuclear war that everyone feared during the Cold War never took place.  Both the U.S. and the Soviet Union maintained arsenals that featured significant counterforce capabilities, but neither superpower ever developed an ability to carry out a completely disarming first strike against the other.  Similarly, both the United States and the Soviet Union engaged in extensive research into missile defense technologies, but neither nation ever came close to deploying a major ABM system.</p>
<p>After the Soviet Union dissolved, the U.S. and Russia implemented dramatic reductions in their nuclear arsenals.  The two nations developed a relatively friendly relationship over the next two decades, the threat of nuclear conflict receded, and debates over nuclear deterrence and nuclear warfighting were supplanted by other topics such as international peacekeeping, ethnic cleansing, and counterterrorism that seemed more relevant to the post-Cold War world.  Now, almost thirty years later, the United States finds itself facing three potential adversaries—Russia, China, and North Korea—armed with nuclear weapons and a fourth, Iran, which many fear will develop a nuclear capability at some point in the future.</p>
<p><em>Editor&#8217;s note: This is the first piece in a two-part series examining the role of damage limitation strategy in U.S. nuclear war planning. <a href="http://globalsecurityreview.com/nuclear-damage-limitation-great-power-competition/">Read part two here</a>.</em></p>
<p><a href="https://globalsecurityreview.com/history-damage-limitation-us-nuclear-war-planning/">A History of Damage Limitation in U.S. Nuclear War Planning</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Climate Security is National Security</title>
		<link>https://globalsecurityreview.com/climate-security-is-national-security/</link>
		
		<dc:creator><![CDATA[Joanna Rozpedowski]]></dc:creator>
		<pubDate>Thu, 12 Dec 2019 15:34:30 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=13381</guid>

					<description><![CDATA[<p>Between 2008-2012 over 144 million people were displaced by a sudden onset of disasters in more than 122 countries, a number far higher than the number of refugees and internally displaced by conflict and persecution during the same period.  Unpredictable climate-related calamities and the associated socio-economic costs test our current legal frameworks and put significant [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/climate-security-is-national-security/">Climate Security is National Security</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Between 2008-2012 over 144 million people were displaced by a sudden onset of disasters in more than 122 countries, a number far higher than the number of refugees and internally displaced by conflict and persecution during the same period.  Unpredictable climate-related calamities and the associated socio-economic costs test our current legal frameworks and put significant stress on existing capacities of states.</p>
<p>Internal government reviews, climate and security conferences, and domestic security reports have increasingly focused on the strategic challenges posed by global climate change. The proliferation of studies suggests that &#8216;the projected climate change is a threat multiplier in already fragile regions, exacerbating conditions that lead to failed states — the breeding ground for extremism and terrorism.&#8217; An overlapping consensus among scholars and policymakers holds that climate-induced crises in the next two to three decades have the potential of aggravating already brittle relations between Sub-Saharan African, the Middle Eastern, and South and Southeast Asian states, destabilizing regions, toppling governments and issuing in mass migrations, widespread pandemics, and food scarcity.</p>
<p>The University of Toronto&#8217;s Project on Environment, Population, and Security forecasts that environmental change will significantly stress or reduce the supply of vital natural resources, such as freshwater, cropland, forests, fisheries, leading to environmental scarcity and increased probability of conflict. The United Nations Climate Reports have consistently predicted that increased occurrence of droughts, rising sea levels, and flooding will pose significant challenges to national stability, exacerbating global economic vulnerabilities and political instabilities, which may result in internal civil and political unrest. Similarly, a quantitative study conducted by the State Failure Task Force assembled at the request of U.S. policymakers to identify factors associated with serious internal crises, concluded that massive environmental damage provoked by general patterns of global climate change could directly contribute to political collapse and destabilization. Analyses conducted by the North Atlantic Treaty Organization and the Swiss Peace Institute have echoed those concerns.</p>
<p>Despite the Trump administration’s hesitations about comprehensive multilateral climate treaty, six years into the new millennium, The United States Department of Defense in its 2006 <em>Quadrennial Defense Review (QDR)</em> identified climate change as a serious threat to America’s national security. The ‘irregular, disruptive, traditional, and catastrophic challenges are surfacing as a result of global climate change … with disastrous consequences’, the report reads, requiring blending of ‘the sustainability tenets of environmental security, ecological economics, and social/environmental equity with the pillars of democratic peace theory’ with a purpose of ‘avoiding the unmanageable and managing the unavoidable.’  Identifying global climate change as an asymmetric strategic and security challenge, the Department of Defense, fearful of the potential disruptions to its operational and tactical capabilities, deemed the creation of a tangible ‘roadmap to victory’ over its climatic superior, an indispensable tool in America’s military arsenal. The report also recognized that the ‘chaotic climate system’ will bring about much uncertainty, necessitating conventional and unconventional responses, encouraging ‘innovation, agility and adaptability, collaboration and partnership’ in the interest of protecting the nation’s security. Such an endeavor, the DoD recognized, will require dynamic and continuous change and reassessment of strategies that will inform the building of networks of global communication, cooperation, and intelligence gathering.</p>
<p>Recognizing the compounded risks associated with the destabilizing effects of climate change, in 2009, the United States Central Intelligence Agency (CIA) launched the Center on Climate Change and National Security with a mandate to oversee the national security impact of phenomena such as desertification, rising sea levels, population shifts, and heightened competition for resources and provide American policymakers with information and analysis on the effects climate change will have on security. In their subsequent Quadrennial Defense Reviews, the Pentagon planners included climate change among national security threats.</p>
<p>A close nexus between climate change and security presents a paramount geopolitical challenge to governments and their agencies. For one, security implications resulting from global climate change, and environmental degradation, as well as the scarcity of renewable resources, are closely related to intra- and inter-state conflicts leading to a pronounced economic decline, social segmentation, and mass-population migration. Environmentally induced depletion of resources can significantly reduce agricultural production and create extreme conditions for poverty and food scarcity, which further increases the probability of conflict.</p>
<p>The Department of Defense recognizes that the United States to be successful in its mission, must adjust its initiatives to four main categories of prospective environmental challenges: (i) traditional; (ii) irregular; (iii) disruptive; and (iv) catastrophic. Although present U.S. interests already call for the mobilization of traditional military instruments in conventional activities, environment-driven challenges may necessitate the deployment of the military in severe instances of mass flooding, droughts, and heatwaves. It is also acknowledged, that climate change would extend the duration of the deployment. Shifts in seasonal snowmelts, increase in droughts, quadrupling frequency of wildfires, extreme precipitation resulting in devastating floods, lengthened cyclone season, and threats of disease outbreaks and large-scale pandemics, can lead to mass population migrations and put significant stress on state infrastructures with significant destabilization impacts on respective governmental entities.</p>
<p>Researchers predict that &#8216;a sea-level rise of one to five meters by 2100 would displace roughly between 130 and 410 million people.&#8217; According to the Department of Defense planners, such a scenario must meet with realistic and urgent military and logistical planning. The loss of the means of subsistence following a widespread natural disaster, presents the military with an irregular challenge, that of massive movements of &#8216;environmental refugees.&#8217; It is projected that the expansion of deserts alone in China, Tunisia, Morocco, and Libya, as well as soil erosion in Egypt, Turkey, Louisiana, and Alaska, will intensify the migratory patterns of populations and put significant stress on potential host countries, requiring support and management mechanisms suitable for attenuating prospective social friction and conflict.</p>
<p>Erosion, desertification, deforestation, irregular floods and droughts, and pandemics can prove disruptive to vital U.S. security interests. It is predicted that climate change-induced famine, water stress, and vector-borne disease will, in the severity of their consequences, exceed those resulting from revolutionary political upheavals or technologies aimed at countering U.S. interests and capabilities.  The Department of Defense recognizes that risk of recurrent pandemics will have &#8216;broad and complex ecological, security, and social ramifications for humans&#8217; pushing many states to the brink of failure and collapse, thus dispersing the risk of social and political destabilization across ever wider regions of the globe. State failure contagion induced by environmental stress will present the United States with catastrophic challenges, comparable only, the Department of Defense reasons, to &#8216;WMD-like effects against U.S. interests.&#8217; Suboptimal living standards in parts of Asia, Africa, and the Middle East, exacerbated by degradation of the environment, collapse of natural ecosystems and their attendant health and social consequences, security specialists contend, will significantly upset normal patterns of subsistence, degrade the quality of life, and increase the probability of political instability and state failure.</p>
<p>&#8220;Economic and environmental conditions in already fragile areas will further erode as food production declines, diseases increase, clean water becomes increasingly scarce, and large populations move in search of resources. Weakened and failing governments, with an already thin margin for survival, foster the conditions for internal conflicts, extremism, and movement toward increased authoritarianism and radical ideologies.&#8221;<sup><a href="#_edn1" name="_ednref1">[1]</a></sup></p>
<p>Climate-induced population movements in the Darfur region in Sudan and across political borders between Bangladesh and India and ongoing skirmishes over water control between India, Pakistan, and China, Israel and Palestine contribute significantly to the renewal of tensions, depleting sources of political toleration and increasing the likelihood of violence. The Department of Defense&#8217;s sensitivity to terrorism breeding conditions necessitates it to acquire means and technologies for facing grave and unpredictable threats of climate change and to strategically respond to and gain control over its inevitable socio-political corollaries.</p>
<p>Second, a real possibility of a serious international conflagration exists in the Arctic region, as it undergoes significant climatic transformations, opening new shipping routes and uncovering invaluable natural resources. The global estimates of the impact of the collapse of the West Antarctic ice sheet, predict that a sea-level rise of 1-5 meters would displace 130-410 million people and uncover vast deposits of oil, gas, nickel, copper, lead, zinc, diamonds, gold, silver, manganese and titanium worth an estimated $1.5-2 trillion. Global governance gaps, inadequate international legal guidelines, political and economic interests in this area threaten to fuel major diplomatic tensions among regional actors, that is Arctic coastal states and non-regional players, over natural resource deposits, navigation rights, control of shipping routes, and fishery management thus increasing competing claims to continental shelves and economic trade routes, worsening diplomatic frictions, and resulting in pronounced regional and international instabilities  &#8211; or resource wars &#8211; between major powers &#8211; the United States, Canada, Norway, Russia, China, Japan, and South Korea. The winners of the Scramble for the Arctic or the race to become the next great polar power will be able to unilaterally delineate areas of territorial control and write the new rules of engagement in the region.</p>
<p>Third, appreciation of threats arising from (i) localized environmental degradation; (ii) ethnic clashes resulting from population migration and deepening social cleavages; (iii) prospects for civil strife caused by resource and food scarcity which affect economic productivity and people&#8217;s chance of dignified survival &#8211; will require a concerted effort of both state governments and non-governmental entities, the civilian and the military sectors of the economy, of private enterprise and public ingenuity.</p>
<p>Economic cooperation buttressed by political consensus is needed to redress scarcity, provide tools for mitigation of, adaptation to, and compensation for global environmental problems and to meet the changing demands of citizens in the face of multi-pronged environmental crises they face. It will become increasingly necessary, therefore, to compound not only the cumulative knowledge base of states, but reassess the critical role that intergovernmental and non-governmental entities can play in the negotiation, regulation, and distribution of counteractive, proactive and reactive measures aimed at promotion of democratic stability and economic prosperity in the context of resource depletion and appreciable threats to human flourishing.</p>
<p>Current trends in political, diplomatic and military circles hint at increased investment in and commitment to a wide variety of contingencies, including &#8211; in addition to threats stemming from nuclear terrorism, deadly pandemics or biological warfare &#8211; the exploration of strategic political responses and military initiatives concerning sustainable security. Prospects for international consensus can reduce anxieties over environmental devastation and propel collaborating states toward greater stability and more sustainable peace.  And while international legally binding treaties such as the Paris Agreement are a proper first step, they alone are insufficient in building resilience to climate change without the cooperation of the military, economic, and political branches of state parties, the exchange of intelligence and strategic investment by non-state entities, and the entrepreneurship and innovation of the private sector.</p>
<hr />
<p><sup><a href="#_ednref1" name="_edn1">[1]</a></sup> CNA Corporation, “National Security Report” in Ackerman, John T. 2008. “Climate Change, National Security, and the Quadrennial Defense Review.” <em>Strategic Studies Quarterly </em>(Spring), p. 73.</p>
<p><a href="https://globalsecurityreview.com/climate-security-is-national-security/">Climate Security is National Security</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Now That Abu Bakr al-Baghdadi is Dead, What Next?</title>
		<link>https://globalsecurityreview.com/abu-bakr-al-baghdadi-death/</link>
		
		<dc:creator><![CDATA[Alan Lis]]></dc:creator>
		<pubDate>Wed, 11 Dec 2019 02:52:39 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Iraq]]></category>
		<category><![CDATA[ISIS]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=13371</guid>

					<description><![CDATA[<p>Abu Bakr al-Baghdadi, the leader of the Islamic State, was killed on the 26th of October in a raid carried out by U.S. Special Forces when he detonated a suicide vest in the Syrian province of Idlib. In a statement the following day, U.S. President Donald Trump acknowledged the role of Iraq, Turkey, Russia, the [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/abu-bakr-al-baghdadi-death/">Now That Abu Bakr al-Baghdadi is Dead, What Next?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Abu Bakr al-Baghdadi, the leader of the Islamic State, was killed on the 26th of October in a raid carried out by U.S. Special Forces when he detonated a suicide vest in the Syrian province of Idlib. In a statement the following day, U.S. President Donald Trump acknowledged the role of Iraq, Turkey, Russia, the Kurds, and the Syrian government in the operation that resulted in killing the ISIS leader.</p>
<p>While this undoubtedly is a major victory for the U.S. in the fight against global jihadism, it cannot be overlooked that this decapitation strike does certainly not mean ISIS that is finished. This organization has proved that it can outlast the loss of its leaders; its founder, Abu Musab al-Zarqawi was killed in 2006; his successors, Abu Ayyub al-Masri and Abu Omar al-Baghdadi, were eliminated in 2010. Following the death of Abu Bakr al-Baghdadi, the Islamic State has now publicly named his successor: Abu Ibrahim al-Hashimi al-Qurayshi.</p>
<h3>Consequences of al-Baghdadi’s Death</h3>
<p><em>Valuable intelligence was obtained during the raid. </em>Similarly to the raid during which Osama bin Laden lost his life, through the operation that resulted in al Baghdad’s death, the U.S. forces got to obtain, presumably exceptionally valuable, intelligence. An additional bonus is that two ISIS fighters were captured alive and then taken to Iraq for interrogation. Having been rather close to al-Baghdadi, it is likely they possess some knowledge regarding the organization’s functioning and its network of sleeper cells, whose activation in the context of staging retaliatory attacks is now one of the major concerns of the anti-IS coalition member states.</p>
<p><em>There&#8217;s a risk that ISIS sleeper cells could be activated to execute retaliatory strikes. </em>Many security experts and analysts have warned about the wave of retaliatory strikes that ISIS will carry out to avenge al-Baghdadi’s death. Though such attacks are extremely likely to happen, it may be some time between the killing and the attacks to take place. ISIS is aware that many countries have put their intelligence and security services on high alert because of the fear of retaliatory strikes. To inflict maximum damage and casualties, it is characteristic for groups like ISIS  to wait out increased protection measures and attack once the security provisions are more relaxed. It&#8217;s almost certain that retaliatory strikes have  been planned and organized even before al-Baghdadi&#8217;s death.</p>
<p><em>The world’s most wanted terrorist was brought to justice</em>. Killing al-Baghdadi is undoubtedly a success in the fight against ISIS, but some analysts argue that its value is rather symbolic, as it is believed that the Caliph’s control over his organization was rather limited in the recent months. While that may be true, it needs to be remembered it was him who led the organization during days of its glory and territorial conquest, and him who was responsible for the death and suffering of millions of people in the process of creating and running the Caliphate. Even though he might not have had in recent months as much power and control as he used to, he was still the most wanted terrorist in the world.</p>
<p><em>President Trump has greater justification for withdrawing U.S. troops from Syria. </em>Killing al-Baghdadi provided Trump with the ammunition to defend his decision of withdrawing the U.S. troops from Syria. He can justifiably claim that the U.S. is still committed to continuing the fight against ISIS despite the withdrawal and that the American forces are not needed there on the ground to carry out effective operations against the IS. However, it must be considered that Trump&#8217;s decision has resulted in a resurgence of ISIS forces as Kurdish forces—who were guarding ISIS fighters—were forced to leave their positions to fight Turkish and Turkey-backed forces as they invaded North-eastern Syria. Reportedly, several hundred ISIS warriors escaped.</p>
<h3>Al-Baghdadi’s death does not mean the end of ISIS</h3>
<p>Many would want to believe that al Baghdadi’s death means the end of the struggle against ISIS and the end of the threat it has posed. This belief is, however, far from being real. Of course, losing a leader is a considerable blow to any terrorist organization, and severe damage to its image, but it needs to be acknowledged that the internal structure of the Islamic State has not been harmed much with al-Baghdadi killed.</p>
<p>There were people ready to take over al-Baghdadi’s role and indeed, as mentioned before, the IS has already claimed its new caliph to be Abu Ibrahim al-Hashemi al-Qurayshi. Though al-Hashemi is likely to continue the work of al-Baghdadi, it is also unclear how strong his position will be and what will be the ISIS’s affiliates’ reaction to the new Caliph. Overall, however, replacing al-Baghdadi sends a message that despite the losses suffered by the terrorist group, it remains in existence and is continuing operations.</p>
<p><a href="https://globalsecurityreview.com/abu-bakr-al-baghdadi-death/">Now That Abu Bakr al-Baghdadi is Dead, What Next?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NATO Membership and Georgia&#8217;s Democratic Future</title>
		<link>https://globalsecurityreview.com/nato-membership-georgia-democracy/</link>
		
		<dc:creator><![CDATA[Miro Popkhadze]]></dc:creator>
		<pubDate>Tue, 03 Dec 2019 19:07:23 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Georgia]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=13297</guid>

					<description><![CDATA[<p>The North Atlantic Treaty Organization is the most powerful alliance in history. Since World War Two, with American leadership, NATO has guaranteed the security, stability, and prosperity of the international order. It protected democracies from the Soviet Union’s aggression during the cold war. Today, NATO continues to ensure global peace and security and expand freedom around the world. NATO’s military might and [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/nato-membership-georgia-democracy/">NATO Membership and Georgia&#8217;s Democratic Future</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.newyorker.com/news/news-desk/what-does-nato-do-anyway#:~:targetText=Douglas%20Lute%2C%20a%20retired%20U.S.,Ambassador%20to%20NATO%20since%202013.&amp;targetText=The%20North%20Atlantic%20Treaty%20Organization,fodder%20for%20election%2Dyear%20politicking.">The North Atlantic Treaty Organization </a>is the most powerful alliance in history. Since World War Two, with American leadership, NATO has guaranteed the security, stability, and prosperity of the international order. It protected democracies from the Soviet Union’s aggression during the cold war. Today, NATO continues to ensure global peace and security and expand freedom around the world. NATO’s military might and political weight make the world safer, more prosperous and more democratic.</p>
<p><a href="https://www.theatlantic.com/international/archive/2016/12/russia-liberal-democracy/510011/">Russia’s invasion of Georgia in 2008</a> undermined the liberal world order. NATO’s failure to defend Georgia, a NATO aspirant country, emboldened Moscow and triggered Russia’s annexation of Crimea and invasion of Eastern Ukraine in 2014. <a href="https://foreignpolicy.com/2015/09/24/natos-endless-caucasian-courtship/">By attacking Georgia, Russia undermined NATO’s enlargement policy</a> and damaged Georgia’s prospects for political and economic development. In order to avoid the mistakes of the past, NATO should offer full membership to Georgia—to prevent further Russian aggression, expand democratic values, and increase U.S. credibility on behalf of security and peace.</p>
<p>Georgia’s NATO membership will stop Russian aggression. Russia’s invasion of Georgia in 2008 was the first time since World War Two that <a href="https://books.google.com/books?id=x5qkDAAAQBAJ&amp;pg=PA107&amp;lpg=PA107&amp;dq=Russia%E2%80%99s+invasion+of+Georgia+in+2008+was+the+first+time+since+World+War+Two+that+one+sovereign+state+in+Europe+crossed+the+border+to+invade+another.&amp;source=bl&amp;ots=XCN92hzZ7q&amp;sig=ACfU3U1cutDbs6XEJqFJTfruat3Z95k-fw&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwizq6LG2JfmAhWkxFkKHSAnBKo4ChDoATAAegQIChAB#v=onepage&amp;q=Russia%E2%80%99s%20invasion%20of%20Georgia%20in%202008%20was%20the%20first%20time%20since%20World%20War%20Two%20that%20one%20sovereign%20state%20in%20Europe%20crossed%20the%20border%20to%20invade%20another.&amp;f=false">one sovereign state in Europe crossed the border to invade another</a>. Russia founded it easy to invade Georgia because Georgia was neither a NATO member nor a U.S. military treaty ally. Georgia’s NATO membership will send the right message to Moscow and deter Russia’s further aggression. The Baltic States’ successful integration into NATO is a good case in point.</p>
<p>NATO membership will help Georgia accelerate its democratic development. Russia views the expansion of democracy into the post-soviet space as a threat to its national security. It is poised to roll back democratic breakthroughs around its borders. <a href="https://www.rand.org/content/dam/rand/pubs/research_reports/RR1800/RR1826/RAND_RR1826.pdf">By expanding the Collective Security Treaty Organization (CSTO)</a> and the Eurasian Union, Moscow intends to create NATO’s alternative, a powerhouse of authoritarian regimes to balance the West.</p>
<p><figure id="attachment_13299" aria-describedby="caption-attachment-13299" style="width: 400px" class="wp-caption alignright"><img loading="lazy" decoding="async" class="wp-image-13299" src="http://globalsecurityreview.com/wp-content/uploads/2019/12/Nato_poster_tbilisi-2-659x1024.jpg" alt="August 2009 sign in Tbilisi Georgia with text reading &quot;Our foreign policy priority is the integration into NATO&quot;" width="400" height="621" srcset="https://globalsecurityreview.com/wp-content/uploads/2019/12/Nato_poster_tbilisi-2-659x1024.jpg 659w, https://globalsecurityreview.com/wp-content/uploads/2019/12/Nato_poster_tbilisi-2-193x300.jpg 193w, https://globalsecurityreview.com/wp-content/uploads/2019/12/Nato_poster_tbilisi-2-768x1193.jpg 768w, https://globalsecurityreview.com/wp-content/uploads/2019/12/Nato_poster_tbilisi-2-989x1536.jpg 989w, https://globalsecurityreview.com/wp-content/uploads/2019/12/Nato_poster_tbilisi-2-1318x2048.jpg 1318w, https://globalsecurityreview.com/wp-content/uploads/2019/12/Nato_poster_tbilisi-2.jpg 1854w" sizes="(max-width: 400px) 100vw, 400px" /><figcaption id="caption-attachment-13299" class="wp-caption-text">An August 2009 sign seen in downtown Tbilisi promoting Georgia&#8217;s integration with NATO (Photo: George Nikoladze)</figcaption></figure></p>
<p>Georgia does not intend to join the Russian-led club of autocracies. Instead, it aims to integrate into the West and consolidate its democracy. In this regard, Georgia has made visible progress. <a href="https://www.silkroadstudies.org/resources/pdf/SilkRoadPapers/2006_06_SRP_CornellStarr_Caucasus.pdf">Since the Rose Revolution in 2003, Georgia</a> has gone from the brink of failed statehood to the region’s poster child for democracy. Despite its remarkable success, Georgia’s democratic development is doomed to remain incomplete and far from consolidation unless it joins NATO and completes its political and economic integration into the West.</p>
<p>Georgia’s NATO membership increases U.S. credibility as a reliable partner.  It will reassure U.S. allies and partners facing similar threats. Allies in the Middle East and Eastern Europe are worried that the U.S is no longer interested in their security and stability. By offering NATO membership to Georgia, the U.S will not only uphold its international obligations and commitments, but it will also increase its credibility and reputation as a dependable partner.</p>
<p><a href="https://www.rand.org/content/dam/rand/pubs/research_reports/RR1800/RR1879/RAND_RR1879.pdf">Skeptics in the West worry</a> that such a step will lead NATO to end up getting involved in direct conflict with Russia. They argue that Russia has a bigger interest in Georgia than NATO does and it can always afford to out-escalate conflict with NATO over Georgia. Notwithstanding division within NATO about its Russia policy, NATO forces remain larger, better equipped and more powerful than Russia’s. Therefore, given NATO’s military and economic superiority, Russia is less likely to go to war with NATO over Georgia. A strong alliance deterred the Soviet Union during the Cold War and will deter a much weaker Russian Federation in the future.</p>
<p>Georgia’s NATO membership will deter aggression, strengthen democracy and increase U.S. credibility. As George Kennan wrote in the now famous <a href="https://alphahistory.com/coldwar/george-kennan-long-telegram-1946/#:~:targetText=Soviet%20power%2C%20unlike%20that%20of,sensitive%20to%20logic%20of%20force.">Long Telegram</a>, “Russia is impervious to the logic of reason and it is highly sensitive to the logic of force.” By the same token, Kennan’s belief that “Russia would back down when encountered strong resistance at any point” remains more relevant today than ever before. Consequently, it is time for NATO to act, and act quickly. By pushing Georgia’s speedy membership in the Alliance and sending a clear message of resolve to Moscow, NATO will contain Russia’s geopolitical thrust and make the region stable, peaceful and more democratic.</p>
<p><a href="https://globalsecurityreview.com/nato-membership-georgia-democracy/">NATO Membership and Georgia&#8217;s Democratic Future</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Yemen is a Battleground in Iran&#8217;s Proxy War Against the U.S. and Saudi Arabia</title>
		<link>https://globalsecurityreview.com/yemen-iran-proxy-war/</link>
		
		<dc:creator><![CDATA[Alan Lis]]></dc:creator>
		<pubDate>Wed, 02 Oct 2019 13:35:21 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[United Arab Emirates]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=12809</guid>

					<description><![CDATA[<p>As the world’s attention is increasingly focused on Iranian aggression in the Persian Gulf, it’s essential to look at the civil war in Yemen, a battlefield in the proxy fight between the U.S. and Iran.  The conflict in Yemen—one of the Arab world’s poorest states—has roots that extend back to the Arab Spring uprisings of [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/yemen-iran-proxy-war/">Yemen is a Battleground in Iran&#8217;s Proxy War Against the U.S. and Saudi Arabia</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>As the world’s attention is increasingly focused on Iranian aggression in the Persian Gulf, it’s essential to look at the civil war in Yemen, a battlefield in the proxy fight between the U.S. and Iran.<span class="Apple-converted-space"> </span></h2>
<p>The conflict in Yemen—one of the Arab world’s poorest states—has roots that extend back to the Arab Spring uprisings of the early 2010s—and beyond. The Houthi insurgency has been in existence since the early 2000s, but it wasn’t until 2012 when a wave of protests forced Yemeni President Ali Abdullah Saleh to step down after ruling the country for 22 years.</p>
<p>Saleh’s successor, Abdrabbuh Mansur Hadi was elected in a single-candidate election in 2012, much to the opposition of the Houthis, who boycotted voting. Hadi failed to successfully manage the country’s problems with food insecurity, unemployment, corruption, and militancy. Political instability only widened once a proposal to reorganize Yemen as a federal state divided into six regions was rejected, and security deteriorated significantly. Hadi was eventually forced from office in February 2015 as his relationship with the Houthis deteriorated severely.</p>
<p>Houthi militants began engaging with the Yemeni Army, and Hadi was placed under house arrest. However, he managed to flee the capital to his hometown of Aden, from where he made a public declaration that he retained executive power. However, he fled to Riyadh, Saudi Arabia as the Houthi’s expanded the territory under their control.</p>
<p>In the years since Hadi&#8217;s ouster, the situation in Yemen has significantly worsened. In addition to hosting a bloody civil war, Yemen has seen numerous acts of terrorism, carried out mostly by groups like Al Qaeda in the Arabian Peninsula (AQAP) and ISIS (Daesh). The United Nations has said it considers the humanitarian crisis in Yemen as the world’s worst. Millions of Yemeni civilians have been displaced, with millions more lacking access to clean water, food, and healthcare. Over one million cases of cholera have been reported in the country, resulting in thousands of deaths.<span class="Apple-converted-space"> </span></p>
<h3>Foreign Intervention</h3>
<p>Like the majority of Iranians, the Houthis are members of the Shia sect of Islam. In the broader Islamic world, Shia Muslims are a minority; the majority of Muslims belong to the Sunni sect. In involving itself in the Yemeni civil war, Iran likely saw an opportunity to advance its interests in a region where it has few friends while frustrating the efforts of Saudi Arabia, Tehran&#8217;s regional rival, to consolidate its influence on the Arabian Peninsula.</p>
<p>Part of Iran’s strategy in Yemen was providing Houthi forces with arms—crucially, drones, and ballistic missiles which are regularly employed against targets in Saudi Arabia. In the past several months alone, there have been numerous drone or missile strikes on critical infrastructure and energy facilities in Saudi Arabia. Furthermore, Tehran has mobilized its most important proxy group, Hezbollah.</p>
<p>In response to the Iranian regime&#8217;s support for the Houthi rebels, Saudi Arabia assembled a coalition of its regional allies to prosecute a military campaign aimed at restoring Hadi to power. The United States and the United Kingdom have assisted the coalition, providing intelligence, logistical support, and arms to the Saudi-led coalition to counter what they perceive as Iran’s growing influence and the Iranian regime&#8217;s efforts to further destabilize an already-troubled region. Complicating Riyadh&#8217;s efforts, however, the United Arab Emirates—the Saudi&#8217;s primary ally in the conflict—recently began withdrawing its forces from Yemen.</p>
<h3>Iranian Proxy Groups</h3>
<p>Providing material, financial, and advisory support to proxy forces in lieu of direct engagement enables Iran to engage in regional conflicts with a degree of deniability. Proxy forces are utilized to shape political developments in specific areas while minimizing potential costs for Iran and are arguably regarded within the regime as a beneficial tool for achieving its foreign policy objectives.</p>
<p>The Islamic Republic provides Houthi forces with weaponry, supplies, training, and logistics, a strategy that aligns with Tehran’s playbook for shaping political and security conditions in a favorable manner. Hezbollah, based in Lebanon and perhaps the best-known Iranian proxy, has, over time, acquired substantial political powers, influence, and capabilities—both in Lebanon and beyond.<span class="Apple-converted-space"> </span></p>
<p>In Yemen, Hezbollah has advised and delivered Iranian weapons to the Houthis. In Syria, the group has provided support to Bashar al Assad’s government forces. Among other groups that have served as Iranian proxies in Syria are Liwa Abu Fadl al-Abbas (LAFA) and the Iraqi Asa’ib Ahl al-Haq (AAH), established in 2006.</p>
<h3>U.S.-Iran Tensions and Escalation</h3>
<p>Tensions between Tehran and Washington have continued to escalate for the past few months. However, direct military confrontation between Iran and the U.S. remains an unlikely option given U.S. President Donald Trump’s continued restraint despite escalatory provocations by the Iranian regime.<span class="Apple-converted-space"> </span>However, the Trump administration will continue to provide logistical support, intelligence, and weapons shipments to Riyadh—despite bipartisan opposition in the U.S. Congress.</p>
<p>Both sides are already deeply involved in the Yemeni civil war, and their respective interests are seemingly intractable. That being said, the leader of both parties understand the devastating costs a full-blown war would have. As a result, the conflict in Yemen will persist for the foreseeable future, fueled by a regional quasi-hybrid proxy war between the U.S.and the Islamic Republic that shows no sign of deescalating.<span class="Apple-converted-space"> </span></p>
<p><a href="https://globalsecurityreview.com/yemen-iran-proxy-war/">Yemen is a Battleground in Iran&#8217;s Proxy War Against the U.S. and Saudi Arabia</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Termination of INF Treaty Could Spark Arms Race in Asia</title>
		<link>https://globalsecurityreview.com/termination-inf-treaty-could-spark-arms-race-asia/</link>
		
		<dc:creator><![CDATA[Pranay Kumar Shome]]></dc:creator>
		<pubDate>Thu, 19 Sep 2019 17:33:50 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Asia]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=12735</guid>

					<description><![CDATA[<p>By terminating of the Intermediate-Range Nuclear Forces (INF) treaty, a key Cold War-era arms control pact, the United States and Russia have reignited the risk of a global arms race.  On August 3rd, 2019, the United States formally announced its withdrawal from the Intermediate-Range Nuclear Forces (INF) treaty, a key Cold War-era arms control agreement, citing [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/termination-inf-treaty-could-spark-arms-race-asia/">Termination of INF Treaty Could Spark Arms Race in Asia</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>By terminating of the Intermediate-Range Nuclear Forces (INF) treaty, a key Cold War-era arms control pact, the United States and Russia have reignited the risk of a global arms race.<span class="Apple-converted-space"> </span></h2>
<p>On August 3rd, 2019, the United States formally announced its withdrawal from the Intermediate-Range Nuclear Forces (INF) treaty, a key Cold War-era arms control agreement, citing “irresponsible actions of Russia.”</p>
<p>Several months before, Russia announced that the spirit of the INF was “dead.” The actions of both nuclear powers have increased fears of an international arms race centered on Asia, where the U.S. has announced it is considering placing intermediate-range conventional missiles in the near term.</p>
<h3>The Intermediate-Range Nuclear Forces (INF) Treaty: An Overview</h3>
<p>In October 1986, Soviet Premier Mikhail Gorbachev invited the then US president Ronald Reagan to a summit meeting in Reykjavik, Iceland and proposed a fifteen-year denuclearization timetable. To an extent, the U.S. was responsive to Gorbachev’s proposal, but President Reagan wasn’t prepared give up the U.S. <a href="https://www.atomicheritage.org/history/strategic-defense-initiative-sdi">Strategic Defense Initiative</a><i> </i>(SDI). Colloquially known as “Star Wars,” the SDI was first proposed by President Reagan on March 23, 1983. The intended purpose of the<b> </b>SDI was to defend the U.S. from Soviet intercontinental ballistic missiles (ICBMs) by intercepting the missiles mid-flight.</p>
<p>At the next summit between the two superpowers in December of 1987, the U.S. and USSR achieved a historic breakthrough by signing the Intermediate-Range Nuclear Forces (INF) treaty. The treaty mandated that all U.S. and Soviet intermediate-range conventional and nuclear ballistic and cruise missiles—deployed throughout Western Europe and the Warsaw Pact—be destroyed within four years. Each side was to monitor the other to ensure the requisite number of missiles were being destroyed in accordance with the treaty.</p>
<p>The <a href="https://www.nytimes.com/2019/02/01/world/europe/inf-treaty.html">treaty expressly prohibited</a> land-based cruise and ballistic missiles with ranges between 311 and 3,420 miles. Air- or sea-launched missiles, such as the U.S. Tomahawk cruise missile and Russia’s Kalibr cruise missile were not covered, even though they had ranges similar to the missiles banned in the treaty.</p>
<h3>Sources of Conflict Between the United States and Russia</h3>
<p><a href="https://www.orfonline.org/expert-speak/implications-inf-pullout/">Russia’s violations of the INF treaty</a> have been a key component of rising tensions between the U.S. and Russia. Washington—and its NATO allies—have repeatedly called for Moscow to acknowledge its noncompliance while demanding that the treaty violation be rectified. According to the U.S., Russia’s <a href="https://www.jpost.com/International/Putin-Russia-will-start-creating-new-missiles-including-hypersonic-ones-579470">Novator 9M729 cruise missile</a> was in direct violation of the treaty, a claim that Moscow has strongly denied. The U.S. first brought up the issue of Russian treaty noncompliance regarding the 9M729 cruise missile in the State Department’s <a href="https://www.state.gov/documents/organization/230108.pdf">2014 Compliance Report</a>, in which Washington suggested that Russia was violating the treaty and that the U.S. would continue to seek a resolution.</p>
<p>In withdrawing from the agreement, the U.S. displayed a willingness to do away with a landmark arms control treaty—possibly igniting an arms race across not only Europe but in Asia, as well. In a statement announcing Washington’s intention to withdraw from the INF treaty, the White House said: “for far too long, Russia has violated the Intermediate-Range Nuclear Forces (INF) Treaty with impunity, covertly developing and fielding a prohibited missile system that poses a direct threat to our allies and troops abroad.”</p>
<p>Russia, for its part, has seemingly demonstrated an eagerness to unshackle itself from the limits of key arms control agreements. In addition to demonstrating a willingness to breach the terms of the INF treaty, Moscow has neglected to push for the renewal of New START (Strategic Arms Reduction Treaty) signed by the U.S. and Russia in 2010. New START placed limits on the number of strategic nuclear missile launch systems, and is set to expire in 2021, unless renegotiated.<span class="Apple-converted-space"> </span></p>
<p>In an effort to position the Kremlin as a reasonable actor, <a href="https://foreignpolicy.com/2019/08/02/what-does-the-demise-of-the-i-n-f-treaty-mean-for-nuclear-arms-control-intermediate-nuclear-forces-new-start-strategic-arms-limitation-nonproliferation-trump-russia-arms-control-explained/">Russian President Vladimir Putin</a> publicly stated that Russia was open to renewing the treaty. In doing so, he warned that the expiration of the deal could spark an arms race. “If we don’t keep this ‘fiery dragon’ under control, if we let it out of the bottle—God forbid—this could lead to global catastrophe,” <a href="https://www.japantimes.co.jp/news/2019/06/07/world/politics-diplomacy-world/putin-says-russia-prepared-drop-new-start-nuclear-arms-treaty-warns-global-catastrophe/#.XUNT1JNKjOQ">Putin said</a> in June of 2019. “There won’t be any instruments at all limiting an arms race, for example, the deployment of weapons in space. This means that nuclear weapons will be hanging over every one of us all the time.”</p>
<p>However, Putin expressed a willingness to let the pact expire—implying that Moscow would not approach renegotiations with a sense of urgency, saying that “if no one feels like extending the agreement—New START—well, we won’t do it then.”</p>
<h3>Post-INF: Battleground Asia</h3>
<p>The nerve center of great power tensions is shifting to Asia. On August 4th, 2019, newly-confirmed U.S. Secretary of Defense Mark Esper stated that Washington was looking at a deploying intermediate-range missiles in East Asia and the western Pacific, a move likely to anger China.<span class="Apple-converted-space"> </span></p>
<p>China wasn’t a signatory of the INF treaty and has developed sophisticated offensive missile systems. While Beijing raised concerns about the collapse of the INF treaty, it seemed unwilling to participate in a multilateral replacement to the agreement, saying the “<a href="https://www.jpost.com/International/Putin-Russia-will-start-creating-new-missiles-including-hypersonic-ones-579470">too complicated</a>” and that prior agreements should be honored.<span class="Apple-converted-space"> </span></p>
<p>For the last three decades, <a href="https://indianexpress.com/article/opinion/columns/india-china-and-the-inf-treaty-5424298/">China has dramatically expanded its missile arsenal</a>. According to U.S. government officials, nearly ninety percent of China’s missile arsenal—estimated to be around 2,000 rockets—are classified as intermediate-range missiles.</p>
<h3>What lies ahead for the global arms control regime?</h3>
<p>The deterioration of international security structures is detrimental to global strategic stability. Although elements of the INF treaty may seem outdated, it played a crucial role in making both the U.S. and Russia accountable.<span class="Apple-converted-space"> </span></p>
<p>The treaty’s collapse has contributed to the development of an ominous atmosphere around the future of arms control. The intention behind these recent developments has been to strengthen compliance and stability, but the likelihood of a more aggressive arms race looms large over the nuclear domain.</p>
<p><a href="https://thediplomat.com/2019/03/us-withdrawal-from-inf-treaty-impact-on-asia/">Dr. Gregory Kulacki</a>, China Project Manager at the Union of Concerned Scientists, maintains that an arms race-based framework will replace the arms-control based strategic security framework. Lessons learned during the Cold War will again need to be re-learned, albeit in the context of a multipolar order.</p>
<p><a href="https://globalsecurityreview.com/termination-inf-treaty-could-spark-arms-race-asia/">Termination of INF Treaty Could Spark Arms Race in Asia</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Diverging Interests in Iran Behind Germany&#8217;s Rejection of U.S. Maritime Security Mission</title>
		<link>https://globalsecurityreview.com/diverging-interests-iran-behind-germanys-rejection-us-maritime-security-mission/</link>
		
		<dc:creator><![CDATA[Trivun Sharma]]></dc:creator>
		<pubDate>Thu, 12 Sep 2019 21:36:41 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=12703</guid>

					<description><![CDATA[<p>During a trip to Poland on July 31st, 2019, German Foreign Minister Heiko Maas stated that “Germany&#160;will not take part in the sea mission presented and planned by the United States,” pointing out that the U.S. strategy of exercising maximum pressure against Iran was wrong.&#160; After withdrawing from the Iran Nuclear Deal—formally known as the [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/diverging-interests-iran-behind-germanys-rejection-us-maritime-security-mission/">Diverging Interests in Iran Behind Germany&#8217;s Rejection of U.S. Maritime Security Mission</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>During a trip to Poland on July 31st, 2019, German Foreign Minister Heiko Maas stated that “Germany&nbsp;<a href="https://www.dw.com/en/germany-will-not-join-us-naval-mission-in-strait-of-hormuz/a-49835380?maca=en-newsletter_en_gns-16215-html-newsletter">will not take part</a> in the sea mission presented and planned by the United States,” pointing out that the U.S. strategy of exercising maximum pressure against Iran was wrong.<span class="Apple-converted-space">&nbsp;</span></p>
<p>After withdrawing from the Iran Nuclear Deal—formally known as the Joint Comprehensive Plan of Action (JCPOA)—in May 2018, the Trump administration has embarked on a policy of “maximum pressure” towards Iran, denying Tehran the benefits it was meant to receive through the deal and reimposing sanctions on broad sectors of the Iranian economy.<span class="Apple-converted-space">&nbsp;</span></p>
<p>For its part, Tehran <a href="https://www.politico.eu/article/france-doesnt-need-us-approval-to-act-on-iran-says-foreign-minister/">has responded by shooting</a> down U.S. military drones, seizing foreign-flagged tankers in the Strait of Hormuz—threatening the freedom of navigation in the strategically critical maritime route—and violating its JCPOA obligations by stockpiling and enriching uranium beyond the agreed-upon levels.</p>
<p>To garner support for a U.S.-led operation to protect ships traveling through the Strait of Hormuz, Washington urged its transatlantic partners—the U.K., France, and Germany chief among them) to participate in a maritime security mission. Their responses, however, indicated that, in contrast to the U.S., Europe didn&#8217;t perceive the Islamic Republic to be a threat to European interests that merited possible military action.</p>
<p>Tensions between London and Tehran peaked when the U.K. <a href="https://www.nytimes.com/2019/07/04/world/middleeast/oil-tanker-gibraltar-syria-iran.html?module=inline">impounded an Iranian tanker</a> near Gibraltar over suspicions that it was violating an EU embargo by carrying oil destined for sale in Syria. In a tit-for-tat escalation,&nbsp;<a href="https://www.nytimes.com/2019/07/19/world/middleeast/iran-british-tanker-drone.html?module=inline">the Iranian Islamic Revolutionary Guard Corps (IRGC) navy seized a tanker flying</a> the British flag in July for allegedly turning off its GPS locator, breaking the maritime traffic pattern in the Strait of Hormuz, and polluting water by dumping crude oil residue.</p>
<p>Initially, the U.K. was hesitant over the idea of its naval forces joining those of the U.S., and instead formulated plans for a European-led mission in the area. However, following Boris Johnson’s appointment as Prime Minister and the lack of continental support for a European-led maritime security mission (with Germany showing little more than complete disinterest), the <a href="https://www.nytimes.com/2019/07/24/world/europe/britain-johnson-may-prime-minister.html?module=inline">U.K. announced it would join the U.S.-led operation</a>. The move served to demonstrate Anglo-American solidarity and strengthen ties between the two countries—in part due to the Boris Johnson government’s prioritization of a post-Brexit free-trade agreement with the U.S.</p>
<p>France’s interests are more nuanced. Thus far, Paris has&nbsp;<a href="https://en.radiofarda.com/a/macron-trump-call-for-new-negotiations-with-iran-for-no-nuclear-weapons/29985042.html">rejected joining any</a>&nbsp;U.S.-led operation. Instead, Paris has been actively engaged in a lengthy diplomatic campaign intended to convince both Tehran and Washington to de-escalate and enter into negotiations. However, France was among the first few European countries to initially support the European-led naval operation that was proposed by the U.K. France has a <a href="https://www.reuters.com/article/us-france-saudi-iran/as-iran-nuclear-deal-flounders-france-turns-to-saudi-for-oil-idUSKCN1TE1IJ">direct interest</a> in the Persian Gulf as it imports most of its crude oil from Saudi Arabia. French companies have business interests in Iran, in large part driven by the <a href="https://www.reuters.com/article/us-iran-nuclear-france-business/france-to-do-utmost-to-protect-business-interests-in-iran-idUSKBN1IA140">export</a> of jets, aircraft parts, and automobile parts. A scenario in which tensions with Iran escalate would undermine France’s strategic interests in the region. Therefore, Paris continues to emphasize diplomacy and show restraint in response to the proposed U.S.-led maritime security operation.</p>
<p>In contrast with France and the U.K., Germany’s outright rejection of the United States’ proposal reflects the downward trend in relations&nbsp;between the two countries. This isn’t the first time Germany has declined to participate in a U.S.-led military operation. Germany previously refused to participate in U.S.-led airstrikes in <a href="https://www.globalvillagespace.com/germanys-syria-strategy/">Douma</a>, Syria, as well as refusing to deploy ground troops to Syria.<span class="Apple-converted-space">&nbsp;</span></p>
<p>Like France and the U.K., Germany was in favor of maintaining the Iran nuclear deal. German Chancellor Angela Merkel’s failure to convince U.S. President Donald Trump not to withdraw from the JCPOA&nbsp;was viewed in Germany as a significant political setback—both for German-American relations and for Merkel’s reputation at home.</p>
<p>Germany’s&nbsp;primary interests&nbsp;in Iran revolve around promoting stability in the Persian Gulf region, which remains critically important for global economic security, as well as resolving conflicts in the Middle East to prevent further mass-migration by refugees and other migrants towards Europe. For this reason, Berlin’s stance is that escalating the situation is neither necessary nor opportune. Germany’s preferred outcome is a diplomatic solution, and continually stresses its resolute opposition to a military solution. There is <a href="https://www.dw.com/en/german-government-divided-over-joining-strait-of-hormuz-naval-mission/a-49789589">little political</a> appetite or support in Germany for the United States’ Iran policy under the Trump administration.<span class="Apple-converted-space">&nbsp; </span>The concern for German policymakers is that Berlin must avoid entrapment in U.S. policy and see itself drawn into a conflict.</p>
<p>In other words, Germany doesn’t share the same interests as the U.S., the U.K., or France when it comes to Iran. Unlike the U.K., no German ships or tankers have been harassed or seized by Iran, and, unlike France, Germany doesn’t rely on the Persian Gulf for its energy needs.</p>
<p><a href="https://globalsecurityreview.com/diverging-interests-iran-behind-germanys-rejection-us-maritime-security-mission/">Diverging Interests in Iran Behind Germany&#8217;s Rejection of U.S. Maritime Security Mission</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Britain&#8217;s Changing Security Perceptions</title>
		<link>https://globalsecurityreview.com/changing-security-perceptions-britain/</link>
		
		<dc:creator><![CDATA[Musa Khan Jalalzai]]></dc:creator>
		<pubDate>Thu, 15 Aug 2019 15:47:09 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=12550</guid>

					<description><![CDATA[<p>The United Kingdom&#8217;s national security challenges are amplifying by the day. Existing security measures and strategies are incapable of combating the hydra of extremism, foreign espionage, international terrorism, and serious organized crime. Drug trafficking, immigration, and containerized illegal trade, and their detrimental impact on industry and the market economy create further complexities for policymakers and [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/changing-security-perceptions-britain/">Britain&#8217;s Changing Security Perceptions</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The United Kingdom&#8217;s national security challenges are amplifying by the day.</h2>
<p>Existing security measures and strategies are incapable of combating the hydra of extremism, foreign espionage, international terrorism, and serious organized crime. Drug trafficking, immigration, and containerized illegal trade, and their detrimental impact on industry and the market economy create further complexities for policymakers and law enforcement agencies.</p>
<p>Exacerbating domestic tensions between communities and the security apparatus has transpired through a range of strategies aimed at countering and reassessing national security threats. CONTEST and other counterterrorism laws have failed to tackle the core issue. This year, the government passed the 2019 Counter-Terrorism and Border Security Act, providing police officers with authorization to stop, question, search, and detain individuals entering the country from abroad. However, a wide range of human trafficking networks both within and outside the U.K. continue to pose significant challenges for British law enforcement agencies.</p>
<p>Britain has been subjected to a series of terrorist attacks for over 18 years. In 2005 and 2009, homegrown extremist groups targeted both government installations and public places in London. In 2013, attacks on mosques in Birmingham generated significant consternation, and in 2014, the Woolwich attack on a British army soldier cast doubt on the government&#8217;s credibility and its law enforcement mechanisms. The three attacks of 2017 increased the public&#8217;s lack of confidence in the authorities for a variety of reasons; police failed to disrupt terrorist plots, as the law and order situation deteriorated, as the media criticized the government&#8217;s lack of a strategic approach to security threats.<span class="Apple-converted-space"> </span></p>
<p>Civil wars in Syria, Afghanistan, and Iraq—along with the British military&#8217;s involvement in those conflicts—contributed to the deterioration of domestic stability. The threat of extremism and terrorism expanded as radicalized elements who had joined the conflicts in the Middle East, the Persian Gulf, and South Asia, returned to the U.K. with new ideas and ways of thinking. Until 2018, there were more than 25,000 registered extremist and radicalized elements representing a range of sectarian groups in British in towns and cities. However, by any reasonable barometer, the level of security of the United Kingdom in 2017 was inauspicious. That year, terrorists carried out three attacks in which several civilians were killed.<span class="Apple-converted-space"> </span></p>
<p>British police and intelligence agencies are undoubtedly well-trained and competent, but their ranks have dwindled.<sup>1</sup> Over the past two decades, police have been a less visible presence in the streets, relying on technology to provide them with visibility in towns and cities. Since 2005, intelligence collection has been mostly dependent on CCTV, mobile phones, and surveillance technology to deal with threats like foreign espionage and international terrorism. Conversely, in a majority of EU member states, human intelligence accompanied by a technical approach to national security challenges was of great importance. In the U.K.,  changes were proposed to improve the professionalism and competence of police intelligence (National Intelligence Model, Ballistic Intelligence, Special Branch, CID, cyber forces) and counter-espionage programs, but political and bureaucratic stakeholders resisted every reform package.<sup>2</sup></p>
<p>The Independent Police Complaints Commission (IPCC) is the only oversight institution designed to improve the competence of the police force, but its efforts went unacknowledged. The commission was established in 2004 to investigate the conduct of police forces.<sup>3</sup> On January 8, 2018, the Independent Police Complains Commission was renamed as the Independent Office for Police Conduct (IOPC).<sup>4<span class="Apple-converted-space">  </span></sup>The Policing and Crime Act 2019 also introduced some changes in the system, but these changes were not implemented.<sup>5  </sup>The Home Office and the British Parliament&#8217;s Intelligence and Security Committee (ISC) remain imperfect with limited capacity for maintaining and conducting oversight over a powerful intelligence infrastructure. Recent reforms notwithstanding, the ISC remains a weak body over which the Prime Minister and government exercise their influence. The editors of <em>The U.K.&#8217;s Changing Democracy</em>  noted some aspects of security sector reforms as they pertain to the ISC and surveillance operations:<span class="Apple-converted-space"> </span></p>
<p>“Choreographed evidence sessions between the committee and the service heads suggest an over-cooperative, too close relationship. So too does the past willingness of the committee to very promptly exonerate the GCHQ petabytes the Snowden revelations and the charges of data collection and surveillance exceeding the agency’s remit—a clearance that occurred while the revelations were still emerging. Although the ISC criticized the lack of privacy safeguards in the Investigatory Power Bill, it did not secure major changes in the final act. Security Sector Reforms (SSR) is a complex process. Narrowly defined, it can encompass institutions and organizations established to deal with external and internal threats to the security of the state and its citizens. At a minimum, therefore, the security sector includes military and paramilitary forces, the intelligence services, national and local police services, border, customs, and coast guards. However, it is increasingly understood that SSR is broader than these institutions.”<sup>6<span class="Apple-converted-space"> </span></sup></p>
<p>British intelligence agencies supported the U.S.-led War on Terror, arresting civilians and handing them over to the CIA and U.S. military for interrogation. There was some degree of public condemnation over this partnership, but neither Parliament nor political parties were in any position to criticize the security services. On 28 June 2018, the UK Parliamentary Intelligence and Security Committee’s torture and rendition report was sharply criticized by human right NGOs: “The report is bound to contain some revelations and criticism about the U.K.’s agencies, but even more worrying is what it won’t contain,&#8221; said Bellah Sankey, Deputy Director of Reprieve. &#8220;The committee only saw what the government allowed it to see, being denied access to individual intelligence agents and could only question senior officers who were not directly involved in alleged torture and rendition,” Sankey continued.<sup>7</sup></p>
<p>On 03 June 2018, the Guardian reported: “Britain’s spies stand accused of continuing to share intelligence obtained under torture, in breach of official guidance. However, the <em>Daily Mail</em> reported Shadow Attorney General Shami Chakraborti’s anger: “The commissioner’s most recent report reveals a doubling of cases considered under the Consolidated Guidance, compared with the last three years, and an unprecedented number of acknowledged failures to apply the Guidance.”<sup>8</sup> MPs found that British spies had seen detainees being mistreated at least 13 times and were told by prisoners on 25 other occasions that they were being mistreated. On another 128 occasions, they were told of mistreatment by foreign agencies.<sup>9</sup> But despite having knowledge of malpractice, British intelligence agencies continued to supply questions for interrogations. The U.K. maintains a robust surveillance apparatus supporting police and security agencies in maintaining law and order.<sup>10</sup> GCHQ—the British signals intelligence agency—operates TEMPORA, a surveillance system designed to identify foreign threats and a competent tool for combating domestic terrorism and radicalization.<sup>11</sup></p>
<p>The role of the Interception Communications Commissioner (IoCC) is widely discussed throughout intellectual forums in the U.K. The IoCC&#8217;s role, and oversight mandate was seen as controversial and serving to alienate citizens from the state and government. The commissioner claimed that, under Part-1, Chapter-1 of the Regulation of Investigatory Power Act 2000, its role was to provide independent statutory oversight over the lawful interception of communication, and also asserted that it also investigates complaints.<sup>12</sup> Civil society and intellectual groups don&#8217;t agree with this assessment. The functions of the Office of Surveillance Commissioners (OSC) are not so different from that of Intelligence Surveillance Commissioner (ISC). The OSC use human intelligence sources under the Police Act of 1997, as well as under Part-11 and Part-111 of the Regulations of Investigatory Power Act of 2000 (RIPA). These institutions help the state to maintain security and stability as well as provide important information to intelligence agencies. Further expanding the functions of the Intelligence Surveillance Commissioner was the Justice and Security Act of 2013.<sup>13</sup></p>
<p>The introduction of mass surveillance programs by British and European intelligence services prompted a nationwide debate on the rights of civilians to be protected from illegitimate or warrantless collection, and analysis of their data and metadata.<sup>14</sup> British newspapers and human rights forums published numerous reports, in which experts expressed concerns about the diminishing privacy of citizens. However, the growing concern of citizens about the right of their privacy has also been reported in print and electronic media, but their voice was never heard.</p>
<p>Google, YouTube, Twitter, and Facebook continue to violate the rights of their users. They operate like intelligence agencies, collecting and noting every aspect of a user&#8217;s interactions and conversations.<sup>15</sup> “Don’t Spy on US,” a coalition of organizations released a policy paper in September 2014 highlighting surveillance and intelligence operations and their impact on the privacy of citizens in the EU and U.K.: “In summer 2013 it was revealed that GCHQ was routinely intercepting submarine fiber-optic cables containing private communication of millions of British residents (the &#8216;TEMPORA’ program). The reported scale of the interception is staggering: each day, GCHQ accesses some 21 petabytes of data—the equivalent of downloading the entire British Library 192 times.”<sup>16</sup></p>
<p>TEMPORA<sup>17</sup> is a surveillance tool used by Government Communication Headquarters (GCHQ). TEMPORA intercepts communications—collecting information from fiber-optic cables.<sup>18</sup> The system is able to access the data of large amounts of internet users, including personal data, regardless of individual suspicion or targeting. Edward Snowden noted in 2016 that TEMPORA maintains two principal components: Mastering the Internet (MTI) and Global Telecoms Exploitation (GTE).<sup>19</sup></p>
<p>Some intelligence experts argue that GCHQ is more effective at mass-surveillance than the U.S. National Security Agency (NSA) because TEMPORA has access to all telephone and internet communications—including Facebook and email—across Europe.<sup>20</sup> TEMPORA is comprised of different components codenamed POKERFACE and the XKEYSCORE. In a 2016 television interview, Edward Snowden revealed that the NSA and GCHQ were using a new surveillance system called MUSCULAR, one of at least four other similar programs that rely on a trusted second party. The programs together are known as WINDSTOP. According to newspaper reports, over a 30-day period from December 2012 to January 2013, MUSCULAR collected 181 million records, while INCENSER, another WINDSTOP program, collected over 14 billion records over the same period. MUSCULAR can collect information without needing warrants, and also supports the NSA&#8217;s PINWALE data collection system.<sup>21</sup></p>
<p>On July 1, 2015, the Investigatory Powers Tribunal (IPT), which investigates complaints of unlawful contact by the UK intelligence agencies, notified Amnesty International that the British government agencies had spied on the organization by intercepting, accessing and storing its communications.<sup>22</sup> The IPT previously identified one of two NGOs which it found had been subjected to unlawful surveillance by the U.K. government as the Egyptian Initiative for Personal Rights (EIPR) when it should have been identified as Amnesty International.<sup>23</sup> The other NGO which was spied on was the Legal Resources Center in South Africa.<sup>24</sup> The Investigatory Powers Tribunal said that until December 2014, GCHQ failed to provide clear enough details of how it shared data collected from mass internet surveillance. It was the IPT&#8217;s first ruling against an intelligence agency in its fifteen-year history.<sup>25</sup></p>
<p>The inquiry was prompted by the revelations from information leaked by former CIA contractor Edward Snowden.<sup>26</sup> The committee concluded that there was no bulk surveillance and gave a lengthy defense on it: “We have established that bulk interception cannot be used to search for and examine the communications of an individual in the U.K. unless GCHQ first obtain a specific authorization naming that individual, signed by a secretary of state.”<sup>27</sup> At the time, the government was attempting to restore control orders,<sup>28</sup> but the very concept of control orders had already failed.<sup>29</sup> Unless extremist returnees are de-radicalized at the community level, no control order can prevent them from joining the ISIS terrorist network.<span class="Apple-converted-space"> </span></p>
<p>Moreover, Britain faces the threat of cyber terrorism.<sup>30</sup> While GCHQ is a top-notch intelligence agency, the U.K. is unable to counter the threat of Chinese or Russian cyber attacks unless it increases the recruitment of young information warriors.<sup>31</sup> Russia maintains strong cyber forces that make use of technology the U.K. doesn&#8217;t have. The U.K. Cyber Security Strategy (2011) noted cyber threats were coming from other states that seek to conduct espionage to spy on or compromise the British government, military, industrial, and economic assets, as well as monitoring opponents of their own regimes.<sup>32</sup> Moreover, cyber-attacks that cause environmental and financial damage will carry a 14-year prison sentence.<sup>33</sup> Ironically, U.K. authorities have failed to arrest a single cyber-terrorist thus far, while professional hackers continue to establish their networks in the U.K. and target state institutions with impunity.<sup>34</sup> The U.K. faces a new form of intelligence war in which its institutions are attacked from a safe distance.</p>
<h4>Notes and references</h4>
<p>[1] Intelligence in Vex: The EU and UK intelligence agencies are in a state of fret. Musa Khan Jalalzai. Vij Publishing, India, 2018</p>
<p>[2] Ibid</p>
<p>[3] The Independent Police Complaints Commission, https://www.gov.uk/government/organisations/independent-police-complaint-commission</p>
<p>[4] Ibid</p>
<p>[5] Ibid</p>
<p>[6] The UK’s Changing Democracy: The 2018 Democratic Audit, edited by: Patrick Dunleavy, Alice Park, and Ros Taylor. LSE Press, 2018</p>
<p>[7] On 28 June 2018, the UK Parliamentary Intelligence and Security Committee released the torture and rendition report.</p>
<p>[8] Daily Mail, 03 June 2018, https://www.dailymail.co.uk/news/article-5800457/British-spies-accused-sharing-intelligence-obtained-torture.html</p>
<p>[9] The Independent, 28 June 2018, https://www.independent.co.uk/news/uk/home-news/uk-torture-rendition-detainees-treatment-isc-mi5-mi6-911-war-terror-a8421856.html</p>
<p>[10] Intelligence in Vex: The EU and UK intelligence agencies are in a state of fret. Musa Khan Jalalzai. Vij Publishing, India, 2018</p>
<p>[11] Ibid</p>
<p>[12] Interception of communication Code of Practice Pursuant to section 71 of the ROPA Act 2000, Interception of Communications Code of Practice Pursuant to section 71 of the Regulation of Investigatory Powers Act 2000 February 2015</p>
<p>[13] Ibid</p>
<p>[14] Intelligence in Vex: The EU and UK intelligence agencies are in a state of fret. Musa Khan Jalalzai. Vij Publishing, India, 2018</p>
<p>[15] Ibid</p>
<p>[16] Ibid</p>
<p>[17] Reforming Surveillance in the UK, The Don’t Spy on US campaign of various organizations that defend privacy report, September 2014, https://www.dontspyonus.org.uk/assets/files/pdfs/reports/DSOU_Reforming_surveillance.pdf</p>
<p>[18] Ibid</p>
<p>[19] Ibid; NSA Report: Liberty and Security in a Changing World, The President&#8217;s Review Group on Intelligence and Communications Technologies, Richard A. Clarke, Michael J. Morell, Geoffrey R. Stone, Cass R. Sunstein, Peter Swire, Princeton University Press, 31 Mar 2014</p>
<p>[20] Intelligence in Vex: The EU and UK intelligence agencies are in a state of fret. Musa Khan Jalalzai. Vij Publishing, India, 2018</p>
<p>[21] Ibid</p>
<p>[22] Press release of Privacy International: UK intelligence agencies admits unlawfully spying on Privacy International, 25 September 2018, https://privacyinternational.org/press-release/2283/press-release-uk-intelligence-agency-admits-unlawfully-spying-privacy</p>
<p>[23] Ibid</p>
<p>[24] Ibid</p>
<p>[25] Ibid</p>
<p>[26] Fact Sheet: Investigatory Power, HO News Team 17 June 2019, https://homeofficemedia.blog.gov.uk/2019/06/17/fact-sheet-what-are-investigatory-powers/. Securing the Insecure States in Britain and Europe. Musa Khan Jalalzai, Algora new York, 2017</p>
<p>[27] Ibid</p>
<p>[28] On February 16, 2015, The Guardian reported that a man from Liverpool had been charged with attempting to obtain a chemical weapon.</p>
<p>[29] Daily Times, 12 September 2014</p>
<p>[30] Ibid, Policy Paper, 04 December 2013</p>
<p>[31] Amnesty International, 03 July 2015<span class="Apple-converted-space"> </span></p>
<p>[32] BBC, 06 February, 2015</p>
<p>[33] The inquiry was prompted by the revelations from documents leaked by former CIA contractor Edward Snowden, The Guardian, 12 March 2015</p>
<p>[34] Ibid</p>
<p><a href="https://globalsecurityreview.com/changing-security-perceptions-britain/">Britain&#8217;s Changing Security Perceptions</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Shifting Dynamics of Britain&#8217;s National Security Threats</title>
		<link>https://globalsecurityreview.com/shifting-dynamics-british-national-security-threats/</link>
		
		<dc:creator><![CDATA[Musa Khan Jalalzai]]></dc:creator>
		<pubDate>Sat, 13 Jul 2019 13:37:52 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=12262</guid>

					<description><![CDATA[<p>With the advent of the twenty-first century came differing classifications of national security threats and a shifting order of strategic preeminence. The risk of extremism and consistent alienation of citizens in European countries have both expanded and diversified. Some European Union member states in the EU require security sector reforms and the replacement of old [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/shifting-dynamics-british-national-security-threats/">The Shifting Dynamics of Britain&#8217;s National Security Threats</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>With the advent of the twenty-first century came differing classifications of national security threats and a shifting order of strategic preeminence.</h2>
<p>The risk of extremism and consistent alienation of citizens in European countries have both expanded and diversified. Some European Union member states in the EU require security sector reforms and the replacement of old communist security and intelligence infrastructure to tackle the hydra of radicalization and extremism.</p>
<p>The British state has abruptly clattered down to “earth with a very hefty collision, thanks to the Brexit hydra.”<sup>1</sup> The country is in a profound social and financial crisis—its machinery and security infrastructure are operating on a long-established streak. Security sector reforms are needed to make the system professionalize and competent. Mr. Tom Winsor&#8217;s police reform paper and the inquiry report into the Justice system both stressed the need for professionalization of police and law enforcement agencies, but no practical implementation has occurred.</p>
<p>The British state is in trouble and is sliding into the unholy-mess of Brexit, and its future is going to become gloomy outside Europe due to its economic and political confrontation with the EU.<sup>2</sup> The culture of racism, hatred, social, and political discrimination intensified after the 2016 Brexit referendum.<sup>3</sup> Second, the Brexit crisis has become a permanent headache of government and civil society, which is going to damage the special relationship between the U.K. and the United States. The 2019 leak of a U.K. National Security Council meeting, in which cooperation on 5G infrastructure with Huawei—a Chinese technology company that is alleged to have close ties with the Chinese Communist Party&#8217;s armed wing, the People&#8217;s Liberation Army—was viewed by security experts as a matter of grave concern. If the company is permitted to operate with free-reign in the U.K., the country’s relationship and intelligence cooperation with the U.S. will be deeply affected.<sup>4</sup></p>
<p>British civil society and the country&#8217;s intelligentsia are, in large part, opposed to Brexit, citing Britain&#8217;s century-long relationship with the continent. On February 13, 2019, the Guardian newspaper reported the concerns of more than forty former Ambassadors and High Commissioners about the entanglement of Brexit and its ramifications. In a written letter to the Prime Minister May, they warned that “British influence in the world will wane if the country leaves Europe’s trading and foreign policy bloc”.<sup>5</sup></p>
<p>These all-embracing developments forced British Intelligence Chiefs to explain the importance of Britain’s intelligence sharing and security cooperation with the EU. On 20 June 2018, in a speech in Brussels, GCHQ Chief Jeremy Fleming’s statement was evident from his irritation about the dilapidating security crisis. He firmly demanded intelligence cooperation with the EU allies. In his speech, Fleming said; “After Brexit, the UK will continue to work with the EU. Fleming stated.<sup>6</sup> On 14 May 2018, Chief of MI5, Mr. Andrew Parker consistently demanded cooperation with the EU intelligence agencies: “In today’s world, we need that shared strength more than ever. I can say confidently that the way we work together has prevented loss of life in the EU.&#8221;<sup>7</sup> These statements were clear signs of irritation.<sup>8<span class="Apple-converted-space"> </span></sup></p>
<p>The Prime Minister did not bring to bear the concerns of intelligence Chiefs about the consequences of Brexit. In the aftermath of these critiques, the government introduced the National Security Capability Review (2018),<sup>9</sup> to tackle national security challenges, but the growing influence of extremist forces across the country<sup>10</sup>, cast doubt on the credibility and highlighted the weak approach of the May government to national security. The first major strategic failure of the review is that it did not elucidate the security road-map: “This lack of strategic clarity has been highlighted by the Joint Committee on the National Security Strategy (JCNSS), the main parliamentary body scrutinizing its implementation.”<sup>11</sup> The country’s National Security Strategy also missed the boat to keep momentum with emerging threats and didn’t adequately respond to the exponentially growing threat of radicalization.<sup>12</sup><span class="Apple-converted-space"> </span></p>
<p>In its 04 June 2018 version, the U.K. Counter-Terrorism Strategy highlighted many vulnerabilities, citing the proliferation of jihadism, and a growing number of terror networks across the country, which prompted negative perceptions about its operational effectiveness, and popularity.<sup>13</sup>, However, several new amendments were added to the National Security Strategy, Strategic Defense and Security Review, and Cyber Security Strategy, to make effective law enforcement and intelligence infrastructure against radicalized forces, lone wolves and foreign espionage, but these amendments are not a proper panacea to the looming security crisis—more work is needed to make police and security agencies effective.<sup>14<span class="Apple-converted-space"> </span></sup></p>
<p>From January to June 2019, more than 100 people in England were killed, and 100 more were injured in different incidents, but the police and law enforcement agencies have no security plan to address the concerns of communities. Interestingly, no single Muslim was found behind these attacks, while British Home Secretary Sajid Javed shamelessly linked terrorism to Islam. His recent verboseness against Islam appeared in a recent report of Christian Today newspaper: “Islam has been responsible for terrorist attacks in Britain&#8230;&#8230;.“it is ‘lazy’ and ‘wrong’ to suggest terror has nothing to do with Islam. But I think it is absolutely fair to say that there is a special burden on Muslim Communities because whether we like or not these terrorists call themselves Muslims, the newspaper reported.<sup>15 </sup>The Home Secretary acted irresponsibly and did not take into account the concerns of Muslim communities.</p>
<p>Adding insult to injury is the country’s Snoopers Charter Surveillance (SCS) and the government&#8217;s war on civilian privacy. Liberty, a British human rights organization recently highlighted the powers of the Snoopers Charter Surveillance and data collection methods that were causing communities irksomeness: “When the U.K. government passed a law allowing the mass collection of data from all U.K. citizens&#8230;..The Investigatory Power Act, more popularly known as the &#8216;Snoopers’ Charter,&#8217; allow for the indiscriminate collection of data”.<sup>16</sup> The police has now practically started using the Snooper Charter Surveillance on a borough-level to monitor communities and their activities day-by-day. <span class="Apple-converted-space"> </span></p>
<p>Recently, Liberty and Privacy International called on local communities to report the negative impacts of this consternating and offensive surveillance of local policing authorities, to the Police and Crime Commissioner. The way local police stations using modern surveillance technologies in streets and markets have put our privacy at risk. From car surveillance to mobile phone and drone technologies, the police forces have an unparalleled view into the lives of ordinary British citizens.</p>
<p>Individual liberty and human rights groups recently warned that excessive and offensive use of surveillance tools by the police might alienate communities from the state and government: “From facial recognition in streets to monitoring social media and mobile phones, the police are not open and honest about what tech they use, where they use it, who they use it against and what laws allow them to do so. However, surveillance tech is being used without the public knowledge or consent, on the ground that 95% percent civilians know nothing about the evolving and changing operational mechanism of police surveillance in cities, towns, and streets”.<sup>17</sup></p>
<p>More worrisome is the unauthorized surveillance in which South Asian intelligence agencies are using their spies against their political opponents. They are cruising in cities and towns with impunity, and receive their salaries through a third person, or from their embassies.</p>
<p>This author has personally experienced eaves-dropping many times in high streets and shopping plazas in London.<sup>18</sup> Foreign terrorist fighters present a significant threat to the national security and critical infrastructure of the country. Since 2014, we have seen large numbers of radicalized individuals traveling to Iraq and Syria, while Joint Terrorism Analysis Centre (JTAC), and Intelligence and Security Committee are showing their performance on papers in their annual reports. In reality, the state&#8217;s response has been feeble since the emergence of the Islamic State (IS) in Syria and Iraq.<sup>19 </sup>Intelligence wars between foreign entities on British soil is making thing worse. The security relationship with the EU community remains in flux, while internal political disagreement and deteriorating law and order are prompting a brain drain within civil society and intellectual forums.<sup>20</sup><span class="Apple-converted-space"> </span></p>
<p>EU resentment towards the U.K. raises several concerns—particularly the attitudes of France and Germany. In a knee-jerk reaction to U.K. electronic surveillance operations on its soil, Germany immediately canceled a Cold-War era agreement with U.K.<sup>21</sup> In 2013, Germany, France, and Spain summoned U.K. Ambassadors to explain the country’s motive behind its intelligence collection practices. To distract from this and in an effort to disguise its own weaknesses, the British government published a security document, underlining the threat of 20 foreign intelligence agencies to the U.K.<sup>22</sup> This was to prove that Germany and France were also spying on Britain.<sup>23</sup><span class="Apple-converted-space"> </span></p>
<p>British counter-extremism and counter-intelligence capabilities are broken. British law enforcement agencies face a multifaceted crisis, including the lack of a common operational mechanism, and a lackluster technical approach to domestic security.<sup>24</sup> The U.K. National Security Council also lacks the professional capacity to implement policy properly. Since the U.K. voted to leave the EU in 2016; huge questions surrounding its place in the international community were left unanswered. Prime Minister Theresa May sacked her Defense Minister, Gavin Williamson over the leaks of security secrets of the discussion of National Security Council about the Chinese Huawei crisis. This act of the Prime Minister proved that many things were not going in the right direction within her government.<sup>25</sup> I<span style="background-color: #f5f6f5;">inar research paper underlining crucial aspects of the NSC and its significance to national security, </span>Institute for Government research associates Dr. Joe Devanny and Josh Harris assert that:</p>
<p style="padding-left: 40px;"><em>“The NSC is a relatively new committee, but it is only the latest iteration of over a century of Prime-Ministerial efforts to coordinate national security issues from the center. To date, there have been few sustained attempts to examine the NSC and its performance. Four and a half years on different Prime Ministers choose to approach the issue, structure, and appointment of senior advisors in different ways. It is important that the center of government can accommodate each Prime Minister’s preferred way of working. Few Prime Ministers now take office with much experience of National Security issues, and National Security coordination is rarely a key them in general election campaign. But no Prime Minister needs to reinvent the wheel once in office; their predecessors have grappled with similar problems of coordination for over a century.”</em><sup>26 </sup></p>
<p>There are a number of national security and law enforcement agencies performing different stabilization roles in the country. However, if one examines their cycle of information, analysis, and operational mechanism, one can conclude that, without the introduction of meaningful security sector reforms, they will be unable to respond to looming national security challenges.<sup>27</sup></p>
<hr />
<p>[1] Britain’s Brexit Armageddon, Tyler Durden, 15 May 2019</p>
<p>[2] Intelligence in Vex, Musa Khan Jalalzai, introduction pages<span class="Apple-converted-space"> </span></p>
<p>[3] Whether it’s Brexit or Bremain, the UK is in long-term economic decline, David Brown, South China Morning Post, 28 May 2018 <a href="https://www.scmp.com/news/world/europe/article/3012428/uk-leadership-race-can-hong-kong-born-rory-stewart-beat-us-born">https://www.scmp.com/news/world/europe/article/3012428/uk-leadership-race-can-hong-kong-born-rory-stewart-beat-us-born</a><span class="Apple-converted-space"> </span></p>
<p>[4] The decline and fall of Britain, Brian Cloughley, 09 December 2016 <a href="https://www.counterpunch.org/2016/12/09/the-decline-and-fall-of-britain/">https://www.counterpunch.org/2016/12/09/the-decline-and-fall-of-britain/</a>, and also, Brexit Is Killing the Special Relationship: Britain’s partnership with the United States always depended on its usefulness—and that’s starting to fall off a cliff. BY STEPHEN PADUANO, Foreign Policy MAY 2, 2019, <a href="https://foreignpolicy.com/2019/05/02/brexit-is-killing-the-special-relationship/">https://foreignpolicy.com/2019/05/02/brexit-is-killing-the-special-relationship/</a></p>
<p>[5] National Security Capability Review another missed opportunity? Celia Mckeon Open Democracy 23 March 2018 <span class="Apple-converted-space">   </span></p>
<p>[6] National Security Capability Review: A changing security environment: Government response to the committee’s first report, 2017-19</p>
<p>[7] Intelligence in Vex, Musa Khan Jalalzai, introduction pages</p>
<p>[8] Brexit, BBC News, 20 June 2018.<span class="Apple-converted-space"> </span></p>
<p>[9] Sajid Javed: What has the new home secretary said about faith? Harry Farley, Christian Today, 30 April 2018</p>
<p>[10] Intelligence in Vex, Musa Khan Jalalzai.</p>
<p>[11] Guardian newspaper, 13 May 2018</p>
<p>[12] BBC 24 June 2016</p>
<p>[13] National Security Capability Review, March 2018</p>
<p>[14] The Guardian newspaper 04 November 2015</p>
<p>[15] Fixing the EU intelligence Crisis, Musa Khan Jalalzai, New York, 2017</p>
<p>[16] Stand up to police spying, Liberty and Human Organization, <a href="https://www.libertyhumanrights.org.uk/stand-police-spying">https://www.libertyhumanrights.org.uk/stand-police-spying</a></p>
<p>[17] Intelligence and Security Committee Annual Report 2017-18, January 2019, <a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/776111/Intelligence_and_Security_Committee_Annual_Report">https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/776111/Intelligence_and_Security_Committee_Annual_Report</a></p>
<p>[18] The National Security Council: National Security at the center of government, Dr. Joe Devanny, Josh Harris, Institute for Government report.</p>
<p>[19] The Guardian Newspaper, 11 October 2017</p>
<p>[20] BBC, 28 April 2018</p>
<p>[21] Regulation of Investigatory Powers Act (RIPA), BBC, 05 November 2015</p>
<p>[22] Intelligence in Vex. Musa Khan Jalalzai, VIJ Publishing, India, 2018</p>
<p>[23] Intelligence in Vex, Musa Khan Jalalzai.</p>
<p>[24] Ibid</p>
<p>[25] Ibid</p>
<p>[26] BBC, 01 May 2019</p>
<p>[27] The National Security Council: National Security at the center of government, Dr. Joe Devanny, Josh Harris, Institute for Government report. <a href="https://www.instituteforgovernment.org.uk/sites/default/files/publications/NSC%20final_0.pdf">https://www.instituteforgovernment.org.uk/sites/default/files/publications/NSC%20final_0.pdf</a></p>
<p><a href="https://globalsecurityreview.com/shifting-dynamics-british-national-security-threats/">The Shifting Dynamics of Britain&#8217;s National Security Threats</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Frenemies: Prospects and Challenges for the Military Integration of the Taliban into the Afghan Security Forces</title>
		<link>https://globalsecurityreview.com/frenemies-prospects-challenges-military-integration-taliban-afghan-security-forces/</link>
		
		<dc:creator><![CDATA[Tamim Asey]]></dc:creator>
		<pubDate>Tue, 02 Jul 2019 23:17:43 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Taliban]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=12164</guid>

					<description><![CDATA[<p>With a potential peace settlement on the horizon, much will depend on the prospects and challenges for the integration of Taliban battlefield commanders and fighters into the ranks of the Afghan military, police, and security service—else they could become a significant source of instability, igniting a new conflict by morphing into another splinter group or [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/frenemies-prospects-challenges-military-integration-taliban-afghan-security-forces/">Frenemies: Prospects and Challenges for the Military Integration of the Taliban into the Afghan Security Forces</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>With a potential peace settlement on the horizon, much will depend on the prospects and challenges for the integration of Taliban battlefield commanders and fighters into the ranks of the Afghan military, police, and security service—else they could become a significant source of instability, igniting a new conflict by morphing into another splinter group or becoming a lucrative recruitment channel from other terrorist groups such as ISIS, Lashkar e Tayeba, or Lashkar e Jahangvi, to name a few. A Taliban-Remnant could exploit disenchanted and extremist members of these groups to fill in their ranks.<span class="Apple-converted-space"> </span></p>
<p>Essentially, the Afghan national security apparatus requires a significant reorganization. Afghanistan’s existing military and security architecture must be reconfigured and restructured to accommodate former Taliban fighters and commanders, given the drastic changes that will come to the country’s threat environment once the Taliban give up the fight and agree to a peace deal. This could be either vertical or horizontal integration of individuals, groups, or units of Taliban commanders and fighters within Afghanistan’s existing military, civilian, and political institutions.</p>
<p>Many senior and mid-level Taliban commanders would want to join leadership roles in the Afghan army and police whereas their foot soldiers would like to join the Afghan security forces en masse. This will require a detailed roadmap outlining the ways and means of military integration. More importantly, such an integration roadmap should serve as a guarantor and accelerator for the long-term sustainability and resilience of any peace deal.</p>
<p>The Afghan Taliban is estimated to have between 60,000 and 100,000 fighters under the leadership of mutually exclusive operational commanders, along with mutually dependent political factions within the group, and a highly centralized chain of command but decentralized control and decision-making systems, which gives considerable levy and authority to local commanders to decide routine day-to-day operations in consultation with Taliban shadow administration officials (i.e. governors). This number fluctuates, peaking during the summer months, with seasonal fighters and volunteers coming from Pakistani madrasas to fight in Afghanistan. Numbers are at their lowest during the winter months, due to harsh weather conditions and logistical hurdles.</p>
<p>The Afghan government estimates that one-third of these fighters are foreign terrorist fighters who fight under the Taliban umbrella—these are global, regional and Pakistani terror outfits such as Al Qaeda, ISIS, ETIM, IMU and LeT among others. These fighters are vital for Taliban finances, logistics and provide sophisticated explosive making expertise. Therefore, any peace deal at the outset should require the Taliban to break ties with these terror outfits and foreign terrorist fighters. A challenging task which Taliban are yet to show the resolve and determination to undertake.</p>
<p>The integration of over 100,000 fighters and commanders into military and civilian life is going to be a daunting and fragile task, which would require delicate management and sharp political negotiation skills with both Afghan ownership alongside third-party foreign oversight—preferably from the United Nations.</p>
<p>Afghanistan is no stranger to disarmament, demobilization, and reintegration of former combatants into military and civilian life. Back in 2004, the Afghan New Beginning Program (ANBP) administered through the United Nations Development Program (UNDP) assisted in disarmament, demobilization and reintegration of thousands of former mujahidin and combatants but with mixed results. It was followed by the Disarmament of Illegal Armed Group (DIAG) program which again had mixed results given lack of Afghan ownership and a strong presence of warlords within the Afghan security and military institutions.</p>
<p>Any military integration of the Afghan Taliban within the ranks of the Afghan military and security institutions would have to be defined within the limits of the type and structure of the new state and subsequently what kind of a security structure and organization would be agreed upon by all sides of the conflict. Furthermore, international experience especially in Africa and South Asia shows that after a peace deal certain countries have opted to downsize the number of their security forces given the new threat environment and have opened up space through reservation and quota within the shrinked security structure for the combatants and their commanders to become apart of the new security and military apparatus.</p>
<p>Military integration of the Taliban fighters and commanders within any new or existing military and security architecture would require a multi-year phased linear approach under the ownership and management of Afghans with the technical assistance of a third party ie the United Nations (UN) with political plus financial support of the United States and its NATO allies as they draw down their troops and redirect a fraction of that cost towards financing the budget required to reintegrate Taliban combatants and commanders in the Afghan military and civilian life.</p>
<h3>The Approach</h3>
<p>International experience shows that there are mainly three approaches to military integration. Albeit, Afghan history can also guide us in this regard and has its own versions of military integration after the fall of the communist regime in the 1990s and later in early 2000 during the fall of the Taliban regime – both of which were more institutional cleansing than military integration.<span class="Apple-converted-space"> </span></p>
<p>The three military integration models are:<span class="Apple-converted-space"> </span></p>
<ol>
<li><i>A consent-based approach, </i>where a comprehensive negotiated settlement of the conflict is reached between the warring parties and the government forces absorb the combatants within its ranks and/or the two forces from the different warring parties merge and constitute a brand new single national security force.<span class="Apple-converted-space"> </span></li>
<li><i>A complete demobilization model, </i>where the government downsizes its forces but does not integrate combatants into the national security forces.</li>
<li><i>A coercive model of peace building, </i>where forced disarmament and demobilization of the armed rebels takes places with external assistance (i.e., UN mandated forces).</li>
</ol>
<p>In all these models—the most feasible one for the Afghan case is the consent based model whereas the ANDSF is resized based on the new threat environment and security landscape and the Taliban commanders and fighters are accommodation across all the level of ANDSF through a quota and reservation system.</p>
<h3>The Prospects<i><br />
</i></h3>
<p>In the event of a comprehensive deal with the Afghan Taliban – military integration will inevitably be part and parcel of any peace deal. The foundational questions which needs to be tackled at the outset of any peace deal will be: what will be the size and shape of the new security and military architecture of Afghanistan in view of the new security environment and based on what model (i.e. NATO or non-NATO military model) as well as the future relationship of the Taliban with the United States and its allies. These foundational questions will determine the size, scope and sustainability of the future Afghan military and security forces of which the newly demobilized Taliban fighters and commanders will be an integral part of it.<span class="Apple-converted-space"> </span></p>
<p>Subsequently, the Taliban can be integrated at three levels, with senior commanders at the top, mid-level commanders in the middle, with foot soldiers making up the base. Integration can be done individually, in groups, or unit integration at the field level. Senior and mid-level Taliban commanders would expect positions of influence within or outside of the Afghan military and security services. This can be approached through a bottom–up field level integration at the division or corp level or be undertaken through individual negotiations with Taliban military leaders through a screening and filtering mechanism.</p>
<p>Much will also depend on the size of the new Afghan military and their operational priorities in view of the rise of Daesh and emergence of Taliban splinter groups and criminal outfits post Taliban peace deal who would split from the Taliban chain of command and carry on the fight in pursuit of their own political and business agendas.</p>
<p>Under such such circumstances—in the interim—the Afghan government and its allies will have to integrate Taliban rank and file within the existing ANDSF size and structure and then through a roadmap transform and downsize ANDSF into a more affordable and sustainable force. This interim integration could be done through center and field level integration (i.e., integrating Taliban units to various geographical army corps across the country and integrate senior Taliban commanders in Kabul HQ).</p>
<p>In the long run – the Afghan government together with its allies, will also have to decide how many professional armed forces and how many auxiliary local forces they need for securing the country. This could provide an opportunity for Afghans and their NATO allies where the existing army could be kept as a professional force, albeit significantly downsized, whereas the Taliban forces with some exception could be added as auxiliary local forces given their vast presence in the country side to complement the security work of the newly reorganized Afghan army.</p>
<p>Furthermore, the Taliban commanders and fighters will need to go through sensitization programs as well as short and long-term training courses plus attend joint exercises with the Afghan forces to promote unity in the force. This will help cohesiveness and efficiency within the command and control structure of the newly reorganized and reconfigured Afghan military.</p>
<h3>The Challenges</h3>
<p>Naturally, with the military integration of the Afghan Taliban within the security infrastructure of Afghanistan comes many sets of political, military, institutional, cultural, financial and budgetary challenges. In fragile countries such as Afghanistan, the biggest of them all will be the political challenge – wherein both sides of the conflict remain committed and resilient regardless of the change in personalities and leaders to the agreed terms of the peace deal and do not use military force as a means of political leverage on each other.</p>
<p>Most of the peace deals and military integration plans fail because one side renege on their commitments and start using military force as a political leverage. Second, comes the institutional absorption capacity to accept change and not to resist the integration of the Taliban commanders and fighters within their ranks.</p>
<p>This is followed by the management and financial requirements which is the least of our worries since a third party (i.e. the UN with the help of the international community) will assist in providing the technical expertise and raise funds to finance the budgetary requirements of the peace deal and military integration plan.</p>
<p>In the case of Afghanistan, the two top challenges will be political resilience and institutional capacity to transform and accommodate the newly integrated Taliban commanders and fighters. The rest can be managed.</p>
<h3>The Mechanism</h3>
<p>Based on international best practices, there are normally two internationally recognized mechanisms through which Taliban fighters and commanders can be integrated within the rank and file of Afghan forces: (a) a temporary parallel co-existence mechanism until full integration happens which is normally referred to as <i>interim security arrangement; </i>and (b) <i>immediate reintegration</i> whereas forces are immediately disarmed and demobilized by individuals, groups and units sometimes keeping the entire command and control structure intact.</p>
<p>Both mechanisms have their pros and cons, under the interim security arrangement both forces co-exist within their geographies under their control but in a cooperative manner (i.e. ceasing hostilities providing security and law enforcement services to their respective areas eventually merged into one force). This mechanism is a recent phenomenon due to size and institutional absorption capacity issues. Many military integration and DDR processes have failed because it has stalled due to institutional capacity issues and political infightings. Therefore, an interim period is envisioned whereas the forces are integrated in instalments over a period of time while both forces co-exist with each other in a cooperative manner conducting joint patrols, joint trainings and exercises. This will assist in better integration and merger of the two forces.</p>
<p>The immediate mobilization mechanism is doable only when the size of the opposing warring parties are small and the institutional absorption capacity in the military apparatus of the country is high with a firm political will and adequate financial resources at hand. This is normally the classic method of military integration whereas the armed rebels are disarmed and demobilized immediately and reintegrated within the government security forces through an elaborate screening, training and professionalization process.</p>
<h3>The Way Forward</h3>
<p>For any peace deal to succeed in a complex case environment such as Afghanistan, it is imperative that it has to have a robust military integration roadmap for integrating Taliban fighters and commanders within the existing or a new Afghan military and security apparatus. This means Afghans together with their international partners will need to reassess their force size, posture, composition and operational readiness in view of the new challenges that would emerge in the event of a post peace deal with the Taliban.</p>
<p>The Taliban leadership will also have to evaluate and make certain key decisions such as what kind of an army and police they envision for Afghanistan? How do they intend to break their ties and fight foreign terrorist groups such as Al Qaeda, ISIS, LeT, and others, as well as to define their long-term relations with the United States and its allies?</p>
<p>Finally, the United States and its allies must define what, when, how, and under what circumstances they will continue assisting post-peace deal Afghan security forces reconstituted and reorganized with Taliban commanders within its ranks?</p>
<p>All of the above decisions will have a significant bearing over the success and failure of any potential military integration plan for the Taliban commanders and fighters within the ranks of the Afghan security forces.</p>
<p><a href="https://globalsecurityreview.com/frenemies-prospects-challenges-military-integration-taliban-afghan-security-forces/">Frenemies: Prospects and Challenges for the Military Integration of the Taliban into the Afghan Security Forces</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CPP-NPA and the Duterte Administration: Realpolitik in Insurgency and Terrorism</title>
		<link>https://globalsecurityreview.com/cpp-npa-duterte-administration-realpolitik-insurgency-terrorism/</link>
		
		<dc:creator><![CDATA[Maria Kristina Decena Siuagan&nbsp;&&nbsp;Jumel Gabilan Estrañero]]></dc:creator>
		<pubDate>Mon, 24 Jun 2019 20:43:45 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Communism]]></category>
		<category><![CDATA[Philippines]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=11862</guid>

					<description><![CDATA[<p>For the Communist Party of the Philippines and its armed wing, the National People&#8217;s Army, strategic positioning is key to spreading influence from the organization&#8217;s core to the grassroots level. NPA tactics of dispersal, concentration, and shifting can be viewed from two perspectives: in line with their activities or ideological, political, and organizational (IPO) efforts [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/cpp-npa-duterte-administration-realpolitik-insurgency-terrorism/">CPP-NPA and the Duterte Administration: Realpolitik in Insurgency and Terrorism</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>For the Communist Party of the Philippines and its armed wing, the National People&#8217;s Army, strategic positioning is key to spreading influence from the organization&#8217;s core to the grassroots level.</h2>
<p>NPA tactics of dispersal, concentration, and shifting can be viewed from two perspectives: in line with their activities or ideological, political, and organizational (IPO) efforts as well as about that of the enemy, the Armed Forces of the Philippines (AFP). To conduct extortion and other malign activities, NPA territorial platoons break up into squads to cover the area of the platoon within the guerrilla zone (GZ) with each squad having an assigned number of 10 barrios at an average.</p>
<p>The SDG<i> (</i><a href="https://newsinfo.inquirer.net/221675/npa%E2%80%99s-sparrows-stepping-up-killings-claims-afp"><i>Sentro de Grabidad</i></a>, which serves as a “rallying point of all other NPA units engaged in military or mass works in the guerrilla front&#8221;<i>)</i> disperses with its squads only deployed in a shorter distance from a relative center conducting the same activities. Both platoons consolidate during conferences, training, and assessment exercises. Shifting is done when a platoon transfers to a different area within the same <a href="https://smallwarsjournal.com/blog/ending-an-insurgency-violently">guerrilla front (GF)</a> or to a different front to participate in a new mission or for a more specific reason, like augmenting the forces of the neighboring GF.</p>
<p>The NPA has also been externally linked with Non-Government Organizations (NGOs) where financial aid is being used to entice both members of the <a href="http://www.refworld.org/pdfid/4d5a310e2.pdf">Lumad ethnicity and others to dig in. Yunit Milisyang Bayan (MBs)</a>, a highly acclaimed foothold of NPA, has driven a lot of Lumads to take part in the revolution from the ground. As an organized group, they are being armed by NPA themselves to become rogue members of NPA units. For instance, Surigao’s <a href="https://www.pna.gov.ph/articles/1061897">ALCADEV (Alternative Learning Center for Agricultural Development)</a> secures foreign funding from Europe for a hidden agenda—instilling the belief that the government cannot help them, the only groups that can are CPP cadres disguised as teachers, management committees, and even politicians. As usual, with the support of legal fronts, the issue of confronting this will die down in the process because of the protection and bias of various interest groups in favor with NPA. Legal fronts are composed of the following: the Makabayan bloc—<a href="https://smallwarsjournal.com/blog/ending-an-insurgency-violently">Bayan, Anakbayan, Karapatan, Anakpawis, Act Teachers, Gabriela</a>, and all other related groups.</p>
<p>In the aftermath of <a href="https://www.manilatimes.net/ending-insurgency-local-way/321912/">President Rodrigo Roa Duterte</a>&#8216;s 2017 State of the Nation Address (SONA), the CPP-NPA exploited the President&#8217;s controversial statement that <a href="https://www.afp.mil.ph/index.php/news/8-afp-news/460-on-the-alleged-militarization-of-lumad-communities">Lumad schools</a> were being run and manipulated by CPP-NPA. According to Armed Forces of the Philippines ‘official website, the CPP-NPA employed an institutionalized self-imposed ‘Taktikang Bakwit’ as a well-versed orchestra of rhetoric directed at the President. Conversely, the Kalumbay Lumad Alliance in Northern Mindanao led by Datu Jomorito Goaynon involved itself the investigation of alleged abuses and violations allegedly committed by army troops under 4ID and the PNP as well in Bukidnon, Surigao, and Agusan Provinces August 15, 2017.</p>
<p><img loading="lazy" decoding="async" class="wp-image-11890 aligncenter" src="http://globalsecurityreview.com/wp-content/uploads/2019/06/terror-attacks-philippines.png" alt="" width="499" height="343" srcset="https://globalsecurityreview.com/wp-content/uploads/2019/06/terror-attacks-philippines.png 677w, https://globalsecurityreview.com/wp-content/uploads/2019/06/terror-attacks-philippines-300x206.png 300w" sizes="(max-width: 499px) 100vw, 499px" /></p>
<p>According to a 2017 report by <a href="https://reliefweb.int/report/philippines/escalating-violence-new-people-s-army-mindanao">Luke Lischin</a>, sixty-four percent of recorded incidents were armed assaults involving the exchange of small arms fire (at a minimum) between the NPA and other actors, 19 percent were attacks on facilities or infrastructure such as mining sites, plantations, and vehicles, while the remaining incidents entailed abductions, arrests, and assassinations/executions.</p>
<p>Further, the CPP-NPA has also initiated a socio-politico strategy of linkage. The <a href="https://www.philstar.com/headlines/2018/12/09/1875575/schools-network-rejects-afp-claim-communist-recruitment">Save Our Schools Network (SOS Network)</a> is essentially an extension of the communist party working to subversively influence target populations by using powerful institutions and personalities in their disinformation operations, masked by the appearance of charitable work. This influence campaign supports the efforts of militants, which routinely violate the <a href="https://thediplomat.com/2019/05/bloody-violence-haunts-philippine-sugar-plantations-in-negros/">CARHRIHL (Comprehensive Agreement for the Respect of Human Rights and International Humanitarian Law).</a></p>
<p>In part, the rejection of activism as a concept stems from a belief that a sufficient amount of change has already been made. In connection therewith, many lives of promising students recruited into the organization ended too soon and too tragically because they crossed the path to armed struggle. We can see that rebel life was being romanticized by insurgents, adding that in truth, it was a portal to a life of suffering, violence, and crime. Thus, activism and membership in specific organizations could lead to a violent fate. This way of thinking emerges when people frame the righting of great historical wrongs as concessions that one group has personally made, in largesse bestowed in some ongoing negotiation (i.e., peace talks) for which there must be a quid pro quo.</p>
<p>In assessing prominent Communist politicians in government and their prospects for gaining power in a legislative manner, particularly now that national elections are nearing, one could arguably make the case that it would take years to accomplish such a goal. The CPP&#8217;s aim has always been to overthrow any individual in a leadership position. Such actions were initiated by during the administrations of three former Presidents—Joseph Ejercito Estrada, Gloria Macapagal Arroyo, and Benigno “Noynoy” Aquino III.</p>
<p>The CPP-NPA successfully ousted former President Estrada in January 2001 through the Erap Resign Movement but failed to oust both Presidents Gloria Arroyo and Noynoy Aquino through their Oust Arroyo campaign in 2006, and Kilusang Talsik in 2013. The CPP-NPA is currently engaged in the Oust Duterte Movement under a “Grand Coalition,” and are also working on other anti-Duterte initiatives—the <a href="https://news.mb.com.ph/2018/09/23/galvez-parlade-reveal-broad-coalition-allegedly-engaged-in-dutertes-ouster/">Coalition For Justice (CFJ) and the Tindig Pilipinas</a>.</p>
<p>The <a href="https://news.mb.com.ph/2018/09/23/galvez-parlade-reveal-broad-coalition-allegedly-engaged-in-dutertes-ouster/">Coalition For Justice (CFJ)</a> is composed of a group of judges led by former Chief Justice Maria Lourdes Sereno, the Evangelical Church led by Pastor Caloy Dino, and the Integrated Bar of the Philippines (IBP) with Attorney Susan Villanueva as the lead personalities. Meanwhile, Tindig Pilipinas is composed of the rejectionist (RJ) group, <a href="https://patolangpilipina.com/talakitok-101/dumadami-ang-mga-grupong-gustong-patalsikin-si-duterte/">Liberal Party and Magdalo Group</a> with Senator Antonio Trillanes, Congressman Gary C Alejano (who campaigned for a Senate seat), Aleta Tolentino, and Ricky Garchitorena as the lead personalities.</p>
<p>Moreover, now that the national election will happen in the same month when Marawi Siege erupted despite its liberation from the hands of Maute-ISIS inspired terrorists, rumors, hearsays, and atrocious commentaries have been circulating to dissuade the people from believing Government’s efforts regarding Marawi rehabilitation. Recently, members of the <a href="https://www.gmanetwork.com/news/news/nation/658362/makabayan-bloc-seeks-probe-into-alleged-rights-violations-rehab-efforts-in-marawi-city/story/">House Makabayan bloc filed a Resolution 1973</a> seeking an investigation into the human rights situation and the status of reconstruction in the Islamic City of Marawi.</p>
<p>The resolution was spearheaded by ACT-Teachers  Reps. Antonio Tinio and Frances Castro, Gabriela Reps. Emmi de Jesus and Arlene Brosas, Bayan Muna Rep.  Carlos   Zarate,  Anakpawis  Rep.  Ariel  Casilao,   and   Kabataan Rep. Sarah Elago specifically asked the House committees on human rights and Muslim affairs to conduct an inquiry, in aid of legislation, on reports of human rights violations in Marawi and   other   grave   concerns   of   the   local   people   on   the   government’s   post-siege rehabilitation   plans   in   Marawi.   Meanwhile,   Amnesty   International,   in its report on November 2017 said that the Philippine security forces violated the prohibition on the use of torture and other ill-treatment of people in their custody, adding that most of the violations were carried out against civilians who were escaping from the besieged lakeside town and seeking military protection.</p>
<p>In one case, Bayan Muna Rep. Carlos Isagani Zarate cited an alleged Armed Forces of the Philippine’s (AFP) anomaly wherein the P192.5  million <a href="https://www.bworldonline.com/localized-peace-talks-could-be-money-making-scheme-for-lgus-security-forces-says-zarate/">Payapa at Masaganang Pamayanan (PAMANA)</a> program in Maguindanao is unconstitutional and promoted corruption. Zarate, as is his style, jumped on the bandwagon of Peace Adviser Jesus Dureza&#8217;s recent statement that he decided to return the extra amount in exchange for a newer version of the budget resolution to be used for allocating funds going forward. They argued that the Peace Talks are a worn-out psychological warfare tactic designed to project victory while concealing the continuing failure of the AFP to suppress the popular resistance and stem the steady growth of the NPA.</p>
<p>Meanwhile, last year, the CPP trade union campaign was developed by the <a href="https://www.gmanetwork.com/news/news/nation/670007/palace-dole-usec-maglunsod-sacked-over-strikes/story/">National Organization Department (NOD)</a>—specifically the National Trade Union Bureau (NTUB)—with <a href="https://www.gmanetwork.com/news/news/nation/670007/palace-dole-usec-maglunsod-sacked-over-strikes/story/">former DOLE Undersecretary Joel Maglunsod</a> serving as a critical player. When PRRD declared his intentions to stop the practice of ENDO—the so-called &#8220;labor contractualization,&#8221; Secretary Bebot Bello and Undersecretary Maglunsod collaborated in coming up with the Department Order 174, which imposed workers regulations. Maglunsod, an active member of the CPP operating inside DOLE, led the national audit and inspection of all labor force situation in big companies and industries, with the dubious participation of a known CPP legal organization, the KMU.</p>
<p>Currently, the CPP-NPA also co-opts the grievances of Marawi residents with grave concerns and frustrations over the lack of a clear and comprehensive rehabilitation plan for internally  displaced   persons, a lack of recognition and   accountability over intelligence failures on the part of the government, inability to stem the flow of terrorist groups into Marawi, an absence of any government statement or commitment to indemnify lost lives or provide compensation for damaged property, no assurance of assistance in rebuilding damaged or destroyed mosques and madrasahs, and the apparent absence of a clear government plan for lifting martial law in Mindanao.</p>
<p>The CPP&#8217;s rhetoric advances their interests to position the party at all levels of the political hierarchy—from the individual level to party-list representatives. This strategy is designed to counter the government’s initiatives on charter reform and federalism. Thus, the <a href="http://constitutionnet.org/news/dutertes-philippines-and-push-constitutional-shift-towards-federalism">CPP-NPA are wary over the potential to reform the country&#8217;s system of government</a> to a more federalist structure, as this will abolish the Party-list system, which would severely affect the entire organization. This was validated by José María Canlás Sison&#8217;s statement citing that “federalism is meant to concentrate executive, legislative, and judicial powers in the hands of Duterte.&#8221;</p>
<p>Externally, the European Union’s funding for Communist Non-Government Organizations (NGOs), along with UN Special Rapporteur for the Indigenous People (UNSRIP) and similar EU agencies, reveal that the CPP-NPA has successfully established international alliances through front organizations—purportedly to address social ills afflicting Filipino society.</p>
<p>Through its International Department, infiltrating the UN and engaging the EU through &#8220;Lakbay Lumad Europe,&#8221; to achieve the eventual revival of the People’s Permanent Tribunal, the CPP-NPA intends to humiliate the Duterte administration in international arena purposely to reinforce the initiative of delegitimizing the President on the international stage. According to CNN Philippines, the CPP-NPA is on EU&#8217;s list of terrorist organizations, yet the government&#8217;s motion to label communist rebels as terrorists is still pending before a local court.</p>
<p>Among the listed Philippine NGOs were the Alternative Learning Center for Agricultural and Livelihood Development (ALCADEV); IBON Foundation; Karapatan; Mindanao Interfaith Services Foundation, Inc.; the Rural Missionaries of the Philippines; the Salugpungan Ta&#8217;tanu Igkanugon Community Learning Center, Inc.; the Alliance of Health Workers; the Kilusang Mayo Uno; Gabriela; and ACT. Meanwhile, the ALCADEV and Salugpungan are identified as CPP-NPA alternative learning centers and schools.</p>
<p>In response, the National Security Adviser and Vice Chairman of the National Task Force to End Local Communist Armed Conflict (NTFELCAC) Hermogenes Esperon formally wrote to the <a href="https://www.pna.gov.ph/articles/1061897">European Union (EU)</a> to &#8220;immediately cease&#8221; funding to groups serving as legal fronts of the Communist Party of the Philippines-New People&#8217;s Army. In a letter to Gilles De Kerchove, EU Counter-Terrorism Coordinator, dated March 26, <a href="https://www.pna.gov.ph/articles/1066058">Esperon said EU funds</a> are being used to sustain terrorist activities of the longest-lasting existing communist terrorist organization in the world—the CPP-NPA—which is listed as a terrorist group by both the United States and the EU.</p>
<p>On March 28, 2019, the EU received a set of documents concerning the more specific allegations by the Government. As a result, the <a href="https://eeas.europa.eu/delegations/philippines/60406/press-statement-eu-delegation-philippines-regarding-alleged-funding-ngos-linked-cpp-npa_en">EU issued a Press Statement</a> stating that “since 2005 the EU considers the Communist Party of the Philippines and the New People&#8217;s Army as terrorist groups, which means, among other things, that no assets can be held in EU by these organizations.”</p>
<p>The European Union&#8217;s commitment investigate the government&#8217;s allegations that EU funds have been donated to groups acting as legal fronts of the Communist Party of the Philippines (CPP) and its armed wing New People&#8217;s Army (NPA) is clear, as outlined in the statement. In April, it was announced that an external firm would be auditing EU grants to non-government organizations (NGOs) in the Philippines that were allegedly funneled to the Communist Party of the Philippines-New People&#8217;s Army (CPP-NPA). The EU did not just commit to looking into the voluminous documents the <a href="https://www.pna.gov.ph/articles/1066058">NTF (National Task Force)</a> has submitted; it also committed to enlisting a third-party firm to audit the funds they donated to <a href="https://globalnation.inquirer.net/173959/belgium-probes-ngos-links-to-cpp-npa">NGOs reported having links with the CPP-NPA.</a></p>
<p><a href="https://globalsecurityreview.com/cpp-npa-duterte-administration-realpolitik-insurgency-terrorism/">CPP-NPA and the Duterte Administration: Realpolitik in Insurgency and Terrorism</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Economizing Defense: A Roadmap for Building Sustainable Afghan Security Forces</title>
		<link>https://globalsecurityreview.com/economizing-defense-roadmap-sustainable-afghan-security-forces/</link>
		
		<dc:creator><![CDATA[Tamim Asey]]></dc:creator>
		<pubDate>Wed, 12 Jun 2019 14:42:57 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Southeast Asia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=11837</guid>

					<description><![CDATA[<p>Back in 2004, when Afghan and American generals were laying the foundations for the post-Taliban Afghan army and security forces the number one question in the minds of everybody around the table was “who will pay for it?”  In those days, it was assumed the burden would fall on the United States and its allies, [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/economizing-defense-roadmap-sustainable-afghan-security-forces/">Economizing Defense: A Roadmap for Building Sustainable Afghan Security Forces</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Back in 2004, when Afghan and American generals were laying the foundations for the post-Taliban Afghan army and security forces the number one question in the minds of everybody around the table was “<i>who will pay for it?”</i><span class="Apple-converted-space"> </span></p>
<p>In those days, it was assumed the burden would fall on the United States and its allies, but that calculation is changing fast with President Trump in office and war fatigue across the capitals in Europe. Today, the answer is simple: Afghans will pay for it through revenues from its vast natural resources and geographical position combined with a national conscription system. <span class="Apple-converted-space"> </span></p>
<p>In the early days of U.S. invasion of Afghanistan, there were three schools of thought over the future of the Afghan armed forces. In the first, there were those who believed that Afghanistan does not need a full-fledged army and police but a small defense force to quell local revolts and maintain border security. This was based on the rationale that international security forces would remain for the long run in the country and also due to objections from former Pakistani dictator, General Pervez Musharraf,<span class="Apple-converted-space">  </span>who opposed the establishment of a large army for Afghanistan for geopolitical reasons. The second school of thought advocated for an Afghan army and security forces in the scale and size of the pre-civil war era (i.e. 250,000 strong with an airforce). Third, was a group of Afghan monarchists and former mujahidin who believed in the mobilization and transformation of the existing mujahidin and militias into an army and police. Of course, none of those options prevailed. Instead, Afghans together with their NATO allies raised, trained and deployed a completely new army based on their threat perception and needs assessment for the country.</p>
<p>In 2014, during the transition of the security responsibilities from International Security Assistance Force (ISAF) to Afghan forces led by Gen. Patreaus and the then chairman of the transition commission and now President of Afghanistan, Ashraf Ghani, there was a golden opportunity to reconfigure and redesign a financially sustainable Afghan security forces but this chance was lost. Although steps were taken, other priorities took over, and the task remained unfinished. While the Bilateral Security Agreement (BSA) under the Strategic Partnership Agreement (SPA) with the United States, alongside the NATO Status of Force Agreement (SOFA) ensures long-term funding, training, and mentoring to Afghan forces, the election of President Trump and increasing war fatigue in the United States has put the long-term future of bilateral security cooperation on uncertain and shaky ground.</p>
<p>Almost for a hundred years, Afghanistan owned a military despite many periods of instability and political anarchy, which it funded through a mixture of traditional and non-traditional sources. The traditional sources of funding included a quota based national conscription mechanism through tribal elders and maliks to fill in the ranks of the army and police; imposition of local taxation and food rations to feed the army and security forces, and finally reliance on local transport for logistics and sustenance. The non-traditional aid came largely from the British Raj and the Russians (later the Soviets).</p>
<p>The Raj, the Russians, Germany,  Turkey, and others provided military equipment and training. Amir Sher Ali Khan established the first Afghan army with some auxiliary tribal militias with the financial and technical support of the British Raj and Russian czar. This army was trained, equipped and funded over the years with a mixture of British tributaries, equipment from British Raj and local taxation and quota conscription system on local tribal elders across the country.  conscription became a controversial matter much later on during the communist regime when many Afghan youths were pushed into the frontlines to fight against the mujahidin, many of whom never returned home, which led to massive migration of Afghan youth to neighboring countries for safety and work. But the culture, practice, and acceptability of conscription as a system existed during the reign of various Afghan rulers. Afghan kings, historically, used a national quota conscription system to fill the ranks of the army and security forces.</p>
<p>Today, Afghanistan has a paid volunteer army and security forces, which is almost entirely funded by the United States and NATO allies. Any experienced military expert will tell you that raising, maintaining, and sustaining a voluntary force is extremely expensive and complicated for poor and aid-dependent economies. Turkey, Israel, Iran, Tajikistan, Uzbekistan and a dozen other states, in the Afghan neighborhood and beyond, who are in a much better economic and financial state run a national conscription system to sustain its armed forces.</p>
<p>Afghanistan can use the revenue from its vast mineral wealth, sale of its abundant water resources to neighbors, transit fees as a land and air bridge to South and Central Asia and export of high-value agriculture crops to fund its security forces. The Afghan leadership and its international partners can rethink, reconfigure, and redesign affordable and financially sustainable Afghan forces through reinstating a carefully designed national conscription system, build up of local defense industries to drive cost down and saving on essential defense budget items to pave the way for medium to long-term financial sustainability of the Afghan security forces.</p>
<p>The time has come for the Afghan military leaders and its international partners to make some hard choices and decisions for the long-term financial sustainability and viability of the Afghan security forces. They will have to rethink, reconfigure, and build a fiscally sustainable, operationally efficient and capable military increasingly funded from the domestic revenues of Afghanistan.<span class="Apple-converted-space">  </span>This can be done through a combined four-track financial sustainability strategy:<em> a. F</em><i>orce management and national conscription; b. </i><i>Fiscal austerity and budgetary savings; c. </i><i>Building local defense industries; and d. </i><i>Establishing localized defense and militias.</i></p>
<p>The first significant decision to make is whether the Afghan military and political leadership would like to have a NATO or non-NATO regular army and security forces. Some military experts argue that a NATO standard Afghan army and security forces can only be viable if Afghanistan remains a long-term ally of NATO and the west with a functioning self-sustaining economy while others advocate for a hybrid standard (i.e. a mixture of NATO and non-NATO standard force based on the agility, mobility and needs assessment of the various units with the Afghan armed forces.</p>
<p>The second major decision is to implement a national, local quota-based conscription mechanism combined with better force management, salary, and remuneration rationalization and anti-corruption drive which could significantly drive down the personnel costs within the Afghan armed forces.<span class="Apple-converted-space"> </span></p>
<p>The idea of enacting drafting or conscription is a politically charged subject in Afghanistan, especially if you have a politically fragile government in Kabul, which lacks broad-based political support. This is primarily due to bad memories of the population from the communist era conscription drive, which led to the deaths of thousands and migration of much more Afghan youth from the country. The Afghan mujahidin and even Taliban to this day impose local conscription in their areas of control.</p>
<p>If the local elder does not generate the required quota of able-bodied men to fight, he will have to offer money, cattle, or agricultural products as a replacement. This exact practice has been in place since the rule of the Afghan Iron Amir, Amir Abdulrahman Khan, in the late eighteenth century who for the first time used this method as a systematic way to fill in the ranks of the Afghan military. The current Afghan government will have to enact a carefully designed quota-based local, national draft or conscriptions system. This will assist in significantly driving down the costs of the Afghan armed forces; foster patriotism and shift much needed budgetary resources to other priorities within the security sector.</p>
<p>Furthermore, the Afghan government can save significant amount of money from the existing budgetary expenditures through taking a couple of bold austerity measures: a. domestic purchase as compared to import of food items for Afghan forces. b. saving on fuel,<span class="Apple-converted-space">  </span>oil and energy costs. c. better maintenance and inventory management of weapons, ammunitions and armored vehicles among others. Such austerity measures could assist in saving millions of dollars within the budget of Afghan security forces. Additionally, the time has come for Afghanistan to produce and manufacture its own basic defense items such as bullets, weaponry and other basic defense items.</p>
<p>While the initial capital investment cost of such an undertaking will be high but over time this will significantly drive down defense expenditure and increase self-reliance. Moreover, Afghanistan could redesign its defense forces to a more mobile and highly equipped small professional army meant to fight terrorism and local insurgency designed for irregular warfare augmented with an auxiliary local militia. This means we could significantly reduce the number of the existing Afghan army and police while augment the gap with local tribal forces to fight local insurgencies and terrorism. This will also assist in the long-term financial sustainability and operational effectiveness of the Afghan security forces.</p>
<p>Such a fundamental reorganization of the Afghan security forces followed by austerity measures will leave Afghanistan with three options for the shape and size of any future army and security forces: <em>a. A modern professional army which will be costly and unsustainable unless Afghanistan finds alternative sources of revenue to fund it. b. A small professional army at the core augmented with auxiliary local militias across the country to fight insurgencies and do counter-terrorism. c. A hybrid force—a combination of a professional army, localized defense forces and militias at different levels.</em></p>
<p>Regardless of the choice of standard, size, and format of the Afghan security forces; the Afghan government and its international partners &#8211; principally the United States and NATO member states will need to fund this force for years to come until Afghanistan builds an indigenous self-sustaining economy from two sources: The first being traditional sources such as a national tax scheme, a saving and austerity regime, and national conscription. The second is non-traditional sources—a long-term trust fund but with significantly less contribution in terms of dollar amount as compared to the current rates to help sustain the force along with scholarships and training programs for its officers corp.</p>
<p>In the words of former Afghan Defense Minister, General Tariq Shah Bahrami, Afghans will eat grass but will fund Afghan forces and defend their country even if NATO and U.S. forces leave the country. While this may be true, Afghans will have to fundamentally rethink and redesign Afghanistan&#8217;s military into financially viable, economically sustainable, and professionally agile armed forces.</p>
<p><a href="https://globalsecurityreview.com/economizing-defense-roadmap-sustainable-afghan-security-forces/">Economizing Defense: A Roadmap for Building Sustainable Afghan Security Forces</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Taliban Peace Calculus</title>
		<link>https://globalsecurityreview.com/afghanistan-taliban-peace-calculus/</link>
		
		<dc:creator><![CDATA[Tamim Asey]]></dc:creator>
		<pubDate>Wed, 05 Jun 2019 19:35:07 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[Al Qaeda]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Taliban]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=11640</guid>

					<description><![CDATA[<p>For the Taliban, the ongoing peace talks are a quest for political legitimacy and a political tactic—not a strategy—to end the war in Afghanistan. The Taliban consider direct negotiations with the United States in Qatar and elsewhere as a platform for national and international recognition rather than a true path to a peaceful end to the [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/afghanistan-taliban-peace-calculus/">The Taliban Peace Calculus</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>For the Taliban, the ongoing peace talks are a quest for political legitimacy and a political tactic—not a strategy—to end the war in Afghanistan.</h2>
<p>The Taliban consider direct negotiations with the United States in Qatar and elsewhere as a platform for national and international recognition rather than a true path to a peaceful end to the Afghan conflict. President Trump’s anti-war stance, the reconciliatory tone of the establishment in Washington, deteriorating relations between President Ghani and the U.S. administration, and an increased regional and global engagement with the Taliban leadership have made the group firm believers in a military victory and the return of an Islamic Emirate based on sharia law.</p>
<p>This engagement is a tactic taken from the playbook of the Afghan jihad in the 1980s and isn&#8217;t a sound strategy to pursue peace—rather, it complements their military strategy on the battlefield. This reality was made clear in the recent congratulatory message of the Afghan Taliban leader, Mullah Haibatullah Akhund, where he reiterated: “No one should expect us to pour cold water on the heated battlefronts of Jihad or forget our forty-year sacrifices before reaching our objectives.”</p>
<p>In another part of the same statement, he stated that “with this initiative, the Islamic Emirate is conducting victorious operations on the Jihadi battlefronts and leading negotiations with the Americans about ending the occupation of Afghanistan, the objectives and goals of both being bringing an end to the occupation and establishment of an Islamic system.” Both sections of the statement make it abundantly clear that the Afghan Taliban firmly believe in a military victory and consider the on-going peace talks as a mere political addition to their battlefield military strategy and not a genuine effort to end the Afghan war.</p>
<p>Shortly after the release of the Taliban Eid statement, the U.S. Special Envoy for Peace—veteran diplomat Zalmay Khalilzad—termed the Taliban statement as “bombastic” and “ serves to complicate &amp; disrupt” the Afghan peace process. He called on the Taliban to reduce the level of violence and continue negotiations to end the war. This statement and the ones before with a reconciliatory tone from Washington has not only emboldened the Taliban but has made them firm believers in the United States and allies defeat and ultimate withdrawal from Afghanistan.</p>
<p>On the other hand, the U.S. envoy sees his mandate to negotiate with the Taliban and the Afghan government, respectively on four inter-related items: Joint counter-terrorism (CT) efforts, a U.S. troop drawdown, a ceasefire; and Intra-Afghan dialogue along with discussions over the future of U.S.-Afghan relations. After several unsuccessful attempts to mediate and forge unity among a divided political elite in Kabul , Zalmay Khalilzad views the government in Kabul as politically divided and unable to form a united political front and high powered national negotiation team to engage with the Taliban as apart of the intra-Afghan dialogue. This has been primarily due to increased electoral politics and factional infighting combined with a lack of a coherent understanding of war and peace among the political and military elites in Afghanistan.</p>
<p>In turn, Zalmay Khalilzad, under pressure from Trump administration to show results on the peace talks is in a rush to conclude the first two items of his mandate i.e. counter-terrorism and troop withdrawal timetable in his new round of negotiations with the Taliban in Doha which is dangerous and goes against his stated negotiation approach, saying that  “nothing is agreed until everything is agreed.”</p>
<p>The Afghan government has criticized this negotiation approach of U.S. envoy to the extent of accusing him of “acting like a viceroy” and of legitimizing the Taliban as an alternative to the incumbent government in Kabul for political expediency in Washington. Zalmay Khalilzad has in turn denied these allegations and has expressed that he always consults with President Ghani before and after his lengthy negotiation sessions with the Taliban.</p>
<p>The Afghan peace process has presented an intriguing platform for all sorts of domestic and regional interests to play out: the Taliban see a divided house in Kabul and believe that rocky relations between Washington and Kabul are an opportunity to be exploited so as to present themselves as an alternative government; the region uses the Afghan peace talks as a card to gain favors and make geopolitical score points against the United States. For instance, Pakistan uses it to extract economic benefits to improve its fragile economy, Iran and Russia use as a platform it to discredit NATO and U.S. efforts in the country while the Arab world uses its to advance their proxy and sectarian agendas.</p>
<p>To exploit this opportunity further, the Afghan Taliban is pursuing a three-pronged interconnected pol-mil strategy: negotiations with the United States, pitting the region against the United States and exploiting great power political faultlines, and dividing the Afghan political elite from the Afghan government. For the Americans, the Taliban assure them that they are no longer affiliated with Al Qaeda and other affiliated foreign terrorist organisations. They are an insurgency with a domestic agenda and do not subscribe to global jihad. The Taliban also assure the Americans that they will never let the Afghan territory to be used against the United States and its allies.</p>
<p>On the contrary, in their negotiations with regional powers such as Russia, China, Iran, and Pakistan, the Taliban provides guarantees that they will never let regional terrorist groups threaten Afghanistan&#8217;s neighbors. Additionally, they and call on the country&#8217;s neighbors to join hands to expel the Americans from Afghanistan who they view as both a threat to the region and the Taliban. Furthermore, the Taliban pursue a policy of “divide and rule” when it comes to intra-Afghan talks. They use Afghan political elites against the government and the Afghan government against the elites to erode the legitimacy of the Afghan government in the eyes of the Afghan public and present themselves as a unified alternative political entity.</p>
<p>This three-pronged strategy that the Afghan Taliban pursue has four primary goals: to gain national and international political legitimacy at the cost of an elected government in Kabul, to negotiate with the United States on behalf of themselves and their regional sponsors on a timetable for troop withdrawal, secure the release of prisoners, restore the restoration of the Islamic emirate; and finally, to isolate, delegitimize, and divide the government from the political elites in Kabul.</p>
<p>This calculus of the Afghan Taliban is based on three assumptions: political anarchy and disunity in Kabul, war fatigue on the part of the U.S. and its allies, and heightened regional tensions over U.S. presence in Afghanistan specifically with regards to Iran and Russia. This is a perfect recipe for Taliban to garner political legitimacy and military victory.</p>
<p>The calculus and strategy of the Taliban and its sponsors can be countered with an equivalent three-pronged strategy of the Taliban and their sponsors through an equivalent three-pronged strategy: sustained military pressure, sustained diplomatic and non-military pressure on the Taliban&#8217;s foreign sponsors, as well as clearly conveying to the Taliban that pursuing a military victory for them is only a recipe for another war. The post-9/11 generation of Afghans and jihadist groups who have been thus far absent from the theater of war would inevitably join the fight, which would only prolong the misery and complexities of the on-going conflict.</p>
<p>Thus far, the Taliban have not shown any concessions in their talks with the Americans and Afghans. They have proven themselves to be tough negotiators. Many expected that the U.S. envoy and the Taliban would reach an agreement within six months or less, but negotiations currently seem to be deadlocked. Many believe the Afghan Taliban negotiators are playing the long game with U.S. envoy to fail him in his mission and eventually discredit him in the eyes of Trump administration officials and pave the way for his ouster from his job.</p>
<p>Moreover, The Afghan Taliban, together with their foreign terrorist affiliates, have increased attacks on Afghan cities and the countryside battlefields, causing an unprecedented level of civilian and military casualties as compared to yesteryears. During the holy month of Ramadan, Kabul has seen at least seven bomb attacks resulting in over 200 dead and injured. Many of them attributed to the Taliban. They are leveraging military power for incentives on the negotiation table with the Americans and Afghan political elites.</p>
<p>The first intra-Afghan talks held in Moscow was a scene to behold. Taliban negotiators and former officials were in tears while sitting down on a prayer mat hailing their leader, Mullah Mohammad Omar, for his predictions of an American defeat and ultimate withdrawal from Afghanistan and proclaiming that they have come true. Meanwhile, eyewitnesses living in the suburbs of the Pakistani cities of Quetta and Peshawar tell a telltale of how Taliban preachers go from corner to corner of various quarters and refugee camps reciting the verse “<em>Nasr-u-men Allah e Fath ul Qareeb</em>” which translates into “with God’s help victory is near.” and delivering fiery speeches on U.S. defeat; an echo and déjà vu from the Afghan jihad times when the communist regime in Kabul was on the verge of collapse due to Moscow’s rising domestic issues and war fatigue.</p>
<p>Both Washington and Kabul need to change their approach to negotiations with the Afghan Taliban. The current talks have only encouraged them in their quest for the return of the Islamic Emirate of Afghanistan along with their foreign terrorist affiliates. We owe it to the many American and non-American men and women who laid our their lives for our security to ensure that Afghanistan never again becomes a haven and launching pad for international terrorism, enabled and empowered by a host regime.</p>
<p><a href="https://globalsecurityreview.com/afghanistan-taliban-peace-calculus/">The Taliban Peace Calculus</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Defeating the Philippine&#8217;s Communist Rebellion</title>
		<link>https://globalsecurityreview.com/defeating-philippines-communist-rebellion/</link>
		
		<dc:creator><![CDATA[Jumel Gabilan Estrañero]]></dc:creator>
		<pubDate>Mon, 03 Jun 2019 22:04:52 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Philippines]]></category>
		<category><![CDATA[Southeast Asia]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=11595</guid>

					<description><![CDATA[<p>CPP-NPA and the Duterte Administration: Post-Activism, Insurgency, and Terrorism Five decades of insurgency and terrorism in the Philippines has presented a socio-political dilemma for both the government and the general public. From the perspective of the Communist Party of the Philippines (CPP) and its armed wing, New People’s Army (NPA), the platform espoused by the [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/defeating-philippines-communist-rebellion/">Defeating the Philippine&#8217;s Communist Rebellion</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>CPP-NPA and the Duterte Administration: Post-Activism, Insurgency, and Terrorism</h2>
<p>Five decades of insurgency and terrorism in the Philippines has presented a socio-political dilemma for both the government and the general public. From the perspective of the <a href="https://www.brookings.edu/opinions/terrorism-in-the-philippines-and-u-s-philippine-security-cooperation/">Communist Party of the Philippines (CPP)</a> and its armed wing, New People’s Army (NPA), the platform espoused by the Duterte administration&#8217;s tagline of &#8220;<i>change is</i> <em>coming</em>&#8221; has been not realized until now. The NPA&#8217;s actions of late reveal a presumption of justification of its violent struggle, as protracted infighting within its ranks draws increased attention from the authorities and society at-large.</p>
<p>The government&#8217;s over-arching strategy is to prevent communist rebels from committing atrocities and acts of violence going forward. Increased engagement on the part of the government highlights the policy guidance of President Rodrigo Duterte, amidst conflicting internal and external factors as well as joint cooperative operations (i.e., <a href="https://www.rappler.com/nation/157788-armed-forces-philippines-dssp-kapayapaan">AFP-DND’s DSSP Kapayapaan 2017</a> and an audit request to the European Union over the alleged funding of communist NGOs).</p>
<p>Even after the fiftieth anniversary of Communist Party of the Philippines (CPP) on December 26, 2018, there are two compelling and competing dilemmas in Philippine political climate that may or may not come to a head until the end of this year. The first is a continued push for charter change (CHA-CHA), vis-a-vis legal reformation, and a restructuring of the political system (i.e., Federalism). The second is finding a resolution over the insurgent and terrorist activities of the Communist Party of the Philippines (CPP) and the New People’s Army (NPA) through the resumption of peace talks.</p>
<p>The current negotiations, to date, are the longest–running peace talks since the CPP-NPA began its armed struggle. After years of guerrilla warfare, disinformation, and a strategy which is heavily influenced by <a href="https://www.manilatimes.net/false-claims-by-the-cpp-npa/509821/">communism and radical left-leaning ideology</a>, the NPA&#8217;s seemingly newfound use of terror tactics attempts to sway the minds of many to favor the group&#8217;s cause, as well as to drive recruitment to boost its numbers.</p>
<p>Between January 16 and February 1, 2017—six months after Duterte was inaugurated as president—the NPA was involved in fifteen incidents, nine of which occurred on January 30. Around the same time, talks between the <a href="https://thediplomat.com/2017/06/a-closer-look-at-the-philippine-peace-process-with-communist-rebels/">NDFP and GRP (Government of the Republic of the Philippines) proceeded in Rome</a> from January 19-25, which involved discussion of the implementation of the NDFP’s socioeconomic reform program. Though the talks were considered productive by all parties, it resulted in few concessions by either side. In particular, the GRP maintained its refusal to release 392 NDFP prisoners from custody until the issue of amnesty was fleshed out.</p>
<p>On January 30, 2017, the NPA broke a ceasefire with simultaneous assaults in Mati, Surigao Del Norte, Valencia City, Bukidnon, Pag-asa, Lebe, Sarangani, Union, Compostella Valley, San Isidro, Mahayahay, Hinambangan, Kitcharao, and Agusan Del Norte. Subsequently, on February 1, the NPA unilaterally called off its ceasefire, citing the failure of the GRP to release their political prisoners and generally abide by the terms of the ceasefire. In response, on February 3, Duterte withdrew the GRP from its ceasefire in response. In May 2017, <a href="https://www.mindanews.com/peace-process/2017/07/duterte-on-peace-talks-with-ndf-no-more-talk-let-us-fight/">President Duterte suspended peace talks</a> with the NDFP, accusing communist rebels of attacking government forces while engaging in negotiations. Months later, on November 23, 2017, President Duterte signed Proclamation No. 360 that formally terminated the talks. Eleven days later, he issued Proclamation No. 374, declaring the CPP and the NPA to be terrorist organizations.</p>
<p><figure id="attachment_11596" aria-describedby="caption-attachment-11596" style="width: 768px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-11596 size-full" src="http://globalsecurityreview.com/wp-content/uploads/2019/06/1551395285-e1559495939275.jpeg" alt="Joint Statement on the Successful Third Round of Formal Talks Between the GRP and NDFP in Rome, Italy 2017" width="768" height="995" srcset="https://globalsecurityreview.com/wp-content/uploads/2019/06/1551395285-e1559495939275.jpeg 768w, https://globalsecurityreview.com/wp-content/uploads/2019/06/1551395285-e1559495939275-232x300.jpeg 232w" sizes="(max-width: 768px) 100vw, 768px" /><figcaption id="caption-attachment-11596" class="wp-caption-text">Figure 1. Joint Statement on the Successful Third Round of Formal Talks Between the GRP and NDFP in Rome, Italy (2017)</figcaption></figure></p>
<p>To counter the Duterte administration&#8217;s moves, <a href="https://peace.gov.ph/category/news/indigenous-peoples/">CPP had a Second International Conference on the Indigenous Peoples</a> in Metro Manila (July 2018). This conference intended to portray the Filipino government as having committed human rights violations. The <a href="http://www.afp.mil.ph/index.php/8-afp-news/639-opening-statement-ip-press-conference">UN High Commission and European Union</a> acted as third-party assessors for the conference.</p>
<p>Despite its substantial experience with running counter-insurgency campaigns over fifty years, the Philippines remains plagued with insurgent groups. After launching numerous assaults based on purportedly effective methodologies and sound concepts, why is the government unable to defeat the CPP-NPA? Such questions that continue to linger in the minds of not only those in government but of the general public, as well.</p>
<h3>The CPP-NPA Theater of Power</h3>
<p>An analysis of the works of <a href="https://josemariasison.org/building-the-peoples-army-and-waging-the-peoples-war/">Jose Maria Sison (JOMA)</a>—such as the <i>Rectify Errors, Rebuild the Party! </i>(1968)<i>, Our Urgent Tasks</i> (between 1969 and 1975), and<i> Specific Characteristics of our People’s War </i>(1971)—reveals that the main difference between the new communist party founded by <a href="https://web.stanford.edu/group/mappingmilitants/cgi-bin/groups/view/149?highlight=Philippines">JOMA in 1968</a> to that of its precursor, the old communist party of the Lavas’ and Taruc is the former’s emphasis on the importance of a sound mass base. The works above also provide for the phasing and general direction of the <a href="https://www.google.com/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=1&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwj6tvK7osjiAhWOUN4KHUDdArQQFjAAegQIBhAC&amp;url=https%3A%2F%2Fjosemariasison.org%2Fwp-content%2Fuploads%2F2015%2F12%2F2015-02-Tangi.pdf&amp;usg=AOvVaw2D11tGcxpdThxKeY4TayUC">revolution</a> which calls for the adoption of stages in the development of revolution through a protracted war of encircling the cities from the countryside and by concentrating first on building a strong base and a peasant army.</p>
<p><figure id="attachment_11605" aria-describedby="caption-attachment-11605" style="width: 640px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-11605" src="http://globalsecurityreview.com/wp-content/uploads/2019/06/IMG_JOMA_SISON_PRRD_UNTV.jpg" alt="CPP Founder Jose Maria Sison" width="640" height="427" srcset="https://globalsecurityreview.com/wp-content/uploads/2019/06/IMG_JOMA_SISON_PRRD_UNTV.jpg 640w, https://globalsecurityreview.com/wp-content/uploads/2019/06/IMG_JOMA_SISON_PRRD_UNTV-300x200.jpg 300w" sizes="(max-width: 640px) 100vw, 640px" /><figcaption id="caption-attachment-11605" class="wp-caption-text">Figure 2. CPP Founder and NDFP Chief Political Consultant Jose Maria Sison (Source: UNTV News)</figcaption></figure></p>
<p>Based on the said works of JOMA, the old party pushed for the immediate overthrow of the “reactionary” government by directly confronting the military. Without a stable base to launch its offensive, the former party became vulnerable to the Armed Forces of the Philippines (AFP) counter-offensive. Learning from this mistake, the new Communist Party of the Philippines (CPP) of JOMA and its armed wing, the New Peoples Army (NPA) established Guerrilla Fronts (GFs) all throughout the Philippine archipelago to spread out the AFP and dissipate it away from the seat of national government in Metro Manila purposely to provide initiative and flexibility to the Party and the Army.</p>
<p>The <a href="https://www.philippinerevolution.info/2018/08/23/great-achievements-of-the-cpp-in-50-years-of-waging-revolution/">CPP-NPA document <i>Reaffirm Our Basic Principles and Carry the Revolution Forward!</i></a> (1991) reveals that an ideological split in the early 1990s among the CPP-NPA&#8217;s top leaders over the general direction that the revolution shall follow resulted in a divide between the “Rejectionist” (anti-Sison) <span style="background-color: #f5f6f5;">bloc </span>and the “Reaffirmist” (pro-Sison) bloc. The “Reaffirmists” accused the “Rejectionists” of leftist adventurism and rightist opportunism that undermined the revolution. The leftist adventurists departed from the protracted war concept and pushed the revolution into the urban centers, while the rightist opportunists espoused legal and parliamentary participation as the primary means of struggle relegating the armed struggle to the backdrop.</p>
<p>The document, together with other <a href="http://openanthcoop.net/press/emancipatory-politics-a-critique/chapter-5/">CPP-NPA published documents</a>, also called for the implementation of the “back to basics” program to correct deviations and repudiate in particular the <a href="https://www.philippinerevolution.info/statement/on-the-pen-and-the-gun/">strategic counter-offensive (SCO)</a> concept of the “leftist adventurists.” The SCO concept had resulted in large NPA formations decimated by the AFP. Also mentioned in the document is the assertion made by JOMA that the strength of the NPA is still in no match to the AFP. He directed to break down the NPA military formations back into platoons and squads and intensify mass works to recover the lost mass base left unchecked and regained by the AFP. JOMA pointed out that the continued decline of the party&#8217;s base would isolate both the party and army, as happened to the old CPP.</p>
<p>An analysis of the CPP-NPA documents previously mentioned as well as to other CPP-NPA Anniversary Statements published over the past two decades would disclose that the “back to basics” program of the 1990s was designed to alter the NPA development from vertical to horizontal in order to enable the NPA platoons and squads to cover a wider area and build as many GFs as possible, necessary for the survival of the Party and the Army.</p>
<p>In terms of ongoing counter-insurgency methodologies, the AFP has come up with <a href="https://www.lawphil.net/executive/execord/eo1994/eo_216_1994.html">Internal Security Operations (ISO)</a> concepts and methods to address the internal security threats. One of these is the triad concept of Civil-Military Operations (CMO), Intelligence, and Combat Operations. There has been much debate over the years as to which triad component shall prevail over the rest.</p>
<p>The <a href="http://www.interaksyon.com/breaking-news/2017/05/27/75019/5th-peace-talks-round-in-the-netherlands-trips-over-grp-conditionality/">Philippine government</a> grappled for the right solution to the country’s communist insurgency problem, while the AFP—with a mandate to conduct ISOs—initiated several campaigns to address this primary threat to the country’s internal peace and security, with little success. The ascent to the presidency by the then Senator Benigno Simeon Cojuangco Aquino III in the 2010 national election through an overwhelming victory gave hope for a speedy resolution of armed conflicts in the country.</p>
<p>The Aquino administration promoted the peace process as the centerpiece of its internal security program anchored on the overarching concept of “Unified Action,” a holistic approach which emphasizes that “the AFP will focus on the military dimension, while it will be supporting and/or assisting other government agencies in the economic and political dimensions” of insurgency (AFP Strategic Intent, p. 12). As regards to ISOs, “a grand plan in dealing with internal threats, including the non-traditional actors, had been laid out through the <a href="http://catalystforpeace.blogspot.com/">Internal Peace and Security Plan (IPSP)</a> (Ibid., p.10).” While it is indisputablee that the AFP’s success in all of the aforesaid mission areas is crucial, it cannot also be an overstatement that its success in ISO is as critical as ever, for in order to focus on other mission areas especially in Territorial Defense, the current internal threats must be addressed first and foremost.</p>
<p><a href="https://globalsecurityreview.com/defeating-philippines-communist-rebellion/">Defeating the Philippine&#8217;s Communist Rebellion</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The New Taiwan Strait Crisis: a Dangerous Decade Ahead</title>
		<link>https://globalsecurityreview.com/new-taiwan-strait-crisis-dangerous-decade-ahead/</link>
		
		<dc:creator><![CDATA[Foreign Brief]]></dc:creator>
		<pubDate>Fri, 31 May 2019 18:27:01 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[East Asia]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=11576</guid>

					<description><![CDATA[<p>Foreign Brief analysis by Tommy Chai (May 31, 2019) What&#8217;s Happening? China’s military expansion is occurring at a time when Taiwan is becoming more resistant to cross-strait reunification, and the U.S. is altering its commitment to Taiwan, suggesting an increasingly dangerous decade ahead in the Taiwan Strait. Key Insights Taiwan’s democratic consolidation means any future [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/new-taiwan-strait-crisis-dangerous-decade-ahead/">The New Taiwan Strait Crisis: a Dangerous Decade Ahead</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: center"><em><a href="https://www.foreignbrief.com/asia-pacific/china/the-new-taiwan-strait-crisis-a-dangerous-decade-ahead/">Foreign Brief analysis by Tommy Chai (May 31, 2019)</a></em></p>
<h4>What&#8217;s Happening?</h4>
<p>China’s military expansion is occurring at a time when Taiwan is becoming more resistant to cross-strait reunification, and the U.S. is altering its commitment to Taiwan, suggesting an increasingly dangerous decade ahead in the Taiwan Strait.</p>
<h4>Key Insights</h4>
<ul>
<li>Taiwan’s democratic consolidation means any future reunification with the mainland will be exceedingly difficult.</li>
<li>China’s confidence in its ability to use force might mislead it into preparing for an invasion</li>
<li>Misperceptions over shifts in U.S. commitment towards Taiwan could encourage an aggrieved China to use force in the future</li>
</ul>
<p>The Taiwan Strait is reaching a critical juncture of heightened instability. Heading into the 2020s and 2030s, the struggle for independence, status quo, or reunification will be increasingly felt as<span style="text-transform: initial"> each of the key actors—Taiwan, Washington, </span>and<span style="text-transform: initial"> Beijing—begin to unravel the twenty-five years of relative stability that has endured since the 1995-6 crisis. Since then, the consolidation of Taiwan’s democracy has become the greatest challenge to China’s quest for reunification. Taiwan continues to oppose any possibility of reunification on Beijing’s terms even if its future leaders do not seek formal independence. Indeed, the&nbsp;</span><span style="text-transform: initial"><a style="text-transform: initial" href="http://focustaiwan.tw/news/aipl/201901030017.aspx">public majority</a></span><span style="text-transform: initial">&nbsp;and&nbsp;</span><span style="text-transform: initial"><a style="text-transform: initial" href="https://www.foreignbrief.com/asia-pacific/china/the-problem-with-xis-40th-anniversary-message-to-taiwan/">leaders</a></span><span style="text-transform: initial">&nbsp;of the traditionally pro-China pan-Blue coalition and independence-minded pan-Green coalitions, including next year’s </span><span style="text-transform: initial"><a href="https://www.foreignbrief.com/asia-pacific/china/instability-in-the-strait-taiwans-2020-election/">election candidates</a></span><span style="text-transform: initial">, have opposed Chinese President Xi Jinping’s reintroduction of the &#8220;One Country, Two Systems&#8221; framework for reunification.</span></p>
<p>Although peaceful reunification is frustrated, mainland China is becoming more powerful and&nbsp;<a href="https://www.hoover.org/sites/default/files/uploads/documents/CLM43AR.pdf">impatient</a>&nbsp;under Xi’s leadership. This is not to suggest that the&nbsp;<a href="http://www.aei.org/spotlight/china-stagnation/">economic problems</a>&nbsp;China faces are not acute. But the People’s Liberation Army is growing more confident in its ability to match the Taiwanese and U.S. armed forces in a contest of strength. If Xi fails to deliver the prosperity promises of his “great rejuvenation of the Chinese nation,” he could very well resort to speeding up his other more&nbsp;<a href="http://www.xinhuanet.com/english/download/Xi_Jinping's_report_at_19th_CPC_National_Congress.pdf">revisionist ambitions</a>&nbsp;of developing a world-class military and reunifying the territories lost during the &#8220;Century of Humiliation.&#8221;</p>
<p><figure id="attachment_11577" aria-describedby="caption-attachment-11577" style="width: 1024px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" src="http://globalsecurityreview.com/wp-content/uploads/2019/05/33565488986_05e35e4209_o-1024x683.jpg" class="size-full wp-image-11577" alt="" width="1024" height="683" srcset="https://globalsecurityreview.com/wp-content/uploads/2019/05/33565488986_05e35e4209_o-1024x683.jpg 1024w, https://globalsecurityreview.com/wp-content/uploads/2019/05/33565488986_05e35e4209_o-1024x683-300x200.jpg 300w, https://globalsecurityreview.com/wp-content/uploads/2019/05/33565488986_05e35e4209_o-1024x683-768x512.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption id="caption-attachment-11577" class="wp-caption-text">Photo: Sunson Guo / Flickr</figcaption></figure></p>
<h3>Costs of Invasion</h3>
<p>During the 1995-6 crisis, there was no doubt about the credibility of U.S. deterrent capabilities buttressing the might of the Taiwanese armed forces, which were then considered to be more advanced and powerful than the PLA. Decades later, China’s “military modernization effort has eroded or negated many of Taiwan’s historical advantages in deterring PLA aggression,” including “the PLA’s inability to project sufficient power across the Taiwan Strait, the Taiwan military’s technological superiority, and the inherent geographic advantages of island defense,” the U.S. Department of Defense noted in its&nbsp;<a href="https://dod.defense.gov/Portals/1/Documents/pubs/2017_China_Military_Power_Report.PDF">2017 report</a>&nbsp;on Chinese military power. These shifts have purportedly led Xi to believe that the “<a href="https://www.youtube.com/watch?v=-eyFdJsOd-0">tide of history</a>”—that is, reunification with Taiwan—favors the mainland.</p>
<p>Assessing the cross-strait military balance generates&nbsp;<a href="https://foreignpolicy.com/2018/09/25/taiwan-can-win-a-war-with-china/">doubts</a>&nbsp;about the PLA’s capacity to subjugate Taiwan. Beijing lacks the amphibious and lift capabilities to land an invasion, and Taiwan possesses submarines and sea mines that could seriously damage any invasion fleet. Climatic conditions and the gradual build-up of Chinese forces also complicate any surprise offensive. The possibility of staging an urban, counterinsurgency warfare against a resilient Taiwanese society while simultaneously holding off U.S. forces in the Western Pacific also diminishes the success of a Chinese invasion.&nbsp;But with China’s&nbsp;<a href="https://nationalinterest.org/blog/buzz/us-intelligence-china-building-its-capability-invade-taiwan-56857">continued acquisition</a>&nbsp;of the relevant capabilities, these disadvantages will gradually erode in the coming decade.</p>
<p>Furthermore, the PLA does not need to be fully equipped to fight a war of reunification. Whether to wage war is not a decision based solely on military calculations, and having confidence in the PLA may mislead the Chinese Politburo into taking an aggressive posture. Given Beijing’s routinization of ‘island encirclement patrols’ and the creation of cross-strait military-civilian flight paths to familiarise the PLA with the terrain and conditions of airlift, an invasion may no longer require a gradual military build-up. By engineering a heightened state of&nbsp;<a href="https://www.the-american-interest.com/2018/06/28/the-coming-crisis-in-the-taiwan-strait/">military readiness</a>, it is difficult for Taiwan to gauge when China decides to launch a surprise offensive.</p>
<p>It would be naive to assume that Xi does not have the political resolve to bear the responsibility of a post-invasion war-torn economy, whose share of trade to mainland China has declined to a mere&nbsp;<a href="http://www.worldstopexports.com/chinas-top-import-partners/">2% of total Chinese exports</a>. Nor should it be assumed the fear of an anti-China international coalition and the repercussions to its &#8220;peaceful rise&#8221; image will restrain Beijing from using force. Since 2016, China has been engaging in a multi-faceted pressure campaign to reinforce an alternate reality of Taiwan as a &#8220;local affair&#8221; to curtail potential foreign criticisms of its cross-strait activities. This has included not just usual diplomatic isolation, but more recently a whole-of-society approach to bring the pressure to bear on the&nbsp;<a href="https://www.nytimes.com/2018/02/18/world/australia/china-taiwan-discrimination.html">private individuals</a>,&nbsp;<a href="https://www.washingtonpost.com/news/worldviews/wp/2018/05/15/u-s-retailer-gap-apologizes-to-china-over-map-on-t-shirt-that-omits-taiwan-south-china-sea/?utm_term=.1a7cc5f0a207">commercial airlines and retail businesses</a>&nbsp;of other countries. To a large extent, this has worked. Even the U.S., the primary security guarantor for Taiwan, quietly&nbsp;<a href="https://www.taiwannews.com.tw/en/news/3351397">removed the Taiwanese flag</a>&nbsp;from two of its government websites, suggesting an implicit yielding to Chinese pressure.</p>
<p><figure id="attachment_11578" aria-describedby="caption-attachment-11578" style="width: 1024px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" src="http://globalsecurityreview.com/wp-content/uploads/2019/05/26762606268_9130868524_k-1024x653.jpg" class="size-full wp-image-11578" alt="" width="1024" height="653" srcset="https://globalsecurityreview.com/wp-content/uploads/2019/05/26762606268_9130868524_k-1024x653.jpg 1024w, https://globalsecurityreview.com/wp-content/uploads/2019/05/26762606268_9130868524_k-1024x653-300x191.jpg 300w, https://globalsecurityreview.com/wp-content/uploads/2019/05/26762606268_9130868524_k-1024x653-768x490.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption id="caption-attachment-11578" class="wp-caption-text">Photo: Mass Communication Specialist 3rd Class Devin M. Monroe / U.S. Navy</figcaption></figure></p>
<h3>Potential U.S. Gradual Retreat</h3>
<p>In the coming decade, the costs of invasion will have likely declined, while frustration with Taiwan’s democracy and impatience regarding delays to reunification will have increased. Taiwan will then have to rely not on itself but on U.S. resolve to deter a potential Chinese invasion. Although Washington has entered a period of &#8220;strategic competition&#8221; with Beijing, growing resource strain — especially with&nbsp;<a href="https://www.lowyinstitute.org/the-interpreter/battle-resource-us-national-defense-strategy">sustained budget sequestration</a>&nbsp;— will force American administrations to reassess U.S. commitment overseas. However, U.S. policymakers, having witnessed President Donald Trump’s damage to&nbsp;<a href="https://www.internationalaffairs.org.au/australianoutlook/us-relations-with-asia-under-trump-taking-stock/">U.S. international standing,</a>&nbsp;are unlikely to retreat into isolation. But subsequent occupants of the White House will be forced to weigh the country’s commitments more carefully between vital and peripheral interests.</p>
<p>In this regard, U.S. interest in Taiwan has remained&nbsp;<a href="https://muse.jhu.edu/article/702459">ambiguous</a>&nbsp;since the post-World War II aftermath. While&nbsp;<a href="https://csis-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/attachments/ts160211_Glaser.pdf">Taiwan sympathizers</a>&nbsp;continue to uphold Taiwan as a vital U.S. interest, the stakes pale in comparison to other more pressing U.S. interests in Asia, such as support for&nbsp;<a href="https://www.state.gov/u-s-relations-with-japan/">Japan</a>&nbsp;and maintaining the rule of law in the&nbsp;<a href="https://www.uscc.gov/sites/default/files/Rapp%20Hooper%20Testimony.pdf">South China Sea</a>. But the issues of prestige and reliability as the region’s primary security guarantor, the fear of China construing U.S. retreat as a sign of weakness, and the domestic sensitivities toward Taiwan as a &#8220;beacon of democracy&#8221; could conflate Washington’s priorities to stay committed in the face of aggression. Thus, while its ability and willingness to deter China from invading Taiwan is likely to decline over time, it will not retreat without putting up resistance. To make up for resource strain, Washington will demonstrate its symbolic gestures to Taiwan to caution China about the prospect of U.S. military intervention. This included the recent passing of the Taiwan Travel Act to allow two-way senior official exchanges, stationing U.S. military personnel to the new American Institute in Taiwan for the first time since 2005, potential port visits and new arms sales. But in doing so, Beijing could misread the gestures as signs of a growing commitment to Taiwan and be provoked into threatening the U.S. not to interfere in its &#8220;local affairs.&#8221;</p>
<h3>Misreading of Signals</h3>
<p>The Taiwan Strait has resumed its status as a dangerous flashpoint. In arranging for a politically viable way to reduce its commitment to Taiwan, Washington could find itself unwittingly confronting an aggrieved and more confident China while trying to preserve&nbsp;<span style="background-color: #f5f6f5">its&nbsp;</span>domestic<span style="background-color: #f5f6f5">&nbsp;and regional reputation&nbsp;</span>as best as possible. U.S. sales of 60 F-16V fighter jets to Taiwan demonstrated this challenge: the sale was&nbsp;<a href="https://thediplomat.com/2019/04/why-a-us-sale-of-fighter-jets-to-taiwan-matters/">praised as symbolically important</a> but was perceived as an&nbsp;<a href="https://www.abc.net.au/news/2019-04-01/chinese-jets-cross-taiwan-strait-line-increasing-tensions/10958640">act of provocation</a>&nbsp;by Beijing, resulting in the PLA’s intentional crossing of the ‘median line’ in the Taiwan Strait for the first time in twenty years.</p>
<p>While this has not escalated into further U.S.-China confrontation, Taiwan President Tsai Ing-wen’s decision to automatize the&nbsp;<a href="https://thediplomat.com/2019/04/taiwan-vows-forceful-expulsion-of-chinese-fighters-flying-in-taiwanese-airspace/">forceful expulsion</a>&nbsp;of Chinese forces suggests that future transgressions of the ‘median line’ will no longer be safe from unprofessional encounters and shoot down incidents. The U.S. will then be pressured to respond with a stronger deterrent posture. But with&nbsp;<a href="https://www.scmp.com/news/china/article/1981525/beijing-cuts-ma-era-cross-strait-communication-channel-taiwan">little to no confidence-building mechanisms</a>&nbsp;to manage cross-strait instability, the mutual signaling of threats between Washington and Beijing could turn into ever-more aggressive shows of force, entrapping both countries into a fourth Taiwan Strait crisis and with consequences they are not prepared to face.</p>
<p><a href="https://globalsecurityreview.com/new-taiwan-strait-crisis-dangerous-decade-ahead/">The New Taiwan Strait Crisis: a Dangerous Decade Ahead</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Haftar Ante Portas Tripoli</title>
		<link>https://globalsecurityreview.com/haftar-ante-portas-tripoli/</link>
		
		<dc:creator><![CDATA[Nico Lamminparras]]></dc:creator>
		<pubDate>Wed, 29 May 2019 04:01:06 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[Libya]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[Turkey]]></category>
		<category><![CDATA[United Arab Emirates]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=11545</guid>

					<description><![CDATA[<p>After a relatively easy advance through the southern and central parts of Libya, the country&#8217;s renegade general now has the capital in his sights. Up until the Libyan National Army (LNA) reached the southern outskirts of Tripoli, the campaign somewhat resembled a sneak attack.&#160;The LNA is lead by General Khalifa Haftar, an ex-Libyan Army officer [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/haftar-ante-portas-tripoli/">Haftar Ante Portas Tripoli</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>After a relatively easy advance through the southern and central parts of Libya, the country&#8217;s renegade general now has the capital in his sights.</h2>
<p>Up until the Libyan National Army (LNA) reached the southern outskirts of Tripoli, the campaign somewhat resembled a sneak attack.&nbsp;The LNA is lead by General Khalifa Haftar, an ex-Libyan Army officer who served under Colonel Muammar al-Gaddafi. From 1990 to 2011, Haftar lived in exile in the United States, returning to Libya in 2011 during the country&#8217;s revolution, holding a senior position in the group that overthrew Gaddafi&#8217;s regime.</p>
<p>In Haftar’s rhetoric, the assault is described merely as a campaign to liberate the capital from the extremist Islamic groups governing it. These assertions do have some logic to them, apart from the fact that the purported extremist groups aren&#8217;t overtly specified. Nevertheless, attempting to capture the capital—let alone effectively administering the country after a victory—may prove to be a bridge too far.</p>
<h3>General Haftar Gains Ground</h3>
<p>Ever since the chaotic events of 2011, Haftar has nearly continuously fought against jihadists, managing to achieve significant territorial gains. In earlier campaigns, some of his troops are known to have committed war crimes, but it would be a fallacy to assume no such crimes were committed by extremist groups on the opposing side.</p>
<p>Since the fall from power and subsequent death of Muammar al-Gaddafi in late 2011, Libya has lacked an effective central government. After a transition period, elections were held in 2012, which resulted in violence and left the country without functioning state organs. Concurrently, as an interim governing authority was established in Tripoli, Haftar struck an alliance with the rival governing body, the House of Representatives in Tobruk, Libya.</p>
<p>The legitimacy of the Tobruk-based government is itself disputed. Initially, it was recognized by the West, most likely in the hope that it would ultimately unite with the Tripoli-based government. This optimism could be deemed naïve, especially after Haftar quickly managed to mobilize an army (the Libyan National Army) primarily from Gaddafi-era officers and soldiers, with support from Egypt and the United Arab Emirates. The LNA succeeded in capturing various cities in Eastern Libya, including Benghazi, after defeating ISIS and Shura Council forces in 2017.</p>
<p>After gaining power over Libya’s vital oil production areas in 2016, Haftar temporarily lost the key export ports of Brega, Es Sidr, and Ras Lanuf, but was able to reestablish control over them shortly after that. In contrast to their successes in eastern Libya, Haftar and his allies lost control over Tripoli’s international airport in 2014. However, heavy fighting damaged the airport&#8217;s facilities—if not even ruined them—rendering the airport inoperable.</p>
<p>In the wake of these clashes, Misrata-led armed groups and their allies formed the &#8220;Libya Dawn&#8221; coalition and took over the capital. In December 2015, Libya&#8217;s two main rivals—the House of Representatives and the Tripoli-based Libya Dawn coalition—reached an agreement over the formation of a UN-backed Government of National Accord (GNA), which was formed in Spring 2016.</p>
<h3>Clashing Congressmen in the Capital</h3>
<p>The supreme authority in Tripoli is the Presidential Council (PC), made up of nine members and chaired by the prime minister. Some members of the Tobruk-based House of Representatives never accepted the idea of a GNA, leaving little chance for any future cooperation. This is unsurprising, however, given that in any merger, members of both power centers would lose standing relative to their current positions.</p>
<p>Notably, the head of the GNA—Fayez Al-Sarraj—was a member of the House of Representatives in Tobruk. Regardless, this detail never fostered trust between the rival factions, nor did it prevent Haftar from seizing valuable oil installations in southern Libya. &nbsp;Initially occupied by armed clans and militant groups, the GNA had to send troops to protect these facilities from Haftar&#8217;s advancing forces.</p>
<p>On the other hand, Haftar isn&#8217;t the only one causing gray hairs for Libya&#8217;s newly formed state institutions. Basing its mandate on the General National Congress elections of 2012, the Government of National Salvation of Khalifa Ghwell was also founded in Tripoli, though without any real governing structures. In 2016, Ghwell again tried to reassert his position but failed. The following year, he and his troops were finally ousted from the capital. Even though Ghwell’s possibilities were limited, the intra-Tripoli clashes 2016–2017 challenged Al-Sarraj’s regime, and in turn, provided momentum for Haftar to slowly approach the capital.</p>
<p>It is likely that internal rivalries existed amongst decision-makers in Tobruk, and that Al-Sarraj was expected to loyally support the aims of the eastern Libya-based House of Representatives. Instead, in the eyes of his former colleagues, he became too independent and powerful through his apparatus in Tripoli, which led to open confrontation between rival factions.</p>
<p>Despite any doubts held concerning Al-Sarraj&#8217;s loyalty, not all parliamentarians in Tobruk supported Haftar&#8217;s final push towards Tripoli. Dozens pledged their support for the general, but a number rejected the use of force and urged their colleagues to convene and elect a new chairperson. Those dissenting viewed the incumbent as a close ally of Haftar, but failed to gather the necessary quorum to hold a vote until later, but were unable to effectuate any meaningful action.</p>
<h3>Foreign Friends &amp; Funding</h3>
<p>Despite sharp divisions between those allied with him, Haftar had no problem commencing his campaign to seize Tripoli. When Haftar ordered his troops to &#8220;liberate&#8221; Tripoli on April 4, 2019, he had already secured Saudi-Arabian backing as well as support from Egypt and the UAE. GNA forces shot down UAVs that were reported to be of Emirati origin, even though the UAE was not officially involved. Furthermore, it is likely that Saudi funding financed the Tripoli campaign, including pay for soldiers.</p>
<p>On the surface, it would seem paradoxical that Haftar—a man whose stated purpose is combating extremism—is funded by Saudi Arabia&#8217;s Wahabbi monarchy. However, considering that Libyan extremists mainly subscribe to a different&nbsp;strain of Islamic fundamentalism than the Saudis, the paradox is not so striking. Turkey, a major regional rival of the Saudis, has provided support and backing to Al-Sarraj and wasted no time in denouncing Haftar&#8217;s move against Tripoli. Ankara has also been accused of transporting fundamentalist militants to Libya from areas that were formerly controlled by ISIS, and more recently, of arming GNA forces.</p>
<p>Fervent Egyptian support for Haftar is similarly complex. President Al-Sisi has taken a hard line against Islamist movements—notably the Muslim Brotherhood—but such predilections have yet to deter Egyptian participation in a Saudi-funded operation. From Cairo&#8217;s perspective, ensuring extremist groups stay away from Egypt and its vicinity is a goal that justifies even minor procedural deviations.</p>
<p>Similarly, French decision-making is heavily guided by security concerns. France&#8217;s strategy of ambiguity, however, merits some explanation. In 2011, airstrikes carried out by French fighter jets, alongside British and U.S. planes, were instrumental in ousting Gaddafi. Shortly after that, however, Paris began to support Haftar&#8217;s campaign against militant fundamentalists in Libya. France vetoed a UN Security Council resolution over Libya&#8217;s current situation, which was perceived as too unilaterally condemning of Haftar, illustrating France&#8217;s pragmatic approach.</p>
<p>More recently and in a logical continuation of its strategic ambiguity, France called on the UN Security Council to facilitate a settlement in Libya. After Al-Sarraj threatened western energy companies operating in Libya over the status of their operating licenses, France relaxed its seemingly supportive stance towards Haftar&#8217;s LNA. While exhibiting sympathy for the endangered GNA in Tripoli, as well as a willingness to serve as an intermediary, Paris is increasingly aware that it&#8217;s unlikely a negotiated settlement will be reached.</p>
<p>Al-Sarraj&#8217;s threat similarly applies to Italian firms. While the Italian government has held meetings with representatives of both sides, it has mostly limited itself to rhetorically highlighting the need for a political solution to the conflict. While Prime Minister Giuseppe Conte&#8217;s position as the head of a populist left- and right-wing populist governing coalition is a question in-and-of-itself, the primary reason for the Italian government&#8217;s intransigence is likely the ongoing refugee crisis. Italy has been a prime destination for migrants setting off from the Libyan coast, and is, rather cynically, weighing which of the warring parties is best-positioned to stem (if not stop entirely) the substantial influx.</p>
<p>In contrast, Libya&#8217;s neighbor Tunisia is not so concerned about possible refugees, not least because Haftar controls most of the Libyan side of the Libyan-Tunisian border. If allegations of Tunisian arms sent to Tripoli and fighters joining GNA are true, Tunis may have lost one income source. Still, a humanitarian catastrophe next door would cause significant economic and social problems for Tunisia as well.</p>
<p>For its part, Russia denies involvement in the escalation in Libya. In the past, Moscow has provided Haftar&#8217;s forces with arms, and Russian private security firms have reportedly been engaged in operations within Libya. The Kremlin, however, is more focused on the international legal precedents that would be established in the event of a UN-brokered settlement, so as to be able to later refer to it as a model for resolving internal conflicts. If Western powers—mainly the U.S., France, Britain, and Germany—agree to a UN-brokered settlement, the precedent established in Libya could be used by Moscow to settle, on its own terms, internal conflicts it has provoked through the creation of quasi-states like Transnistria, Abkhazia, and the Donetsk People&#8217;s Republic, to name a few.</p>
<h3>Haftar advances towards Tripoli</h3>
<p>As the UN voiced its concern over impending hostilities— in vain—Haftar’s forces closed in on the capital along the two main roads that run parallel to one another into Tripoli. The initial phase was rather quick, and Haftar’s troops succeeded in advancing to the Tunisian border in the west and Janzur on the western outskirts of Tripoli, essentially cutting the city off from any supplies or reinforcements, leaving just two small GNA-loyal pockets along the coast. In the opposite direction, this also prevents possible refugees from crossing over to Tunisia.</p>
<p>Shortly after that, the LNA lost one airplane, reportedly due to technical failures. The LNA bombed the city’s only functioning airport, Mitiga, which was closed for several days. Once again, the heaviest fighting has been concentrated in and around the old airport, located roughly 30 kilometers south of the city center. For now, Haftar is in control the airport itself, with enemy&nbsp;forces just yards away.</p>
<p>Situated between the two main roads leading to Tripoli from the south, the airport serves as a crucial foothold to block access to the city, as well as a forward base from which to conduct further operations. Together with Janzur (had its capture succeeded—instead, around 140 of Haftar’s men were besieged and captured) and a strategic intersection close to the suburb of Tajoura, these gains would offer optimal positions from which to lay siege to the city. Or, if the LNA manages to establish a hold on the old airport, Janzur isn&#8217;t even needed, since the LNA already controls Surman, which blockades the area west of Al-Zawiyah.</p>
<p><figure id="attachment_11546" aria-describedby="caption-attachment-11546" style="width: 877px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" src="http://globalsecurityreview.com/wp-content/uploads/2019/05/Libya20May2019.png" class="size-full wp-image-11546" alt="LNA Positions outside Tripoli, Libya as of May 23, 2019 (graphic by author)" width="877" height="517" srcset="https://globalsecurityreview.com/wp-content/uploads/2019/05/Libya20May2019.png 877w, https://globalsecurityreview.com/wp-content/uploads/2019/05/Libya20May2019-300x177.png 300w, https://globalsecurityreview.com/wp-content/uploads/2019/05/Libya20May2019-768x453.png 768w, https://globalsecurityreview.com/wp-content/uploads/2019/05/Libya20May2019-357x210.png 357w" sizes="(max-width: 877px) 100vw, 877px" /><figcaption id="caption-attachment-11546" class="wp-caption-text">LNA Positions outside Tripoli, Libya as of May 23, 2019 (graphic by author)</figcaption></figure></p>
<p>As of this article&#8217;s publication, the LNA&#8217;s main base of operations remains in Gharyan, some 60 kilometers from Tripoli, whereas the frontline goes from the Qaser Bin Ghashir suburb adjacent to the old airport. Gharyan itself closes a counterattack route via Kilka—the corner of the vast GNA-loyal enclave situated behind the LNA—just southwest of Tripoli. The LNA&#8217;s loss of Al-Aziziyah was a setback, and fierce fighting continues around it and the old airport. The LNA has managed to achieve minor territorial gains around Al-Aziziyah, and for a short period, were able to progress to the Tripoli Medical Center, roughly 10 kilometers from the city center.</p>
<p>Overall, the LNA has been unable to break through the Tripoli defense lines, which have been reinforced by fighters from Misrata. If Haftar were to concentrate all his forces in Tripoli, it would weaken his flanks, leaving his positions open to a possible counterattack from Misrata—towards Bani Walid or from along the eastern coast. Conversely, by drawing in and binding as many Misrata-based armed groups as possible to the Tripoli trenches, Haftar diminishes the likelihood of a counterattack from Misrata.</p>
<p>Launching an assault on a new front along the coast by Sirte is another tactic Haftar could employ to prevent any attacks on his forces from the rear. On the other hand, however, it implies that breaking through Tripoli&#8217;s southern defenses proved harder than initially expected. Thus, clashes remain sporadic, but increasingly heavy shelling has inflicted large amounts of damage on the southern Tripoli suburbs, as thousands have fled amidst a death toll that has risen into the hundreds. Even if the fighting remains localized, the situation could worsen quickly. With deteriorating living conditions, there is a risk of a far greater humanitarian crisis.</p>
<h3>No easy solution</h3>
<p>Escalation into a full-scale civil war cannot be excluded, given the aspirations of the involved parties. As the capital plays a strategic role, capturing it would solidify—to an extent—Haftar&#8217;s control over Libya. Nevertheless, maintaining control over crossroad towns such as Tarhouna, Bani Walid, Waddan, and a small village east of Sirte remains vital for LNA operations in the northwest of Libya.</p>
<p>On the other hand, Al-Sarraj’s most effective (and likely only) way to remain in power is to defeat Haftar&#8217;s LNA at Tripoli&#8217;s gates. A counterattack from Misrata or anywhere else would bog down forces plus weaken the capital&#8217;s southern defenses. Thus, the GNA&#8217;s primary objective is ensuring that the main routes into Tripoli remain closed to the LNA to preclude the possibility of a siege on the city.</p>
<p>In the event of an all-out civil war, there would be no victors. First and foremost, the death toll would likely rise into the tens of thousands, and it would take substantial time and resources to rebuild Libya after another civil war. Hafter can&#8217;t afford to lose the battle for Tripoli, as it would mean the end of his career. If Haftar is victorious, the population of Tripoli isn&#8217;t likely to welcome him as a liberator, thus forcing him into a long campaign to win their hearts and minds.</p>
<p>Likewise, if the GNA prevails, it cannot be sure whether the various armed groups backing it now would subsequently submit to its authority. This would be particularly so if the decisive factor delivering the victory were troops from Misrata, who might seek a more significant share of power, encouraged by their successes and perceived leverage. In this scenario, the intra-Tripoli situation from 2016-2017 would likely repeat itself. Furthermore, several armed groups remain, among whom are former ISIS militants, who could take advantage of factional infighting. Such groups are unlikely to submit to the rule of a central governing authority, and whoever should prevail in Tripoli must effectively deal with these factions—or else the next conflict is already looming.</p>
<p><a href="https://globalsecurityreview.com/haftar-ante-portas-tripoli/">Haftar Ante Portas Tripoli</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Russia&#8217;s Disinformation Campaigns are Succeeding in Europe</title>
		<link>https://globalsecurityreview.com/russia-disinformation-campaigns-succeeding-europe/</link>
		
		<dc:creator><![CDATA[Gabriella Gricius]]></dc:creator>
		<pubDate>Sat, 11 May 2019 19:04:30 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[Georgia]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=11311</guid>

					<description><![CDATA[<p>Russian disinformation campaigns continue to increase, and increasingly seems to be part of a coordinated campaign to overwhelm democracies. In 2017, Catalonia held an illegal referendum on independence from Spain, despite it having been declared unconstitutional by the Spanish Constitutional Court. While 92% of referendum voters supported independence, only 43% of registered voters voted. Amid police [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/russia-disinformation-campaigns-succeeding-europe/">How Russia&#8217;s Disinformation Campaigns are Succeeding in Europe</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Russian disinformation campaigns continue to increase, and increasingly seems to be part of a coordinated campaign to overwhelm democracies.</h2>
<p>In 2017, Catalonia held an illegal referendum on independence from Spain, despite it having been declared unconstitutional by the Spanish Constitutional Court. While 92% of referendum voters supported independence, only 43% of registered voters voted. Amid police crackdowns and massive protests, the Spanish National Court <a href="https://www.independent.co.uk/news/world/europe/catalonia-independence-what-happened-spain-timeline-events-referendum-latest-a8023711.html">ordered the imprisonment of Jordi Cuixart and Jordi Sanchez</a>, two Catalan separatist leaders. In spite of this, Catalonian MPs voted to declare independence. In response, Spain imposed direct rule over Catalonia. However, the situation is not as straightforward as many commentators make it seem, as vital information key to understanding the unrest has been overlooked.</p>
<p>Both the United States Senate and <a href="https://elpais.com/elpais/2017/11/11/inenglish/1510395422_468026.html">an independent study conducted by the George Washington University</a> have claimed that Kremlin-connected media outlets Russia Today (RT) and Sputnik created &#8220;zombie accounts&#8221; or bots to perpetuate a negative perception of Spain in the days leading up to the referendum. Half of the stories shared by RT highlighted police violence to deliberately disrupt internal cohesion in Spain.</p>
<p>Spain is not Moscow&#8217;s only target, however. Over the last year, the E.U. East StratCom Task Force reported <a href="https://euvsdisinfo.eu/">993 reports of disinformation cases,</a> 152 of which targeted the E.U. and originated from Russia. Furthermore, <a href="https://ec.europa.eu/digital-single-market/en/news/final-results-eurobarometer-fake-news-and-online-disinformation">eighty-three percent of Europeans </a>believe &#8220;fake news&#8221; is a danger to democracy.  Disinformation is on the rise, and there is ample evidence that Russian disinformation is part of an orchestrated campaign to overwhelm democracies and free media outlets. <a href="https://foreignpolicy.com/2018/03/05/im-sorry-for-creating-the-gerasimov-doctrine/">Coined by Russian expert Mark Galeotti</a>, the &#8220;Gerasimov doctrine&#8221; is a colloquial term that refers to the employment of non-kinetic or non-military methods to achieve political ends—to destabilize the E.U. and NATO from within through the exploitation of existing social, ethnic, and religious divisions.  The so-called &#8220;Gerasimov doctrine&#8221; merely describes an operational concept and isn&#8217;t a reference to a Russian military doctrine.</p>
<p>For decades, the <a href="https://www.ispionline.it/it/pubblicazione/means-goals-and-consequences-pro-kremlin-disinformation-campaign-16216">trans-Atlantic alliance</a> has remained stable, but history is no guarantee of stability in perpetuity. Despite mostly positive support for NATO amongst the citizens of its member states, Russia seizes upon existing dissatisfaction felt by a minority of citizens and pushes messaging that employs terms like &#8220;occupying power&#8221; to describe the alliance. The same goes for the European Union. Member states regularly disagree over issues such as refugee resettlement, Russian sanctions, and the resurgence of nationalism across the continent. Such subjects are prime targets for Russian disinformation campaigns, which are disseminated by Kremlin-controlled media outlets like RT (Russia Today) and Sputnik, as well as on fringe websites and social media accounts to amplify the message further.</p>
<p>Disinformation is challenging to counter, despite increasing and widespread awareness. Some European states like France <a href="https://www.politico.eu/article/french-parliament-passes-law-against-fake-news/">have enacted laws</a> that compel social networks to disclose the source of funding for sponsored political content and allow for candidates to sue for the removal of contested news reports during elections. In 2018, the E.U. enacted a non-binding disinformation code of practice, aimed at targeting &#8220;fake news&#8221; in upcoming European elections.</p>
<p>Such measures, however, are merely reactive and fail to anticipate the continually adapting strategies of disinformation purveyors. To avoid laws that target foreign influence campaigns, state-sponsored actors are buying political ads in local currency. Actors are increasingly adept at masking their locations and are moving towards image-based disinformation campaigns, which are less regulated and significantly more difficult to legislate.</p>
<p>Rather than perpetually being one step behind, Europe should emulate the strategies of states like Estonia that have been <a href="https://www.csmonitor.com/World/Passcode/2017/0324/Estonia-s-lessons-for-fighting-Russian-disinformation">dealing with Russian disinformation campaigns for years</a>. Rather than allow for Russian disinformation campaigns to gather steam, the websites such as the Estonia-based <a href="https://www.propastop.org/">Propastop</a> continuously debunk disinformation. The Estonian government also operates a Russian-language news channel to serve as an alternative to RT. Moreover, all Estonian politicians and public administration officers do not give interviews to Russian state-controlled media outlets. <a href="https://www.kremlinwatch.eu/countries-compared-states/estonia/https:/www.kremlinwatch.eu/countries-compared-states/estonia/">This strategy of national resilience</a> is also strengthened by Estonia’s National Center for Defense and Security Awareness (NCDSA), a non-governmental organization that aims to foster a society that is resilient and resistant to hostile foreign influence.</p>
<h3>France: The Yellow Vests</h3>
<p>Counter-disinformation tactics must be adaptable because disinformation comes in many different forms. Catalonia and Estonia are not the only case studies by far. France, for example, is currently dealing with an enormous surge of anti-government protestors who disagreed vehemently with an increase on the gas tax. These protestors are better known by their moniker &#8220;yellow vests.&#8221; Although the demonstrators&#8217; original demand of suspending the gas tax increase was met, the next day, more than 125,000 yellow vest protestors took to the streets, clashing with police and looting stores as they went.</p>
<p>According to New Knowledge, <a href="https://www.wired.com/story/co-opting-french-unrest-spread-disinformation/">340 pro-Kremlin accounts</a> created and magnified “the brutality of the French police, Macron’s inability to lead the nation, and anti-NATO or anti-migrant sentiments more than 20,000 times.” Since late October 2017, these accounts have posted at least 1,600 times a day on Twitter, retweeting false information to increase its believability. These accounts, as well as others, impersonated journalists and legitimate news outlets to craft a narrative of France being embroiled in a civil war and blaming Macron for its onset.</p>
<p>What does the Kremlin hope to accomplish through its disinformation campaigns in France? Ultimately, Russia wants to undermine the French government&#8217;s ability to govern effectively. If the French government&#8217;s focus is entirely domestic, it can no longer point fingers at Russia, continue its sanctions regime, and pose any serious threat to Russia. By amplifying societal discontent in France with disinformation through social media, Russia is creating a reality where French democracy is indeed under threat. As the yellow vest protests continue, it remains to be seen whether or not Russia has achieved its goals.</p>
<h3>Georgia: Disinformation as the Status Quo</h3>
<p>Unfortunately, Russian disinformation in Georgia is nothing new. During the 2008 war between Russia and Georgia, the former launched an intense pro-Russian propaganda campaign to spread claims that the Georgian government was violating the human rights of Russian speakers in Georgia. Although the accusations were widely discredited, they were used by Russia to justify the invasion and subsequent occupation of the Georgian regions of South Ossetia and Abkhazia. While Georgian politicians are aware of threat Russian disinformation poses, they lack the <a href="https://www.kremlinwatch.eu/userfiles/russia-s-disinformation-activities-and-counter-measures-lessons-from-georgia.pdf">political will to enact meaningful countermeasures.</a></p>
<p>According to the Georgia-based Media Development Foundation (MDF), this lack of response may be problematic given that <a href="http://mdfgeorgia.ge/uploads/library/89/file/eng/AntiWest-2017-ENG.pdf">almost 2000 anti-Western messages were detected</a> throughout Georgian media outlets in 2017. In contrast to 2016, when most of the Russian disinformation campaign was centered on human rights, the dominant topic in 2017 was the polarization of the Georgian domestic political landscape. Pro-Kremlin actors focused on targeting everyday Georgian&#8217;s perceived loss of national identity paired with demonizing rhetoric of the U.S., NATO, and the E.U.</p>
<p>Russia&#8217;s disinformation campaigns in Georgia are based on a three-part strategy. First, create a threat. Second, foster distrust of Georgia&#8217;s Western allies and partners. Third, reinstate and reinforce the belief that Russia is the sole trustworthy partner. Russian disinformation campaigns in Georgia used fake photos and videos to encourage conspiratorial thinking and increase radicalism in groups like <a href="https://www.transparency.ge/en/blog/anatomy-georgian-neo-nazism">Georgian Neo-Nazi parties</a>. One example of this tactic is the <a href="https://www.bbc.com/news/av/world-46157507/russian-disinformation-and-the-georgian-lab-of-death">“lab of death”</a> narrative, where it was claimed that a U.S.-funded laboratory in Georgia which was giving untested drugs to Georgians, causing them to die.</p>
<p>In Georgia, the goal of such disinformation campaigns is quite different than in France. As Georgia is not presently a member of the E.U., the bulk of Russian messaging is intended to ensure that will never happen. Russia sees Georgia as lying within its sphere of influence, and any attempt to align with the West is seen as a threat. The 2008 Russian-Georgian war, for example, is primarily seen as the driver behind Georgia’s push to receive a NATO Membership Action Plan.</p>
<p>Despite the troubled relationship between the two countries, Georgia has adopted a pragmatic approach for its foreign policy, where it has downplayed tensions with Russia <a href="http://georgiatoday.ge/news/10455/Russia%E2%80%93Georgia-Trade-Corridor-Agreement-Moving-Forward">and even is in talks to create trade corridors </a>through the frozen conflict zones of South Ossetia and Abkhazia. Again, Russia’s disinformation campaigns are having the desired impact. Despite Georgia’s westward orientation, Tbilisi continues to adopt a less aggressive and more pacifist tone towards Moscow.</p>
<h3>Europe Needs to Fight Back</h3>
<p>From Western Europe to the Eastern Neighborhood, disinformation campaigns are having a severe impact on societal cohesion. In France, the &#8220;yellow vest&#8221; protests are ongoing. In Georgia, right-wing radicalism is on the rise, threatening Georgia’s turn to the West. Disinformation is even suspected to be involved with Brexit, and <a href="https://euvsdisinfo.eu/pro-kremlin-disinformation-in-germany-absent-or-present/">the recent German parliamentary election</a>. In this hostile environment, Europe must reorient itself and learn from the E.U. East Stratcom Task Force and Estonia. Otherwise, the E.U. risks further fragmentation within itself and other Western democracies.</p>
<p>Russia’s campaigns are succeeding within Europe because countries are not adopting the appropriate countermeasures. Instead of simply acknowledging that disinformation is a problem, European countries must take proactive measures to debunk Russian propaganda. The E.U.’s East Stratcom Task Force is already doing much of this work, but it could receive further funding and publicity from all E.U. member states.</p>
<p>Counter-disinformation efforts can only be successful if they are marketed effectively. Furthermore, European countries ought to create more societal resilience programs, modeling them off the Estonian model. While not every European country has a Russian-speaking minority, each has segments of disenfranchised people who are vulnerable to disinformation. Put bluntly, the best way to combat the current successes of Russian disinformation is to fight back.</p>
<p><a href="https://globalsecurityreview.com/russia-disinformation-campaigns-succeeding-europe/">How Russia&#8217;s Disinformation Campaigns are Succeeding in Europe</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Sri Lanka: Jihadism and Separatism in an Ethnically-Divided Country</title>
		<link>https://globalsecurityreview.com/sri-lanka-jihadism-and-separatism-ethnically-divided-country/</link>
		
		<dc:creator><![CDATA[Paolo Zucconi]]></dc:creator>
		<pubDate>Fri, 26 Apr 2019 17:20:40 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Iraq]]></category>
		<category><![CDATA[ISIS]]></category>
		<category><![CDATA[Sri Lanka]]></category>
		<category><![CDATA[Syria]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=11246</guid>

					<description><![CDATA[<p>On April 21st, Sri Lanka suffered from several lethal terrorist attacks that killed at least 359 people and injured over 500 more. Of the victims, thirty-five were citizens of foreign states. According to Sri Lankan authorities, multiple terrorists attacked large hotels and Christian churches with explosives. Sri Lankan security services have arrested several dozen people. Political [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/sri-lanka-jihadism-and-separatism-ethnically-divided-country/">Sri Lanka: Jihadism and Separatism in an Ethnically-Divided Country</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>On April 21<sup>st</sup>, Sri Lanka suffered from several lethal terrorist attacks that killed at least 359 people and injured over 500 more.</h2>
<p>Of the victims, thirty-five were citizens of foreign states. <a href="https://www.bloomberg.com/news/articles/2019-04-22/sri-lanka-searches-for-answers-after-easter-blasts-kill-hundreds">According to Sri Lankan authorities</a>, multiple terrorists attacked large hotels and Christian churches with explosives. Sri Lankan security services have arrested several dozen people.</p>
<p>Political violence has affected Sri Lanka (formerly Ceylon) since the country re-established itself as a republic in 1971.  Sri Lanka was engaged in a decades-long civil war until 2009, the end-product of the country&#8217;s colonial and post-colonial oppressive social and economic policies. These policies constrained the rights of the Tamil population, a Hindu minority group. The Tamil people felt that they were politically unrepresented and were increasingly marginalized in Sri Lankan society.</p>
<p>In 1972, when Ceylon changed its name to Sri Lanka, established the state as a republic, and announced that the official religion would be Buddhism, the Tamil began peacefully protesting against the government&#8217;s policies. As time went on, however, Tamil armed resistance groups began to emerge. These groups employed terrorist tactics during what would become a bloody civil war, characterized by large-scale human rights violations and the deaths of over 100,000 people.</p>
<h3>Today, the situation in Sri Lanka is different.</h3>
<p>Throughout Southeast Asia, acts of violence are primarily carried out by jihadist groups and Islamic separatist movements. Christians are increasingly targeted by both long-standing terrorist organizations, such as Al-Qaeda, and groups founded more recently, such as ISIS (Daesh).  Al-Qaeda and ISIS are engaged in a competition for influence and leadership within the broader region, one that is illustrative of the evolving nature of jihadist insurgencies in the region.<span class="Apple-converted-space"> </span></p>
<p>Although ISIS no longer controls territory in Syria and Iraq, the group&#8217;s increasingly asymmetric nature and the propaganda disseminated by the group are now affecting Southeast Asian states like Indonesia and the  Philippines, which governments are having difficulty countering. Furthermore, there is increasing concern over the threat posed by foreign fighters returning to their country of origin, as it could have a profound impact on local conflicts. In Sri Lanka, for instance, ISIS didn&#8217;t radicalize many people. However, the group&#8217;s propaganda intersects with that of other jihadist militant groups, increasing the overall terrorist threat in Sri Lanka, as tensions and rivalries among various jihadist factions make the security landscape inherently more complex.</p>
<p>ISIS claimed responsibility for the 2019 Easter Sunday bombings in Sri Lanka, as evidence emerged of the perpetrators&#8217; sophisticated management and organizational capabilities, along with their use of known jihadi tactics. The government accused the <a href="https://www.bloomberg.com/news/articles/2019-04-22/sri-lanka-searches-for-answers-after-easter-blasts-kill-hundreds">National Thowheeth Jama&#8217;ath</a> of carrying out the attacks with foreign support, which merits closer scrutiny. Not only did the Easter bombings occur on the tenth anniversary of the Tamil&#8217;s defeat by Sri Lankan government forces, but the National Thowheeth Jama&#8217;ath has historically carried out acts of vandalism rather than terrorism. If the group was, in fact, responsible for the Easter Sunday bombings, their use of explosives and suicide bombers indicates a substantial qualitative leap in terms of their capabilities. It&#8217;s essential that the ongoing investigation clarifies the National Thoweeth Jama&#8217;ath&#8217;s involvement.<span class="Apple-converted-space"> </span></p>
<p>Furthermore, the attacks were the result of an intelligence failure, <a href="https://www.timesofisrael.com/possible-intelligence-failures-to-be-examined-in-sri-lanka-blasts/">according to Sri Lankan authorities</a>. Pujith Jayasundara, a senior Sri Lankan government official, reportedly received a warning from a foreign intelligence service concerning a possible terrorist attack against Christian churches in the country and issued a warning. Unfortunately, the information failed to reach policymakers in time, according to telecommunications Minister Harin Fernando.</p>
<h3>Breaking the nexus between violent separatists and jihadist groups.</h3>
<p>Should the National Thowheeth Jama&#8217;ath be proven to be responsible for the attacks, it will serve as further proof that violent acts by small numbers of jihadist militants can gravely threaten a country&#8217;s national security and socio-economic interests, mainly if tourism is a significant economic driver. Domestic and regional cooperation between police and intelligence services urgently needs to improve as it&#8217;s becoming easier and easier for local militants and smaller groups to connect across borders to disseminate instructions, training, and logistics information from larger terrorist organizations.</p>
<p>In Southeast Asia, a region deeply affected by internal conflicts, the growth of violent jihadist and separatist movements significantly impacts both political and social stability. Separatist movements are inherently a threat to national security, especially as separatism and the desire for recognition are increasingly connected with ethnonationalist and jihadist movements. Existing gaps in counter-terrorism efforts only serve to deepen the increasing interconnection and interdependence of jihadist and separatist movements.</p>
<p>Although local separatist movements maintain different strategies and objectives from both global and localized jihadist groups, many employ transnational jihadist rhetoric and propaganda to achieve religious-political goals. Separatist groups may use jihadist tactics for their attacks because they are hard to counter and have the desired impact on local and international media outlets. It is critical that Southeast Asian re-adapt their counter-terrorism efforts to break the nexus between political insurgency and jihadism—especially now that well-trained and experienced militants are returning home from Syria and Iraq.</p>
<p><a href="https://globalsecurityreview.com/sri-lanka-jihadism-and-separatism-ethnically-divided-country/">Sri Lanka: Jihadism and Separatism in an Ethnically-Divided Country</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Four &#8220;Nots&#8221; to Correctly Interpreting China&#8217;s Rise</title>
		<link>https://globalsecurityreview.com/four-nots-analyze-china-rise/</link>
		
		<dc:creator><![CDATA[Lorenzo Termine]]></dc:creator>
		<pubDate>Thu, 18 Apr 2019 15:35:28 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[Philippines]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=11156</guid>

					<description><![CDATA[<p>Correctly appraising the rise of China is the sine qua non for engaging with it. In contrast to its predecessors, the Trump administration has brought about some relevant changes to U.S. foreign policy towards the People’s Republic of China. According to the 2018 National Defense Strategy, &#8220;inter-state strategic competition&#8221; has reappeared as the principal threat [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/four-nots-analyze-china-rise/">The Four &#8220;Nots&#8221; to Correctly Interpreting China&#8217;s Rise</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Correctly appraising the rise of China is the sine qua non for engaging with it.</h2>
<p>In contrast to its predecessors, the Trump administration has brought about some relevant changes to U.S. foreign policy towards the People’s Republic of China. According to the <a href="https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf">2018 National Defense Strategy</a>, &#8220;inter-state strategic competition&#8221; has reappeared as the principal threat to U.S. national security.</p>
<p>Similarly, the <a href="https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf">2017 National Security Strategy</a> contends that China—together with Russia—threatens to challenge &#8220;American power, influence, and interests, attempting to erode American security and prosperity.&#8221; In short, China must be considered a &#8220;strategic competitor&#8221; and a &#8220;revisionist power&#8221; as it is promoting a worldview utterly &#8220;antithetical&#8221; to U.S. values and interests.</p>
<p>Each subsequent strategic and operational document released by the Trump administration since the National Security Strategy (<a href="https://media.defense.gov/2018/Feb/02/2001872886/-1/-1/1/2018-NUCLEAR-POSTURE-REVIEW-FINAL-REPORT.PDF" data-saferedirecturl="https://www.google.com/url?q=https://media.defense.gov/2018/Feb/02/2001872886/-1/-1/1/2018-NUCLEAR-POSTURE-REVIEW-FINAL-REPORT.PDF&#038;source=gmail&#038;ust=1555433536830000&#038;usg=AFQjCNFHioD_NGmbiq_cLLjYdalCy9c8iQ">2018 Nuclear Posture Review</a>; <a href="https://www.navy.mil/navydata/people/cno/Richardson/Resource/Design_2.0.pdf" data-saferedirecturl="https://www.google.com/url?q=https://www.navy.mil/navydata/people/cno/Richardson/Resource/Design_2.0.pdf&#038;source=gmail&#038;ust=1555433536830000&#038;usg=AFQjCNH6CzLg77z2mRmqm6HnUCiPxiEa3Q">2018 Design for Maintaining Maritime Superiority 2.0</a>; <a href="https://www.defense.gov/Portals/1/Interactive/2018/11-2019-Missile-Defense-Review/The%202019%20MDR_Executive%20Summary.pdf" data-saferedirecturl="https://www.google.com/url?q=https://www.defense.gov/Portals/1/Interactive/2018/11-2019-Missile-Defense-Review/The%25202019%2520MDR_Executive%2520Summary.pdf&#038;source=gmail&#038;ust=1555433536830000&#038;usg=AFQjCNEVDts3cBEV-lhNblXmHwNSFYQ9-Q">2019 Missile Defense Review</a>) has chorused those conclusions. After unveiling the 2017 NSS, the White House imposed tariffs on China in response to allegedly unfair trade practices.</p>
<p>[bs-quote quote=&#8221;Beijing is a revisionist power, but it is not necessarily a subversive actor on the global stage.&#8221; style=&#8221;style-6&#8243; align=&#8221;left&#8221;][/bs-quote]</p>
<p>The United States first imposed tariffs on $3 billion worth of goods and then enacted measures on another $50 billion. In September of 2018, the U.S. imposed a 10% tariff on approximately $200 billion worth of Chinese goods, with a possibility of a rise to 25% in January 2019. The U.S. and China negotiated a temporary truce over further protectionist escalation at the G-20 Summit in Buenos Aires in December 2018, averting an increase in tariffs on Chinese exports. Nevertheless, competition between the U.S. and China is expected to endure, primarily in the economic and technological realms, forcing Washington and Beijing into <a href="https://www.foreignaffairs.com/articles/china/2018-12-11/age-uneasy-peace" data-saferedirecturl="https://www.google.com/url?q=https://www.foreignaffairs.com/articles/china/2018-12-11/age-uneasy-peace&#038;source=gmail&#038;ust=1555433536830000&#038;usg=AFQjCNG8rdGSbhTjKQ6A3LsR9iWDpLSo_Q">an uneasy peace</a>.</p>
<p>After four decades of economic growth, China today is a great power, eager to pursue its strategic interests. On a global level, however, China is bound by structures, institutions, procedures, and rules that have been promoted by the United States since 1945, and ultimately standardized after the collapse of the Soviet Union and the end of the Cold War.</p>
<p>Regionally, Chinese expansionism is constrained by the U.S.-led hub-and-spoke security system that binds the United States with its allies and partners in the Indo-Pacific region (primarily Japan, the Republic of Korea, the Philippines, Taiwan, Australia, and New Zealand). Policymakers should keep the following four points in mind when developing China policies—these four &#8220;nots&#8221; are essential for understanding Chinese behavior, goals, and interests.</p>
<ol>
<li><em>The center of political authority in China is NOT Xi Jinping; it’s the Chinese&nbsp;Communist Party.</em> This is not to downplay the role Xi has played in fueling China&#8217;s global ambitions—rather, since 1978, it has been the Party that ultimately drives China&#8217;s foreign policy and grand strategic goals. It has always been since 1978. If Xi wants to implement a new vision or global agenda, he nevertheless needs the Party’s approval. Additionally, <a href="https://www.brookings.edu/articles/hus-to-blame-for-chinas-foreign-assertiveness/" data-saferedirecturl="https://www.google.com/url?q=https://www.brookings.edu/articles/hus-to-blame-for-chinas-foreign-assertiveness/&#038;source=gmail&#038;ust=1555433536830000&#038;usg=AFQjCNEnBcI5W1nw37eTENbrc9aWWNuAgg">as Rush Doshi contends</a>, concepts usually attributed to Xi such as “national rejuvenation,” “strategic opportunity,” and “China’s great power status,” were laid down <em>before</em> Xi rose to the apex of the CCP in November 2012.</li>
<li><em>China&#8217;s revisionist behavior is NOT revolutionary; It’s incremental and selective.</em> As Robert Gilpin’s hegemonic stability theory states, there are two plausible paths of systemic revisionism: incremental and revolutionary. Incrementalism aims to implement &#8220;continuous adjustments within the framework of the existing system,&#8221; while revolution occurs with &#8220;intermittent abrupt changes.&#8221; Empowered by forty-years of unprecedented economic growth, Beijing eventually became more assertive and demanding of what it perceives is a more accommodating and beneficial international order, but stopped short of attempting a sweeping and radical restructuring of the global order. Thus, <a href="https://macropolo.org/reluctant-stakeholder-chinas-highly-strategic-brand-revisionism-challenging-washington-thinks/" data-saferedirecturl="https://www.google.com/url?q=https://macropolo.org/reluctant-stakeholder-chinas-highly-strategic-brand-revisionism-challenging-washington-thinks/&#038;source=gmail&#038;ust=1555433536830000&#038;usg=AFQjCNHroY1CEG5t6FUXEaT5qcDIZVBLFA">as Evan Feigenbaum states</a>, China is carrying out revisionist policies through an incremental and selective approach rather than a revolutionary one.</li>
<li><em>China is NOT a peer competitor to the U.S. at present, but it could be in the future.</em> Today, Chinese economic growth has run aground as Xi Jinping pursues structural reforms to shepherd the country into a more sustainable and domestic-consumption-driven path, a move which will inevitably stimy economic growth. Furthermore, a formidable strand of literature (see <a href="https://www.mitpressjournals.org/doi/10.1162/ISEC_a_00225" data-saferedirecturl="https://www.google.com/url?q=https://www.mitpressjournals.org/doi/10.1162/ISEC_a_00225&#038;source=gmail&#038;ust=1555433536830000&#038;usg=AFQjCNGBt8HhgRninj8GSk91FZU9_g4gGw">Stephen Brooks and William Wohlforth</a>, <a href="https://www.mitpressjournals.org/doi/abs/10.1162/ISEC_a_00066" data-saferedirecturl="https://www.google.com/url?q=https://www.mitpressjournals.org/doi/abs/10.1162/ISEC_a_00066&#038;source=gmail&#038;ust=1555433536830000&#038;usg=AFQjCNF8mteq-mrHMbXO3LpK5BA2t-aoXQ">Michael Beckley</a> and <a href="https://www.mitpressjournals.org/doi/full/10.1162/isec_a_00337" data-saferedirecturl="https://www.google.com/url?q=https://www.mitpressjournals.org/doi/full/10.1162/isec_a_00337&#038;source=gmail&#038;ust=1555433536830000&#038;usg=AFQjCNHlM6o24m4xzNYKXUVwfNTs3jS28w">Andrea and Mauro Gilli</a>) has flourished in recent years stressing China’s deficiencies while outlining obstacles to reaching parity with the United States. Stephen Brooks and William Wohlforth accurately identify national military, economic and technological capabilities that are &#8220;tailored for superpower status,&#8221; but conclude that &#8220;the one-superpower [the U.S.] system is not on the cusp of structural change&#8221; and that &#8220;there has been no transformation in its fundamental operating dynamics,&#8221; despite Chinese advances.</li>
<li><em>China is NOT out-of-the-way; it’s in-the-way.</em> Globalization and forty years of normalized diplomatic relations have intertwined Beijing and Washington on multiple fronts: currency reserves, trade, investments, industrial complementarity, cultural exchanges, international security matters in which both parties have interests, and more.&nbsp;<a style="text-transform: initial" href="https://www.foreignaffairs.com/articles/china/2018-03-02/counterproductive-cold-war-china" data-saferedirecturl="https://www.google.com/url?q=https://www.foreignaffairs.com/articles/china/2018-03-02/counterproductive-cold-war-china&#038;source=gmail&#038;ust=1555433536830000&#038;usg=AFQjCNGjqE5Y-EeuxdDAeD7xx2grSIe1_Q">As Michael Swaine appraised</a><span style="text-transform: initial">, disentangling—or decoupling—a relationship of such complexity, while addressing critical nodes, will require more than labeling China as an existential threat and discarding China’s contribution to global security and prosperity.</span></li>
</ol>
<p>Beijing is a revisionist power, but it is not necessarily a subversive actor on the global stage. Indeed, as the U.K. Parliament&#8217;s Foreign Affairs Committee recently assessed, “<a href="https://www.parliament.uk/business/committees/committees-a-z/commons-select/foreign-affairs-committee/news-parliament-2017/china-international-rules-report-published-17-19/" data-saferedirecturl="https://www.google.com/url?q=https://www.parliament.uk/business/committees/committees-a-z/commons-select/foreign-affairs-committee/news-parliament-2017/china-international-rules-report-published-17-19/&#038;source=gmail&#038;ust=1555433536830000&#038;usg=AFQjCNGK04uQAe7H6gg9UlA3aoTr1qKdgQ">China is a force for order, but not liberal order</a>.” For its part, the Trump Administration is advancing a <em>Free and Open Indo-Pacific&nbsp;</em>strategy that, despite promoting strong global cohesion in the face of China&#8217;s rise, displays a proclivity for unilateralism. Policymakers should consider the four &#8220;nots&#8221; as a starting point for developing a long-term strategy for countering Chinese revisionism.</p>
<p><a href="https://globalsecurityreview.com/four-nots-analyze-china-rise/">The Four &#8220;Nots&#8221; to Correctly Interpreting China&#8217;s Rise</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Designating the IRGC as a Terrorist Group: Consequences for U.S. Forces</title>
		<link>https://globalsecurityreview.com/designation-irgc-terrorist-organization-consequences-us-troops/</link>
		
		<dc:creator><![CDATA[Ali Arfa]]></dc:creator>
		<pubDate>Wed, 17 Apr 2019 15:27:35 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Hezbollah]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Iraq]]></category>
		<category><![CDATA[IRGC]]></category>
		<category><![CDATA[ISIS]]></category>
		<category><![CDATA[Lebanon]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=11151</guid>

					<description><![CDATA[<p>The obsession in the United States with the “war on terror” entered a new phase when U.S. President Donald Trump formally designated Iran’s Islamic Revolutionary Guard Corps (IRGC) as a Foreign Terrorist Organization (FTO).  According to the statement, the designation is “the first time that the United States has ever named a part of another government [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/designation-irgc-terrorist-organization-consequences-us-troops/">Designating the IRGC as a Terrorist Group: Consequences for U.S. Forces</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="text-transform: initial;">The obsession in the United States with the “war on terror” entered a new phase when U.S. President Donald Trump formally designated Iran’s Islamic Revolutionary Guard Corps (IRGC) </span><a style="text-transform: initial;" href="https://www.whitehouse.gov/briefings-statements/statement-president-designation-islamic-revolutionary-guard-corps-foreign-terrorist-organization/">as a Foreign Terrorist Organization (FTO)</a><span style="text-transform: initial;">.  According to the statement, the designation is “the first time that the United States has ever named a part of another government as an FTO,” and consequently any form of business with the IRGC will be interpreted as “bankrolling terrorism.” The statement was released a few days after Pentagon claimed that </span><a style="text-transform: initial;" href="https://www.militarytimes.com/news/your-military/2019/04/04/iran-killed-more-us-troops-in-iraq-than-previously-known-pentagon-says/">Iran had killed more U.S. troops in Iraq</a><span style="text-transform: initial;"> than was previously known, which could be interpreted as providing a pretext for the administration&#8217;s action.</span></p>
<p>In response, Iranian Foreign Minister Javad Zarif wrote a letter to President Hassan Rouhani and Iran’s Supreme National Security Council (SNSC) asking that U.S. Central Command (CENTCOM) be designated <a href="https://www.wsj.com/articles/iran-labels-u-s-central-command-a-terrorist-organization-11554750204">as a “terrorist organization” in a reciprocal move</a>, a measure already promised by some Iranian lawmakers. Shortly after that, Iran&#8217;s SNSC stated that the U.S. government was a “sponsor of terrorism” and designated CENTCOM and all affiliated forces as “terrorist groups.” Now, a new wave of tensions could spread through the region.</p>
<h3>Too big a bite for CENTCOM to chew?</h3>
<p>Many have argued that the U.S. is retreating from its role as a world leader and is moving in a more isolationist direction. Others point to a need to reconcentrate U.S. resources in response to the oft-mentioned return to &#8220;great power competition.&#8221;</p>
<p>China—and Russia, to a lesser extent—are engaged in expansionist agendas as the U.S. has been preoccupied with events in the Middle East. Many believe the time, energy, and money the U.S. has spent for nearly two decades in the region would have been better spent countering the influence of the country&#8217;s real revisionist threats.</p>
<p>While the U.S. remains involved in a “forever war&#8221; in Afghanistan, and with Iraq still reeling from the aftermath of sectarian conflict and ISIS, the U.S. increasingly seems bent on raising tensions with Iran in light of the recent IRGC designation as a terrorist group.</p>
<h3>The U.S. presence and the Shiite Crescent</h3>
<p>The Iranian proxies in Iraq, known in general as &#8220;حشد الشعبی&#8221; or <em>Popular Mobilization Units</em> (PMU), whose commanders such as Hadi Al-Amiri and Abu Mahdi al-Muhandis have close ties to IRGC—and Qasem Soleimani, in particular. In the aftermath of fighting ISIS in Iraq, the PMU is now better organized and equipped.</p>
<p>With the recent designation, these groups, with their close ties to their Shiite Iranian allies, can undoubtedly escalate the level of violence in Iraq. According to <em>The New York Times</em>, the recent move could even <a href="https://www.nytimes.com/2019/04/08/world/middleeast/trump-iran-revolutionary-guard-corps.html">push the Iraqi parliamentarians</a> to fuel a proposal limiting the movement and actions of the approximately 5,000 American troops in Iraq.</p>
<p>Hezbollah, based in Lebanon, is arguably the most loyal Iranian proxy group. With approximately <a href="https://www.france24.com/en/20181219-iran-israel-hezbollah-tunnels-missiles-lebanon-syria-nasrallah">45,000 fighters</a>, having alongside the IRGC in Syria, the Hezbollah militia has proven itself to be a capable force in implementing Tehran&#8217;s regional strategy. The PMU and Hezbollah—essentially two foreign branches of the IRGC—will pose challenges for the U.S. forces. While the United States would undoubtedly emerge tactically victorious from any conflict in the Middle East, two questions remain: at what cost, and after how long?</p>
<p><a href="https://globalsecurityreview.com/designation-irgc-terrorist-organization-consequences-us-troops/">Designating the IRGC as a Terrorist Group: Consequences for U.S. Forces</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Resilience of Jihadi Extremist Groups in North Africa</title>
		<link>https://globalsecurityreview.com/resilience-extremist-groups-north-africa/</link>
		
		<dc:creator><![CDATA[Paolo Zucconi]]></dc:creator>
		<pubDate>Mon, 15 Apr 2019 18:37:03 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Al Qaeda]]></category>
		<category><![CDATA[Algeria]]></category>
		<category><![CDATA[Egypt]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[ISIS]]></category>
		<category><![CDATA[Lybia]]></category>
		<category><![CDATA[Morocco]]></category>
		<category><![CDATA[North Africa]]></category>
		<category><![CDATA[Tunisia]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=11101</guid>

					<description><![CDATA[<p>Eight years after Qaddafi&#8217;s fall, Libya remains in a state of chaos due to the fragmentation of power and contrast between West and East Libya (Tripoli and Tobruk)—as well as tribal conflicts (especially in the Fezzan). This affects both the rebuilding of active state institutions and the process of national reconciliation. While the Libyan conflict has [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/resilience-extremist-groups-north-africa/">The Resilience of Jihadi Extremist Groups in North Africa</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Eight years after Qaddafi&#8217;s fall, Libya remains in a state of chaos due to the fragmentation of power and contrast between West and East Libya (Tripoli and Tobruk)—as well as tribal conflicts (especially in the Fezzan). This affects both the rebuilding of active state institutions and the process of national reconciliation. While the Libyan conflict has been primarily characterized by short-term alliances among local actors (such as militias and tribes), the resilience of Libyan jihadi extremist groups and their networks cannot be underestimated.</p>
<p>Extremist propaganda has spread beyond Libya to reach Morocco, Tunisia, Algeria, and Egypt. While this isn&#8217;t a new phenomenon, North African states continue to suffer from substantial terrorist attacks. Recently, the Tripoli-based Libyan <a href="https://www.thenational.ae/world/mena/isis-claims-libyan-oil-headquarters-attack-1.769334">National Oil Company</a> and the <a href="https://eeas.europa.eu/delegations/libya/43893/statement-attack-libyan-high-national-electoral-commission-hnec-tripoli_en">High National Electoral Commission</a> were attacked by militants seemingly linked to ISIS (<em>Daesh</em>). Extremist movements are increasing their propaganda output and continue to pose a severe threat to internal and regional security.</p>
<p>Tunisia is engulfed in a deep economic crisis. As such, international financial institutions are demanding significant economic structural reforms, which have triggered protests and prompted an increase in propaganda originating from networks in Libya to exploit socio-economic issues to attract disaffected young people to their ranks.</p>
<p>On October 28<sup>th</sup>, 2018 a woman with no previously-known militant background (according to <a href="https://edition.cnn.com/2018/10/29/middleeast/tunis-female-suicide-bomber-intl/index.html">Tunisian authorities</a>) blew herself up. The attack occurred just as the country&#8217;s vital tourism industry started to recover more than three years after two deadly terror attacks. More recently, on March 7<sup>th</sup>, 2019, a post office in Tunis intercepted <a href="http://northafricapost.com/28518-tunisia-interception-of-letters-containing-toxic-substances-addressed-to-public-figures.html">19 letters</a> containing potentially deadly toxins addressed to notable journalists, politicians, and trade unionists. Local authorities revealed that the substances were produced in a Tunisian laboratory. This is a critical security issue that needs to be addressed—both domestically and regionally, and possibly in cooperation with the European Union. Tunisia, Algeria, and Egypt are strategic partners for Europe—ensuring their stability is essential to avoid further crises in the region.</p>
<p>On March 10<sup>th</sup>, 2019, Al-Qaeda in the Maghreb&#8217;s (AQIM) al-Andalus media foundation released an <a href="https://www.longwarjournal.org/archives/2019/03/aqim-official-calls-for-sharia-governance-in-algeria.php">audio clip</a> of a speech given by AQIM official Abu Obeida Yusuf al-Annabi. The address championed the Algerian protests against current Algerian president Abdelaziz Bouteflika and encouraged protesters to demand Sharia-based governance. Despite Algeria having recently initiated a massive counter-terrorism operation to prevent the infiltration of terrorists through the country&#8217;s borders with Tunisia, Libya, and Mali, extremist propaganda still represents a serious issue.</p>
<p>Algier&#8217;s counter-terrorism efforts are increasingly complicated by illegal migration and human trafficking along Algeria&#8217;s southern border. Terrorism and criminality are increasingly interconnected, and the need to break the nexus between the two has increased following the social unrest that led to the ouster of the 82-year old Bouteflika. Stability in Algeria is critical—for the security of Algerians, and the broader region. The country&#8217;s next leader will face a challenging economic situation, persistent threats from terrorist networks in Mali and Libya, and increasing extremist propaganda targeted to influence the country&#8217;s younger generations.</p>
<p>According to the British government&#8217;s <a href="https://www.gov.uk/foreign-travel-advice/morocco/terrorism">Foreign Travel Advice</a>, &#8220;terrorists are likely to try to carry out attacks in Morocco. You should be vigilant at all times.&#8221;  Two Scandinavian tourists were brutally killed in Morocco in December of 2018. While local authorities <a href="https://www.moroccoworldnews.com/2018/12/261356/scandinavian-tourists-murder-isis/">reported</a> the attackers were not affiliated with ISIS, the attack—coupled with ISIS&#8217; territorial defeat in Syria and Iraq—has lead to growing scrutiny over the group&#8217;s increasingly asymmetric dimension.</p>
<p>One component of the Moroccan counter-terrorism strategy is <i>moussalaha—</i>a reconciliation program. Launched in 2018, it is a de-radicalization program to combat violent extremism. According to the General Delegation for Prison Administration and Reintegration, human rights and anti-radicalization experts provide psychological support and rehabilitation of charged and jailed people for terror crimes. On March 10<sup>th </sup>of 2019, Moroccan authorities announced a repatriation program to allow militants of Moroccan origin to return in safety. The returnees were subject to judicial investigations for their alleged involvement in terror-related activities. The Head of Morocco’s Central Bureau of Judicial Investigation estimated <a href="https://www.moroccoworldnews.com/2019/03/267647/authorities-repatriate-8-moroccans-terrorism-syria/">1.668 Moroccans</a> joined ISIS in Syria, Iraq, and Libya.</p>
<p>In Egypt, several cells affiliated with <i>Wilaya Sinai (</i>Islamic State in the Sinai) remain operational and continue to threaten security and stability in the Sinai. Egypt continues to suffer from ongoing attacks against Christians and other religious minorities. The elimination of the territorial holdings of ISIS in Syria and Iraq could force militants to flow into Egypt.</p>
<p>Furthermore, despite the group&#8217;s territorial defeat, ISIS-affiliated propaganda and the group&#8217;s shift to an asymmetric entity from a territorially-based entity will continue to threaten North African security. ISIS, in addition to smaller, localized groups, are capable of radicalizing young people in a complex regional context, one deeply affected by economic crises. Extremist propaganda represents an illusory—but convincing—opportunity for young people to turn from losers to winners<i>. </i>Breaking the nexus between terrorism and criminality (especially smuggling) is essential to promote regional stability and security.</p>
<p><a href="https://globalsecurityreview.com/resilience-extremist-groups-north-africa/">The Resilience of Jihadi Extremist Groups in North Africa</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Pulwama Incident Part Two: Pakistan and India Have Much to Learn</title>
		<link>https://globalsecurityreview.com/pulwama-pakistan-india-conflict-much-learn/</link>
		
		<dc:creator><![CDATA[Mikail Shaikh]]></dc:creator>
		<pubDate>Wed, 10 Apr 2019 14:23:56 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Kashmir]]></category>
		<category><![CDATA[Pakistan]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=11080</guid>

					<description><![CDATA[<p>The world stood on the precipice of a nuclear war in the final week of February 2019. This article is a continuation of a previous analysis of the Pulwama attack that examined how the attack and the way in which India responded threatened South Asian security.  Following a terrorist attack on an Indian security forces [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/pulwama-pakistan-india-conflict-much-learn/">The Pulwama Incident Part Two: Pakistan and India Have Much to Learn</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The world stood on the precipice of a nuclear war in the final week of February 2019.</h2>
<p style="text-align: center;"><i>This article is a continuation of a <a href="http://globalsecurityreview.com/india-pakistan-pulwama-incident-kashmir-razors-edge/">previous analysis of the Pulwama attack</a> that examined how the attack and the way in which India responded threatened South Asian security. </i></p>
<p>Following a terrorist attack on an Indian security forces convoy in <a href="https://www.bbc.co.uk/news/world-asia-india-47240660">Pulwama</a>, Kashmir, India and Pakistan engaged in airstrikes, dogfights and cross-border shelling along the Line of Control (LoC). Since their independence and partition in 1947, India and Pakistan have fought several wars and low-intensity conflicts.</p>
<p>There was, however, an aspect of this latest incident that changed the game and had potentially catastrophic consequences: both states are nuclear powers. Excluding the 1999 Kargil War, this is the only time in history that nuclear powers have attacked each other. Possibly more significant is that India displayed a willingness to strike targets in mainland Pakistani territory—outside of Kashmir.</p>
<h3>Overview</h3>
<p>It started when the Indian Air Force (IAF) struck what it claimed to be a <i>Jaish-e-Muhammad</i> (JeM) terrorist camp in the town of Balakot in Pakistan—the first time an Indian aircraft violated Pakistani airspace since the War of 1971. Pakistan, in response, shot down an Indian jet and captured its pilot, Wing Commander Abhinandan Varthaman.</p>
<p>To de-escalate, Pakistan released the pilot within forty-eight hours of detaining him. India’s response was to unleash a barrage of shelling across the LoC. All the while, an aggressively jingoistic Indian media apparatus was disseminating information that was inconsistent, confusing or outrightly <a href="https://www.standard.co.uk/news/world/india-has-more-fake-news-than-anywhere-else-in-the-world-report-says-a4059876.html">false</a>. In some reports, details would be altered within just a few hours.</p>
<p>At the time of writing, both countries seem to have <a href="https://www.aljazeera.com/indepth/features/india-pakistan-stand-kashmir-remains-precarious-edge-190301115237414.html">stood down</a> and ceased hostilities. Many would call this a stroke of luck, considering the cataclysmic ramifications of further escalation. Lessons must be learned by both sides to prevent a situation like this happening again. Such a crisis could spin wildly out of control, threatening the security of Southeast Asia—and the world.</p>
<h3>Lessons for India</h3>
<p>Arguably, India has the most to learn. Prime Minister Narendra Modi took a significant gamble ordering the initial strikes in Balakot. Driven by revenge for the Pulwama Attack, Modi assumed that appearing tough on Pakistani-sponsored terrorism, while securitizing the province of Kashmir, would win him votes in April&#8217;s Indian elections, a dangerous gamble considering both India and Pakistan are nuclear powers.</p>
<p>That assumption has since been shattered, as <a href="https://www.hindustantimes.com/india-news/leaders-from-21-parties-come-together-to-take-on-bjp-as-sp-bsp-skip-opposition-meeting/story-A3nUAWTujhDFDSp6uSPvIN.html">21 opposition parties</a>, led by Rahul Gandhi’s Congress Party, have banded together to oppose Indian military action in Pakistan. Alongside this twenty one-party alliance, prominent <a href="https://twitter.com/MJibranNasir/status/1101163984420519942">Indians</a> have taken to social media to express their dissatisfaction at the ongoing military operation, criticizing the Indian government and mass media for acting irrationally and fostering a vitriolic nationalism throughout the country and broader Indian diaspora.<span class="Apple-converted-space"> </span></p>
<p>Another lesson to learn is how the Indian media covers Pakistan, and by extension counter-terrorism operations like the Balakot strike. News coverage was inconsistent at best and toxic at its worst. Information disseminated was either debunked within hours or fabricated completely, the most prominent example being Indian coverage of the initial <a href="https://tribune.com.pk/story/1922397/1-no-casualties-balakot-strike-concedes-india/">Balakot strike</a>.</p>
<p>Indian media outlets declared that over 300 JeM militants had been killed. Within a few hours, Pakistan’s Inter-Services Public Relations (ISPR)—the Pakistani military’s media wing—had posted images of the bomb site on Twitter. Later confirmed by satellite, the images showed that Indian ordnance fell on a mostly uninhabited forest far from the intended target.</p>
<p>A debate has sparked whether Indian ordnance hit uninhabited territory with the purpose of provoking a Pakistani response, or if there was indeed a camp and the weapons simply missed; odd considering they were state-of-the-art Israeli SPICE bombs. Other dubious claims include those regarding Pakistani <a href="https://www.dawn.com/news/1467971">F-16</a> fighter jets being shot down by Indian MiGs, which were disproven by Indian experts in television studios. Even the release of Abhinandan was treated as the result of Pakistani weakness rather than a genuine attempt to de-escalate the crisis.</p>
<p>By this point, it became clear that the Indian narrative—and indeed Modi’s government—had lost credibility within a matter of hours. What had started as a pre-emptive response to terrorist groups in Pakistan had quickly descended into a military operation within the sovereign airspace of another state. It also became evident that India had overlooked the fact that both countries possess nuclear weapons, so de-escalation was in the interest of both countries.</p>
<p>The BJP government stands to learn a great deal from the events of that week. Given the lack of conclusive evidence of Pakistani involvement in the Pulwama attack, it is clear that the focus must be on terrorist networks within Kashmir rather than fomenting nationalistic fervor and attacking another country. Pulwama showed that Kashmir is experiencing a homegrown terrorist movement and that India must shift its focus to performing counterinsurgency (COIN) rather than blaming its neighbor for each incident as a knee-jerk response.</p>
<p>COIN, however, can only work with the support of the Kashmiris. Achieving this means giving Kashmiris a forum to air grievances and express any desire for self-determination. Making concessions of this nature will reduce terrorism and consequently stabilize the region—even at the expense of Indian prestige.</p>
<h3>Lessons for Pakistan</h3>
<p>Modi’s Pakistani counterpart, Prime Minister Imran Khan, took a far more reasonable and—according to some commentators—“mature” approach to the conflict, prioritizing peace and de-escalation over victory. This, coupled with the release of the Indian pilot, earned him praise from within Pakistan and from the wider international community. Some have gone as far as advocating that Khan be <a href="https://www.khaleejtimes.com/international/pakistan/pakistan-pm-imran-khan-reacts-to-calls-for-nobel-peace-prize-for-him">awarded</a> the Nobel Peace Prize for his handling of the issue.</p>
<p>Restraint and sensibility are conducive to effective Pakistani state policy, as opposed than the nationalistic belligerence exhibited by the Indian government. Thus, Khan should adopt sensible approaches to future policy initiatives outside of security.</p>
<p>However, Khan needs to seriously address the elephant in the room: the presence of terrorist groups like JeM operating or based within Pakistan. The presence of JeM and other Kashmiri militant and terrorist groups within Pakistan has been a key issue in Indian-Pakistani Relations since the 1980s. These groups have been responsible for some of the deadliest attacks on Indian soil, such as the 2008 Mumbai attacks and the 2001 terrorist attack on the Indian Parliament.</p>
<p>Though Pakistan has had no direct involvement in these events, their inability to target and apprehend these groups and their leadership, or hand them over to India, has contributed to poor relations and the <i>modus operandi</i> of India blaming Pakistan for any Jihadist terrorist attack in its territory. This cannot continue, and something must be done.</p>
<p>Since 2014, Pakistan’s counterterrorism apparatus has proven effective, having managed the defeat, split, and expulsion of the <i>Tehreek-e-Taliban Pakistan</i> and established a condition of security nationwide. Monitoring or tracking terrorist groups like JeM is entirely feasible and an intuitive approach to ensuring Pakistan&#8217;s national security.</p>
<p>As of April 2019, Khan has implemented wide-ranging <a href="https://www.theguardian.com/world/2019/mar/08/pakistan-launches-major-crackdown-extremist-groups-kashmir">crackdowns</a> to limit the ability of these groups to operate, both within Kashmir and Pakistan. Should this harder-line policy prove effective, it could lead to a reduction in the capability of armed groups to carry out acts of terrorism on either side of the LoC. Only time will tell if these initiatives are successful.</p>
<p style="text-align: center;"><i>Read Part One of The Pulwama Incident: <a href="http://globalsecurityreview.com/india-pakistan-pulwama-incident-kashmir-razors-edge/">The Razor&#8217;s Edge</a></i></p>
<p><a href="https://globalsecurityreview.com/pulwama-pakistan-india-conflict-much-learn/">The Pulwama Incident Part Two: Pakistan and India Have Much to Learn</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Pulwama Incident Part One: The Razor&#8217;s Edge</title>
		<link>https://globalsecurityreview.com/india-pakistan-pulwama-incident-kashmir-razors-edge/</link>
		
		<dc:creator><![CDATA[Mikail Shaikh]]></dc:creator>
		<pubDate>Mon, 08 Apr 2019 15:32:46 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Kashmir]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Southeast Asia]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=11066</guid>

					<description><![CDATA[<p>The Pulwama Bombing, India’s Response, and its Impact on South Asian Security The Pulwama bombings in Kashmir on February 14th, 2019 sent shockwaves throughout South Asia. An unstable and tense region, to begin with, the bombing brought about greater instability and tension between the region’s two leading powers: India and Pakistan. The terrorist attack nearly [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/india-pakistan-pulwama-incident-kashmir-razors-edge/">The Pulwama Incident Part One: The Razor&#8217;s Edge</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The Pulwama Bombing, India’s Response, and its Impact on South Asian Security</h2>
<p>The Pulwama bombings in Kashmir on February 14<sup>th</sup>, 2019 sent shockwaves throughout South Asia. An unstable and tense region, to begin with, the bombing brought about greater instability and tension between the region’s two leading powers: India and Pakistan. The terrorist attack nearly brought about a catastrophically destructive event.</p>
<h3>What happened?</h3>
<p>On February 14th, a car laden with explosives was driven into a Central Reserve Police Force (CPRF) convoy near the town of <a href="https://www.bbc.co.uk/news/world-asia-india-47240660">Pulwama</a> in Kashmir. The bomber, later identified as 20-year-old Aadil Dar, had recently joined the Pakistan-based terrorist group <i>Jaish-e-Mohammad</i> (JeM), who claimed responsibility for the attack, and the deaths of 40 Indian policemen—the deadliest terrorist attack in Kashmir to date. Kashmir is no stranger to terrorism, nor Pakistan and India struggling over it, as control of the mountainous province has been a key bone of contention between the two nuclear-armed states since their independence in 1947.</p>
<p>Within hours of the attack, Indian Prime Minister, Narendra Modi leveled blame for the attack on Pakistan and declared them responsible for the bombing. Pakistan denied any involvement, even though JeM is based in the Pakistani city of Bahawalpur. The international community has since <a href="https://economictimes.indiatimes.com/news/international/world-news/donald-trump-describes-pulwama-terrorist-attack-as-horrible-situation/articleshow/68072275.cms">weighed in</a>, condemning Pakistan and its involvement in <a href="https://timesofindia.indiatimes.com/india/pulwama-attack-pakistan-to-stay-on-fatf-grey-list-for-terror-financing/articleshow/68110707.cms">supporting</a> terrorist groups in Kashmir. In the week following the raid, Indian security forces conducted raids on JeM cells and operatives in Kashmir, resulting in the death of the attack’s alleged mastermind, known as <a href="https://economictimes.indiatimes.com/news/defence/pulwama-attack-mastermind-kamran-alias-rasheed-ghazi-killed-in-encounter/videoshow/68050555.cms">Kamran</a>.</p>
<p>Despite finding and killing those behind the attacks, the accusations set in motion a chain of events that raised tensions between the two states to their highest in recent times, even resulting in military action. On February 26<sup>th</sup>, Indian Air Force (IAF) planes violated Pakistani airspace to conduct <a href="https://www.nytimes.com/2019/02/25/world/asia/india-pakistan-kashmir-jets.html">air raids</a>, bombing what it claimed to be a JeM camp in the Pakistani-Kashmir town of Balakot.<span class="Apple-converted-space"> </span></p>
<p>This was the first time an Indian aircraft violated Pakistan’s airspace since 1971, and the first instance in which nuclear-armed nations have bombed each other. From that day, conflict and tensions between the two escalated, to the point where Pakistan shot down and captured an IAF pilot, Wing Commander Abhinanadan Varthaman, who was subsequently released on March 1<sup>st</sup>. Since that week, there has been mutual shelling from both sides of the Line of Control (LoC).</p>
<p>This is incredibly problematic for maintaining South Asian Security at large, mostly because there is little conclusive evidence that Pakistan was directly involved in the Pulwama Bombing, but more so because of the presence of nuclear weapons and a history of interstate warfare in the region. The risk this poses cannot be understated, as if both states were to use their nuclear weapons, it would bring about the end of modern civilization through famine and the spread of radioactive fallout.<span class="Apple-converted-space"> </span></p>
<h3>Instability and its Effects</h3>
<p>There is an element of truth to the accusations laid unto Pakistan supporting terrorist groups in Kashmir. Since the 1980s, the Pakistani security apparatus has funded mujahideen and Jihadist insurgent groups in Afghanistan. Initially, this was to counteract the Soviet Union when they invaded Afghanistan in 1979. Once they withdrew in 1989, these mujahideen had no conflict left to fight, until they declared <i>jihad </i>on India, and went to fight them in Kashmir.</p>
<p>Groups responsible for attacks in India, such as JeM, have been banned within Pakistan and their membership and leaders arrested, more intensely since Khan announced a recent string of crackdowns in response to almost being put on the Financial Action Task Force <a href="https://www.samaa.tv/news/2019/02/pakistans-grey-list-fate-hangs-in-balance-as-fatf-meets-in-paris-on-feb-17/">“grey list”</a>, a list of countries that have engaged in money laundering and terrorist financing, which India has accused Pakistan of doing. To be put on the list would lead to increased costs for money transfers and running businesses, severely damaging Pakistan’s already weak economy.</p>
<p>However, India has also contributed to the condition of insecurity experienced since February 14<sup>th</sup>, through blaming Pakistan for the attacks without providing evidence or intelligence, and more recently the use of air raids. Arguably, this posture is due to <a href="https://www.bbc.co.uk/news/world-asia-india-47439101">General Elections</a> in April, with the ruling <i>Bharatiya Janata Party</i> (BJP) Government aiming to use harsh action on Pakistan and Kashmir to secure votes.</p>
<p>In the week following the bombing, media focus on blaming Pakistan ended up mainly ignoring that the attack was a textbook case of homegrown terrorism. Dar was a Kashmiri who was radicalized by other groups before he joined JeM, and according to officials in the Indian Military, the explosives were <a href="https://www.dawn.com/news/1464358">locally sourced</a>. The vehicle used to attack the Indian convoy was <a href="https://timesofindia.indiatimes.com/india/nia-identifies-vehicle-used-in-pulwama-terror-attack-owner-sajjad-bhat-absconding/articleshow/68155959.cms">Indian</a> and had changed hands several times within Indian territory. This shows that a Kashmiri insurgency is now <a href="https://www-nytimes-com.cdn.ampproject.org/v/s/www.nytimes.com/2019/02/15/world/asia/kashmir-attack-pulwama.amp.html?usqp=mq331AQCCAE=&amp;amp_js_v=0.1#aoh=15505269053518&amp;amp_ct=1550526912493&amp;csi=1&amp;referrer=https://www.google.com&amp;amp_tf=From%2520%25251$s&amp;ampshare=https://www.nytimes.com/2019/02/15/world/asia/kashmir-attack-pulwama.html">self-sufficient</a>, and no longer needs Pakistani support to conduct operations.<span class="Apple-converted-space"> </span></p>
<p>It also shows that India needs to enact a more nuanced counterinsurgency strategy to deal with the issue, rather than dragnet crackdowns and <a href="https://tribune.com.pk/story/1917290/1-shutdown-protests-iok-india-arrests-200-kashmiris/">mass arrests</a>. Mistreatment and human rights violations have led to Pakistani-sponsored terrorism in the 1980s mutating into the more homegrown insurgent campaign today. To blame Pakistan and subsequently conduct strikes on targets on their soil is an extremely dangerous and counterintuitive tactic, considering the minuscule margins for error associated with nuclear weaponry.</p>
<p>The attack has had the most significant impact on Kashmiri Muslims throughout India, however. Kashmiri students have been forced to leave their universities, and others have been victims of Islamophobic abuse or forced into hiding following wide-scale government-led crackdowns across the country.</p>
<p>Kashmiri militants have used violence in response to repressive measures taken out by Indian security forces and police against Kashmiri protesters, such as the use of <a href="https://www.washingtonpost.com/opinions/2019/02/23/india-beats-its-war-drums-over-pulwama-its-occupation-kashmir-is-being-ignored/?utm_term=.8f2b99b2ebfd">pellet rifles</a> to disperse protests, which happens to be a violation of human rights and international law. This latest incident has not made life any easier for them, who have been protesting for independence since 1948, though these became far more violent in 2016. It also creates an environment ideal to radicalize disenfranchised Kashmiris, giving Kashmiri militant and Jihadist groups more fighters. It is a vicious cycle, one that can be closed through India entertaining the Kashmiri desire for self-determination and giving them a forum to air their grievances.</p>
<h3>Lessons to be Learned</h3>
<p>Pakistan and India stood at the precipice and stared down the barrel of a nuclear war. Thankfully, neither side escalated further, and both appear to have stood down for the most part, except for drone flights and air patrols of the LoC and the international border. There are lessons that both sides need to learn though, especially considering the Kashmir crisis.</p>
<p style="text-align: center;"><em>Read Part Two of the Pulwama Incident: <a href="http://globalsecurityreview.com/pulwama-pakistan-india-conflict-much-learn/">Pakistan and India Have Much to Learn</a></em></p>
<p><a href="https://globalsecurityreview.com/india-pakistan-pulwama-incident-kashmir-razors-edge/">The Pulwama Incident Part One: The Razor&#8217;s Edge</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Durand Line Border Dispute Remains Point of Contention for Afghanistan-Pakistan Relations</title>
		<link>https://globalsecurityreview.com/durand-line-border-dispute-contention-afghanistan-pakistan-relations/</link>
		
		<dc:creator><![CDATA[Hayat Akbari]]></dc:creator>
		<pubDate>Sun, 24 Mar 2019 21:57:45 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=10875</guid>

					<description><![CDATA[<p>On multiple occasions over the past several years, Afghan and Pakistani forces have clashed with one another along the Durand Line that demarcates the border between Afghanistan and Pakistan. The Durand Line was drawn in 1893 by Britain, the ruling power in the region during the 19th century. The implementation of the line resulted in [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/durand-line-border-dispute-contention-afghanistan-pakistan-relations/">Durand Line Border Dispute Remains Point of Contention for Afghanistan-Pakistan Relations</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>On multiple occasions over the past several years, Afghan and Pakistani forces have clashed with one another along the Durand Line that demarcates the border between Afghanistan and Pakistan. The Durand Line was drawn in 1893 by Britain, the ruling power in the region during the 19th century. The implementation of the line resulted in the separation of hundreds of thousands of people from their relatives and tribes on both sides of the border.</p>
<p>Periodic skirmishes and tensions between Pakistani and Afghan security personnel along the disputed border greatly aggravate an already-deteriorating bilateral relationship, with each side accusing the other of insincerity when it comes to counter-terrorism. On April 15, 2018, Afghan and Pakistani forces exchanged fire in Afghanistan&#8217;s Khost province at a border post handled by the Pakistani army in the Laka Tigga area of the Lower Khurram Agency. The clash resulted in the deaths of two Pakistani soldiers, with five others being injured.</p>
<p>Kabul continuously blames Islamabad for the ongoing violence and the resiliency of the Taliban in Afghanistan. Afghan officials claim that Pakistan is doing nothing to address the presence of the Taliban and Al-Qaeda in Afghanistan. Pakistan vehemently denies these claims.</p>
<p>The Durand Line has complicated relations between Afghanistan and Pakistan ever since the founding of Pakistan in 1947. More recently, conditions in Afghanistan have considerably deteriorated. Levels of insecurity, lawlessness, and drug trafficking are all increasing, and Afghan warlords are gaining increasing amounts of influence. The opium trade, along with that of other drugs currently account for nearly half of Afghanistan’s GDP, according to some estimates. According to one study, the Afghan border with Pakistan has become a hub for illicit drug exports.</p>
<p>In an effort to address the cross-border flow of militants and drugs, Pakistan initiated construction on a border fence in 2018 along the Durand Line—the roughly 1,622 mile-long border (2,611 kilometers) shared with Afghanistan. Pakistan believes the barrier would improve the security environment in both Pakistan and Afghanistan. A senior officer in the Pakistani army stated that “[the fence] would greatly help to stop cross-border movements of militants.” Afghanistan resolutely opposes the fence’s construction.</p>
<p>Pakistan considers the Durand Line to be the established international border between itself and Afghanistan. The Afghan government rejects Islamabad’s claim and sees the Durand Line as an artificial border that was created by the British and agreed to by Amir Abdul Rahman Khan in 1893. The demarcation subsequently resulted in the separation of members of the Pashtun ethnic group.</p>
<p>The Afghan government views the Durand Line border as an artificial border between two countries which was signed by Amir Abdul Rahman Khan in 1893. In the final days of British colonial rule—before the founding of Pakistan—Pashtuns residing on the Indian side of the Durand Line, led by Khan Abdul Ghaffar Khan (known as the “Frontier Gandhi”) were opposed the creation of Pakistan. At the time, the Pashtun identity was based on nationalism rather than religion; thus Pashtuns were opposed to the formation of an Islamic Pakistan.</p>
<p>When it became clear that the British were intent on partitioning India into two sovereign states, the Pashtuns demanded their own territory, Pashtunistan, which would either be an independent state or incorporated into Afghanistan. Instead, the British were intent on establishing a stable Pakistan and it was decided that the Pashtun-dominated North Western Frontier Province (NWFP) was to become part of Pakistan.</p>
<p>Since Pakistan’s founding in 1947, Islamabad has routinely attempted to refute the Afghan argument that the Durand Line is an “artificial border.” Pakistan regularly dismisses Afghan claims as invalid.</p>
<p>During a recent visit to Kabul by Pakistani Prime Minister Shahid Khaqan Abbasi, both countries agreed to take series of deescalatory steps, one of which being minimizing cross-border clashes. including fire exchange in borders. In this meeting, Islamabad accused Kabul of taking action against militant groups who continue to attack Pakistani soldiers across the borders in Afghanistan. The Pakistani statement says that “Pakistan urges Afghanistan to focus on taking effective counterterrorism actions, including plugging in of large gaps existing along the Afghan side of Pakistan-Afghanistan border,” adding that “it is also important that the Afghan government refrain from playing the blame game.”</p>
<p>Pakistan, however, will remain committed to destabilizing Afghanistan. Pakistan continues to utilize terrorist groups in Afghanistan as proxies, ensuring Afghanistan remains preoccupied with internal affairs. Both countries must—in good faith—move to address the issues caused by the colonial-era border. Balochistan and portions of the Pashtun tribal areas currently under Pakistani administration should be restored as Afghanistan’s sovereign territory.</p>
<p>Kabul, for its part, should be mindful of its relationship with Pakistan. Afghanistan is landlocked and relies on Pakistani ports. Marvin G. Weinbaum, a former Pakistan and Afghanistan analyst at the U.S. State Department Bureau of Intelligence and Research, estimates that Pakistan’s wide-ranging exports to Afghanistan amount to roughly $1.2 billion per year, while it imports over $700 million worth of Afghan goods.</p>
<p>The United States and the European Union need to review their respective policies for Afghanistan in order to foster long-term regional peace, rather than pouring billions of dollars into a war that can’t be won. The disagreement over the Durand Line will continue for the foreseeable future and will present a significant challenge to the relationship between Afghanistan and Pakistan. Pakistan will continue to view the border dispute as a settled matter, as it defines the matter as a matter of national security. On the other hand, Afghanistan will continue to highlight the unsettled and disputed nature of the border as the root cause of the deteriorating Afghan-Pakistani relationship.</p>
<p><a href="https://globalsecurityreview.com/durand-line-border-dispute-contention-afghanistan-pakistan-relations/">Durand Line Border Dispute Remains Point of Contention for Afghanistan-Pakistan Relations</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Next Middle East Conflict Could Emerge Out of a Cyber Clash</title>
		<link>https://globalsecurityreview.com/next-middle-east-conflict-could-emerge-cyber-warfare/</link>
		
		<dc:creator><![CDATA[Ali Arfa]]></dc:creator>
		<pubDate>Mon, 18 Mar 2019 16:52:53 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Iraq]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=10845</guid>

					<description><![CDATA[<p>Pandora&#8217;s Box of cyber warfare was opened when the United States and Israel initiated the Stuxnet attack on Iranian nuclear infrastructure in the summer of 2010. In response, Iran hit back by attacking the computer systems of Bank of America and Saudi Aramco—affecting around seventy-five percent of the latter corporation&#8217;s computer systems. Tensions subsided with a [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/next-middle-east-conflict-could-emerge-cyber-warfare/">The Next Middle East Conflict Could Emerge Out of a Cyber Clash</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Pandora&#8217;s Box of cyber warfare was opened when the United States and Israel initiated the Stuxnet attack on Iranian nuclear infrastructure in the summer of 2010. In response, Iran hit back by attacking the computer systems of Bank of America and Saudi Aramco—affecting around <a href="https://www.nbcnews.com/politics/national-security/iranian-backed-hackers-stole-data-major-u-s-government-contractor-n980986" data-saferedirecturl="https://www.google.com/url?q=https://www.nbcnews.com/politics/national-security/iranian-backed-hackers-stole-data-major-u-s-government-contractor-n980986&amp;source=gmail&amp;ust=1552761173701000&amp;usg=AFQjCNGeMyam74mWbXabOQr8i4L0HJczKg">seventy-five percent</a> of the latter corporation&#8217;s computer systems.</p>
<p>Tensions subsided with a rapprochement between the two sides, ultimately culminating in the signing of the Joint Comprehensive Plan of Action (JCPOA) in 2015. Those days are gone—now, the remaining &#8220;adult in the room&#8221; is the walrus-mustached U.S. National Security Advisor John Bolton, who has publicly threatened Iranian Supreme Leader Ayatollah Khamenei <a href="https://www.businessinsider.de/white-house-differs-with-intelligence-community-on-iran-nuclear-deal-2019-2?r=US&amp;IR=T" data-saferedirecturl="https://www.google.com/url?q=https://www.businessinsider.de/white-house-differs-with-intelligence-community-on-iran-nuclear-deal-2019-2?r%3DUS%26IR%3DT&amp;source=gmail&amp;ust=1552761173701000&amp;usg=AFQjCNGC8HMtzLED2FaYnGlie1w1V5nDug">may not have many more anniversaries to celebrate</a>.</p>
<p>Michael Morford, a former U.S. Army captain, and a Security Fellow at the Truman National Security Project <a href="https://eu.usatoday.com/story/opinion/2019/03/07/john-bolton-neoconservatives-steer-trump-america-war-iran-column/3061161002/" data-saferedirecturl="https://www.google.com/url?q=https://eu.usatoday.com/story/opinion/2019/03/07/john-bolton-neoconservatives-steer-trump-america-war-iran-column/3061161002/&amp;source=gmail&amp;ust=1552761173701000&amp;usg=AFQjCNEaRIt3iLwWONfjNjgJCDCl_KQkWg">has warned</a> that it appears the so-called neoconservatives in Washington are attempting to steer the U.S. towards another war in the Middle East—this time with Iran. If this assumption is valid, the Trump administration will need to garner public support by presenting a case ostensibly justifying the use of military force. The Trump administration could follow a strategy similar to the one employed by the Bush administration before the U.S. invasion of Iraq: forcefully presenting a narrative that Iran constitutes a significant threat to U.S. national security.</p>
<p>In 2003, members of the Bush administration were pushing the narrative that Iraq had weapons of mass destruction. In creating a pretext for military action against Iran, the Trump administration could argue that kinetic military action is warranted in response to an Iranian cyber attack. Such a scenario would set a dangerous precedent but would be a fitting pretext for a major U.S. military operation in the Middle East. Some recent incidents have made such an outcome all the more likely and should, therefore, be addressed.</p>
<h3>Missile sabotage claims answered by drone hack footage release</h3>
<p>After two unsuccessful satellite lunches—the first on January 15 and then on February 5—assumptions were made by U.S. media outlets that a secret satellite-launch sabotage operation started in the second Bush administration had been <a href="https://www.nytimes.com/2019/02/13/us/politics/iran-missile-launch-failures.html" data-saferedirecturl="https://www.google.com/url?q=https://www.nytimes.com/2019/02/13/us/politics/iran-missile-launch-failures.html&amp;source=gmail&amp;ust=1552761173701000&amp;usg=AFQjCNEGKjh2sRm7mGBWLdDNZt70_Q5xtw">revived</a>.</p>
<p>However, Iranian officials have rejected these claims, and Iran&#8217;s semi-official Fars News Agency released <a href="http://en.farsnews.com/newstext.aspx?nn=13971205000535" data-saferedirecturl="https://www.google.com/url?q=http://en.farsnews.com/newstext.aspx?nn%3D13971205000535&amp;source=gmail&amp;ust=1552761173701000&amp;usg=AFQjCNEtQ1iX-aI21nSpTMsjTXQMjIy9vA">footage</a> of what it claimed were U.S. drones in Iraq that were hacked by Iranian proxies, ostensibly in response to the allegedly sabotaged satellite launches. Iranian officials declared the rocket suffered a third-stage failure, and the U.S. Operation Inherent Resolve (OIR) declined to comment on the alleged drone hack.</p>
<h3>The Citrix breach</h3>
<p>Recently, an Iranian-linked hacking group known as Iridium was <a href="https://www.nbcnews.com/politics/national-security/iranian-backed-hackers-stole-data-major-u-s-government-contractor-n980986" data-saferedirecturl="https://www.google.com/url?q=https://www.nbcnews.com/politics/national-security/iranian-backed-hackers-stole-data-major-u-s-government-contractor-n980986&amp;source=gmail&amp;ust=1552761173701000&amp;usg=AFQjCNGeMyam74mWbXabOQr8i4L0HJczKg">reported</a> to have targeted one of the largest U.S. government software contractors and stole anywhere from six to ten terabytes of data. Iridium is also believed to have been behind hacks into the <a href="https://www.nbcnews.com/politics/national-security/iran-backed-hackers-hit-both-uk-australian-parliaments-says-report-n977651" data-saferedirecturl="https://www.google.com/url?q=https://www.nbcnews.com/politics/national-security/iran-backed-hackers-hit-both-uk-australian-parliaments-says-report-n977651&amp;source=gmail&amp;ust=1552761173702000&amp;usg=AFQjCNGBjZWXXp-gtetnBWmz-RC5Up-WKw">Australian and British Parliaments</a> in 2017.</p>
<p>Particularly concerning is the recent Citrix cyber attack could be the first in a series of operations. “It’s possible that adversaries could gain insights into the company’s network configuration and the defenses of the government agencies,” <a href="https://www.nbcnews.com/politics/national-security/iranian-backed-hackers-stole-data-major-u-s-government-contractor-n980986" data-saferedirecturl="https://www.google.com/url?q=https://www.nbcnews.com/politics/national-security/iranian-backed-hackers-stole-data-major-u-s-government-contractor-n980986&amp;source=gmail&amp;ust=1552761173702000&amp;usg=AFQjCNEZRx_jkvHUZ4YTOrfO0ouFmWWNig">said Suzanne Spaulding</a>, a former senior official at the Department of Homeland Security, “and that would make hacking those government agencies easier.”</p>
<h3>A history no one wants to repeat</h3>
<p>As he was making a case for war against Iraq at the UN Security Council in 2003, then-Secretary of State Colin Powell held up a model vial of anthrax. Shortly after that, “Operation Iraqi Freedom” began, initiating a series of events that would leave hundreds of thousands of Iraqis dead, trillions of dollars wasted, the destruction of much Iraq&#8217;s infrastructure, and the eventual formation of ISIS (Daesh).  History can repeat itself; however, rather than citing the possession of weapons of mass destruction (WMDs), the next Middle East conflict could originate in cyberspace.</p>
<p>In the 2018 Nuclear Posture Review (NPR), the U.S. states that it will consider <a href="https://media.defense.gov/2018/Feb/02/2001872886/-1/-1/1/2018-NUCLEAR-POSTURE-REVIEW-FINAL-REPORT.PDF">a nuclear strike in response to a major non-nuclear strategic attack</a>. The NPR defines a &#8220;major non-nuclear strategic attack&#8221; as including—but not limited to—&#8221;<em>attacks on the U.S., allied, or partner civilian population or infrastructure, and attacks on U.S. or allied nuclear forces, their command and control, or warning and attack assessment capabilities</em>.&#8221;</p>
<p>Infrastructure, command and control capabilities, along with warning and attack assessment capabilities, could all be hampered through cyber attacks. Although it is a <a href="https://www.defenseone.com/technology/2018/02/no-us-wont-respond-cyber-attack-nukes/145700/">highly remote possibility</a> that the U.S. would use nuclear weapons in response to a cyber attack—given the strength of its conventional forces—a cyber attack could be used by the White House as justification for the use of force against Iran, with a U.S. diplomat referring to a flash memory drive instead of anthrax.</p>
<p>Even if a major Iranian cyber attack (real or imagined) isn&#8217;t enough to initiate a major conflict, there is always the risk of inadvertent or accidental escalation between the two countries, and between Iran and its regional rivals. Furthermore, when one takes into account the proliferating social media disinformation and misinformation campaigns throughout the Middle East that fan the flames of war, the highly risky cyber game currently being played by the U.S. and Iran can&#8217;t be overestimated.</p>
<p><a href="https://globalsecurityreview.com/next-middle-east-conflict-could-emerge-cyber-warfare/">The Next Middle East Conflict Could Emerge Out of a Cyber Clash</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Tailoring Expectations: The Good, the Bad, and the Ugly Scenarios for Afghanistan</title>
		<link>https://globalsecurityreview.com/tailoring-expectations-good-bad-ugly-scenarios-afghanistan/</link>
		
		<dc:creator><![CDATA[Tamim Asey]]></dc:creator>
		<pubDate>Tue, 12 Mar 2019 16:40:03 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=10818</guid>

					<description><![CDATA[<p>From the very beginning, the war in Afghanistan has been about managing expectations. Why is the United States there, what does it intend to achieve, what is the desired end-state, and what is the theory of victory? Nobody expected the U.S. and its NATO allies to turn Afghanistan into another Switzerland—nor did Afghans and the [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/tailoring-expectations-good-bad-ugly-scenarios-afghanistan/">Tailoring Expectations: The Good, the Bad, and the Ugly Scenarios for Afghanistan</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>From the very beginning, the war in Afghanistan has been about managing expectations.</h2>
<p>Why is the United States there, what does it intend to achieve, what is the desired end-state, and what is the theory of victory? Nobody expected the U.S. and its NATO allies to turn Afghanistan into another Switzerland—nor did Afghans and the international community foresee the prevailing political deadlock and military stalemate.</p>
<p>The Afghan war has increasingly become one of dignity for U.S. and NATO forces. A defeat at the hands of a ragtag, AK-47-wielding force calling itself the Taliban, with safe-havens across the border in Pakistan, will only refresh the memories of Vietnam in the Pentagon and the broader security establishment in the United States.</p>
<p>The United States and its NATO allies cannot afford the stain of another Vietnam on their track record—especially when their Russian counterparts, albeit with questionable military tactics, are increasingly successful against a more complex enemy in Syria. However, every liberating army eventually becomes an occupying force in the eyes of the local population if it does not deliver on its initially-stated mission objectives. This is especially so in Afghanistan. The problem has been that U.S. and NATO forces kept jumping from one mission statement to another, from one NATO summit to another, continuously promising a consolidation of gains and the ultimate defeat of the Taliban and their terrorist allies, but to no avail.</p>
<p>When assuming command of multinational forces in Afghanistan, each subsequent U.S. four-star general has called for a mission review, made some changes, presented a report to the U.S. Department of Defense asking for more resources and political support, assured NATO allies in various forums of success around the corner, but ended up leaving a more unstable Afghanistan for the next commander.</p>
<p>Here we are eighteen years later with a resurgent Taliban and U.S.-NATO achievements not only consolidated but more fragile than ever. The Afghan state has been left weaker, not to mention an unpredictable president in the White House, growing war fatigue in the West, and a divided Washington over the fate of its military engagement in Afghanistan.</p>
<p>It is in this context that the United States, Afghanistan, and the broader region need to think long and hard over the decisions that have been made and consider the potential consequences of those decisions for security and geopolitical interests—within Afghanistan and beyond. An increasingly unstable Afghanistan will adversely affect the security and stability of its neighbors, in addition to having substantial implications for security in the West.</p>
<p>In this context, it would seem surprising that Afghanistan’s neighbors—chief among them Pakistan, Iran, and the Russian Federation—are using the Taliban as a proxy force to destabilize the country to bloody the nose of the U.S. and its coalition allies.</p>
<p>This may, in the short term, serve the geopolitical interests of Iran and Russia but the absence of U.S. troops in Afghanistan will eventually present a severe threat to the security of these countries. A U.S. withdrawal will mean the Pakistanis, Iranians, and Russians will have to become increasingly involved in Afghanistan to counter terrorist activity and safeguard their respective political interests.</p>
<p>Steve Bannon, President Trump’s former chief strategist, was a staunch advocate of withdrawing U.S. troops from Afghanistan because he believed that an unstable and violent Afghanistan would threaten the security of China, Russia, and Iran, thus serving U.S. national security interests. Bannon argued that by destabilizing Afghanistan further, Russia, China, and Iran would be forced to divert resources to stabilizing Afghanistan for the sake of their respective national security interests. Such a scenario, at present, is very much conceivable under the current Trump administration in Washington.</p>
<p>In such a world full of uncertainties and geopolitical flashpoints, Afghanistan, the U.S., NATO, and the world need to move from a narrative of success to one of compromise, whereas the interests of all sides are served through a cooperative approach for achieving stability in Afghanistan, one with an accommodation for a Taliban that is neither at war with itself nor a threat to regional and global security. The western infatuations with military victory and the regional narrative of using Afghanistan as a geopolitical chokepoint for the United States may yield short-term benefits to one side or another, but in the long-term, it will work against the security interests of all involved parties.</p>
<p>The outcome of the Afghan war will primarily depend on the behavior of the sponsors and proxies involved. The war in Afghanistan can subside, intensify, change in nature, or become contained to particular localities depending on stakeholders’ political farsightedness and their stated military objectives. It is the Afghan people who will lose the most in terms of life, treasure, and infrastructure.</p>
<p>To turn this situation into a strategy that is beneficial to the interests of all, involved parties need to fundamentally recalculate their strategy and move towards a cooperative, mutually-beneficial approach. There is potential for U.S.-Russia, U.S.-Iran, and U.S.-Pakistan cooperation to address this credible geopolitical challenge, which could pose real threats to each party’s national security interests.</p>
<p>Nobody can predict the future course of events in Afghanistan—particularly given President Trump’s deep reservations about continued U.S. military engagement in the country. Other factors, such as a resurgent Taliban, a return to “great game” power politics, and an exhausted Afghan populace who question the presence of foreign forces despite an absence of real security in the country further increase the complexity of any predictive exercise. However, one of three scenarios—good, bad, or ugly—is likely to play out in Afghanistan to some degree.</p>
<h3>Scenario 1: The Good—A Negotiated Settlement</h3>
<p>The ideal situation, a negotiated settlement, would be beneficial for all parties to the Afghan conflict. The agreement would be negotiated between the Afghan government and the Taliban, brokered by the U.S., China, and Russia, and guaranteed by Pakistan, Iran, Saudi Arabia, and the United Arab Emirates. There are numerous blueprints and roadmaps in existence that outline the details for such an agreement. It would take into account the interests and demands of both the Taliban and the Afghan government while addressing the security concerns of the U.S. and its NATO allies, as well as taking into account regional concerns and interests.</p>
<p>In such a scenario, the shape, form, and nature of the Afghan constitution and government will be negotiated with the Taliban and a grand Jirga—together with a high ulema council that will give its blessing to the new constitution and the formation of a new government. On the other hand, Taliban be required to break its ties with regional and global terrorist groups, take action against foreign fighters who are currently fighting with the group, and subsequently disarm, demobilize its fighters and integrate them into the Afghan national security forces. Such a scenario would be beneficial to the geopolitical and security interests of all internal and external players of the Afghan conflict. Therefore, all parties should strive to ensure such an end state is achieved.</p>
<h3>Scenario 2: The Bad—U.S. Withdrawal and an Afghan Government on Borrowed Time</h3>
<p>In this scenario, President Trump rejects the advice of his military and national security advisors, proceeds with a complete withdrawal, and accepts responsibility for the decision to do so, to win favor with the U.S. electorate ahead of the 2020 Presidential Elections and ultimately win a second term in office. The U.S. could announce a timetable for withdrawal but continue to financially support the government in Kabul while exerting diplomatic leverage over regional powers to take up the mantle of ensuring stability in Afghanistan.</p>
<p>If the United States were to pull out its military personnel, which would also entail the withdrawal of NATO forces, the Afghan government would be put on life support. Such a move would embolden the Taliban and other international terrorist organizations with the feeling of having beaten the world’s greatest military power in Afghanistan. The government in Kabul would become increasingly fragile, and eventually disintegrate and collapse.</p>
<h3>Scenario 3: The Ugly—Proxy Conflict and Fully-Fledged Civil War</h3>
<p>The worst case scenario is that the United States declares to withdraw its troops from Afghanistan and cuts or redirects financial resources from the Afghan security forces and the Government in Kabul to another part of the world. Alternatively, such a scenario could come to pass if the U.S. becomes embroiled in a conflict with China, Russia, North Korea, or Iran, and must rapidly divert large quantities of resources towards a more urgent priority.</p>
<p>Should such a scenario play out, the Afghan government would collapse, and the Afghan security forces would divide along ethnic lines. Each of Afghanistan’s neighbor will move to secure their security interests and political influence in the country, which will inevitably push the country into a proxy conflict or a fully-fledged civil war. This scenario would be a complete and utter disaster and must be avoided at all costs. Such a descent into chaos will not only inflict harm throughout Afghanistan but will substantially threaten regional security.</p>
<p>Afghanistan is the responsibility of the Afghan people. Nobody expects the United States and its NATO allies to remain in the country forever. However, the least the U.S., its partners, and regional actors can do is ensure the Afghan people have a stable government and professional, well-equipped security and military forces who cannot only secure Afghanistan but serve as the first line of defense to the region and the West against international terrorist groups intent on inflicting harm.</p>
<p><a href="https://globalsecurityreview.com/tailoring-expectations-good-bad-ugly-scenarios-afghanistan/">Tailoring Expectations: The Good, the Bad, and the Ugly Scenarios for Afghanistan</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Give Ordinary Afghans a Voice in Any Peace Deal With the Taliban</title>
		<link>https://globalsecurityreview.com/give-ordinary-afghans-voice-regarding-peace-deal-taliban/</link>
		
		<dc:creator><![CDATA[Kambaiz Rafi]]></dc:creator>
		<pubDate>Wed, 27 Feb 2019 22:43:10 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Taliban]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=10697</guid>

					<description><![CDATA[<p>Recent negotiations between the U.S. peace envoy Zalmai Khalilzad and the Taliban’s newly appointed political chief Mullah Ghani Baradar have made rare progress, bringing the two sides closer to signing a pact.  Negotiations in Doha, Qatar—the location of the Taliban&#8217;s political office—were followed by a conference in Moscow where members of the Afghan opposition were [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/give-ordinary-afghans-voice-regarding-peace-deal-taliban/">Give Ordinary Afghans a Voice in Any Peace Deal With the Taliban</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Recent <a href="https://www.washingtonpost.com/world/asia_pacific/us-taliban-talks-appear-closer-to-pact-after-marathon-talks-in-qatar/2019/01/26/685e638e-20f5-11e9-a759-2b8541bbbe20_story.html?noredirect=on&amp;utm_term=.544d8f81a5e7">negotiations</a> between the U.S. peace envoy Zalmai Khalilzad and the Taliban’s <a href="https://www.nytimes.com/2019/01/25/world/asia/taliban-negotiator-afghanistan.html?fbclid=IwAR0JNGzQ54xz77HplkZ-te2Np1E--R3heQtFlgS6w-ZfZavG7Q_QTwpUE9g">newly appointed political chief</a> Mullah Ghani Baradar have made rare progress, bringing the two sides closer to signing a <a href="https://mobile.reuters.com/article/amp/idUSKCN1PK0DG">pact</a>.<span class="Apple-converted-space">  </span></p>
<p>Negotiations in Doha, Qatar—the location of the Taliban&#8217;s political office—were followed by a conference in Moscow where members of the Afghan opposition were met by a Taliban delegation for peace-related consultations. Though the Afghan government was left out of the Doha negotiations and refused to participate in the Moscow conference, the two events—coupled with a <a href="https://www.nytimes.com/2019/02/25/world/asia/us-taliban-talks-afghanistan-qatar-baradar.html">new round</a> of talks at the highest level on both the U.S. and the Taliban sides—have essentially rendered a negotiated settlement of the “war on terror” in Afghanistan irreversible.<span class="Apple-converted-space">   </span></p>
<p>However, noticeably absent from the peace talks is any consideration for a post-deal mechanism that can bring the opinions of ordinary Afghans to the table when it comes to finalizing an agreement that will undoubtedly impact them the most.<span class="Apple-converted-space"> </span></p>
<p>Peace negotiations in other countries held in a similar context to those in Afghanistan have included some measure of public engagement—typically in the form of a national referendum. In Colombia, a recently negotiated deal between the Colombian government and the rebel FARC movement, along with the Good Friday Agreement that brought an end to the sectarian conflict in Northern Ireland conflict both involved such a step—twice, in some cases. <span class="Apple-converted-space"> </span></p>
<p>Although a referendum may not yield credible results in Afghanistan due to a range of obstacles—a record of rigged elections being one—other mechanisms can be applied to make the peace process more participatory.<span class="Apple-converted-space"> </span></p>
<h3>The Loya Jirga</h3>
<p>One such mechanism, the Grand Assembly or <i>Loya Jirga, </i>is well known in Afghanistan. The term is a combination of the Pashtu <i>Loya</i> meaning &#8220;grand&#8221; and the Farsi or Turkic <i>Jirga</i> meaning &#8220;assembly.&#8221; Enshrined in the 2004 Afghan Constitution, a presidential decree can convene the assembly. Members consist of the presidents of the district and provincial councils in addition to members of the Parliament. District councils, however, have yet to be formed in Afghanistan due to seventeen years of technical drawbacks. This deficit in membership can be rectified by including more women and members of civil society in the event such an assembly is convened.<span class="Apple-converted-space"> </span></p>
<p>In the 2004 Constitution, the Loya Jirga is referred to as “the highest manifestation of the will of the people.”  A Loya Jirga is responsible for decisions on matters such as presidential impeachment or constitutional amendments. The first Loya Jirga in modern Afghan history was convened from 1914-1915 by then-Afghan King Amir Habibullah to decide if Afghanistan should join any of the warring camps in World War I. The 540 delegates opted for neutrality. A Loya Jirga has ratified seven out of eight of Afghanistan&#8217;s 20th-century constitutions.<span class="Apple-converted-space"> </span></p>
<p>The election of the first post-Bonn Conference president, Hamid Karzai, went through a Grand Assembly, as did the 2004 ratification of the country&#8217;s most recent constitution. There is no reason why an exception should be made for an eventual peace deal that is likely to entail significant constitutional amendments and significantly disrupt the country’s institutions.<span class="Apple-converted-space"> </span></p>
<p>Afghan President Ashraf Ghani <a href="http://prod.tolonews.com/afghanistan/ghani-suggests-%25E2%2580%2598grand-consultative-jirga%25E2%2580%2599-peace">has suggested</a> a consultative Loya Jirga be convened to discuss the nature of a peace deal which falls well short of an assembly with a binding decision-making power.<span class="Apple-converted-space"> </span></p>
<p>A Loya Jirga should include under its mandate, at the very least,<i> </i>putting individual items in the peace deal under scrutiny by members who are representative of a diverse range of stakeholders—particularly those whose views may be left out in the high politics of negotiations. Specifically, women and members of civil society would be able to steer the fate of a post-deal Afghanistan through such a platform, guaranteeing their continued role in shaping the country&#8217;s future.<span class="Apple-converted-space"> </span></p>
<h3>The Religious Justification for a Loya Jirga</h3>
<p>The idea of a Loya Jirga might find strong support in Islamic politics as well, in that it may help to convince the Taliban to cooperate to some degree—given that the group may not agree to a Colombia-style referendum. The group does not believe in people’s choice as the basis of political authority – a realm reserved strictly for religion and its commandments according to the radical interpretation of Islam the Taliban espouse.<span class="Apple-converted-space"> </span></p>
<p>The notion of <i>Shura</i> or council, however, has been promulgated by the Quran and is the legitimizing basis for deliberative decision-making in politics and society. The Quranic verse calling for holding council adorns the wall above the seat of the Speaker of the House of the People in Afghanistan’s Parliament. Agreeing to a Loya Jirga could be politically beneficial for the Taliban, as the group would demonstrate it is unafraid of views representing a broader perspective from the population, and that it can demonstrate its intentions to adhere to a time-honored national tradition.<span class="Apple-converted-space"> </span></p>
<p>Forgoing a wider participatory process will leave the playing field mostly to a few well-known figures from among the former Mujahidin parties, some new faces (mostly men) who’ve risen in prominence in recent years, and previous members of the Taliban who have joined the peace process. Barring a few, such individuals who mostly made up the attendees at the Moscow conference to meet the Taliban delegation, are closer in terms of ideology and tribal-thinking to the Taliban than Afghanistan&#8217;s civic-minded population. These individuals can be persuaded to compromise on important post-Bonn values if a quick peace deal guarantees an end to the ongoing bloody stalemate and brings them recognition.<span class="Apple-converted-space">   </span></p>
<p>Ultimately, the two sides currently engaged in talks have their own priorities. The Taliban insists on a timeline for a withdrawal of the U.S.-led coalition from Afghanistan as the main precondition for peace—a demand they have made ever since reemerging as an insurgency in the mid-2000s. The U.S. <a href="https://twitter.com/SecPompeo/status/1089294263219822593">demands guarantees</a> that Afghanistan will not become a launch-pad for international terrorism following complete withdrawal of U.S. and coalition troops.<span class="Apple-converted-space"> </span></p>
<p>U.S. President Donald Trump has noted that he considers military campaigns in the Greater Middle East to be  “dumb wars,” continuing a trend initiated by Barack Obama of shifting attention to more important strategic theaters. In the United States&#8217; own hemisphere, the situation in Venezuela seems ripe for intervention—possibly militarily if the situation deteriorates considerably if one were to believe Trump&#8217;s rhetoric.</p>
<p>The many <a href="https://www.nytimes.com/2019/01/01/opinion/afghanistan-war-american-troops-withdraw.html">influential voices</a> calling for complete pull-out from Afghanistan, either <a href="https://www.rand.org/pubs/perspectives/PE326.html">cautiously</a> or <a href="https://www.nytimes.com/2019/02/03/opinion/afghanistan-war.html?fbclid=IwAR3kQzEyXcvFkyN15AWVjU3HH_ISNGRoRcZDI07zSOawPLA20orqUWxjbbs">persuasively</a>, easily outnumber the <a href="https://www.washingtonpost.com/opinions/i-was-ambassador-to-afghanistan-this-deal-is-a-surrender/2019/01/29/8700ed68-2409-11e9-ad53-824486280311_story.html?noredirect=on">few</a> who believe the ongoing talks with the Taliban is but a means to negotiate the terms of surrender for the U.S.—a Vietnam-style capitulation. Patience for delaying the exit, therefore, may be in serious shortage in Washington.<span class="Apple-converted-space"> </span></p>
<p>U.S. Special Envoy Khalilzad hasn’t acknowledged any discussions with the Taliban about a future political system. So far, both sides have<span class="Apple-converted-space"> </span><a href="https://www.nytimes.com/2019/01/28/world/asia/taliban-peace-deal-afghanistan.html">acknowledged progress</a> resulting in an agreement in principle for a peace framework, which will require further talks in Doha and subsequent negotiations in Kabul with the Afghan government—should the Taliban eventually agree to such talks that they have thus far rejected, calling the government in Kabul a puppet regime. <span class="Apple-converted-space"> </span></p>
<h3>Historical Precedent for Negotiated Settlements in Afghanistan</h3>
<p>Amidst the hustle to strike a deal, ordinary Afghans might become victims of a pervasive ostrich effect due to the fatigue of a long conflict.<span class="Apple-converted-space"> </span>Ironically, this same approach has tragic precedence not long ago in Afghanistan.</p>
<p>Negotiated settlements between the Soviet-backed regime in Kabul and the Mujahidin in early 1990s sidelined the ordinary population. Later, similar agreements between the many Mujahidin parties excluded any participation by the people. This resulted in political accords that tethered their durability to factional and partisan interests. In the absence of a broader popular base to guarantee them, these agreements lost currency the moment one faction’s interests were threatened, leading to renewed hostilities.<span class="Apple-converted-space"> </span></p>
<p>Absence of genuine belief in public participation in power might be one reason behind a widespread disillusionment among Afghans that they don’t really matter even if the international community make the claim of having brought democracy to the country. It’s either a US-led conspiracy (aided by the British), a dirty gimmick by the Pakistani ISI or political machinations among the elite in or out of the government that runs the country.<span class="Apple-converted-space"> </span></p>
<p>Excluding ordinary people again might hasten the peace process, but it will likely result in the age-old adage of history repeating itself—first as tragedy, then as farce. To ensure that today’s peace won’t result in future instability due to grievances originating in opposition to a deal that undermines aspirations of ordinary Afghans, convening a Loya Jirga with binding authority is necessary.<span class="Apple-converted-space">  </span></p>
<p>In case the Taliban returns to power unilaterally or as part of a coalition and is faced with a popular resistance as it did in the late 1990s and thus fail to assert full authority on the country’s territory, the group’s guarantees regarding preventing Afghanistan from becoming a jihadist hub will carry little weight. The proliferation of power vacuums can provide <a href="https://www.foreignaffairs.com/articles/afghanistan/2019-02-21/taliban-making-pledge-it-cannot-keep">terrorist groups</a> with much-needed training grounds, including ISIS-affiliated militants who are already present in the country and in loggerheads with the Taliban.<span class="Apple-converted-space"> </span></p>
<p><a href="https://globalsecurityreview.com/give-ordinary-afghans-voice-regarding-peace-deal-taliban/">Give Ordinary Afghans a Voice in Any Peace Deal With the Taliban</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Negotiating With Extremists Threatens Pakistan&#8217;s National Security</title>
		<link>https://globalsecurityreview.com/negotiating-extremists-threatens-pakistan-national-security/</link>
		
		<dc:creator><![CDATA[Mikail Shaikh]]></dc:creator>
		<pubDate>Tue, 26 Feb 2019 20:04:25 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Taliban]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=10559</guid>

					<description><![CDATA[<p>Negotiating with extremist groups—militant or otherwise—undermines the state&#8217;s sovereignty and security. In January 2019—in a landmark turn of events—the Supreme Court of Pakistan acquitted and ordered the immediate release of Aasia Bibi, a Christian woman accused of blasphemy and placed on death row in 2010. While her release was cause for celebration among Pakistan’s political liberals, [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/negotiating-extremists-threatens-pakistan-national-security/">Negotiating With Extremists Threatens Pakistan&#8217;s National Security</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Negotiating with extremist groups—militant or otherwise—undermines the state&#8217;s sovereignty and security.</h2>
<p>In January 2019—in a landmark turn of events—the Supreme Court of Pakistan <a href="https://www.dawn.com/news/1442396/sc-acquits-asia-bibi-orders-immediate-release">acquitted</a> and ordered the immediate release of Aasia Bibi, a Christian woman accused of blasphemy and placed on death row in 2010. While her release was cause for celebration among Pakistan’s political liberals, it greatly angered religious conservatives and those on the extreme right-wing of Pakistan&#8217;s political spectrum.<span class="Apple-converted-space"> </span></p>
<p>Clerics like Khadim Hussain Rizvi and his <i>Tehreek-e-Labaik Pakistan</i> (TLP) party started <a href="https://www.theguardian.com/world/2018/nov/01/asia-bibi-anti-blasphemy-protests-spread-across-pakistan">demonstrating</a> by blocking roads in Pakistan’s major cities and paralyzing the country, as well as making calls to extremist elements in government and the country’s Armed Forces to mutiny and overthrow or kill judges involved in the verdict, Prime Minister Imran Khan and the Chief of Army Staff, General Qamar Javed Bajwa – essentially an open call for sedition. Party workers were also responsible for vandalizing and burning vehicles across the country’s urban areas.</p>
<p>Aasia had been jailed since 2010, on death row for violating Pakistan’s ambiguous blasphemy laws. Anyone who spoke out in support of her, who violated blasphemy laws, or simply spoke out against the laws themselves found themselves under attack from religious conservatives and right-wing extremists. Nobody was safe; in 2011 Salman <a href="https://www.bbc.co.uk/news/world-south-asia-12111831">Taseer</a>, the sitting Punjab governor, was gunned in Islamabad by his bodyguard for speaking out against the court’s verdict. His assassin, Mumtaz Qadri, was hailed by the religious right as a hero.<span class="Apple-converted-space"> </span></p>
<p>The laws themselves are subject to intense <a href="https://herald.dawn.com/news/1154036">criticism</a> by human rights organizations and Pakistan&#8217;s Supreme Courts. The laws are ambiguously written and open to interpretation, thus undermining the rule of law. Accusations of blasphemy are enough to warrant mob violence and vigilantism. Indeed, there is a precedent for such violence taking place, especially against minorities.<span class="Apple-converted-space"> </span></p>
<h3>Negotiating From a Position of Weakness</h3>
<p>These recent events and the protests forced Khan’s <i>Pakistan Tehreek-e-Insaaf </i>(PTI) government to enter negotiations with the protesters to end the demonstrations— a counterintuitive approach to ending the crisis while maintaining Pakistan’s internal sovereignty and security.</p>
<p>Khan&#8217;s government announced plans were to place Aasia on the <a href="https://www.nytimes.com/2018/11/02/world/asia/pakistan-blasphemy-asia-bibi.html">ECL</a> and for her case to be reviewed by the Supreme Court, all to appease the TLP while undermining the judiciary and putting her life in danger. Since those negotiations were conducted, the government denied her exit from the country, despite talks for asylum with the U.S., the U.K., and Canada. Recently, however, the petition to have the case reviewed was overturned, meaning that Aasia was (and is at the time of writing) a free woman.</p>
<p>The denial of safe passage for Aasia greatly angered Pakistani liberals while also putting the relatively new PTI government in a precarious position, stripping it of support and legitimacy. Concessions to extremists—let alone the mere act of entering into negotiations—are detrimental to not only the survival of the Khan&#8217;s government but to Pakistan&#8217;s national security, as well.</p>
<p>There is at least a decade of precedent that evidences the counterintuitive nature of negotiating with extremists. Doing so weakens the state and empowers extremists and militants. To fulfill the demands of extremists is to invite further challenge, which, in turn, requires further concessions to resolve.<span class="Apple-converted-space"> </span></p>
<p>Khan entered into negotiations on the back foot; he approached the TLP to convince them to cease demonstrations, as the blocking of major roads in Karachi and other big cities had paralyzed the country and would adversely impact Pakistan’s already weak economy. Khan was negotiating from a position of weakness, as he perceived the deal as a political necessity instead of restoring social order.</p>
<h3>Militant Groups Rarely, if Ever, Uphold Their End of the Deal</h3>
<p>This is not the first time the state has attempted negotiation out of necessity. The <a href="https://www.pakpips.com/article/1469">Swat<i> </i>Agreement</a> is probably the most notable instance of state capitulation in Pakistan’s history. The agreement, signed in April 2009, essentially handed control of the Swat Valley over to the <i>Tehrik-e-Taliban Pakistan </i>(TTP), to induce the group to cease hostilities and terrorist attacks.<span class="Apple-converted-space"> </span></p>
<p>The terms of the agreement allowed the TTP, led by Maulana Fazlullah, to set up Sharia courts within the areas of Swat and Malakand, from where the state had agreed to withdraw its troops. Both sides got what they wanted, and a short cessation of hostilities was observed, with emphasis on the word “short.” By mid-April (the same month the agreement was signed), the TTP had forcibly taken over a police station in Swat, breaking the terms of the deal.</p>
<p>The issue with negotiating with non-state actors in Pakistan merely is that it is not possible to bind the militants to the terms of an agreement. They are not a state agency, nor is there any overarching authority governing their actions. Though the TLP are not militants or terrorists, they violate the function of the state by blocking major roads, therefore obstructing commerce, policing, and the public’s general movement.<span class="Apple-converted-space"> </span></p>
<p>Alongside their blockade, TLP followers and workers were seen vandalizing cars and public transport, a clear violation of the Pakistan Penal Code. Given this behavior and based on the TLP&#8217;s historical failure to follow through on promises, Khan shouldn&#8217;t have entered into negotiations in the first place.<span class="Apple-converted-space"> </span></p>
<p>Negotiation, in this instance, is a poor strategy given the nature of the TLP as an organization. To understand why, one must look at the ideology of the TLP and the teachings of <i>Barelvi</i> Islam. Like <i>Deobandism, Barelviism </i>was developed in India in the 19<sup>th</sup> Century. However, unlike Deobandism, there is little to no influence from Salafism or Wahabbism.</p>
<p>The TLP and other Barelvi groups do not share the aims of Deobandi extremist groups like the TTP, such as implementing Sharia Law or creation of a new Islamic state. Barelvis instead preach the <a href="https://www.globalsecurity.org/military/intro/islam-barelvi.htm">prophethood</a> and finality of Muhammad (PBUH). This is a problem.</p>
<h3>The Influence of Barelvi Islam on Tehreek-e-Labaik Pakistan</h3>
<p>The TLP and extremist Barelvi preachers can reach and influence more people than their Deobandi counterparts. The TTP&#8217;s goal of implementing Sharia law doesn&#8217;t resonate with all Muslims in Pakistan, whereas merely preaching about the Prophet will resonate with the core beliefs of a much larger segment of Muslims in Pakistan. This, coupled with the TLP’s hardline anti-Ahmadi and blasphemy-related rhetoric has created a situation where increasing numbers of people are influenced to hold negative views towards Ahmadis and engage in vigilantism against accused blasphemers.</p>
<p>The Barelvi ideology resonates with a large proportion of Muslims and reaches a large population throughout the Indian subcontinent. Because of this, religious minorities are more likely to be subjected to violence, harassment, and discrimination. From a strategic communications perspective, the immense size of the target audience presents a high risk to security in Southeast Asia, as there are more Muslims in the <a href="http://www.pewresearch.org/fact-tank/2017/01/31/worlds-muslim-population-more-widespread-than-you-might-think/">Indian subcontinent </a>than in the Middle East and North Africa.</p>
<p>Negotiation with extremists, violent or otherwise, empowers such groups and harms national security. By negotiating with the TLP, Khan is enabling it and similar groups to engage in extrajudicial murder, terrorism, and a wide range of other criminal activity. Because of the scale of audience that could potentially be influenced by extremist messaging, such groups pose a threat to the long-term security of Pakistan and the broader region.</p>
<p><a href="https://globalsecurityreview.com/negotiating-extremists-threatens-pakistan-national-security/">Negotiating With Extremists Threatens Pakistan&#8217;s National Security</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>United States-China Rivalry Will Dominate Geopolitics in East Asia</title>
		<link>https://globalsecurityreview.com/united-states-china-competition-geopolitics-asia-indo-pacific/</link>
		
		<dc:creator><![CDATA[Vincent Lofaso]]></dc:creator>
		<pubDate>Mon, 25 Feb 2019 17:37:22 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Vietnam]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=10556</guid>

					<description><![CDATA[<p>Great power competition between the United States and China will define the geopolitical landscape of East Asia. The Indo-Pacific region will see a fundamental shift in the geopolitical status quo throughout 2019. This shift is the result of many factors, but the most prominent is China’s rise as a political, economic, and military great power. [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/united-states-china-competition-geopolitics-asia-indo-pacific/">United States-China Rivalry Will Dominate Geopolitics in East Asia</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Great power competition between the United States and China will define the geopolitical landscape of East Asia.</h2>
<p>The Indo-Pacific region will see a fundamental shift in the geopolitical status quo throughout 2019. This shift is the result of many factors, but the most prominent is China’s rise as a political, economic, and military great power. China’s rapid economic growth has provided the foundation for an expansion of the People’s Liberation Army and has dramatically increased the country’s international political clout.<span class="Apple-converted-space"> </span></p>
<p>For nearly three decades, China’s economy greatly expanded due to low wages, a large workforce, substantial demand for raw materials, and investment by multinational corporations. In the U.S., many industries suffered as production was increasingly outsourced to Chinese factories. Furthermore, Chinese companies have enjoyed easy access to the U.S. market for decades, whereas U.S. firms are forced to hand over intellectual property and make other concessions to be granted access to Chinese markets.<span class="Apple-converted-space"> </span></p>
<p>Washington has embarked on a campaign to induce Beijing to implement meaningful economic reforms. By imposing tariffs on hundreds of billions of dollars of Chinese goods, the U.S. has effectively made it more difficult for Chinese products to enter U.S. markets. In doing so, the U.S. is attempting to force China to open its markets to U.S. goods and services and to eliminate harmful policies such as forced technology-sharing and joint-investment agreements. <span class="Apple-converted-space"> </span></p>
<p>The challenge for China is that submitting to Washington’s demands would profoundly weaken China’s economy, which could seriously undermine the <a href="http://globalsecurityreview.com/threats-legitimacy-power-chinese-communist-party/">legitimacy of the Chinese Communist Party</a>.<span class="Apple-converted-space">  </span>China is stuck between a rock and a hard place; even if Beijing were to offer to purchase more U.S. goods while gradually reducing barriers to foreign investment, it would take years for China to prove that it has been making good on its end of the bargain.</p>
<h3>What&#8217;s Next for the U.S.-China Trade War?</h3>
<p>It&#8217;s unlikely an immediate resolution will be found for the ongoing U.S.-China trade dispute. Instead, it’s likely that both countries will continue down the path of economic decoupling. The Trump Administration is encouraging multinational firms to reorient their supply-chains outside of China and is erecting barriers to Chinese investment in the United States. This year, U.S. policymakers will have to consider imposing another round of tariffs on the remaining $267 billion worth of Chinese goods imported into the U.S. each year, on top of the duties already imposed on some $250 billion worth of Chinese products. Furthermore, there is the possibility that lawmakers in Washington could introduce sanctions on Beijing in response to China’s mass-detention of Uyghurs in the western Chinese provinces of Xinjiang and Ningxia.</p>
<p>Due to China’s reliance on the U.S. consumer market, it will have difficulty retaliating on an equal scale. China’s wealthier coastal provinces, which host the bulk of the country’s export production capacity, are especially vulnerable to an extended trade dispute with the U.S. it will be difficult to respond due to its reliance on the U.S consumer market. That being said, Beijing has several cards left to play. The government can reduce taxes, offer subsidies, invest in infrastructure projects, and ease regulations to promote domestic consumption and economic growth in the private sector.</p>
<p>Beijing is also likely to use leverage the value of its currency to mitigate the damage inflicted by U.S. tariffs. As Chinese access to U.S markets is increasingly impeded, Beijing will seek new markets along the Belt and Road Initiative (BRI) and pursue bilateral trade agreements to secure access to them.</p>
<h3>Reorienting Global Supply-Chains</h3>
<p>The United States will likely adopt an increasingly aggressive posture when it comes to the development and investment in strategic technological sectors. Tech firms in the U.S.—particularly those that work with dual-use (civil-military) technology—will come under increasing government supervision in 2019. Competition between China and the United States. Much like in Germany and France, the United States has been setting up barriers to Chinese investment in strategic sectors.</p>
<p>U.S. tech firms that work with dual-use civil-military technology will come under increasing government supervision in 2019. Such dual-use technology falls into categories such as aerospace, 5G networking, artificial intelligence, quantum computing, and high-performance semiconductors. As it has done with Canada and European allies, the U.S. is likely to lobby its allies and partners in the Indo-Pacific region to implement expert controls on similar emerging technologies. Such measures will be detrimental to the operations of Chinese firms, some of which have already been branded as national security threats by governments around the world.</p>
<p>As multinational corporations move to reorient their supply-chains to decrease reliance on China, there are Asian states that will be in a position to benefit from the economic decoupling of the world&#8217;s two largest economies. Vietnam, Thailand, Malaysia, Indonesia, and the Phillippines all offer attractive alternatives to manufacturing in China. Additionally, many of these countries specialize in the production of certain goods. Vietnam, for instance, produces high-quality electronics and textiles, and Thailand and Malaysia both have formidable automobile manufacturing sectors.</p>
<p>According to the U.S. Chamber of Commerce, around one-third of American firms in China are considering moving their operations abroad due to the ongoing trade standoff. Regardless if they relocate or not, the ASEAN markets will emerge as attractive alternatives for global supply chains as foreign direct investment begins to rise throughout the region. These changes will not happen immediately. Firms will need time to find regional partners, navigate legal systems, and draft new agreements. It&#8217;s likely that the full effects of the U.S.-China trade dispute won&#8217;t be realized for three to five years, but there will be a lasting impact nevertheless.</p>
<h3>Worsening Tensions in the South China Sea</h3>
<p>Trade and technology aside, tensions in the South China Sea will continue to deteriorate. Beijing will likely take a more aggressive stance as it continues to militarize existing and reclaimed islands—bolstering its naval, missile, and air power capabilities in an apparent Anti-Access/Area Denial (A2/AD) strategy. China’s expanding presence will complicate matters for powers like the U.S. and Japan who regularly conduct freedom of navigation operations (FONOPS) in disputed waters.</p>
<p>China&#8217;s expansionary behavior and an increased presence by the United States and its allies increase the probability for accidents or a rapid escalation. Despite this, the U.S. Navy and its partners will continue to conduct FONOPS in the South and East China Seas. Furthermore, the U.S. may sell more advanced arms and technology to Taiwan and increase the number of FONOPS it conducts in the Taiwan Strait.</p>
<p><a href="https://globalsecurityreview.com/united-states-china-competition-geopolitics-asia-indo-pacific/">United States-China Rivalry Will Dominate Geopolitics in East Asia</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Future of the War in Ukraine</title>
		<link>https://globalsecurityreview.com/future-east-ukraine-war/</link>
		
		<dc:creator><![CDATA[Gabriella Gricius]]></dc:creator>
		<pubDate>Wed, 20 Feb 2019 20:58:54 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Ukraine]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/future-east-ukraine-civil-war/</guid>

					<description><![CDATA[<p>The conflict began when Russia annexed Crimea from Ukraine in 2014. The war in the Donbas has been in a state of frozen conflict since May of 2014. As the upcoming Ukrainian presidential elections near, many have started to wonder what the future holds for the Donbas. Since the conflict originated in 2014, more than [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/future-east-ukraine-war/">The Future of the War in Ukraine</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The conflict began when Russia annexed Crimea from Ukraine in 2014.</h2>
<p class="graf graf--p">The war in the Donbas has been in a state of frozen conflict since May of 2014. As the upcoming Ukrainian presidential elections near, many have started to wonder what the future holds for the Donbas.</p>
<p class="graf graf--p">Since the conflict originated in 2014, more than 10,000 people have been killed and over one million have been displaced. Unfortunately, Assistant Secretary-General Miroslav Jenca, a United Nations official associated with the ongoing Minsk accords, <a class="markup--anchor markup--p-anchor" href="https://www.rferl.org/a/un-ukraine-conflict-minsk-accord/29767153.html" target="_blank" rel="noopener noreferrer" data-href="https://www.rferl.org/a/un-ukraine-conflict-minsk-accord/29767153.html">acknowledged that negotiations</a>“appear to have lost momentum.”</p>
<h3 class="graf graf--h4">Ukraine’s Options Going Forward</h3>
<p class="graf graf--p">If the UN-backed negotiations have effectively stalled, Ukraine must evaluate its alternatives. <a class="markup--anchor markup--p-anchor" href="https://www.rferl.org/a/ukraine-44-candidates-presidential-election/29759798.html" target="_blank" rel="noopener noreferrer" data-href="https://www.rferl.org/a/ukraine-44-candidates-presidential-election/29759798.html">There are over 44 candidates</a> who hold varying views as to what the country’s options are. In the running for the presidency is the incumbent President Petro Poroshenko, the former Prime Minister Yulia Tymoshenko, the comedian Volodymyr Zelensky, and the former Deputy Prime Minister Yuriy Boyko. For Zelensky and others, <a class="markup--anchor markup--p-anchor" href="https://www.bloomberg.com/opinion/articles/2019-01-10/volodymyr-zelensky-comedy-star-and-ukraine-s-donald-trump-wannabe" target="_blank" rel="noopener noreferrer" data-href="https://www.bloomberg.com/opinion/articles/2019-01-10/volodymyr-zelensky-comedy-star-and-ukraine-s-donald-trump-wannabe">the answer is direct democracy</a>. Zelensky argues the solution is for Ukraine to hold a referendum on the conflict in eastern Ukraine.</p>
<p class="graf graf--p">Ukraine’s current President Poroshenko has opted to push for an international peacekeeping solution, <a class="markup--anchor markup--p-anchor" href="https://jamestown.org/program/russian-proposal-reopens-donbas-un-peacekeepers-debate/" target="_blank" rel="noopener noreferrer" data-href="https://jamestown.org/program/russian-proposal-reopens-donbas-un-peacekeepers-debate/">calling for a UN-backed mandate</a>. Tymoshenko, on the other hand, <a class="markup--anchor markup--p-anchor" href="https://jamestown.org/program/tymoshenko-reveals-peace-plan-for-eastern-ukraine-as-she-ramps-up-presidential-campaign-to-challenge-poroshenko/" target="_blank" rel="noopener noreferrer" data-href="https://jamestown.org/program/tymoshenko-reveals-peace-plan-for-eastern-ukraine-as-she-ramps-up-presidential-campaign-to-challenge-poroshenko/">has a much more aggressive proposal</a>. Her plan focuses on economic modernization, job creation, and reconstruction efforts for the Donbas region and tougher sanctions on Russia. She has spoken out against amnesty proposals for separatist fighters within the self-proclaimed Donetsk and Luhansk People’s Republics, both of which are backed by Moscow. Tymoshenko has also criticized the “special status” policy that was adopted for the Donbas region under the Minsk Two protocol.</p>
<p class="graf graf--p">The governments of Denmark, Sweden, and Switzerland have earmarked some $14 million (USD) for Ukraine as part of <a class="markup--anchor markup--p-anchor" href="https://www.rferl.org/a/denmark-sweden-switzerland-give-14-million-to-un-aid-for-eastern-ukraine/29760738.html" target="_blank" rel="noopener noreferrer" data-href="https://www.rferl.org/a/denmark-sweden-switzerland-give-14-million-to-un-aid-for-eastern-ukraine/29760738.html">a UN project</a> to “promote social cohesion and strengthen regional governance in eastern Ukraine.” While the three governments providing the funds likely expect it to promote a peaceful resolution to the conflict, how that money is spent, however, very much depends on the candidate in office.</p>
<h3 class="graf graf--h4">Poroshenko Seeks Greater Euro-Atlantic Integration for Ukraine</h3>
<p class="graf graf--p">It’s no surprise that Poroshenko seeks closer ties with the West — even going so far as to pass a Constitutional amendment that reflects Ukraine’s E.U. and NATO aspirations. Poroshenko likely believes that if Ukraine is more closely aligned with Western institutions, Russian aggression will, at the very least, be tempered. In fact, Poroshenko has stated that Russia’s annexation of Crimea and the ongoing conflict in the Donbas is due to Ukrainian politicians “talking about the necessity for Ukraine to… stay away from all alliances.”</p>
<p class="graf graf--p">However, there are a number of practical obstacles to achieving this reality. First is the question of Ukraine’s disputed territory. If Poroshenko believes that NATO membership will induce the alliance to intervene on Ukraine’s behalf, he is mistaken. The fact remains that many NATO members would likely not support Ukrainian membership in the alliance precisely due to the disputed nature of the country’s territory.</p>
<h3 class="graf graf--h4">The Ukrainian Conflict Will Remain Frozen for the Foreseeable Future</h3>
<p class="graf graf--p">There is no incentive for either side to seriously engage in meaningful negotiations. The gap between expectation and reality is widening. If a candidate such as Tymoshenko emerges as Ukraine’s next president, <a class="markup--anchor markup--p-anchor" href="https://www.unian.info/politics/10361667-tymoshenko-takes-lead-in-poll-ahead-of-2019-presidential-elections-infographics.html" target="_blank" rel="noopener noreferrer" data-href="https://www.unian.info/politics/10361667-tymoshenko-takes-lead-in-poll-ahead-of-2019-presidential-elections-infographics.html">as some election observers suggest</a>, the gap between expectation and reality will only widen further.</p>
<p class="graf graf--p">Similar to the case of the Republic of Georgia’s disputed South Ossetia and Abkhazia regions, neither side has any reason to try and alter the status quo. Going forward, absent a major “black swan” event, the Donbas will continue to play host to a frozen conflict with little chance for a negotiated settlement.</p>
<p><script>        if(window.strchfSettings === undefined) window.strchfSettings = {};    window.strchfSettings.stats = {url: "https://global-security-review.storychief.io/future-east-ukraine-civil-war?id=1896004218&amp;amp;amp;amp;amp;amp;amp;amp;type=2",title: "The Future of Ukraine’s Civil War",id: "67a59392-0711-40d2-8ebe-f4788e7ac4fa"};            (function(d, s, id) {      var js, sjs = d.getElementsByTagName(s)[0];      if (d.getElementById(id)) {window.strchf.update(); return;}      js = d.createElement(s); js.id = id;      js.src = "https://d37oebn0w9ir6a.cloudfront.net/scripts/v0/strchf.js";      js.async = true;      sjs.parentNode.insertBefore(js, sjs);    }(document, 'script', 'storychief-jssdk'))    </script></p>
<p><a href="https://globalsecurityreview.com/future-east-ukraine-war/">The Future of the War in Ukraine</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Global Britain: A New Vision</title>
		<link>https://globalsecurityreview.com/global-britain-new-vision/</link>
		
		<dc:creator><![CDATA[Robert Clark]]></dc:creator>
		<pubDate>Tue, 12 Feb 2019 21:55:24 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=10403</guid>

					<description><![CDATA[<p>Since Prime Minister Theresa May and then-Foreign Secretary Boris Johnson announced in 2016 a new Global Britain approach to the United Kingdom&#8217;s (UK) position on the world stage, much speculation has been cast over precisely what this approach entails. A report recently released by the Henry Jackson Society&#8217;s Global Britain program offers a more comprehensive [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/global-britain-new-vision/">Global Britain: A New Vision</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Since Prime Minister Theresa May and then-Foreign Secretary Boris Johnson announced in 2016 a new Global Britain approach to the United Kingdom&#8217;s (UK) position on the world stage, much speculation has been cast over precisely what this approach entails.</p>
<p>A <a href="https://henryjacksonsociety.org/wp-content/uploads/2019/02/HJS-Global-Britain-­-A-Twenty-first-Century-Vision-Report-A4-web.pdf">report</a> recently released by the Henry Jackson Society&#8217;s Global Britain program offers a more comprehensive view of what this new role for the U.K. should look like. The authors, James Rogers, and Bob Seeley, MP, argue that a Global Britain approach should be centered around three fundamental freedoms: Freedom for Trade, Freedom from Oppression, and Freedom of Thought.</p>
<p>Arguing that these three key freedoms are essential for liberal democratic states to succeed in a more competitive world order, the report confirms several significant recent developments regarding the current world order which have already seen successful policy-driven implementations over the last two years.</p>
<p>The first development is the return to a competitive state-based international order. Though the United States retains its global supremacy as the world&#8217;s sole superpower, and alongside NATO&#8217;s success in ensuring trans-Atlantic peace for 70 years, various regions in the world have recently become more competitive and unpredictable, which has led to a greater risk of conflict.</p>
<p>This shift from a unipolar world order at the onset of the 21st Century to one of multipolarity in 2019 <a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/705347/6.4391_CO_National-Security-Review_web.pdf">was outlined</a>&nbsp;in the National Security and Capability Review in 2018, which highlighted both a revisionist Russia across Eurasia and an expansionist China, particularly in the South China Sea and wider Indo-Pacific region.</p>
<p>This development has led to the U.K. increasing its diplomatic capabilities and defense engagement across East Asia and the Pacific, establishing <a href="https://www.gov.uk/government/news/foreign-secretary-expands-uk-commonwealth-diplomatic-network">nine new diplomatic</a> missions in Pacific island states whilst increasing cooperation with allies such as Singapore and Japan. The <a href="https://ukdefencejournal.org.uk/is-increased-uk-japan-defence-cooperation-leading-to-new-strategic-alliance/">new strategic alliance</a> forged with Japan, in particular, is an example of how increased bilateral defense engagement with strategic partners should be a cornerstone of a Global Britain approach.</p>
<p>As part of the U.K.&#8217;s activity in East Asia, it has increased significantly the Royal Naval presence transiting through these crucial waters. Conducting <a href="https://www.telegraph.co.uk/news/2018/09/06/royal-navy-warship-confronted-chinese-military-beijing-attacks/">Freedom of Navigation Operations</a>&nbsp;both in 2018 and early 2019, the Royal Navy missions in Chinese-disputed international waters affirms the report written by James Rogers and Bob Seeley, MP citing the centrality of both Freedom for Trade and Freedom from Oppression within a Global Britain vision. Britain&#8217;s presence will soon be increased, as the U.K. Defense Secretary&nbsp;<a href="https://www.bbc.co.uk/news/uk-politics-47192232">announced earlier in February</a>&nbsp;that the Royal Navy’s flagship aircraft carrier, the HMS Queen Elizabeth, will likely be making its first operational mission to the Indo-Pacific.</p>
<p>The second recent development in the international system which this report addresses are the attempted erosion of the rules-based global order by states employing increasingly sophisticated and criminal methods of subversion. From the state-sponsored terrorist attack in Salisbury, U.K. in 2018, to the unrelenting hybrid warfare being conducted against Ukraine since 2014, to the increased military and diplomatic assistance provided to Syrian dictator Bashar al-Assad, Russia has sought to systematically undermine liberal democratic states and institutions. Specifically, the Kremlin has been engaged in a concerted effort to divide NATO and the E.U., for at least the past decade. Thus, Freedom from Oppression and Freedom of Thought are two essential strategies the UK should seek to further pressure the Russian regime into ceasing its malign activities.</p>
<p>China seeks to reshape both international law and existing institutions across the Indo-Pacific region, in an attempt to establish hegemony in a less overtly aggressive, though potentially more unpredictable and dangerous manner compared with Moscow&#8217;s approach. Maintaining international shipping lanes across the Indian Ocean is not just a UK security concern, but a global one. China has sought to project its influence across the region through its ambitious Belt and Road Initiative (BRI, also known as the One Belt, One Road program). Additionally, Beijing has continued to&nbsp;<a href="https://www.lowyinstitute.org/the-interpreter/china-s-play-military-bases-eastern-indian-ocean">militarize port facilities</a>&nbsp;in Djibouti, Sri Lanka, and Myanmar. A heightened Royal Naval presence across the Indo-Pacific, building on its successes in 2018, should form a central pillar in a strategy to manage possible bullish Chinese maritime behavior undermining the rules-based order.</p>
<p>This report seeks to address the growing concern as to what precisely the U.K.&#8217;s role should be in the world, especially in the light of the U.K.&#8217;s imminent withdrawal from the European Union (E.U.). By strengthening alliances with global partners including the so-called CANZUK group (Canada, Australia, and New Zealand), as well as Japan and Singapore, and by promoting the three universal freedoms, the U.K. can contribute to upholding and maintaining the liberal norms and values which have ensured global peace and security.</p>
<p><a href="https://globalsecurityreview.com/global-britain-new-vision/">Global Britain: A New Vision</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Conflict and Competition in the Middle East Will Persist Throughout 2019</title>
		<link>https://globalsecurityreview.com/conflict-competition-middle-east-persist-2019/</link>
		
		<dc:creator><![CDATA[Vincent Lofaso]]></dc:creator>
		<pubDate>Tue, 12 Feb 2019 20:24:48 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Hezbollah]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Lebanon]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[United Arab Emirates]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=10159</guid>

					<description><![CDATA[<p>In previous years, interest in the Middle East was largely focused on ISIS (DAESH). This year, however, that focus will shift towards Iran. As the threat from the extremist Sunni group dwindled, Iran-backed militias have been strengthening their foothold in the region. In Iraq, Tehran is working to integrate Shia militia forces into the Iraqi [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/conflict-competition-middle-east-persist-2019/">Conflict and Competition in the Middle East Will Persist Throughout 2019</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>In previous years, interest in the Middle East was largely focused on ISIS (DAESH). This year, however, that focus will shift towards Iran.</h2>
<p>As the threat from the extremist Sunni group dwindled, Iran-backed militias have been strengthening their foothold in the region. In Iraq, Tehran is working to integrate Shia militia forces into the Iraqi military, cementing its influence over Baghdad. In Syria, the Iranians are reinforcing militia groups as they attempt to cement their presence in the country as a deterrent to Israel. Additionally, Iran is supplying Hezbollah with increasingly sophisticated weaponry and precision-guided missiles.</p>
<p>However, Iran is not without internal complication. Over the past year, the value of the Iranian Rial has decreased substantially and the United States&#8217; withdrawal from the Joint Comprehensive Plan of Action (JCPOA), and its unilateral re-imposition of sanctions have only exacerbated Iran&#8217;s economic troubles. Furthermore, there is a tug-of-war brewing in Tehran between members of the ruling class aligned with President Hassan Rouhani and the Islamic Revolutionary Guard Corps (IRGC) over the reformation of the Iranian economy. In short, domestic affairs and declining revenues will constrain Iranian efforts to strengthen its regional influence in 2019.</p>
<h3>Tehran&#8217;s Problems Are Washington&#8217;s Opportunity</h3>
<p>For some countries, however, Iran’s troubles could be perceived as a strategic opportunity. As 2019 progresses, the U.S. will enlist existing allies and forge new partnerships to contain Tehran&#8217;s expansionist aims. One such coalition, albeit still in the making, is the Middle East Strategic Alliance (MESA), also known as the “Arab NATO.&#8221; Another group of partners is the Kurdish militias in Northwest Iran, with whom the U.S. has cultivated solid ties. Washington could also encourage insurgencies in the Iranian regions of Khuzestan and Baluchistan.</p>
<p>To effectively push back against Iran, however, the U.S. must work alongside allies with which its interests are closely aligned. Israel, Saudi Arabia, and the United Arab Emirates will all readily endorse activities designed to constrain Iranian influence, but will first have to overcome decades of mistrust and hostility.</p>
<p>For the time being, each state will have its own issues to deal with. For Saudi Arabia, the <a href="http://globalsecurityreview.com/saudi-us-alliance-tipping-point/">murder of journalist Jamal Khashoggi</a> will cast a long shadow over the ruling House of Saud. Saudi Crown Prince Mohammad bin Salman has come under increasing international scrutiny, but any major change in the status quo is unlikely. Beyond the Crown Prince, Riyadh will strive to make progress on its Saudi Vision 2030 initiative, which the government expects will enable it to ease up on austerity measures and promote economic activity in the non-oil sectors.</p>
<h3>An End to the War in Yemen?</h3>
<p>To the south of Saudi Arabia is the ongoing civil war in Yemen. The conflict has proved increasingly costly for the involved powers, not to mention the millions of civilians who lack access to food, shelter, and medicine. In November 2018, the U.S. Senate voted to move ahead with a bill that, if passed, would end Washington&#8217;s involvement in the Yemen War.</p>
<p>Now that the Democratic Party has assumed control of the House of Representatives, the pressure to end the conflict will only increase. In Tehran, there are calls for the country to negotiate with the United States for sanctions relief in exchange for a scaling-down of Iranian support for Houthi rebels in Yemen.</p>
<p>2019 could present an opportunity for the U.S. and Iran to de-escalate tensions, should the interests of both countries align enough—especially when it comes to Yemen. Should a successful agreement be implemented regarding Iranian involvement in Yemen&#8217;s civil war, it could serve as a jumping-off point for further engagement.</p>
<h3>Israel, Hezbollah, and Iran</h3>
<p>In the Levant, Hezbollah has acquired precision-guided munitions from Iran and manufactures them in Lebanon.  For Israel, this presents a strategic threat. Many Israeli policymakers believe a preventive strike against Hezbollah while the group remains preoccupied with the conflict in Syria is necessary.</p>
<p>As such, there is the possibility that, at some point in 2019, Israel conducts one or more offensives against Iranian-Hezbollah supply lines in Syria and Lebanon. Such a strike would likely target storage and manufacturing facilities for guided munitions. In doing so, however, Israel will have to ensure it avoids inadvertently targeting Russian or Turkish assets in an increasingly crowded battle space in Syria.</p>
<p>Setting aside the fact that such a preventive offensive against targets in Lebanon would be a violation of international law, airstrikes alone would likely fail to achieve any meaningful objectives. In the last war with Hezbollah, Israel inflicted enormous damage in Lebanon but ultimately failed to achieve its objective. A similar outcome is likely for a coming air offensive unless Israel is willing to commit ground forces as well.</p>
<h3>U.S. Troops to Withdraw from Syria?</h3>
<p>In Syria, the war appears to be entering its final phases. In December of 2018, U.S. President Donald Trump announced that the U.S. would withdraw its troops from Syria. However, no deadline or timeline was given for the departure, which will ultimately grant a strategic advantage to Russia and Iran, as well as possibly allow for a reemergence of ISIS or a similar Sunni extremist group.</p>
<p>In the Syrian province of Idlib, the situation will remain particularly volatile throughout 2019. Turkey has pledged to increase its engagement in the region and commit troops. However, there is little agreement between individual Turkish-backed groups which has resulted in growing infighting. At the same time, Syrian President Bashar Al-Assad has vowed to retake the province, even as Russian, Iranian, Syrian, Kurdish, French, and American forces are situated nearby. Given the number of opposing forces in such a congested area, there is a risk for a rapid and inadvertent escalation.</p>
<h3>Managing Tensions Between Turkey and the U.S.</h3>
<p>With regards to tensions between Turkey and the United States, the two will likely come to some sort of agreement over how best to proceed in Syria. Although Ankara and Washington are both hostile to Assad, the two disagree over the next phase of the conflict. Washington sees combating ISIS as the top priority; the closest partner for the U.S in this effort mission is the YPG, a Kurdish militant group currently in control of Northeast Syria. Turkey, which sees the YPG as a terrorist group and a threat to Turkish national security, seeks to deny the YPG a safe haven in Syria.</p>
<p>To settle these differences, Turkey and the United States will have to negotiate an agreement. Washington is unlikely to turn its back on the Syrian Kurds as long as ISIS remains a credible threat. Rather, it will likely make minor territorial concessions to Turkey without undermining the security of the Syrian Kurdish militias. President Erdogan’s proposal for a &#8220;safe zone&#8221; along the Turkish border and in territories controlled by the YPG is one arrangement being considered.</p>
<p>Regardless, Turkey can&#8217;t simply walk away from the United States. It depends on the U.S. to balance against Russia. Likewise, the United States needs to maintain its relationship with Turkey, a NATO ally, to counter Russia in the Black Sea, the Balkans, and the Caucasus, especially since tensions between Moscow and Washington will likely worsen throughout 2019.</p>
<p>The Middle East will remain susceptible to foreign influence and prone to conflict throughout 2019. The primary catalyst being heightened competition between great powers, along with competition between regional powers such as Iran and Saudi Arabia or Iran. Furthermore,  an increasing propensity for unilateral action by a number of players in the region increases the chance for a substantial escalation.</p>
<p><a href="https://globalsecurityreview.com/conflict-competition-middle-east-persist-2019/">Conflict and Competition in the Middle East Will Persist Throughout 2019</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What&#8217;s in an Iranian Drone&#8217;s Name?</title>
		<link>https://globalsecurityreview.com/names-iran-drones/</link>
		
		<dc:creator><![CDATA[Ali Arfa]]></dc:creator>
		<pubDate>Tue, 29 Jan 2019 01:20:56 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=10100</guid>

					<description><![CDATA[<p>Iranians are skilled in the localization of almost anything Western or foreign. This is partly because of the nationalist, anti-imperialist promises of the 1979 revolution, and partly due to U.S. and international sanctions. These localization capabilities are evident in the manipulated designs and the partial or complete renaming of domestically assembled French cars, mobile apps, [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/names-iran-drones/">What&#8217;s in an Iranian Drone&#8217;s Name?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Iranians are skilled in the localization of almost anything Western or foreign. This is partly because of the nationalist, anti-imperialist promises of the 1979 revolution, and partly due to U.S. and international sanctions.</p>
<p>These localization capabilities are evident in the manipulated designs and the partial or complete renaming of domestically assembled French cars, mobile apps, computer games, and even the dubbing and redubbing of <a href="https://www.believermag.com/issues/201003/?read=article_edwards" data-saferedirecturl="https://www.google.com/url?q=https://www.believermag.com/issues/201003/?read%3Darticle_edwards&amp;source=gmail&amp;ust=1548810509588000&amp;usg=AFQjCNGGJqJ7GYrJDKapFhv-2UsPDg6ANg">the DreamWorks film trilogy, Shrek</a>. Iranian drone production, a sign of the country&#8217;s military independence, is no exception; in fact, the term drone itself is rarely used in Iranian military jargon. Instead, the Farsi acronym “پهپاد” [pahpad], the translation of which stands for “Remotely Piloted Flying Object” is frequently used.</p>
<p>Closely linked to the Iranian strategic interests in the Middle East region are religious and ideological interests, to which the names of Iranian unmanned aerial vehicles (UAVs), and therefore capabilities and types of use, could be closely attached. Iranian drones’ names speak volumes about the impression they want to create among Iranian officers and the message they want to send to adversaries.</p>
<h3>Iranian drones are more loaded with ideology than weapons</h3>
<p>The Iranians have designed, engineered, and reverse-engineered a range of drones, ranging from the Saeqeh (Thunderbolt), a reverse-engineered version of the RQ-170 Sentinel (bellingcat), <a href="https://www.washingtonpost.com/world/israel-confirms-downed-jet-was-hit-by-syrian-antiaircraft-fire/2018/02/11/bd42a0b2-0f13-11e8-8ea1-c1d91fcec3fe_story.html?noredirect=on&amp;utm_term=.121368075485" data-saferedirecturl="https://www.google.com/url?q=https://www.washingtonpost.com/world/israel-confirms-downed-jet-was-hit-by-syrian-antiaircraft-fire/2018/02/11/bd42a0b2-0f13-11e8-8ea1-c1d91fcec3fe_story.html?noredirect%3Don%26utm_term%3D.121368075485&amp;source=gmail&amp;ust=1548810509588000&amp;usg=AFQjCNGloJGW_mKPUzI0vb3M0nEkniKgkQ">shot down by Israeli Defense Forces (IDF)</a> in the Golan Heights, to the <a href="http://www.businessinsider.com/iran-suicide-combat-drone-patched-with-duct-tape-2013-10?IR=T" data-saferedirecturl="https://www.google.com/url?q=http://www.businessinsider.com/iran-suicide-combat-drone-patched-with-duct-tape-2013-10?IR%3DT&amp;source=gmail&amp;ust=1548810509588000&amp;usg=AFQjCNEfv6VFoCPkfJxdy2ntXfOyy3lgGw">duct-taped Ra&#8217;ad 85</a> (Thunder 85) suicide drone.</p>
<p>Here, however, the argument is not the technical and engagement capabilities of these drones but rather how they are named and to what effect? Since the list of Iranian drones’ Perso-Arabic names is not short. In this analysis, five drones—Ababil, Fotros, Karrar, Mohajer, and Yaser—are analyzed in more detail through their connotative meanings. These names fall into three categories: The Prophet’s Sahaba (companions of the prophet Mohammed), The Destroyer of the Jewish Fortress, and The Defenders of the Holy Sites.</p>
<h4>The Prophet’s Sahaba</h4>
<p>Mohajer is a medium sized surveillance drone which was in service during the Iran-Iraq War and was one of the earliest weaponized drones. <a href="http://dronecenter.bard.edu/irans-drones/" data-saferedirecturl="https://www.google.com/url?q=http://dronecenter.bard.edu/irans-drones/&amp;source=gmail&amp;ust=1548810509588000&amp;usg=AFQjCNEkhzB7L3Nsodh36tzJgEO46ixHSA">Version 4 of the Mohajer is still in use.</a> Yasir is also a surveillance drone, which is a <a href="https://theaviationist.com/2013/09/29/yasir-drone/" data-saferedirecturl="https://www.google.com/url?q=https://theaviationist.com/2013/09/29/yasir-drone/&amp;source=gmail&amp;ust=1548810509588000&amp;usg=AFQjCNEGBZpDvgmP3LNOlqCyqzpIFofiOA">modified copy of the Boeing ScanEagle.</a></p>
<p>Apart from the literal meaning of the name Mohajer (immigrant), the name refers to Prophet Mohammed’s sahaba (early companions) who emigrated from Mecca to Medina.</p>
<p>Another surveillance drone is the Yasir. Yasir was one of the most loyal companions of the prophet Mohammed who accompanied the prophet also during his migration from Mecca to Medina. By referencing historical efforts to further a sacred Islamic cause, the selection of these two names recalls the hardships of early Islam along with its ultimate triumph over the region.</p>
<h4>The Jewish hero slayer</h4>
<p>The next drone is the Karrar, which is a <a href="http://dronecenter.bard.edu/irans-drones/" data-saferedirecturl="https://www.google.com/url?q=http://dronecenter.bard.edu/irans-drones/&amp;source=gmail&amp;ust=1548810509588000&amp;usg=AFQjCNEkhzB7L3Nsodh36tzJgEO46ixHSA">turbojet propelled drone</a> capable of carrying a single bomb and a flying range of almost 600 miles.</p>
<p>Karrar is a title of Imam Ali, the first imam of the twelve Shiites, the sect of Islam to which the Iranian leadership belongs. As the conqueror of Kheibar (Fateh Kheibar) the title was given to Ali during a battle of the same name, after he defeated a legendary hero of a Jewish army, Marhab.</p>
<p>The name Karrar means frequent and repeated attacker and is therefore given to Ali for having the characteristics of a strong warrior. Apart from suggesting that this drone could be used in a conflict with Israel and its allies, the name conveys Tehran&#8217;s conviction that the Israeli Defense Forces (and Israel itself) will be ultimately defeated by the warriors, drones, and the army of Islam.</p>
<h4>The defenders of the holy sites</h4>
<p>The drones in this category are the Ababil and the Fotros. The Ababil is considered to be the <a href="http://dronecenter.bard.edu/irans-drones/" data-saferedirecturl="https://www.google.com/url?q=http://dronecenter.bard.edu/irans-drones/&amp;source=gmail&amp;ust=1548810509588000&amp;usg=AFQjCNEkhzB7L3Nsodh36tzJgEO46ixHSA">first operational Iranian drone</a>. It was initially used during the Iran-Iraq War and is still in production. The Fotros is claimed to be the biggest Iranian UAV to date, armed and <a href="http://www.bbc.com/persian/iran/2013/11/131118_l26_iran_drone_fotros" data-saferedirecturl="https://www.google.com/url?q=http://www.bbc.com/persian/iran/2013/11/131118_l26_iran_drone_fotros&amp;source=gmail&amp;ust=1548810509588000&amp;usg=AFQjCNEwV65X7a6aQMEQpUs3sJLDBJh6ng">30-hour flight endurance.</a></p>
<p>In Iran, the term Ababil refers to the name of a bird or a group of birds, similar to the sparrow in the Quran that appeared miraculously to save the Kabah—the center of the Sacred Mosque in Mecca—from an attack.</p>
<p>The Quranic verse reads <a href="https://quran.com/105" data-saferedirecturl="https://www.google.com/url?q=https://quran.com/105&amp;source=gmail&amp;ust=1548810509588000&amp;usg=AFQjCNE_MVoezVEbDHLHy1FBIPrit5_jUw">وَأَرْسَلَ</a> <a href="https://quran.com/105" data-saferedirecturl="https://www.google.com/url?q=https://quran.com/105&amp;source=gmail&amp;ust=1548810509588000&amp;usg=AFQjCNE_MVoezVEbDHLHy1FBIPrit5_jUw">عَلَيْهِمْ</a> <a href="https://quran.com/105" data-saferedirecturl="https://www.google.com/url?q=https://quran.com/105&amp;source=gmail&amp;ust=1548810509588000&amp;usg=AFQjCNE_MVoezVEbDHLHy1FBIPrit5_jUw">طَيْرًا</a> <a href="https://quran.com/105" data-saferedirecturl="https://www.google.com/url?q=https://quran.com/105&amp;source=gmail&amp;ust=1548810509588000&amp;usg=AFQjCNE_MVoezVEbDHLHy1FBIPrit5_jUw">أَبَابِيلَ</a> (And He sent against them birds in flocks), telling the story of an army of elephant riders who were defeated by small birds that threw hard clay at them. The birds, being small, were able to outmaneuver and overpower the comparatively giant elephants and fend off their army. The choice of the name Ababil for this UAV could also be read as a reference to the drone swarm technology.</p>
<p>Farzad Esmaili, the commander of the Khatam al-Anbia Air Defense Base, once referred to all the Iranian drones as <a href="https://www.youtube.com/watch?v=YYGKGSLpb90" data-saferedirecturl="https://www.google.com/url?q=https://www.youtube.com/watch?v%3DYYGKGSLpb90&amp;source=gmail&amp;ust=1548810509588000&amp;usg=AFQjCNG4rEo31g9OOf0MszKnGWMTQwW-Sg">“Ababil’s carrying fiery lava for the enemy’s eyes and enemy’s heart.”</a></p>
<p>Fotros was an angel whose wings were taken after disregarding God’s order and was advised by prophet Mohammed to touch the body of the newborn Hussein (the prophet’s grandson) and regain the wings. Upon doing so, Fotros’ wings regrow and she can fly back to heaven with the rest of the angels. S/he then vows to be <a href="http://fa.alalam.ir/news/1535399" data-saferedirecturl="https://www.google.com/url?q=http://fa.alalam.ir/news/1535399&amp;source=gmail&amp;ust=1548810509588000&amp;usg=AFQjCNFewCWqpZVF6GynPNfv1xYtz6bVZQ">the guardian of the holy site of the third Imam of the Shiites, Hussein, and his messenger.</a></p>
<p>The two drones’ names, one inspired by a Koranic verse and the other by Shiite tradition, suggest the responsibility of defending the holy sites, both Sunni and Shiite. They also very well fit the recent narrative of fighting a holy war against ISIS in Syria as the <a href="https://theiranproject.com/blog/tag/defenders-of-holy-shrine/" data-saferedirecturl="https://www.google.com/url?q=https://theiranproject.com/blog/tag/defenders-of-holy-shrine/&amp;source=gmail&amp;ust=1548810509588000&amp;usg=AFQjCNEfey40ZxwYxtg45gisBQi-kB5CJA">“Defenders of the Holy Shrine”</a>. Hence, no matter how far away from Tehran the Iranian Revolutionary Guard Corps (IRGC) advisors fly their drones, their mission remains one of defending holy Islamic sites.</p>
<p><a href="https://globalsecurityreview.com/names-iran-drones/">What&#8217;s in an Iranian Drone&#8217;s Name?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Implications of Brexit for Security in Europe</title>
		<link>https://globalsecurityreview.com/implications-brexit-european-security/</link>
		
		<dc:creator><![CDATA[Trivun Sharma]]></dc:creator>
		<pubDate>Thu, 24 Jan 2019 20:20:31 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Poland]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=9784</guid>

					<description><![CDATA[<p>Besides having long term economic consequences for both the British and the European economies, Brexit will likely have security implications that may weaken the interlocking web of Western institutions and alliances that maintained peace and stability on the continent. This is because one of the long-term impacts of Brexit will be on the geopolitics of [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/implications-brexit-european-security/">The Implications of Brexit for Security in Europe</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Besides having long term economic consequences for both the British and the European economies, Brexit will likely have security implications that may weaken the interlocking web of Western institutions and alliances that maintained peace and stability on the continent. This is because one of the long-term impacts of Brexit will be on the geopolitics of the region and Britain’s role in the world. Britain’s entry into the European institutions was as much the result of strategic calculations as it was about accepting the geopolitical reality that emerged after the Second World War.</p>
<p>Before World War II, Britain was the dominant global power—having control over important trade routes across the Atlantic, Indian, and Pacific oceans. Control over maritime trade routes coupled with leading the industrial revolution in Europe enabled Britain to emerge as the dominant economic power in the nineteenth century. However, in the latter half of the nineteenth century—following its unification— Germany emerged as <a href="https://geopoliticalfutures.com/the-geopolitics-of-britain/">a dynamic continental power</a> capable of both efficient production and trade. The end of the nineteenth century, therefore, saw the U.K. gradually lose its European primacy owing to competition from Germany in terms of industrial production, trade, and military strength. However, it was only after World War II that Britain lost its global dominance to the United States.</p>
<p>The situation after World War II saw the U.S. rise as the dominant power. The United States&#8217; strong economy and superior naval strength enabled it to control global maritime trade routes. The geopolitical rationale drove the U.K. to become a strategic ally of the United States. Securing vital maritime trade routes worked in the interest of both countries. For the U.S., with coasts with both the Atlantic and the Pacific Ocean, securing its waters was a matter of security <a href="https://geopoliticalfutures.com/brexits-impact-uk-economy/">driven by geography</a>. For the U.K. it was about keeping the vital channels of international trade open. But the disintegration of its empire also meant that the U.K. was left with a weak economy which needed to be rebuilt.</p>
<p>World War II devastated European economies. The founders of the European Union decided that the best way to ensure growth on the continent would be to join European countries economically and politically into institutions that would eliminate the threat of war. Thus, the idea of having a common market in continental Europe began taking shape. As European countries grew more united and rebuilt their economies, the U.K. saw an opportunity. It realized that the common European market could supplement if not replace its decreasing imperial markets. In other words, economic interest motivated the U.K. to join the E.U.</p>
<p>The U.K. also found that it benefitted in being an active member of the European security architecture. NATO and the E.U. became the bedrock of British national security. Participation in NATO allowed the U.K. to maintain <a href="https://www.revistamilitar.pt/artigo/1056">some global power</a> and redefine its position in post-war Europe. During the Cold War, the U.K. built its foreign and defense policy around its membership of NATO. The alliance that was formed to protect Western Europe from invasion by the Soviet Union, became central to how the U.K. would structure, equip, and deploy its armed forces for decades to come.</p>
<p>However, the end of the Cold War saw the U.K.’s <a href="https://www.forces.net/evergreen/comment-how-uk-critical-natos-future-keep-russians-out">defense spending reduced</a> following the elimination of the Soviet threat. This resulted in major cuts being imposed on the British Armed Forces, a process that was mirrored in most European NATO member states. While the U.K. did not provide the bulk of troops and resources to European security operations in Kosovo, Afghanistan, the Aegean Sea, and the Gulf of Aden, its contributions in terms of providing strategic guidance, expertise, intelligence, and equipment, proved effective and contributed to the E.U.&#8217;s <a href="https://www.washingtonpost.com/news/monkey-cage/wp/2018/10/18/brexit-will-weigh-heavily-on-european-security-heres-why/?utm_term=.fe6c7fc447f9">international credibility</a> on security issues.</p>
<p>The U.K. has thus been an integral part of European security architecture in the post-Cold War era. However, with Brexit, this could change. The impact of Brexit will at best introduce uncertainty and at worst permanently weaken Western defense by introducing new divisions in Europe. There are a number of issues on how the post-Brexit U.K. will continue to co-operate with bodies such as Europol and European Counter Terrorism Center. At the moment it is assumed that Britain’s co-operation in European security arrangements will continue after Brexit, but it is not certain—much depends on how negotiations take shape.</p>
<p>Given the importance of such bodies to both the U.K. and the E.U., it is safe to assume that both sides would try to find some common ground. Losing one or the other would have negative consequences on not just the functioning of the organization but also on the overall security in Europe, which recent terrorist attacks have shown is lacking. Therefore, the U.K.—with its large military budget, advanced weaponry, and a highly sophisticated intelligence services—has proved vital in maintaining both EU’s vital counterterrorism and homeland security efforts.</p>
<h3>Prioritizing bi-lateral relationships</h3>
<p>The real impact of Brexit would be on the bi-lateralization of relationships in the E.U. which could impact the E.U.-NATO multilateral dynamics. Already, the U.S. has prioritized its relationship with certain E.U. countries, for example, Poland and Romania. U.S. policy has been in cognizance with the <a href="https://geopoliticalfutures.com/intermarium-three-seas/">Intermarium concept</a>, an idea that is floated by strategic thinkers to understand U.S. policy especially with regards to Central and Eastern European countries. The U.K. has a strong military relationship with the United States. Compared to other European powers, the U.K.&#8217;s military strength and common foreign policy interests have enabled it to share the military burden with the U.S. when engaging in global and regional operations.</p>
<p>President Trump’s evident dislike of the E.U. and the NATO and his support for reviving the special relationship between the U.K. and the U.S. offers the former a tempting prospect of making its relationship with the U.S. the central pillar of its foreign policy. At the same time, the U.S. policy of working with Central and Eastern European countries provides much common ground for Britain to remain an influential power in Europe by building stronger ties with emerging powers in that region. A case can be made for a stronger partnership between Poland and a post-Brexit Britain.</p>
<p>The two countries have already signed the <a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/728126/TS_3.2018_Poland_Defence_Cm_9673.pdf">Treaty on Defense and Security Co-operation</a> under which commitments have been made for cooperating on a number of issues ranging from cybersecurity to strategic communications. Under this defense and security co-operation agreement, Britain can offer Poland a number of benefits. It is important to note that although Poland has been an active member of NATO and is among the few countries that contribute two percent of its GDP to the NATO budget, it does not solely rely on NATO for its security. Poland over the years has focused on cultivating bilateral defense relationships with key countries to match its security considerations.</p>
<p>A post-Brexit Britain could provide Poland support on critical issues concerning its security. Britain has been one of the staunchest critics of Russian President Vladimir Putin’s policy in Ukraine. There is no reason to assume that London’s policy will change after Brexit. Britain has its own problems with Russia and it would be in Britain’s interest to throw its diplomatic weight behind Poland’s resistance against Russia. Moreover, Britain can also provide Poland with investment and trade agreements that could decrease Poland’s dependency on Germany for economic growth in the long-term. Solidifying Poland’s political position in Europe would enable Britain to remain relevant in European geopolitics. For Poland, having the support of an economic and diplomatic powerhouse would be crucial as it campaigns against German influence in Europe.</p>
<p><a href="https://globalsecurityreview.com/implications-brexit-european-security/">The Implications of Brexit for Security in Europe</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Hard Edge of China&#8217;s Soft Power</title>
		<link>https://globalsecurityreview.com/hard-edge-china-soft-power/</link>
		
		<dc:creator><![CDATA[Mattias Bouvin]]></dc:creator>
		<pubDate>Wed, 23 Jan 2019 23:55:28 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Indonesia]]></category>
		<category><![CDATA[Malaysia]]></category>
		<category><![CDATA[Philippines]]></category>
		<category><![CDATA[Singapore]]></category>
		<category><![CDATA[South China Sea]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=9856</guid>

					<description><![CDATA[<p>China learned the value of hard power during its so-called “century of humiliation.” Now, as China begins its century of expansion, it’s learning to use soft power, too. In reference to China’s foreign policy strategy, Deng Xiaoping once said: “hide your strength, bide your time.” For three decades, Chinese foreign policy was implemented accordingly. As [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/hard-edge-china-soft-power/">The Hard Edge of China&#8217;s Soft Power</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>China learned the value of hard power during its so-called “century of humiliation.” Now, as China begins its century of expansion, it’s learning to use soft power, too.</h2>
<p>In reference to China’s foreign policy strategy, Deng Xiaoping once said: “hide your strength, bide your time.” For three decades, Chinese foreign policy was implemented accordingly. As China realigned itself as a market economy, it seemed content in its role as the<span class="Apple-converted-space">  </span>“world’s factory;” at the same time, the rest of the world was content with cheap consumer goods that were produced in China.</p>
<p>In recent years, however, Xi Jinping has overseen a significant shift in China’s foreign policy. China has become increasingly assertive in pursuit of its national security, foreign policy, and economic interests both in the Indo-Pacific region and throughout the world, from Asia to Latin America. China’s policies and behaviors, from the massive Belt and Road Initiative (BRI) to the creation of artificial islands in the South China Sea, are clear indicators that Beijing is done hiding and biding.</p>
<p>Significant amounts of natural resources and secure trade routes for exports are essential to ensure China’s continued economic growth. As the land components of the BRI expand across Central and Southeast Asia, the South China Sea remains a point of geopolitical volatility. The South China Sea is host to some of the world’s most critical shipping lanes. Eighty percent of China’s energy imports pass through the Strait of Malacca, strategically positioned between the countries of Malaysia, Singapore, and Indonesia—all of which are American allies.</p>
<p>China seeks to place the South China Sea firmly within its sphere of influence. Doing so would see China move from a position of geopolitical vulnerability to one of strength, effectively maintaining a “Great Maritime Wall” that would ensure China’s unfettered access to both the Indian and Pacific Oceans. Consolidating and solidifying its sphere of influence will be the most significant Chinese foreign policy challenge of the twenty-first century while maintaining the status quo and retaining its strategic advantage will be that of the United States.</p>
<p><figure id="attachment_9857" aria-describedby="caption-attachment-9857" style="width: 979px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-9857" src="http://globalsecurityreview.com/wp-content/uploads/2019/01/9_dotted_line.png" alt="South China Sea Map with Nine-Dash Line" width="979" height="1206" srcset="https://globalsecurityreview.com/wp-content/uploads/2019/01/9_dotted_line.png 979w, https://globalsecurityreview.com/wp-content/uploads/2019/01/9_dotted_line-244x300.png 244w, https://globalsecurityreview.com/wp-content/uploads/2019/01/9_dotted_line-768x946.png 768w, https://globalsecurityreview.com/wp-content/uploads/2019/01/9_dotted_line-831x1024.png 831w" sizes="(max-width: 979px) 100vw, 979px" /><figcaption id="caption-attachment-9857" class="wp-caption-text">The South China Sea. China&#8217;s (disputed) &#8220;Nine-Dash Line&#8221; claim is highlighted in green.</figcaption></figure></p>
<p>Estimates currently project that China will be operating a fully-fledged <a href="https://www.cnas.org/publications/reports/beyond-the-san-hai">blue-water navy by 2030</a>. It is likely that, around this time, China will be pushing to break through the First Island Chain in the East and South China Seas that are currently controlled by U.S. allies. Until China’s hard power capabilities are fully matured, China will continue to vie for influence using diplomacy and other soft power vehicles.</p>
<h3>China’s Soft Power Capabilities</h3>
<p>The canonical conception of soft power is centered mainly around ideas like constitutionalism, liberal democracy, and human rights, none of which are on offer from an unapologetically authoritarian China.<span class="Apple-converted-space">  </span>While Chinese universities are drawing growing levels of international students, the fact remains that, on the whole, China’s cultural pull is meager. Its most famous artist lives in exile, state media outlet Xinhua gets little traction outside of China, and while K-pop and J-pop are widely played outside of Korea and Japan respectively, Chinese popular music has failed to capture international attention.</p>
<p>China may not have much to offer as an alternative to the American Dream for populations around the world, but for the leaders and governments of developing states, China presents an attractive partner. Rather than seeking investment and financial support from the Bretton Woods institutions, which require governance and human rights reforms, many governments are turning to Beijing, which attaches far fewer strings.</p>
<p>While China’s lack of democratization does damage its international reputation, that damage must be viewed in the context of the relative decline of American soft power. The post-9/11 wars in Afghanistan and Iraq have harmed the global impression of the United States as a “bringer of democracy,” to the extent that such a phrase are now mostly invoked in irony.</p>
<p>In Latin America, the United States’ historical sphere of influence, many states are signing bilateral agreements with China on everything from hydropower projects to the development of telecommunication networks. China’s engagement in Central and South America has resulted in it becoming the region’s largest creditor. Furthermore, as U.S. levels of domestic shale production increase, there will be less U.S. demand for foreign energy. China’s thirst for oil, on the other hand, will continue unabated. For <a href="https://www.brookings.edu/wp-content/uploads/2017/01/fp_201701_china_investment_lat_am.pdf">many Latin American nations</a>, the choice of China as an economic partner has been a straightforward one.</p>
<p>The appeal of China as an alternative isn’t due to Beijing’s alignment with specific ideological criteria. Instead, China is appealing <i>because it is an alternative</i>. China profits from the extent to which the U.S. influence declines relative to its own, not from the gravitational pull of some cultural or ideological preponderance. This means that even those pursuing Western-style governance structures will see opportunities to engage with China. For these countries, if the United States won’t purchase foreign oil, or the World Bank won’t fund a development project, China will.</p>
<h3>China’s Carrot and Stick</h3>
<p>The allure of the Chinese alternative is visible in the South China Sea also. In this rather authoritarian region, liberal democratic values are held in lower regard than economic prosperity and political stability. Singapore stands as a shining example that liberalism is not a prerequisite for success in these metrics. To a working class citizen in an underdeveloped province of Indonesia or the Philippines, democracy—or “democrazy” as it is sometimes termed in the region—can seem stultified and inefficient. China, as it would have the world believe, has demonstrated that its model for global engagement achieves results.</p>
<p>China has attempted to satisfy concerns about the nature of its investment and economic policies. The Asian Infrastructure Investment Bank, founded and led by China, is an attempt to increase engagement with countries in the Indo-Pacific region. The AIIB is a signal to countries in the region that Chinese investment isn’t solely for Latin America or Africa. Furthermore, China has been willing to engage in multilateral forums and agreements as it tries to convince its neighbors that its intentions are benign.</p>
<p>However, Beijing has mostly failed in this regard. Chinese military activity has increased in the South China Sea. China’s naval presence in the region has increased dramatically; the Chinese Coast Guard has even escorted <a href="https://www.theguardian.com/world/2016/mar/21/south-china-sea-indonesia-summons-chinese-ambassador-as-fishing-dispute-escalates">fishing trawlers into Indonesian waters</a>. Beijing is working diligently—and successfully—to reduce Taiwan’s international relations.<span class="Apple-converted-space">  </span>The Nine-Dash Line (which outlines China’s South China Sea claims) continues to be a significant source of tension; the region is flush with complex, multilateral territorial disputes, any of which could erupt into conflict with little warning.<span class="Apple-converted-space"> </span></p>
<p>China, for its part, never intended to assuage its neighbors’ concerns completely. Instead, China is trying to show that, while it carries a big stick, it can be reasoned with.</p>
<p>Indo-Pacific states are now engaged in a continuous balancing act. Each country is weighing the benefits and costs of their relationship with the established superpower (the United States) against the incipient one (China). While China moves towards the maturation of its hard power, it is perhaps operating within the last phase of biding its time. China has attempted to sell a narrative where it is the reliable power in the Indo-Pacific, rather than a country several thousand miles across the Pacific, from which the echoes of “America first” can be heard.</p>
<h3>Alliances are Essential for Maintaining the Status Quo in Southeast Asia</h3>
<p>Nevertheless, regional alignment remains with the U.S.—for now. Staring down vociferous Chinese criticism, South Korea placed an American anti-ballistic missile defense system on its soil. Taiwan continues to hedge against a Chinese threat by seeking closer ties with the U.S. as regular arms sales have resumed under the Trump administration. The U.S. has turned a blind eye to Japan’s latent nuclear capabilities and encouraged the evolution of its nominal self-defense force into something more potent.</p>
<p>The United States’ network of alliances in Southeast Asia is intact but fragile. The U.S. must remain credible to <i>each</i> state individually to be credible to <i>all</i> states collectively. Should the U.S. signal a lack of interest—such as by <a href="https://www.bbc.co.uk/news/world-us-canada-38721056">withdrawing from the TPP</a>, publicly questioning the <a href="https://www.foreignaffairs.com/articles/asia/2011-03-01/will-chinas-rise-lead-war">value of a <i>de-facto</i> independent Taiwan</a>, or demonstrating a hesitation to <a href="https://www.foreignaffairs.com/articles/north-korea/2018-01-09/myth-limited-strike-north-korea?cid=int-rec&amp;pgtype=art">fight alongside South Korea</a> in a conflict with North Korea—its network of alliances may be compromised.</p>
<p>In the twenty-first century battle for influence in the South China Sea, credibility is everything. China currently sees what it perceives as a power vacuum, and it is only too happy to slide into it. Affirming its influence and presence in the Indo-Pacific will be a key U.S. foreign policy objective over the next century. To succeed, the U.S. must act with determination yet delicacy, so that it may maintain the network of alliances that currently safeguards a strategic advantage over an emergent China. <span class="Apple-converted-space"> </span></p>
<p><a href="https://globalsecurityreview.com/hard-edge-china-soft-power/">The Hard Edge of China&#8217;s Soft Power</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Border Dispute Between Chechnya and Ingushetia Threatens Regional Stability</title>
		<link>https://globalsecurityreview.com/border-dispute-chechnya-ingushetia-regional-stability/</link>
		
		<dc:creator><![CDATA[Gabriella Gricius]]></dc:creator>
		<pubDate>Thu, 17 Jan 2019 19:31:35 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Chechnya]]></category>
		<category><![CDATA[Ingushetia]]></category>
		<category><![CDATA[Russia]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/border-dispute-chechnya-ingushetia-regional-stability/</guid>

					<description><![CDATA[<p>On September 26, 2018, Chechen president Ramzan Kadyrov and his Ingush counterpart Yunus-bek Yevkurov signed a bill initiating a land swap between Chechnya and Ingushetia. In the following months, this seemingly straightforward agreement has grown into a major issue that threatens to upend the stability of the Northern Caucasus region. Mass protests began October 4 [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/border-dispute-chechnya-ingushetia-regional-stability/">Border Dispute Between Chechnya and Ingushetia Threatens Regional Stability</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>On September 26, 2018, Chechen president Ramzan Kadyrov and his Ingush counterpart Yunus-bek Yevkurov <a href="http://tass.com/politics/1023194" rel="nofollow noopener">signed a bill initiating a land swap between Chechnya and Ingushetia</a>. In the following months, this seemingly straightforward agreement has grown into a major issue that threatens to upend the stability of the Northern Caucasus region. Mass protests began October 4 in the Ingush capital of Magas and <a href="http://oc-media.org/protests-in-ingushetia-on-pause/" rel="nofollow noopener">continued until October 17</a>.</p>
<p>Around 10,000 people attended these protests, an unprecedented number for Ingushetia, where the population is just over 450,000. The protests stemmed from a lack of public deliberation regarding the bill and a history of adverse sentiments concerning land swaps. Furthermore, the text of the agreement was not published, and some members of the Ingush Parliament have issued statements saying that their signatures were falsified.</p>
<p>Protestors also argued that the ratification of the bill should be nullified because the Russian Constitution requires a public referendum on all territory changes. According to official media, the bill swapped allegedly uninhabitable lands in Chechnya’s Nadterechny District and Ingushetia’s Malgobeksky District. However, the equality of the swap was very much in question, as Chechnya is <a href="http://www.eng.kavkaz-uzel.eu/articles/44659/" rel="nofollow noopener">taking control of 25 times more land than Ingushetia</a>.</p>
<p>As protests grew, demonstrators began demanding Yevkurov&#8217;s resignation. While he did not resign, his government put forth several alternatives to the nullification of the land swap agreement. Eight days of demonstrations were allowed by the government of Ingushetia, which also outlawed the use of force against protestors. This drastically reduced fears of a police crackdown that had been predicted by many international human rights groups including Amnesty International.</p>
<h3>Ingushetia and Chechnya Have a History of Border Disputes</h3>
<p>For the Ingush, the mere idea of a land swap brings up painful memories. North Ossetia gained control over the Prigorodny district in 1991, which resulted in an ethnic cleansing that claimed the lives of 600 Ingush. The border dispute between Chechnya and Ingushetia is similarly nothing new, it has remained unresolved since the breakup of the Soviet Union. The Chechen-Ingush Autonomous Soviet Socialist Republic was divided into Chechnya and Ingushetia in 1991.</p>
<p>While the Republic of Ingushetia joined the Russian Federation, Chechnya chose to declare its independence from Russia twice but failed on both counts. Despite this, then Ingush-President Ruslan Aushev and the then-President of the Chechen Republic of Ichkeria, Dzokhar Dudayev, signed a border demarcation agreement in 1993. Even though the deal wasn’t ratified, it set a precedent whereby the majority of the Sunzhensky District remained within Ingushetia.</p>
<p>In March 2003, then-President of Chechnya, Akhmad Kadyrov, and then-Ingush leader Murad Zyazyko <a href="https://www.fairobserver.com/region/europe/chechnya-ingushetia-border-dispute-protests-north-caucasus-russia-europe-news-17261/">signed a similar agreement</a>. It followed the precedent of the Aushev-Dudayev agreement, giving full jurisdiction over the Sunzhensky District to Ingushetia while entitling Chechnya to the settlements of Assinovskaya and Sernovodsk. While disagreement remains between Chechnya and Ingushetia, these two agreements served to appease the local populations.</p>
<p>However, since Ramzan Kadyrov took power in Chechnya in 2006, the norms in the Northern Caucasus have shifted. The Kremlin implicitly handed the reins over to Kadyrov within Chechnya, and in doing so, allowed his authoritarian style of governance to continue as long as Chechnya remained peaceful. This is seemingly at-odds with Kadyrov’s interest in pursuing regional power and interference within Ingushetia. In 2012, <a href="https://www.eng.kavkaz-uzel.eu/articles/21748/">three Chechen militants were killed</a> in the Ingush village of Galashki. A year later, <a href="https://jamestown.org/program/chechen-authorities-organize-incursion-into-ingushetia-2/">six Ingush police officers were killed</a> when 300 Chechen security <em>Spetznaz </em>(special forces) entered the town of Arshty.</p>
<p>That same year, <a href="https://www.rferl.org/a/chechnya-ingushetia-border-dispute/24919250.html">Kadyrov introduced an amendment to the Chechen Constitution</a> which asserted Chechen claims to six further settlements in the disputed Sunzhensky District (Voznesenskoye, Karabulak, Nesterovskoye, Sleptsovskoye, Troitskoye, and Chemulga). This particular incident caused serious friction between the two republics and ultimately had to be resolved with the Kremlin’s mediation.</p>
<h3>What Prompted the Chechen-Ingush Land Swap?</h3>
<p>In August, <a href="https://www.rferl.org/a/explainer-ingush-chechen-land-swap/29536507.html">construction began on a road</a> that would lead into the Sunzhensky district, leading many to fear expansionism by Chechnya. Other reports have cited the construction of a Chechen border post in the village of Arshty, which is two kilometers past the border with Ingushetia. These actions may have convinced Yevkurov that it was better to avoid escalation and settle with a land swap.</p>
<p><a href="https://www.eurasiareview.com/01102018-chechen-ingush-border-accord-angers-ingush-society-frightens-other-north-caucasians-oped/">Some local commentators</a> have expressed concerns that Kadyrov is using the land swap as a tactic to assume control over Ingushetia with the Kremlin’s consent. Given his experience with pacifying Chechnya, Kadyrov could easily offer to similarly pacify Ingushetia, taking a burden off the Kremlin’s shoulders. <a href="http://www.eng.kavkaz-uzel.eu/articles/40807/">According to Russian political scientist Dmitry Oreshkin</a>, “Kadyrov can afford what Yevkurov, for example, cannot. Kadyrov is active, he is increasing political weight and has ambitious plans. Kadyrov is pushing his interests and, apparently, not without the support of Moscow.”</p>
<p>Perhaps the main reason why the Kremlin has been so supportive of Kadyrov is the fear of a resurgence of radicalism in the North Caucasus. Chechnya was a source of substantial regional instability throughout the 1990s and early 2000s. Kadyrov’s actions have since brought Chechnya under control, a fact that has not gone unnoticed by the Kremlin. Accordingly, they may feel the need to reward Kadyrov, to ensure his loyalty during a possible future uprising in Dagestan, where the Kremlin has been purging local elites. As such, Kremlin spokesman Dmitry Peskov has recently said “<a href="https://www.rferl.org/a/explainer-ingush-chechen-land-swap/29536507.html">the Kremlin is closely following the situation</a>,&#8221; but stated that it is a regional issue rather than a federal one.</p>
<p>In all likelihood, the protests in Ingushetia won&#8217;t amount to much, at least in the near-term. However, the land swap raises the probability of future instability within the North Caucasus region as a whole. With Chechen minorities in both Dagestan and Ingushetia, there is a significant chance that Kadyrov could choose to use the same rationale that Russia adopted in Crimea to seize land and gain more power for himself.</p>
<h3>Russia Can&#8217;t Afford Another Crisis in the Caucasus</h3>
<p>Given Russian President Vladimir Putin’s low approval ratings, any instability or deterioration of security in the Caucasus is bad for Moscow. It is difficult to forecast how tensions in the North Caucasus will be managed. The Kremlin has yet another volatile matter on its list of problems, which includes Crimea and Ukraine, poor turnout in recent gubernatorial elections, ongoing sanctions, and poor public approval.</p>
<p>Protestors have planned to travel around Ingushetia and inform citizens of this agreement and submit please to local courts, the Council of Europe, the UN, and the Islamic League to have the border agreement nullified. Despite these protests, the border agreement came into force on October 16, 2018, with Kadyrov decrying attempts against the deal as “<a href="http://tass.com/politics/1026281">inadmissible and futile</a>.”</p>
<p>However, Ingushetia’s Constitutional Court <a href="https://www.rferl.org/a/ingushetian-court-declares-divisive-border-deal-with-chechnya-illegal/29573182.html">declared on October 30</a> that the land swap was illegal. The Court decreed that any changes to the territory of Ingushetia require a referendum, which wasn&#8217;t held in the case of the Chechen-Ingush land swap. However, rather than stating that the agreement was invalid, the judge referred the matter to the Russian Constitutional Court.</p>
<p>On December 6, <a href="https://themoscowtimes.com/news/russias-constitutional-court-upholds-divisive-chechnya-ingushetia-land-transfer-63729">Russia’s Constitutional Court upheld the land transfer as legitimate</a>, further stating that Ingushetia’s Constitutional Court lacked the jurisdiction to make any judgments on the matter. As of yet, there has been little reporting of further discontent in the Caucasus, but the long-term implications of the Chechen-Ingush land swap remain to be seen.</p>
<p><script>        if(window.strchfSettings === undefined) window.strchfSettings = {};    window.strchfSettings.stats = {url: "https://global-security-review.storychief.io/border-dispute-chechnya-ingushetia-regional-stability?id=44153201&type=2",title: "Border Dispute Between Chechnya and Ingushetia Threatens Regional Stability",id: "67a59392-0711-40d2-8ebe-f4788e7ac4fa"};            (function(d, s, id) {      var js, sjs = d.getElementsByTagName(s)[0];      if (d.getElementById(id)) {window.strchf.update(); return;}      js = d.createElement(s); js.id = id;      js.src = "https://d37oebn0w9ir6a.cloudfront.net/scripts/v0/strchf.js";      js.async = true;      sjs.parentNode.insertBefore(js, sjs);    }(document, 'script', 'storychief-jssdk'))    </script></p>
<p><a href="https://globalsecurityreview.com/border-dispute-chechnya-ingushetia-regional-stability/">Border Dispute Between Chechnya and Ingushetia Threatens Regional Stability</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Intelligence in War: Fixing and Fitting Intelligence in the Afghan War</title>
		<link>https://globalsecurityreview.com/fixing-fitting-intelligence-afghanistan-war/</link>
		
		<dc:creator><![CDATA[Tamim Asey]]></dc:creator>
		<pubDate>Tue, 15 Jan 2019 20:37:25 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=9786</guid>

					<description><![CDATA[<p>Modern wars are fought with eyes and ears on the ground, air, and cyberspace. In Afghanistan, the U.S. and its allies have deployed cutting-edge aerial intelligence, surveillance, and reconnaissance (ISR) capabilities. What is missing, however, is good human intelligence (HUMINT) collection capabilities. Afghans have been entrusted with the task of HUMINT collection, but multiple Taliban [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/fixing-fitting-intelligence-afghanistan-war/">Intelligence in War: Fixing and Fitting Intelligence in the Afghan War</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Modern wars are fought with eyes and ears on the ground, air, and cyberspace.</h2>
<p>In Afghanistan, the U.S. and its allies have deployed cutting-edge aerial intelligence, surveillance, and reconnaissance (ISR) capabilities. What is missing, however, is good human intelligence (HUMINT) collection capabilities. Afghans have been entrusted with the task of HUMINT collection, but multiple Taliban infiltration and sabotage operations illustrate the need for comprehensive reform of Afghanistan&#8217;s intelligence apparatus.</p>
<p>The Afghan intelligence community requires a robust overhaul. This includes investment in both human and technical capabilities alongside a comprehensive reform program. Afghanistan&#8217;s intelligence community is comprised of the National Directorate of Security (NDS), Police Intelligence (PI) and Military Intelligence (MI). Some coordination centers, including Tawheed, NASRAT, and the Presidential Information Coordination Center (PICC) connect and share strategic, operational, and tactical intelligence between the individual agencies.</p>
<p>Regarding organizational hierarchy, the Afghan intelligence community is structured like a pyramid, with the powerful National Directorate of Security at the top. The NDS oversees Afghanistan&#8217;s overall intelligence machinery as it pertains to both internal and external security.</p>
<p>Though vested with substantial powers, the Afghan intelligence community has become heavily politicized and suffers from a lack of investment coupled with an old and inefficient bureaucracy. Afghanistan&#8217;s intelligence collection efforts are primarily focused on gathering HUMINT through long-standing networks of tribes, local commanders, traders, and government employees. This HUMINT is augmented with basic signals intelligence (SIGINT) collection capabilities.</p>
<p>The Five Eyes countries (the U.S., U.K., Canada, Australia, and New Zealand) have done much to transform the Afghan intelligence community. However, more needs to be done to create professional, disciplined, and adequately equipped intelligence services. At present, arbitrary political appointments, a lack of professional intelligence schools, and the ongoing politicization of Afghanistan&#8217;s intelligence agencies have profoundly undermined their institutional integrity and credibility.</p>
<h3>The Institutional History of Afghan Intelligence</h3>
<p>Intelligence collection and analysis as organized tradecraft is a relatively new phenomenon in Afghanistan. It started with the creation of the <i>Edara e Zabt Ahwaalaat</i> of the 18<sup>th</sup> century King Abdul Rahman Khan. The founding father of modern Afghan intelligence is former Prime Minister and President Sardar Dawood Khan; he transformed <i>Edara Zabt Ahwalaat Sedarat</i> to establish the first-ever State Intelligence Services—<i>Edara Estikhabarat Dawlati</i>. This agency was later ideologically refined as communist governments took power with the help of the Soviet KGB, and renamed as KAM, AGSA, and KHAAD.</p>
<p>Today, a significant number of Afghan intelligence agents and officers are graduates of KGB training centers in Russia and former Soviet republics or satellite states such as Uzbekistan, East Germany, and the former Yugoslavia. Furthermore, police and military intelligence agencies were established during the communist period to conduct surveillance on political opponents, conduct counterintelligence operations and gather intelligence on criminals and crime syndicates in major urban centers.</p>
<p>The institutional history of the Afghan intelligence community has created legal and policy frameworks that are in dire need of reform. Updating and revising these frameworks to define and clarify the authorities, responsibilities, and roles of the various intelligence agencies is essential to safeguard their legitimacy, integrity, and professionalism. At present, there is considerable overlap between the mandates and activities of Afghanistan&#8217;s military and civilian intelligence, especially in the areas of intelligence on criminal or terrorist activities, tactical-level intelligence, and strategic intelligence. These overlaps need to be clarified through a comprehensive, cross-agency review, which will serve as a road map for subsequent updates and revisions to the legal and policy frameworks used by the Afghan intelligence services.</p>
<p>Furthermore, robust investment is required to upgrade and equip intelligence training schools in the military and civilian sectors. These schools should be the Afghan intelligence community&#8217;s sole supplier of human capital to ensure job security, professionalism, and discipline while avoiding any politicization of the intelligence services. The only political appointees in positions of authority in the Afghan intelligence community should be the Director of the NDS and his first deputy; both should have a term limit of two to three years. The career professionals in the services must be immune from political appointments, while service chiefs and NDS personnel who have been discharged from service should be prohibited from engaging in any political or business activity for ten years. This will ensure that sensitive information they may have had access to will not be used for political or financial gain.</p>
<p>There is also the fact that the NDS is spread too thin. As such, there is a dire need to establish three new intelligence agencies: a foreign intelligence agency, a counter-intelligence agency, and a joint intelligence committee consisting of the various intelligence service chiefs chaired by the President of Afghanistan. This improved institutional arrangement will clarify the roles and responsibilities of each agency, improve oversight, increase inter-agency coordination, and enable each agency to better focus on its core mission.</p>
<h3>The Intelligence Cycle and Modus Operandi</h3>
<p>Afghanistan&#8217;s intelligence services currently lack a coherent methodology governing the collection and analysis of intelligence, and the delivery of final intelligence products. Little attention is paid to analyzing and corroborating raw intelligence, which is often presented as a final product. These shortcomings are primarily due to a lack of a coherent institutional culture and the absence of a system of intelligence development. The modus operandi of the three existing services needs to be upgraded with the right systems, procedures, and personnel. This process can start with the implementation of a robust intelligence development cycle, and clarification as to the roles and responsibilities of various agencies, and of departments within each agency.</p>
<p>Furthermore, the Afghan intelligence community would benefit from higher numbers of western-trained intelligence officers. Retirement incentives should be offered to older, KGB-trained officers. At the same time, existing intelligence training schools in Afghanistan need to update their curricula and increase their enrollment as older officers retire and demand for new officers rises.</p>
<h3>Information Sharing and Coordination</h3>
<p>While secrecy and information compartmentalization are fundamental aspects of the intelligence tradecraft, timely and effective sharing and coordination of information is an ongoing challenge for any intelligence service. While many improvements have been made with the establishment of coordination centers such as TAWHEED, PICC, and NASRAT, more needs to be done at the tactical and operational levels.</p>
<p>The fall of the provinces of Kunduz and Ghazni are examples of intelligence sharing failures in Afghanistan. Agencies were unable to coordinate and share intelligence regarding imminent Taliban attacks promptly. Information needs to be distributed in an efficient and timely manner to those with the proper capabilities to address the issue. Optimized inter- and intra-agency information sharing capabilities will change the face of the Afghan war.</p>
<h3>Foreign Partnerships</h3>
<p>Partnerships with external intelligence services are essential. Given Afghanistan&#8217;s geopolitical circumstances, the Afghan intelligence community can not afford to rely on a single partnership. Instead, it should diversify its foreign partnerships while distinguishing between strategic and non-strategic partners. The United States and the other Five Eye countries are examples of strategic partners.</p>
<p>The Afghan intelligence services should structure its foreign partnerships in three tiers. The first tier would be Afghanistan&#8217;s principal partners, such as the U.S. and the Five Eyes countries. The second tier should be comprised of the intelligence services of India, Russia, China, and neighboring countries. The third tier would include the rest of the world.</p>
<h3>Paramilitary Forces</h3>
<p>Like all intelligence agencies, Afghanistan retains a paramilitary force that is tasked with carrying out quick and effective counter-terrorism operations. These forces have been essential for actions taken against the Taliban, foreign terrorists, and Daesh (Islamic State, ISIS, ISIL). In the event of a reorganization or restructuring of the Afghan intelligence community, these forces and their operational capabilities should be maintained due to their critical role in counter-terrorism.</p>
<p>There is a critical need to improve inter-agency coordination when it comes to operational targeting, planning, and execution with other branches of Afghanistan&#8217;s security services. Due to the sensitive nature of operations carried out by paramilitary forces, there are often duplicate or overlapping operations. However, structures such as the Joint Services Operations Command (JSOC) can play an essential role in avoiding redundancies regarding efforts and resources.</p>
<h3>SIGINT vs. HUMINT in Hybrid Warfare</h3>
<p>The Afghan conflict has changed from insurgenct-proxy warfare to a hybrid war much like the ongoing conflict in the Donetsk and Donbass regions of Ukraine. Alongside covert involvement by Russia and Iran, Pakistan has employed a combination of proxy groups, psychological warfare operations (PsyOps), and economic blockades against Afghan forces, while simultaneously discrediting U.S. and NATO operations in the country. Much of the SIGINT Afghanistan has access to is provided by the U.S.-led coalition forces.</p>
<p>Afghanistan&#8217;s intelligence services primarily focus on developing intelligence products utilizing HUMINT capabilities and assets, albeit without much success given the significant number of attacks in major cities and military installations. A robust overhaul is needed to reform and develop full-spectrum capabilities that will enable Afghan government forces to counter hybrid warfare tactics employed by the Taliban and their foreign backers. Integrating HUMINT and SIGINT is a critical step that will improve the efficacy of intelligence products on the battlefield. The Afghan war won&#8217;t be won by drones, PC-12s, and other aerial capabilities alone; ground-based networks and sources can have a significant impact when coupled with the proper capabilities and resources.</p>
<h3>Oversight and Control</h3>
<p>During the eighties and nineties, the Afghan intelligence services—KAM, AGSA, and KHAD—were notorious for atrocities such as arbitrary arrests, mass executions, and forced disappearances. The predecessor of these agencies, <i>Edara e Zabt Ahwaalaat Sedarat</i>, was a tool used for domestic surveillance of political opponents and dissidents of Afghanistan&#8217;s kings. Accordingly, intelligence and spycraft are looked at with suspicion by the Afghan people, as it brings back memories of KAM, AGSA, and KHAAD. Thus far, the NDS has been successful, to an extent, in its efforts to improve its reputation, but much more needs to be done.</p>
<p>The Afghan intelligence community&#8217;s budget is in need of a robust legal and policy framework to ensure accountability, both operationally and fiscally. In a democratic state, intelligence agencies are required to operate within the rule of law and uphold values like human rights. To their credit, the National Directorate of Security and its sister agencies have done much in this area, but more is required to improve their reputational standing. Measures such as quarterly reports to the parliamentary intelligence committee, ensuring access to detainees by domestic and international human rights organizations, and robust oversight by and reporting to the presidency and the National Security Council are all measures that would contribute to an increase in public and international confidence in Afghanistan&#8217;s intelligence apparatus.</p>
<h3>Information Trade and Budget Controls</h3>
<p>Information is an asset, and if corroborated and verifiable, can be a game changer for Afghanistan. However, there is much more disinformation and rumors than solid, actionable intelligence. Raw data that is not put through a proper intelligence cycle before being included in a final intelligence product is virtually useless. In the intelligence tradecraft, most of the raw information turns out to be rumors and uncorroborated hearsay.</p>
<p>Meanwhile, large sums of money are spent to develop sources and produce intelligence products with little parliamentary or presidential oversight. The operational budgets of all three existing services under parliamentary and presidential oversight need to be assessed using a cost-benefit analysis that weighs the value of final intelligence products against the costs required to develop those products. While a degree of secrecy surrounding the budgets of intelligence services is warranted, there must be proper oversight to provide a check-and-balance mechanism to monitor corruption, inefficiency, and ensure a positive return on investment.</p>
<p><a href="https://globalsecurityreview.com/fixing-fitting-intelligence-afghanistan-war/">Intelligence in War: Fixing and Fitting Intelligence in the Afghan War</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Political Uncertainty Will Plague Europe Throughout 2019</title>
		<link>https://globalsecurityreview.com/political-uncertainty-plague-europe-2019/</link>
		
		<dc:creator><![CDATA[Vincent Lofaso]]></dc:creator>
		<pubDate>Mon, 14 Jan 2019 20:53:26 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Belarus]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Italy]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Portugal]]></category>
		<category><![CDATA[Romania]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Spain]]></category>
		<category><![CDATA[The Netherlands]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=9782</guid>

					<description><![CDATA[<p>As the world becomes increasingly interconnected by land, air, sea, and cyberspace, tensions and uncertainty are growing. These trends are particularly evident in Europe, where elections, treaties, and other events will reshape the continent. Before the end of 2018, the Italian government and the European Union were locked in a dispute over Italy&#8217;s budgetary plans. [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/political-uncertainty-plague-europe-2019/">Political Uncertainty Will Plague Europe Throughout 2019</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>As the world becomes increasingly interconnected by land, air, sea, and cyberspace, tensions and uncertainty are growing.</h2>
<p>These trends are particularly evident in Europe, where elections, treaties, and other events will reshape the continent. Before the end of 2018, the Italian government and the European Union were locked in a dispute over Italy&#8217;s budgetary plans. The European Commission sharply criticized the spending plans due to concerns that Italy&#8217;s approximately $3 trillion in debt combined with higher public spending could lead to a banking crisis that could spread to other countries in the Eurozone. While Rome did pass a revised budget to appease E.U. officials in Brussels, the ordeal has sewed divisions within Italy&#8217;s populist coalition government which are likely to persist throughout 2019. Tensions between Rome and Brussels will also continue, and possibly escalate.</p>
<p>The United Kingdom is scheduled to formally withdraw from the European Union on March 29, 2019. However, no agreement has been approved by the U.K. parliament that would avert a potentially catastrophic &#8220;no-deal&#8221; or &#8220;hard&#8221; Brexit. British Prime Minister Theresa May has come under considerable criticism from within her party over the tentative agreement her government negotiated with the E.U., but no alternative plans have been put forth. Regardless of the outcome, the U.K. will continue to strengthen bilateral relations with E.U. member states such as France, Germany, the Netherlands, and Poland.</p>
<p>In May, European Parliamentary elections will take place, while E.U. member states will appoint a new President of the European Commission in October. Despite a rise in nationalist and euro-skeptic parties, pro-European factions are expected to maintain overall control. A divided political landscape will make it difficult for the E.U. to implement any significant reforms. Furthermore, E.U. member states are divided when it comes to fiscal policy. Southern states like Italy, Portugal, and Spain are pushing for higher spending and greater risk-sharing, whereas northern states led by Germany are calling for greater fiscal responsibility in Frankfurt.</p>
<h3>Ongoing Political Divisions in the E.U. and its Member States</h3>
<p>E.U. member states after the U.K. withdrawal) to focus inwards. German Chancellor Angela Merkel has announced that her current term will be her last and resigned as leader of her Christian Democratic Union (CDU) Party. The CDU elected Annegret Kramp-Karrenbaur as party leader in the latter part of 2018. However, the party is divided over a range of policy positions. Furthermore, the CDU&#8217;s coalition partner is facing an identity crisis of its own, which has already weakened the coalition government. Further disagreements and intra-coalition infighting could lead to early elections in Germany.</p>
<p>In France, President Emmanuel Macron’s institutional and economic reforms have fueled substantial, and in some cases, violent opposition. Large-scale protests have erupted throughout France. 2019 will see continued opposition to Macron&#8217;s reforms, opposition stoked by groups on both the far-right and the far-left ends of the political spectrum. Some of Macron&#8217;s economic reforms will succeed, but French citizens will be increasingly vocal in their rejection of his attempts to revitalize the French economy.</p>
<p>Domestic political concerns will require greater attention from both Paris and Berlin, decreasing both powers from critical external affairs. Political divisions will hamper initiatives to achieve greater strategic autonomy through the implementation of increased European military integration and the promotion of the Euro over the U.S. Dollar as the global reserve currency. Therefore, it is unlikely these major initiatives will see substantial progress in 2019.</p>
<h3>Trade and China</h3>
<p>Trade will be a significant area of focus. If the U.S. imposes higher tariffs on European-manufactured vehicles, for instance, approximately 10% of total U.S.-E.U. trade will be affected. In such a scenario, the E.U. would be forced to respond in kind, leading to a greater rift in transatlantic relations. Automobile tariffs would disproportionately affect the German auto industry, which manufactures one in every three cars produced in Europe. However, trade disputes will not lead to the collapse of the transatlantic alliance, as both the U.S. and E.U. have concerns over unfair Chinese trade practices.</p>
<p>Aside from trade, Europe has other concerns with China. Led by the governments in Berlin and Paris, policymakers across Europe are increasingly wary over Beijing&#8217;s economic activity on the continent. As a result, Europe has begun to exclude China from investing in critical infrastructures such as ports and telecommunications networks. China filed suit against the E.U. in the WTO, arguing that Beijing should be treated as a market economy. The case will come to a resolution in 2019, and the outcome will have a significant impact on the ongoing trade dispute between the U.S., the E.U., and China.</p>
<p>The complicated bureaucratic system of rules and regulations, however, put poorer or smaller member states at an economic disadvantage. As such, these states are more welcoming to Chinese investment and lending. Those states that are receptive to Chinese economic activity in Europe will likely continue to lobby against Berlin And Paris. The European bloc&#8217;s position towards China will be ambiguous, leading to more vocal action by those states that are concerned about China&#8217;s economic activities.</p>
<h3>Escalating Tensions Between Russia and the U.S.</h3>
<p>The relationship between Russia and the United States will continue to deteriorate. The U.S. is set to formally withdraw from the Intermediate-Range Nuclear Forces (INF) Treaty, which bans intermediate-range missiles. Washington has cited Moscow&#8217;s noncompliance with the treaty as the justification for its withdrawal. The collapse of the INF treaty will heighten tensions in Eastern Europe, leading to a military buildup. This will be particularly visible in Poland and Romania, both of which will continue to lobby the U.S. for increased military commitments. Moscow will continue to build up its military forces in Kaliningrad, and the Crimea, both of which will likely play host to Russian intermediate-range missiles should the U.S. decide to deploy its own in Europe.</p>
<p>U.S. discussions with Poland regarding a possible permanent deployment of U.S. troops will continue throughout 2019. The Kremlin, citing what it perceives as &#8220;NATO-encirclement&#8221; will maintain, or even increase its efforts to interfere in the domestic politics of European states through malign activity in cyberspace, possible covert actions, and support for Euro-skeptic and nationalist factions across the E.U. The European parliamentary elections in May will provide Moscow with an opportunity to bolster the ranks of nationalist and Euro-skeptic groups, further sewing divisions within the E.U.</p>
<p>It is also possible that Moscow will open a military base in Belarus, as had previously been hinted by Belarusian President Alexander Lukashenko. However, Lukashenko has made increasing overtures to the E.U. and the U.S., which could lead to increased hostility from Moscow. Russia&#8217;s efforts to undermine the integrity of NATO and the E.U. will be particularly visible in the Balkan states of Serbia, Bosnia and Herzegovina, Montenegro, and Macedonia.</p>
<h3>High Stakes for Ukraine as the Kremlin Deals With Domestic Challenges of its Own</h3>
<p>Ukraine will face considerable challenges throughout 2019. Both the TurkStream and NordStream 2 natural gas pipelines are set to become active. The pipelines will circumvent Ukraine, providing Moscow with enormous economic leverage over Kiev. Ukraine will be deprived of substantial transit fees that it will now lose as the two pipelines exclude Ukraine from Russia&#8217;s natural gas supply lines.</p>
<p>Tensions between Russia and Ukraine have deteriorated in the aftermath of Russia&#8217;s seizure of three Ukrainian Navy vessels in the Sea of Azov, and tensions are expected to continue throughout 2019. The conflict in Eastern Ukraine will continue, and Ukraine is set to hold presidential elections in March. Depending on the outcome, negotiations could reopen between Moscow and Kiev, however, it is unlikely the two parties will come to a resolution. It is in Russia&#8217;s interest to maintain a state of low-grade or frozen conflict in Eastern Ukraine, which effectively prevents the former Soviet republic from joining NATO.</p>
<p>Russia, however, will face its own domestic challenges in 2019. The Kremlin has announced controversial economic reforms, including increasing the retirement age, raising the value-added tax (VAT), and imposing new taxes on certain consumer products and the tourism sector. The reforms are designed to bolster the government&#8217;s revenue but have generated considerable backlash from Russians across the country. It is the working class that will be hardest hit by the measures, which are due to come into effect this month. As such, there is likely to be a degree of social unrest. Meaningful changes are unlikely, however, as there is presently no viable opposition party capable of threatening Russian President Vladimir Putin&#8217;s hold on power.</p>
<p>Overall, 2019 will be a year of volatility in Europe. Diplomatic, trade, and economic disagreements will persist between Europe and the United States, and within Europe itself. Tensions between Russia and NATO heighten anxiety for Eastern European states, which will lead to a buildup of military capabilities on both sides.</p>
<p><a href="https://globalsecurityreview.com/political-uncertainty-plague-europe-2019/">Political Uncertainty Will Plague Europe Throughout 2019</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>U.K. and Japan Heighten Defense Cooperation Ahead of Brexit</title>
		<link>https://globalsecurityreview.com/uk-japan-heighten-defense-cooperation-ahead-brexit/</link>
		
		<dc:creator><![CDATA[Robert Clark]]></dc:creator>
		<pubDate>Fri, 11 Jan 2019 20:16:06 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=9729</guid>

					<description><![CDATA[<p>Japanese Prime Minister Shinzo Abe’s January 2019 visit to the United Kingdom highlights the close partnership that exists between the two great powers. As the U.K. attempts to redefine its role on the international stage once it withdraws from the European Union, London will move to embrace old allies and new partners in an attempt [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/uk-japan-heighten-defense-cooperation-ahead-brexit/">U.K. and Japan Heighten Defense Cooperation Ahead of Brexit</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Japanese Prime Minister Shinzo Abe’s January 2019 visit to the United Kingdom highlights the close partnership that exists between the two great powers.</h2>
<p>As the U.K. attempts to redefine its role on the international stage once it withdraws from the European Union, London will move to embrace old allies and new partners in an attempt to forge stronger ties to emerging markets in the East.</p>
<p>The relationship between Japan and the United Kingdom has the potential to be of enormous mutual benefit to both parties. The two are both fiercely proud island nations with considerable geopolitical clout.&nbsp; In a recently published <u><a href="https://henryjacksonsociety.org/wp-content/uploads/2019/01/HJS-2019-Audit-of-Geopolitical-Capability-Report-web.pdf">audit of global geopolitical capability</a></u> by the Henry Jackson Society, the U.K. was ranked second only to the United States, with Japan being ranked sixth. The study defined the U.K. as a global power, and Japan, despite being the third-largest economy worldwide, is described as a “hemispheric power,” meaning that it has the geopolitical capability to wield influence within the northern hemisphere.</p>
<h3>The U.K.-Japan Relationship is Built on Security and Trade</h3>
<p>Relations between the Japanese and British began over 400 years ago. The Anglo-Japanese partnership was solidified in 1854 with the signing of the Treaty of Friendship and Trade. The treaty defined the relationship between the two countries as one centered around mutually beneficial commerce and security. After relations improved following the end of World War II, trade and security once again became the foundation blocks upon which the Anglo-Japanese relationship was built.</p>
<p>Abe’s visit was, by no means, coincidental in timing. Abe intended to provide reassurances to both British businesses and undecided politicians over British Prime Minister Theresa May’s Brexit deal. Specifically, Abe made the case that May’s deal is the best option for Japanese businesses who rely on the United Kingdom’s access to the European single market. Japanese investment in the U.K. reached <u><a href="https://www.bbc.co.uk/news/business-42994603">£46.5 billion</a></u> in 2016, with over 1,000 Japanese businesses employing over <u><a href="https://www.expressandstar.com/news/uk-news/2019/01/10/visiting-japanese-pm-backs-theresa-mays-brexit-plan/">150,000 people</a></u>.</p>
<p>The Japanese automobile manufacturers Nissan, Honda, and Toyota&nbsp;produce nearly half of the 1.67 million cars assembled every year in the U.K., of which the vast majority are exported. As the British auto industry employs just-in-time manufacturing processes, any future E.U. tariffs and border delays will have a negative impact on the industry.</p>
<p>Japan has long-relied on the U.K. as its gateway to Europe. While access to the single market may be reduced once Britain leaves the Union, there are still advantages for businesses operating in the U.K. A growing labor market and a highly skilled manufacturing base, technological prowess in research and development (ranked <u><a href="https://henryjacksonsociety.org/wp-content/uploads/2019/01/HJS-2019-Audit-of-Geopolitical-Capability-Report-web.pdf">second in the world</a></u> after the U.S.), stable trade relations, and the status of the English language as a <em>lingua franca </em>for international business and diplomacy are all significant factors in attracting and maintaining Japanese interest and investment.</p>
<p>Prime Minister Abe’s other key message for the U.K. is one intended to convey Japan’s desire for increased defense and security cooperation. Abe <u><a href="https://www.expressandstar.com/news/uk-news/2019/01/10/visiting-japanese-pm-backs-theresa-mays-brexit-plan/">stated that</a></u> the two nations are “partners as we strive to uphold rules-based international order and to promote global and regional security.” Abe’s statement follows significant developments in bilateral defense cooperation over the past 18 months.</p>
<p>British Prime Minister Theresa May sought to expand defense cooperation on her <u><a href="https://www.gov.uk/government/speeches/prime-ministers-press-statement-in-tokyo">visit to Japan</a></u> in August 2017. May highlighted that the two nations common global interests are underpinned by a strong defense relationship centered on a commitment to the “rules-based international system, free and open international trade and the fundamental values of freedom, democracy, human rights, and the rule of law.”</p>
<p>This meeting between the two heads of government resulted in the <u><a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/641155/Japan-UK_Joint_Declaration_on_Security_Cooperation.pdf">Japan-U.K. Joint Declaration on Security Cooperation</a></u>, an agreement which seeks to further bilateral engagement on security issues including counter-terrorism, counter-piracy, and cybersecurity. Securing international sea lanes throughout the Indo-Pacific region from foreign aggression is another key objective, as is increasing participation in international peacekeeping operations. The declaration established the conditions for Japan, which has been reluctant to develop offensive military capabilities after the Second World War, to increase its regional military engagement.</p>
<h3>A &#8220;Global Britain&#8221; Approach to Foreign Policy</h3>
<p>Furthermore, the agreement set the stage for unprecedented levels of Anglo-Japanese defense cooperation throughout 2018. In a demonstration of a “Global Britain” approach to foreign policy, the <u><a href="https://www.telegraph.co.uk/news/2018/04/12/hms-sutherland-arrives-japan-effort-curb-north-koreas-evasion/">Royal Navy</a></u> deployed three ships to Japan: the HMS Albion, Sutherland, and Argyll.</p>
<p>The deployed ships supported a variety of missions, including enforcing United Nations sanctions against North Korea, conducting freedom of navigation operations (FONOPS), and participating in joint exercises with the Japanese Maritime Self-Defense Force. The deployment significantly improved interoperability between the Royal Navy and the U.K.’s closest ally in Asia. Additionally, British Army personnel from the Honorable Artillery Company participated in exercises on Japanese soil alongside their Japanese counterparts for the first time,&nbsp;the only foreign military forces to do so alongside the U.S.</p>
<p>At a strategic level, these actions demonstrated the U.K.’s commitment to regional stability, international law, and the United Nations Law of the Sea; crucial components to the maintenance of a rules-based global system and essential to countering Chinese subversion and expansion across the region. Growing bilateral defense cooperation between the U.K. and Japan demonstrates that the relationship is more than one based solely on national interests, instead, it is one of a higher strategic significance.</p>
<p>As the U.K. prepares to leave the European Union, it is evident that trade is foremost amongst Japanese concerns. Considering the level of Japanese investment into British industry over the last forty years, this is understandable. However, once the U.K. has formally left the Union, engagement with allies like Japan should be the highest priority.</p>
<p>A Global Britain approach to foreign policy seeks to maximize the United Kingdom’s geopolitical capabilities as a global power. To do this, the U.K. must be seen as upholding the core values and standards of the rules-based global order. The U.K. can sustain its geopolitical capabilities while strengthening British influence around the world by reinforcing strategic partnerships with powerful allies like Japan while seeking out new opportunities for cooperation and engagement. Failure to do so would be detrimental to both British economic interests and overall global security.</p>
<p><a href="https://globalsecurityreview.com/uk-japan-heighten-defense-cooperation-ahead-brexit/">U.K. and Japan Heighten Defense Cooperation Ahead of Brexit</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Iran&#8217;s Interests in Afghanistan: Water, Black Market Currency, &#038; Extremism</title>
		<link>https://globalsecurityreview.com/iranian-interests-afghanistan-black-market-currency-water-extremism/</link>
		
		<dc:creator><![CDATA[Ejaz Ahmad Malikzada]]></dc:creator>
		<pubDate>Mon, 07 Jan 2019 02:20:29 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[United Arab Emirates]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=9621</guid>

					<description><![CDATA[<p>Iranian Deputy Foreign Minister Abbas Araghchi recently visited Kabul to discuss recent efforts towards peace in Afghanistan.  Though the Afghan Ministry of Foreign Affairs hasn’t provided any details of the meeting, the visit is indicative of an Iranian effort to maintain relations with the Afghan government as the government negotiates with the Taliban. Furthermore, the [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/iranian-interests-afghanistan-black-market-currency-water-extremism/">Iran&#8217;s Interests in Afghanistan: Water, Black Market Currency, &#038; Extremism</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Iranian Deputy Foreign Minister Abbas Araghchi recently visited Kabul to discuss recent efforts towards peace in Afghanistan.<span class="Apple-converted-space"> </span></h2>
<p>Though the Afghan Ministry of Foreign Affairs hasn’t provided any details of the meeting, the visit is indicative of an Iranian effort to maintain relations with the Afghan government as the government negotiates with the Taliban. Furthermore, the secretary of the Iranian Supreme National Security Council, Ali Shamkhani, has confirmed that Tehran and the Taliban were previously engaged in direct talks. On December 31, the Iranian government confirmed that a Taliban delegation had visited Iran for another round of negotiations.</p>
<p>Tehran is not only hedging by maintaining a dialogue with the radical extremist group; it’s assuming the role of a disruptor in the peace process to ensure its interests are secured in the ongoing negotiations between the United States and a select group of regional stakeholders. While the U.S. includes Pakistan, Saudi Arabia, and the United Arab Emirates in its deliberations, it is excluding key stakeholders—Afghanistan, Iran, and India.</p>
<p>The Iranian government justifies its disruptive involvement by citing “legitimate concerns” regarding the rise of militant extremist groups in Afghanistan. Tehran previously adopted a similar approach in its engagements with Islamabad, which provides aid and haven to the Taliban. Iran’s willingness to engage with the Taliban is not unprecedented—the relationship dates back to 1994 when the Taliban was under the leadership of Mullah Omar. Relations continued under Omar’s successor, Akhtar Mansoor, who was <a href="https://www.theguardian.com/world/2016/may/23/death-of-mullah-mansoor-highlights-talibans-links-with-iran">killed in May of 2016</a> while returning to Pakistan after visiting Iran. According to his Pakistani passport, Mansoor spent two months in Iran before being targeted by a U.S. drone strike on the highway leading into Pakistan from the country’s Iranian border.<span class="Apple-converted-space"> </span></p>
<p>Tehran does not want to sever ties with the Afghan Government while simultaneously maintaining a relationship with a resurgent Taliban, which is in control of more territory than at any time since 2001. Tehran considers the rise of militant Islamic extremist groups to be a key “legitimate concern,” along with the threat of a Taliban takeover of the Afghan government and the illegal drug trade originating in Afghanistan. Keeping Afghanistan in a perpetual state of instability guarantees the flow of Afghan surface waters to Iran, and ensures a steady stream of black market U.S. dollars into the Iranian economy.</p>
<p>Ensuring the continued flow of surface water from Afghanistan to Iran is a crucial priority for Tehran. The Afghan government recently opened the Salma Dam, which was constructed with financial support from India. Following in dam’s inauguration, Tehran increased support for the Taliban insurgency in provinces of Western Farah and Herat to disrupt any further dam development of dams on the Afghan side of the Afghanistan-Iran border along the Helmand river.</p>
<p>In late 2018, Farah City was overrun by the Taliban—despite public outcry from the local population over Iranian support for the Taliban in Western Farah province, which lies along the Helmand river. A single <a href="https://www.reuters.com/article/us-afghanistan-iran-water/in-parched-afghanistan-drought-sharpens-water-dispute-with-iran-idUSKBN1K702H">water agreement</a> exists between Iran and Afghanistan; a 1973 treaty provides Iran with 820 million cubic meters of water annually. Iran has been hit with regular water shortages, leading Tehran to protest plans to construct dams along the Helmand river intended to increase Afghanistan’s agricultural capacity to approximately $20 billion (U.S.).<span class="m_3517261038058986319apple-converted-space"> </span></p>
<p>Iranian engagement with the Taliban facilitates ongoing instability along the Afghanistan-Iran border, which provides an illegal route for Iran to import U.S. dollars from merchants in the Herat and Farah provinces. As the Iranian currency continues to depreciate against the dollar, Tehran’s interest in sustaining this black market source of hard currency will grow.<span class="Apple-converted-space"> </span></p>
<p>The rise of Salafi extremist groups—facilitated with support from Gulf states—is another phenomenon motivating Iran to engage with the Taliban. Iranian overtures to the Taliban are an effort to ensure militant Islamist ideology imported into Afghanistan does not flow to Iran. Russia exhibited similar concerns when the Kremlin claimed that “Daesh [Islamic State] imported into Afghanistan” had expanded over Northern Faryab and Jawzjan provinces along the Afghan border with Tajikistan, Uzbekistan, and Turkmenistan. Russia reportedly met with Taliban representatives to negotiate a settlement agreement, as well as coordinate efforts to block and topple any Daesh activity in Afghanistan’s Northern provinces.<span class="Apple-converted-space"> </span></p>
<p>Beyond fomenting ongoing insecurity within Afghanistan, Iran’s Revolutionary Guard has been training Afghan refugees as Fatemiyoun mercenaries to fight against Daesh in Syria in support of the Assad regime. Thousands of vulnerable refugees who are devout Shias have joined the Fatemiyoun ranks to change their families’ legal status as refugees in Iran. They had reportedly returned to Afghanistan to counter Salafi extremism activity alongside the Taliban and combat militant Islamist activity in the western region of Afghanistan on behalf of the Revolutionary Guard.</p>
<p>Iran’s cooperation with a hardline Sunni extremist group like the Taliban group to counter threats to its interests in Afghanistan is a dangerous strategy. Going forward, Iran must act strategically; history has proven that engagement with the Taliban along with the selective use of terrorism will not achieve the end-result Tehran is expecting. The Iranian government must respect Afghanistan’s sovereignty, recognize the Afghan state, and develop a bilateral relationship based on culture, trade, and legitimate interests for Tehran within a stable Afghanistan.<span class="Apple-converted-space"> </span></p>
<p>In a stable Afghanistan, a priority for Tehran should be increasing trade between the two countries. Trade between Iran and Afghanistan is valued between two and three <a href="https://financialtribune.com/articles/economy-domestic-economy/93431/irans-trade-with-afghanistan-tops-1-billion">billion dollars</a> annually. Afghanistan is the fourth-largest importer of goods from Iran, which is suffering from crippling U.S. sanctions. Between March and August of 2018, Iran exported over $1.43 billion worth of goods. Iran has a role as a responsible stakeholder in the growth of the Afghan economy. Therefore, the U.S. has <a href="https://www.voanews.com/a/afghans-hail-exemption-of-iran-port-from-us-sanctions-/4648348.html">exempted Afghanistan</a> from Iran sanctions. The strategic Chabahar port is one way of improving Iranian trade ties with Afghanistan. Chabahar port, which provides Afghanistan access to seaborne trade routes, decreasing Afghanistan’s dependency on Pakistan. Moreover, a renewed water agreement could serve the interests both sides in addressing persistent water shortages while increasing Afghan-Iranian agricultural-based trade.</p>
<p>Iran must play the role of a good neighbor to Afghanistan; the latter has never posited a threat to Iranian national security.<span class="Apple-converted-space">  </span>Iranian concern over the activities of Salafi extremist groups in Afghanistan is a legitimate one, however bypassing the Afghan Government in favor of non-state actors will not alleviate this concern, however justified.<span class="Apple-converted-space"> </span></p>
<p>An Afghan Institute for Strategic Studies research finding shows that a majority of the Afghan elite (between 57 and 66.4 percent) has <a href="http://aiss.af/assets/aiss_publication/The_Afghan_elites_perception_toward_the_Islamic_Republic_of_Iran_(English).pdf">expressed satisfaction</a> with Iran’s social, religious, and economic policies. However, the same survey findings show that 55 percent of the Afghan elite have expressed dissatisfaction towards the Islamic Republic of Iran’s political and security policies as they relate to Afghanistan. Iran has a role in the Afghan peace process, but it must act in good faith.<span class="Apple-converted-space"> </span></p>
<p><a href="https://globalsecurityreview.com/iranian-interests-afghanistan-black-market-currency-water-extremism/">Iran&#8217;s Interests in Afghanistan: Water, Black Market Currency, &#038; Extremism</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Peace Process in Afghanistan is a Failure</title>
		<link>https://globalsecurityreview.com/failed-peace-process-afghanistan/</link>
		
		<dc:creator><![CDATA[Omar Sadr]]></dc:creator>
		<pubDate>Fri, 21 Dec 2018 20:05:40 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[Al Qaeda]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Taliban]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=9318</guid>

					<description><![CDATA[<p>Editor&#8217;s note: this assessment is based on a study conducted by the author for the Afghan Institute of Strategic Studies entitled The Fallacy of Peace Processes in Afghanistan: The People’s Perspectives. Afghanistan’s dream for a sustainable peace remains unmet since the country&#8217;s establishment. Amir Habibullah—son of Amir Abdur Rahman, the founder of the modern state of [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/failed-peace-process-afghanistan/">The Peace Process in Afghanistan is a Failure</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: center;"><em>Editor&#8217;s note: this assessment is based on a study conducted by the author for the Afghan Institute of Strategic Studies entitled </em><a href="http://www.aiss.af/assets/aiss_publication/The_Fallacy_of_the_Peace_Process_in_Afghanistan_The_People%E2%80%99s_Perspectives_(English).pdf">The Fallacy of Peace Processes in Afghanistan: The People’s Perspectives</a>.<em><br />
</em></p>
<p>Afghanistan’s dream for a sustainable peace remains unmet since the country&#8217;s establishment. Amir Habibullah—son of Amir Abdur Rahman, the founder of the modern state of Afghanistan—recognized the need for national reform and reconciliation before his assassination nearly a century ago.</p>
<p>Since then, however, Afghanistan has experienced neither sustainable nor long-lasting peace. At present, the Taliban primary challenge to peace and stability in Afghanistan. All efforts at resolving the current conflict through negotiations have ended without success. These initiatives of the past seventeen years include high-level talks with the Taliban, reintegration programs, track-2, and track-1.5 diplomatic interactions, and local peace agreements. However, the fact remains that the policies mentioned above have not been implemented in a unified, continuous, and integrated manner sufficient enough to be called a process. Instead, efforts have been undertaken in isolation from one another.</p>
<p>My recent <a href="http://www.aiss.af/assets/aiss_publication/The_Fallacy_of_the_Peace_Process_in_Afghanistan_The_People’s_Perspectives_(English).pdf">study on the peace process</a> includes a nation-wide survey on the peace process for the first time in Afghanistan and indicates that all prior attempts at a negotiated peace have been failures. One might argue that judging the results of the peace process might be premature at this stage, given how the efforts are still ongoing. However, to diagnose the current status, it is important to understand public sentiment towards past efforts. More than 63.3% of the respondents opined that previous attempts at a peace settlement all failed. In this context, female respondents demonstrated a higher tendency (65.6%) than male respondents (61.6%).</p>
<p>Similarly, Uzbeks (73.3%), Tajiks (70.7%), and Hazaras (73.5%) demonstrated a higher tendency to say that peace efforts have failed, when compared to Pashtuns (49.3%). Multivariate analysis also shows that this association was robust and held after controlling for demographic and attitudinal factors. The curve of perception about the failure of the peace process goes up as the level of education increases. Additionally, respondents who said peace is possible were less likely (61.5%) to assess the peace process as a failure, compared to those who said peace is impossible (75.0%).</p>
<p>Similarly, the historical cases of peace agreements in Pakistan involving the Taliban&#8217;s sister organization, Tehrik-e Taliban Pakistan (TTP), indicates that peace agreements with TTP are failed. The negotiations in Pakistan have some characteristics in common with the efforts made in Afghanistan. First, only a few peace agreements with TTP lasted longer than a few months. Second, after every agreement, TTP demanded further concessions. Third, the agreements led to further empowerment of the Pakistani Taliban. Bushra Gohar, a former Pakistani MP, said that Afghanistan must learn lessons from the failed agreements with Pakistani Taliban during the seventh Herat Security Dialogue. Gohar reiterated that these agreements in Pakistan only resulted in furthering the Talibanization (radicalization) of Pakistan.</p>
<p>In Afghanistan, the Taliban has become increasingly aggressive and has been demanding more concessions. Besides the withdrawal of international forces, the end goal of the Taliban is the replacement of the current political system of Afghanistan with a theocratic regime, the Islamic Emirate of Afghanistan. In contrast to the Taliban, the Afghan government and the United States have taken a softer approach, and have given in to many of the Taliban&#8217;s demands. In the aftermath of the U.S.-led invasion of Afghanistan, Taliban leadership sought amnesty for their terrorist activities. However, just a few years later the group demanded that it be recognized as a party to the conflict in Afghanistan as a legitimate actor, similar to how the PLO is regarded by the international community, rather than as a terrorist organization. Presently, the Taliban&#8217;s demands are indicative of the group&#8217;s re-radicalization. If the Taliban&#8217;s demands are agreed to, it will mean the restructuring of the entire Afghan political order that has been painstakingly constructed post-9/11.</p>
<p>On the contrary, the Government of Afghanistan and the U.S. have experienced setbacks regarding their negotiating position. The first setback was the violation of Afghanistan-owned and led peace process. This principle was violated with the initiation of direct talks between the U.S. and the Taliban alongside the last Moscow Format.</p>
<p>The violation of the three conditions for peace talks with the Taliban was the second setback. Before recent direct U.S. overtures to the Taliban, the international community and the Afghan government had three fundamental conditions for peace with the Taliban. The group must end all relations with terrorist groups; Taliban militants must lay down their arms; and the group must accept the constitutional order of Afghanistan, which has been the basis of political developments over the last several years.</p>
<p>While President Ashraf Ghani made an unconditional peace offer to the Taliban, the proposal highlighted four points: (a) Ensuring rights and duties of all citizens, particularly those of women, based on the constitution; (b) Accepting Afghanistan’s constitution, including its own provisions for amendments; (c) Ensuring activities of the civil services and the security and defense forces based on the law and; (d) Dismantling any armed group which is linked with foreign terrorist networks and transnational criminal organizations. However, it is unclear whether the points discussed above are preconditions or end conditions for the peace talks.</p>
<p>The current talks between the Taliban and the United States were initiated under circumstances where the Taliban has not accepted the legitimacy of the Afghan constitution. Furthermore, the group has failed to denounced terrorism. Similarly, the Government of Afghanistan has announced a 12-member negotiating team and a High Advisory Board for Peace. Both of these bodies substantially lack representation from civil society, women, youth, and academia. Unfortunately, the current scenario will not lead to sustainable peace.</p>
<p><a href="https://globalsecurityreview.com/failed-peace-process-afghanistan/">The Peace Process in Afghanistan is a Failure</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Pakistan&#8217;s Inter-Services Intelligence Contributes to Regional Instability</title>
		<link>https://globalsecurityreview.com/pakistans-intelligence-agency-destabilize-region/</link>
		
		<dc:creator><![CDATA[Alexandra Gilliard]]></dc:creator>
		<pubDate>Tue, 18 Dec 2018 16:41:34 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Pakistan]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/pakistans-intelligence-agency-destabilize-region/</guid>

					<description><![CDATA[<p>On December 7th in the Kishtwar district of the Indian state of Jammu and Kashmir, police arrested an individual suspected to be working as an agent for Pakistan&#8217;s Inter-Services Intelligence (ISI). He was charged with intending to carry out a terror attack on behalf of a Pakistan-based terrorist organization, Harkat-ul-Mujahideen. The accused, Sehran Sheikh, is alleged [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/pakistans-intelligence-agency-destabilize-region/">Pakistan&#8217;s Inter-Services Intelligence Contributes to Regional Instability</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>On December 7th in the Kishtwar district of the Indian state of Jammu and Kashmir, police arrested an individual suspected to be working as an agent for Pakistan&#8217;s Inter-Services Intelligence (ISI). He was charged with <a href="https://www.tribuneindia.com/news/jammu-kashmir/isi-agent-held-in-kishtwar/694981.html">intending to carry out a terror attack</a> on behalf of a Pakistan-based terrorist organization, Harkat-ul-Mujahideen. The accused, Sehran Sheikh, is alleged to have collected information and video of police and armed forces in Jammu and Kashmir. Once in possession of this information, Sheikh transferred it using a mobile phone to Pakistani phone numbers. Though the situation remains judicially unresolved, this event yet again brings to light the murky relationship between Pakistan&#8217;s ISI and terrorist organizations in the region.</p>
<p>The ISI Directorate in Pakistan has enjoyed unparalleled power since its creation in 1948. As the ISI Director-General is selected by the Military Branch, the agency has remained steeped in army and military affairs for seventy years. From its outset, the ISI has backed terrorist organizations that provide strategic depth within India and greater influence in Afghanistan.</p>
<p>These efforts are designed to promote Pakistan&#8217;s regional hegemony—all while wreaking havoc on the national security interests of both India and Afghanistan. ISI support and aid for several terrorist organizations, including the Afghan Taliban and the Haqqani network, have resulted in international condemnation of the <a href="http://www.ohchr.org/EN/HRBodies/SP/Pages/CommunicationsreportsSP.aspx">ISI’s failures</a> to prevent “systematic and persistent human rights violations,” albeit with little effect.</p>
<h3>The ISI Regularly Fails to Implement Counter-Terrorism Policy</h3>
<p>Within Pakistan, terrorist attacks have declined in recent years following legislation and ISI counter-terrorism policies enacted between 2013 and 2016. However, the ISI’s continued covert support for extremists has fostered a growing radical community and new splinter groups that have spread throughout the region.</p>
<p>After former President Musharraf’s pledge to join the War on Terror, the ISI vacillated between continued sponsorship of extremist groups in support of its interests and cracking down on radical anti-ISI groups within Pakistan. Ultimately, due to inconsistencies in its counter-terrorism campaign, Pakistan&#8217;s intelligence agency was quietly listed as a terrorist organization in U.S. military documents, instructing that ISI officers be <a href="http://www.theguardian.com/world/2011/apr/25/guantanamo-files-isi-inter-services-intelligence">treated the same as terrorists</a>.</p>
<p>The ISI is plagued by a persistent hesitancy to destroy terrorist groups, instead hoping to nurture them and use them in the future against Pakistan&#8217;s regional rival, India. According to Pakistan&#8217;s police officials, ISI officers <a href="https://www.foreignaffairs.com/articles/pakistan/2016-03-30/life-and-death-lahore">regularly halt investigations</a> involving terrorist groups they support, further perpetuating violent extremism so long as it serves to enhance Pakistan&#8217;s regional influence.</p>
<h3>What This Means for Pakistan, India, and Afghanistan</h3>
<p>Why does Pakistan, through the ISI, support terrorist groups? Following the partition of British India and the creation of Pakistan in 1947, Pakistan&#8217;s leaders became almost fanatical about one thing: the idea that India sought to destroy the Pakistani state. While this claim has been repeatedly disputed by India and has overall been assessed as unfounded, Pakistan and its ISI have worked to limit India&#8217;s regional influence as much as possible.</p>
<p>Often, this has come in the form of support for anti-India terrorist groups—even at the expense of Pakistan&#8217;s security and internal radicalization. These terrorist groups have been released to carry out attacks in both India and Jammu and Kashmir while providing protections to the <a href="https://www.brookings.edu/blog/order-from-chaos/2018/01/05/why-pakistan-supports-terrorist-groups-and-why-the-us-finds-it-so-hard-to-induce-change/" rel="noopener">Haqqani network and the Afghan Taliban</a> in Afghanistan—using the state as a proxy in its perceived conflict with India.</p>
<p>In Afghanistan, Pakistan&#8217;s primary goal is to prevent India from gaining ground and obtaining too much influence. As the Taliban vies for more control, the ISI has provided it with military aid to ensure Afghanistan remains in a state of perpetual instability. Should the Taliban gain power, Pakistan will have bought itself a staunch ally in the region, with the potential to form a strategic partnership against India. Should the Taliban fail to gain power, Pakistan will have done its best to destabilize the country and prevent a potential strong governmental alliance with India. Pakistan is effectively hedging its bets on radical groups to foment insecurity within Afghanistan, as a more stable neighbor that decides to align itself with India is perceived as a threat to Pakistan&#8217;s national security, at least from the Pakistani perspective.</p>
<p>On December 11, 2018, in a surprising turn of events, Pakistan&#8217;s Foreign Minister, Shah Mehmood Qureshi, acknowledged that the establishment of an Afghan peace is a &#8220;<a href="https://economictimes.indiatimes.com/news/defence/indias-role-crucial-for-afghan-peace-process-pakistan/articleshow/67041628.cms" rel="noopener">shared responsibility</a>&#8221; of Pakistan and its neighbors. A &#8220;solution through dialogue&#8221; would be a step in the right direction for the region, despite the ISI&#8217;s recent subversive actions in Jammu and Kashmir. Currently, the words of Pakistan&#8217;s intelligence agency and senior government officials seem contradictory. While the state allegedly seeks peace in the region, the ISI remains committed to subversive activities that will foment ongoing regional insecurity.</p>
<h3>The Future of Pakistan&#8217;s Inter-Services Intelligence Agency</h3>
<p>If the attempts at an Afghan peace and a combined effort towards normalization in relations between India and Pakistan are to be successful, the ISI and the Pakistani state must renounce support for the Taliban, the Haqqani Network, and other militant groups to be taken seriously. Such a declaration must occur before terrorism, and interstate conflicts further destabilize the region. According to the <a href="https://www.crisisgroup.org/asia/south-asia/pakistan/revisiting-counter-terrorism-strategies-pakistan-opportunities-and-pitfalls" rel="noopener">International Crisis Group</a>, counter-terrorism in the region will be ineffective as long as the ISI continues to make distinctions between “good” and “bad” terrorist groups.</p>
<p>With is decades-long support for terrorist organizations targeting India, it will be difficult for the agency to break from this pattern any time soon. Instead, it will be up to the state to align its intelligence agency with the government&#8217;s regional goals. Without the ISI’s confrontation of <a href="http://foreignpolicy.com/2016/04/06/squandered-progress-in-pakistan/">extremist ideologies</a> and a reassessment of its alliances, radicalization will continue to threaten regional security and inflame its perceived conflict with India. Until the “threat of India” has been recognized as a falsehood, it&#8217;s likely that the ISI will continue to build a haven for extremism.</p>
<p><script>        if(window.strchfSettings === undefined) window.strchfSettings = {};    window.strchfSettings.stats = {url: "https://global-security-review.storychief.io/pakistans-intelligence-agency-destabilize-region?id=1288390537&type=2",title: "Can Pakistan&#039;s Intelligence Agency Destabilize the Region?",id: "67a59392-0711-40d2-8ebe-f4788e7ac4fa"};            (function(d, s, id) {      var js, sjs = d.getElementsByTagName(s)[0];      if (d.getElementById(id)) {window.strchf.update(); return;}      js = d.createElement(s); js.id = id;      js.src = "https://d37oebn0w9ir6a.cloudfront.net/scripts/v0/strchf.js";      js.async = true;      sjs.parentNode.insertBefore(js, sjs);    }(document, 'script', 'storychief-jssdk'))    </script></p>
<p><a href="https://globalsecurityreview.com/pakistans-intelligence-agency-destabilize-region/">Pakistan&#8217;s Inter-Services Intelligence Contributes to Regional Instability</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Fiscally Unsustainable Path of the Afghan Military and Security Services</title>
		<link>https://globalsecurityreview.com/fiscally-unsustainable-afghanistan-military-security-services/</link>
		
		<dc:creator><![CDATA[Tamim Asey]]></dc:creator>
		<pubDate>Mon, 17 Dec 2018 17:00:53 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=9225</guid>

					<description><![CDATA[<p>The average annual cost of an Afghan soldier—including the cost of arms, ammunition, uniform, and wages—is estimated to be around $4000 (USD). This amount increases depending on the nature of deployments, casualties, and other factors. The cadre of Afghan officers—which numbers in the thousands—carries an even higher cost. The Afghan National Security Forces (ANSF) require [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/fiscally-unsustainable-afghanistan-military-security-services/">The Fiscally Unsustainable Path of the Afghan Military and Security Services</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The average annual cost of an Afghan soldier—including the cost of arms, ammunition, uniform, and wages—is estimated to be around $4000 (USD). This amount increases depending on the nature of deployments, casualties, and other factors. The cadre of Afghan officers—which numbers in the thousands—carries an even higher cost. The Afghan National Security Forces (ANSF) require $4.5 billion annually—an amount fully funded by NATO member states per the Chicago Conference commitments.</p>
<p>Afghanistan itself contributes a negligible amount to its national security and defense budget. Many are questioning the affordability and sustainability of maintaining an extensive national security apparatus, given Afghanistan’s slow economic development and substantial levels of poverty. Furthermore, the country lacks an indigenous defense industry. The most basic of the military’s needs, from boots to ammunition, must be imported from abroad—often at a high cost.</p>
<p>Afghanistan currently has a military, an intelligence service, and a police force that it can ill-afford—especially when coupled with militia forces recently created by the government. NATO commanders and Afghan military leaders are looking into possibly downsizing the ANSF beyond 2021. Furthermore, the Afghan National Budget is obliged under the terms of the Chicago conference to contribute $500 million in ANSF funding, but is under tremendous domestic constraints: a shortfall of domestic revenue, declining foreign aid, capital flight, growing insecurity, and persistent corruption. Due to these constraints, the Afghan government has called on the international community to supplement its commitments.</p>
<p>According to NATO, the Afghan National Security Forces, which includes the army, air force, and national police force numbers approximately 345,000-strong. This figure can be expected to increase or decrease depending on the threat level and state of security in the country. Depending on the threat level within Afghanistan, this number can be expected to increase and this number is expected either to decline or increase depending on the security and threat level in the country.</p>
<p>Overseeing the sustainability and funding of the national security apparatus is primarily the job of the Afghan Treasury. However, the government is struggling to fund its non-military budget, even when defense expenditures aren’t taken into account. Within the ANSF, there are substantial challenges in the areas of budgeting, financial management, procurement, logistics, and expenditure arrangements.</p>
<p>Most of the financial management and procurement for Afghanistan’s national security apparatus is carried out through the Combined Security Transition Command for Afghanistan, also known as the CSTC-A. The Afghan military and police forces have a long way to go to overcome these challenges. To do so, there must be effective budget and financial management systems in place, overseen by properly-trained specialists.</p>
<p>In his memoirs, a former Soviet army general wrote that Afghans were tough warriors, but terrible military planners and strategists, The general was in Afghanistan providing assistance to the Soviet-aligned Afghan National Army in combatting the Mujaheddin. According to the general, Soviet military advisors found themselves repeatedly reminding Afghan military officers of specific battle tactics and strategies. As a result, Soviet forces found themselves having to take administrative affairs into their own hands. Illiteracy, a lack of intrinsic motivation, a culture of nepotism and corruption that centered around family and tribal relations has been the primary impediment to the formation of an effective Afghan national security apparatus.</p>
<p>Now, more than ever, Afghanistan is in dire need of of a politically impartial and highly trained corps of officers who are able to fill the shoes of U.S. military leaders in the country and those of other NATO members. Only then will the ANSF be able to take a strategic approach in the effort to deprive the Taliban of influence and drive it from its territories.</p>
<p>From a budgetary perspective, Afghanistan’s national security apparatus must be maintained in a sustainable and financially viable manner. Currently, the Afghan military, police, and security services are entirely unsustainable given the economic and financial constraints of the Afghan government. Based on fiscal and revenue projections, Afghanistan’s economy is years away from being able to meet the funding requirements to maintain its defense and security expenditures at their current levels.</p>
<h3>Afghanistan&#8217;s Budget and National Security Expenditures</h3>
<p>In an interview with the PBS program <em>60 Minutes</em>, the former commander of NATO forces in Afghanistan, U.S. General John F. Campbell (retired), noted that the country will, at some point, have to plan for a future decrease the number of their forces due to budgetary limitations. Such a decision will depend drastically on the political developments, peace process and threat level within the country. All these factors will play an important role in driving the security expenditures of Afghanistan higher or lower than its current levels.</p>
<p>For the Afghan government to be able to cover the cost of the army, air force, police, and intelligence services, the country must economize the national budget and produce a road map based on the budgets and financial requirements of the country&#8217;s national security institutions.</p>
<p>The Afghan government should also concentrate on building domestic industrial capacity to reduce national expenditures. This requires an in-depth analysis, broad-based political support and agreement and finally a commitment from the international community to support this process.</p>
<h3>Financial Management, Procurement, and Logistics</h3>
<p>The Afghan National Security Forces lack a centralized and digitized system for managing budgetary and financial matters, procurement activities, and logistical requirements. This deficiency has contributed to rampant corruption throughout the ANSF.</p>
<p>Afghanistan&#8217;s military and national police have been repeatedly accused of corruption in connection with a range of supplier contracts including contracts for boots and uniforms. Recently, millions of dollars worth of medical equipment and medicines were embezzled from Sardar Mohammad Daud Khan Army Hospital.</p>
<p>One of the key mission objectives of the Resolute Support Mission (RSM) is to assist the Afghan National Security Forces build their financial management, procurement and logistical capabilities, however many challenges remain.</p>
<h3>The Role of Civilian Managers and Leaders in the ANSF</h3>
<p>The ANSF are largely unwelcoming to civilians who undertake key administrative, policy, financial management, and logistical roles within defense and security institutions. In some instances, civilian professionals have been forced out of the ANSF, leaving the military and security forces themselves to manage administrative, policy, and financial affairs. However, they often lack the capacity to effectively manage these key functional areas.</p>
<p>Afghanistan&#8217;s national security institutions require the expertise and resources that, often, only civilians can provide. In the long run, with the establishment of military institutes and colleges, this function might be handed over to military personnel. In the short-term, however, there is a dire need for civilian expertise within the Afghan national security establishment.</p>
<h3>Transparency and Accountability in Security Expenditures</h3>
<p>It goes without saying that every military and security institution is required to ensure information is kept secret, including budgetary statistics. However, Afghanistan as a democracy, and like any other. it has to strike a balance between transparency and national security concerns. Doing so means that the Afghan public must be aware of the amount of money their defense and security agencies are spending. Continuing to keep such information confidential is a return to Soviet practices.</p>
<p>Publicly, little is known about the budgetary and financial management processes of the Afghan National Security Forces today. This is partly due to the fact that many financial resources are coming through the U.S. and NATO military channels, and partly due to the opaque nature of Afghanistan&#8217;s national security institutions.</p>
<p>The institutions of the ANSF are the institutions of a democratic state. As such, their budgets and finances should be publicly available both for scrutiny and support from voters. Only through popular support and public trust will Afghanistan&#8217;s national security institutions succeed in meeting their prime objective of providing security to the Afghan public.</p>
<h3>Afghanistan&#8217;s Forgotten Indigenous Defense Industry</h3>
<p>Afghanistan lacks the industrial capacity required for a domestic arms industry suitable for outfitting an expanding military and and security services. The basic munitions factories that were constructed by the British, the Turks, and the Soviets Kabul were destroyed, looted, or became inoperable during the turbulent period in the early 1990s. The U.S. and NATO have built only a few facilities for the repair and maintenance of Afghan military equipment.</p>
<p>Building a defense and military industry for Afghanistan is key to reducing the expenditures of the ANSF. The development of a domestic arms industry would also reduce Afghanistan&#8217;s dependency on foreign imports for basic equipment and munitions.</p>
<p>Significant financial and technical investment is required to revive arms manufacturing in Afghanistan. However, doing so would be the first key step in economizing the Afghan national security budget.</p>
<h3>A Framework for a Fiscally Sustainable Force</h3>
<p>Currently, the Afghan National Security Forces are financially unsustainable for the Afghan government. In the medium to long-term, the Afghan government will be forced to decrease the size of its military forces and security services unless Afghanistan&#8217;s economy suddenly improves substantially, a scenario which is unlikely.</p>
<p>The Afghan government should focus on a four-pillar framework to develop economically sustainable military and police forces:</p>
<ol>
<li>Develop financial management and logistical capabilities within all Afghan national security institutions through establishing standardized financial management, procurement, and logistical systems with trained personnel.</li>
<li>Re-evaluate the entire security apparatus of the country from a financial and budget sustainability perspective. Based on the findings of this evaluation, the government should take steps to economize the expenditures of the Afghan military and police.</li>
<li>Further political dialogue with Afghanistan&#8217;s neighbors and adversarial armed groups through negotiations and other mechanisms to reduce the current threat level and reduce violence in the country. Doing so will enable a reduction in the size the Afghan military, police, and intelligence services. An over-militarized Afghan state is not beneficial to any of actors within the country.</li>
<li>Launch a comprehensive investment program of investment to develop an indigenous defense industry.</li>
</ol>
<p><a href="https://globalsecurityreview.com/fiscally-unsustainable-afghanistan-military-security-services/">The Fiscally Unsustainable Path of the Afghan Military and Security Services</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cold War? Towards an Era of Adverse U.S.-China Competition</title>
		<link>https://globalsecurityreview.com/cold-war-towards-era-adverse-us-china-competition/</link>
		
		<dc:creator><![CDATA[Foreign Brief]]></dc:creator>
		<pubDate>Wed, 12 Dec 2018 19:39:43 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=9136</guid>

					<description><![CDATA[<p>This article was originally published on November 4, 2018, by Tommy Chai for Foreign Brief. What&#8217;s Happening? The U.S. is engaging in an adverse competition with China that, absent a negotiated understanding, will become increasingly difficult to manage and may spill out of control. Key Insights U.S. perceptions of and approach towards China are turning [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/cold-war-towards-era-adverse-us-china-competition/">Cold War? Towards an Era of Adverse U.S.-China Competition</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: center;"><a href="https://foreignbrief.com/asia-pacific/cold-war-towards-an-era-of-adverse-us-china-competition/"><em>This article was originally published on November 4, 2018, by Tommy Chai for Foreign Brief.</em></a></p>
<h4>What&#8217;s Happening?</h4>
<p>The U.S. is engaging in an adverse competition with China that, absent a negotiated understanding, will become increasingly difficult to manage and may spill out of control.</p>
<h4>Key Insights</h4>
<ul class="bs-shortcode-list list-style-check">
<li>U.S. perceptions of and approach towards China are turning hostile with an ideological undertone that may fuel misperception and miscalculation.</li>
<li><span style="text-transform: initial;">Beijing is not yet ready to confront Washington in the same way that the U.S. is now beginning to view its relationship with China.</span></li>
<li><span style="text-transform: initial;"> A cold war between China and the U.S. today will be far more difficult to manage than the contest between the U.S. and the USSR.</span></li>
</ul>
<h3>A New Normal</h3>
<p>In recent years, several bodies and prominent individuals in Washington have instigated a series of measures that have shifted U.S. perception and strategic posture toward China. They included the release of National Security Strategy (<a href="https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf">NSS</a>) and National Defense Strategy (<a href="https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf">NDS</a>), Secretary of Defense James Mattis’s remarks at the Shangri-La Dialogue, the White House’s <a href="https://www.whitehouse.gov/wp-content/uploads/2018/06/FINAL-China-Technology-Report-6.18.18-PDF.pdf">China technology report</a>, President Donald Trump’s trade war with China, the National Defense Authorisation Act 2019 (<a href="https://www.congress.gov/bill/115th-congress/house-bill/2810/text">NDAA</a>) and most recently Vice President Mike Pence’s speech at the <a href="https://www.hudson.org/events/1610-vice-president-mike-pence-s-remarks-on-the-administration-s-policy-towards-china102018">Hudson Institute</a>.</p>
<p>The aforementioned reports and speeches share an outlook that U.S.-China relations are turning increasingly competitive at a time when Beijing has been accused of committing more and more actions perceived as fundamentally incompatible with Washington’s interests and values. Pence’s speech, in particular, summarised China’s “whole-of-government approach” by pointing out its malign activities.</p>
<p><em>In the U.S.:</em></p>
<ul>
<li>Influence operations</li>
<li><span style="text-transform: initial;">Cyber-operations</span></li>
<li><span style="text-transform: initial;">Technological espionage</span></li>
<li><span style="text-transform: initial;">Intellectual property theft</span></li>
<li><span style="text-transform: initial;">Investment in critical national assets</span></li>
<li><span style="text-transform: initial;">Predatory economics</span></li>
</ul>
<p><em>In the region:</em></p>
<ul>
<li>Eroding U.S. military advantages and its alliance system</li>
<li><span style="text-transform: initial;">Committing aggressive acts in the South China Sea</span></li>
</ul>
<p><em>In China:</em></p>
<ul>
<li>“A sharp U-turn toward control and oppression.”</li>
<li><span style="text-transform: initial;">The “Great Firewall of China”</span></li>
<li><span style="text-transform: initial;">The “Orwellian system” of “social credit system.”</span></li>
<li><span style="text-transform: initial;">Religious crackdown</span></li>
<li><span style="text-transform: initial;">Suppression in secessionist regions</span></li>
</ul>
<p>Pence’s speech is not surprising given the gradual change in <a href="http://www.pewresearch.org/fact-tank/2017/02/10/americans-have-grown-more-negative-toward-china-over-past-decade/">American attitudes toward China</a>. But by invoking the failures of past administrations to integrate China into the U.S.-led international order, he reflected a new normal for the U.S.: it will no longer “be intimidated” by China and “will not stand down.” Furthermore, Pence’s speech was given in the context of the NDAA, which received <a href="https://www.wsj.com/articles/u-s-defense-bill-seeks-to-counter-china-1533127150">bipartisan support</a> in Congress, meaning that the turn is not a short-lived phenomenon and is likely to last beyond Trump’s presidential term.</p>
<h3>Strategic Competition Turning Adversarial</h3>
<p>While ‘strategic competition’ has become the Trump administration’s preferred label to frame Washington’s relations with Beijing, the U.S. has been sending signals that it views the relationship as increasingly adversarial and zero-sum. For example, the NDS acknowledges China’s quest for “Indo-Pacific regional hegemony in the near-term and displacement of the United States to achieve global preeminence in the future.”</p>
<p>The U.S. has sought to prevent this and is preparing forces not only to deter but to <a href="https://thehill.com/policy/defense/390165-pentagon-us-military-has-a-lot-of-experience-taking-down-small-islands-in">win a war</a> against China. Such reaction and response have called into question whether Beijing is merely a ‘competitor’ or is, in fact, emerging as a threat that warrants a more aggressive response. As Anthony H. Cordesman from the CSIS <a href="https://www.csis.org/analysis/choosing-between-four-cs-conflict-and-containment-versus-competition-and-cooperation">warns</a>, “it is becoming steadily harder to distinguish between efforts designed to limit or contain the other state and those that might lead to actual conflict.”</p>
<p>More dangerously, the ‘strategic competition’ label is feeding an ideological narrative that divides Americans and Chinese into ‘us’ and ‘them.’ Robert Keohane and Jeff Kogan, for example, <a href="https://www.foreignaffairs.com/articles/world/2017-04-17/liberal-order-rigged">advocate</a> that Washington “nurture a uniquely American social identity and a national narrative [t]hat will require othering authoritarian and illiberal countries.” The NSS and NDS have, in line, developed an image of China as a “revisionist power” bent on shaping “a world consistent with their authoritarian model” and “antithetical to U.S. values and interests.”</p>
<p>However, ideological narratives have the tendency to facilitate simple-minded worldviews and reduce the foreign ‘other’ to stereotypes, which fuels misperception and unnecessary distrust, and are instrumental to opportunist leaders especially during critical junctures of domestic political transition. Pence’s speech was partly fuelled by suspicion rather than facts; his accusation that China is “influencing the [U.S.] midterms [elections]” was contradicted by the Department of Homeland Security and has led to speculation that he was shoring up domestic support to fuel his neoconservative agenda.</p>
<h3>An Emerging Cold War?</h3>
<p>The adversarial undertone in U.S.-China relations has generated speculation of an emerging ‘cold war’ (see <a href="https://theconversation.com/the-risks-of-a-new-cold-war-between-the-us-and-china-are-real-heres-why-103772">here</a> and <a href="https://www.ft.com/content/666b0230-cd7b-11e8-8d0b-a6539b949662">here</a>). However, a ‘cold war’ will first require both parties to develop opposing perceptions of each other and Beijing seemingly remains ambiguous as to how it views itself and its relations with Washington. For now, China is caught between simultaneously pursuing peaceful development and its ambitions of territorial reunification and great-power respect. The former requires maintaining a conducive environment for prosperity, including peaceful relations with the U.S. and its neighbors. But the latter requires acting tough on issues where sovereignty and autonomy are challenged, leading to more assertive and aggressive conduct in international affairs.</p>
<p>During the 19th Party Congress, Chinese President Xi Jinping sought to <a href="http://www.chinadaily.com.cn/china/19thcpcnationalcongress/2017-11/04/content_34115212.htm">address these two agendas</a>—but only as separate issues. He has yet to affirm which one is accorded greater priority. Without addressing the contradiction between peace and assertiveness, it is difficult to see how China can formally clarify its perception of the U.S. as either a strategic partner or an ideological threat; the U.S. has both contributed immensely to China’s rise and engaged in actions hostile to Beijing’s aspirations. Professor Chen Dingding <a href="https://thediplomat.com/2018/10/3-types-of-chinese-reactions-to-mike-pences-china-speech/">posits</a> that there are currently three dominant views in Beijing regarding Washington’s future China policy: containment, competition, and cooperation. The question is how far China will tolerate U.S. policies suggestive of a containment strategy before it pushes back with “calls for active Chinese measures to counterbalance possible U.S. aggressive actions in a possible all-out conflict.”</p>
<p>Moreover, any talk of a ‘cold war’ is unlikely to manifest in the same manner as that between the U.S. and the USSR, which was contested globally through the policies of containment and comprehensive economic decoupling. The world is not currently moving towards bipolar global blocs with close-to-no economic interaction; both China and the U.S. are far too connected to each other and to the global economy. While they currently engage in a trade war, the U.S. is (outwardly) seeking to <a href="https://www.washingtonpost.com/opinions/global-opinions/the-trump-administration-just-reset-the-us-china-relationship/2018/10/04/c727266e-c810-11e8-b2b5-79270f9cce17_story.html?utm_term=.1d21eef068d7">revise the rules</a> of the game rather than abandon the policy of engagement.</p>
<p>It is difficult to assume that China will simply collapse under the weight of U.S. containment as the USSR did in 1991—its relative economic strength vis-a-vis the U.S. is already greater than that of the Soviet Union at its peak. Furthermore, as Graham Allison <a href="https://www.ft.com/content/666b0230-cd7b-11e8-8d0b-a6539b949662">notes</a>, “if the U.S. leads [in containing China], who will follow”? U.S. allies and partners have significant interests in maintaining strong relations with both powers—usually in the form of economic ties with China and security commitments with the U.S.—and do not want to make a choice between the two.</p>
<h3>Instability in the New Era</h3>
<p>However, U.S.-China relations proceed, they are unlikely to remain as stable as the U.S.-USSR bipolar era, which had over time developed a series of tacit and formal signaling and normative arrangements that worked towards ameliorating what could have had been a series of escalatory outbreaks. Today, the structures of the international system are substantially different. The <a href="https://onlinelibrary.wiley.com/doi/epdf/10.1111/j.1468-2478.2011.00704.x">multipolar dynamic</a>, with its uneven distribution of power and influence, creates a greater risk of miscalculation. Rapid technological changes (advanced conventional weapons, cyberwarfare and artificial intelligence) will also make competition increasingly difficult to manage as the global rules and norms fail to keep pace.</p>
<p>Both the U.S. and China will need to manage their differences lest the rivalry transforms into a downward spiral of confrontation. However, the outlook is foreboding. If President Trump withdraws from the Intermediate Nuclear Forces Treaty amidst accusations of unfair Chinese and Russian practices, he will set a precedent that could undermine the future stability of global arms control and plunge the world into another arms race.</p>
<p><a href="https://globalsecurityreview.com/cold-war-towards-era-adverse-us-china-competition/">Cold War? Towards an Era of Adverse U.S.-China Competition</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Political Ramifications of Trump’s Haste to Make Peace with the Taliban</title>
		<link>https://globalsecurityreview.com/political-ramifications-trumps-haste-negotiate-with-taliban/</link>
		
		<dc:creator><![CDATA[Kambaiz Rafi]]></dc:creator>
		<pubDate>Tue, 11 Dec 2018 15:52:25 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[Qatar]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Taliban]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=9104</guid>

					<description><![CDATA[<p>The same week NASA announced the successful landing of its probe InSight on Mars, violence erupted in Kabul, Afghanistan. A rogue militia commander’s arrest by government security forces triggered violent protests by his supporters, leaving at least 30 civilians and security personnel wounded, and brought parts of the city to a standstill. Commander Alipour—known as [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/political-ramifications-trumps-haste-negotiate-with-taliban/">The Political Ramifications of Trump’s Haste to Make Peace with the Taliban</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The same week NASA announced the successful <a href="https://www.theguardian.com/science/2018/nov/27/nasa-mars-insight-lander-sends-back-first-picture-from-red-planet">landing</a> of its probe InSight on Mars, violence erupted in Kabul, Afghanistan. A rogue militia commander’s arrest by government security forces <a href="https://www.washingtonpost.com/world/asia_pacific/protests-over-arrest-of-anti-taliban-commander-turn-violent-in-afghanistan/2018/11/25/11512a08-f0c2-11e8-99c2-cfca6fcf610c_story.html?utm_term=.3f4d5a98952b">triggered</a> violent protests by his supporters, leaving at least 30 civilians and security personnel wounded, and brought parts of the city to a standstill.</p>
<p>Commander Alipour—known as “Commander Sword” by his supporters because of his exploits in fighting the Taliban in Afghanistan’s inland provinces—was detained because of accusations of human rights abuse. His arrest follows the detention of a powerful police chief in the North, Nizamuddin Qaisari, who was arrested by the orders of President Ashraf Ghani as part of a crackdown on unruly officers behaving like rogue militia leaders. That incident also led to <a href="https://www.nytimes.com/2018/07/04/world/asia/afghanistan-militia-faryab.html">violent protests</a>.</p>
<p>What is worth noting in both these incidents is the overly explicit ethnic fervor shown by the supporters of both the men who were objecting their arrests. The supporters of Alipour and Qaisari were predominantly from Hazara and Uzbek ethnic groups, to which Alipour and Qaisari respectively belong. The intensity of the protests forced the government to walk back Alipour’s arrest. In Qaisari’s case, indictment proceedings of current vice president and Uzbek strongman Rashid Dostum on charges of sexual abuse had to be overlooked to let him return to the country from a self-imposed exile in Turkey to pacify pro-Qaisari protests. The unrest had, by then, paralyzed daily life in many northern provinces.</p>
<p>Another individual with a similar reputation as a rogue official, Kandahar’s police chief Abdul Raziq, was left unscathed until he was assassinated by the Taliban in November 2018. Raziq—now hailed as a national hero after his assassination—was no martyr. Although Raziq was spared from the crackdown largely because of his role in ensuring Kandahar’s security against the Taliban—and tacit <a href="https://theintercept.com/2018/10/30/afghanistan-war-taliban-abdul-raziq/">support from the United States</a>—his being spared from arrest highlights discrepancies in the treatment of individuals of different ethnic groups.</p>
<p>Raziq, unlike Alipour and Qaisari, was Pashtun, as is President Ashraf Ghani and the majority of his aides and advisors. Although the men are members of different Pashtun tribal confederations—Raziq was Durani while President Ghani is Ghilzai—the incident accentuates the privilege Raziq enjoyed due to his belonging to the same ethnic group as the president.</p>
<h3>The peace talks with the Taliban have reached a critical juncture.</h3>
<p>Zalmai Khalilzad, the veteran Afghan-American diplomat and former U.S. ambassador to Afghanistan, has returned as U.S. President Donald Trump’s envoy to hasten along the negotiation process. During this critical phase, attention must be paid to the ethnically-charged uproar engulfing Kabul following Alipour’s arrest. This is especially important due to the ambiguity of the situation.</p>
<p>The content of the peace talks remains a <a href="https://www.nytimes.com/2018/10/18/world/asia/afghanistan-us-taliban-ashraf-ghani.html">matter of debate</a> even between the U.S. envoy and his Afghan hosts in the National Unity Government. The opacity of the negotiations could create anxiety among sections of Afghan society that are wary of giving the Taliban too generous of a deal. The content and nature of any future negotiations remains unknown, both to those involved and to outside observers, according to the head of Washington-based American Academy of Diplomacy and former U.S. ambassador to Afghanistan Ronald Neumann in a recent discussion he attended at the Afghanistan Institute of Strategic Studies.</p>
<p>Bellicose and opportunistic individuals among non-Pashtuns, similar to Alipour and Qaisari, might proliferate and see a boost to their popularity if a peace deal with the Taliban and their return to political dominance in any form put their ethnic groups in potential or actual harm.</p>
<p>What is more at stake—apart from safeguarding the delicate ethnic balance—is sustaining the advancements made by women, the civil society, and Afghanistan&#8217;s youth in post-Bonn Agreement Afghanistan. In the <a href="https://twitter.com/NoorjahanAkbar/status/1066524238897704960">words of</a> activist and former government official Shaharzad Akbar, what should be achieved through a deal is “an expansion of opportunities, not their curtailment.” Akbar added “if today a girl in Faryab cannot go to school, if in Helmand a girl is unable to study in a university, we want them to have this opportunity. Not a girl who is already going to school in Bamyan to be deprived of this right.”</p>
<h3>A Hastily-Negotiated Peace Deal with the Taliban is a Slippery Slope</h3>
<p>In a <a href="http://aiss.af/assets/aiss_publication/The_Fallacy_of_the_Peace_Process_in_Afghanistan_The_People%E2%80%99s_Perspectives_(English).pdf">recent survey</a> of over two thousand individuals from Afghanistan’s 34 provinces, 90 percent of the respondents indicated that they disagreed with the Taliban’s style of governance. To many who oppose the group’s politics and ideology, the Taliban’s blend of Islamic fundamentalism and tribal hierarchy might be palatable if they form a political party similar in nature to the parties formed by other militant groups from the Soviet resistance era. However, giving over too many concessions may lead to unforeseeable backlash, including by ordinary Afghans.</p>
<p>Over-concession would threaten the advancements in Afghan society made possible by an international commitment to Afghanistan’s reconstruction that has endured for over seventeen years. The Taliban’s return through an overly-generous power-sharing arrangement made possible by a hasty deal by U.S. envoy Khalilzad—allowing for the U.S. military withdrawal the U.S. president <a href="https://www.nbcnews.com/news/world/trump-s-envoy-tests-all-channels-afghan-taliban-bid-launch-n940846">is impatient</a> to achieve—will likely aggravate segments of society that view the group as a tribal outfit and political misfit.</p>
<p>Both the Taliban’s deeds and words do little to reinforce their claims of politico-ideological reform and a move away from the dogmatism demonstrated during the late 1990s. The Taliban&#8217;s online rhetoric grows harsher the more it nears what the group perceives as a military victory against the U.S. and Afghan security forces. This perception is reinforced by the constant unidirectional plea for peace from the U.S. and the Afghan governments that emboldens the group. The Taliban <a href="https://alemarah-english.com/?p=37483">swiftly condemns</a> anyone who contradicts their official pronouncements. Early in November, at a conference in Moscow to which the Taliban sent a delegation, the group issued statements <a href="https://www.firstpost.com/world/peace-with-the-taliban-will-not-be-peaceful-us-desperation-to-broker-deal-gives-outfit-more-bargaining-power-5555401.html">demanding respect</a> for the “Islamic Emirate of Afghanistan.” Such rhetoric should be taken into account when considering whether the Taliban has genuinely reformed.</p>
<p>Any peace deal should include strong guarantees to prevent the Taliban—who&#8217;ve shown a penchant for totalitarian rule—from gaining too much power. This is vital for preserving social dialogue on important issues such as women’s rights, freedom of expression, and civic equality—among all ethnic groups in Afghanistan.</p>
<p>A <a href="http://www.1tvnews.af/en/news/afghanistan/36586-read-the-full-text-of-afghan-governments-peace-plan">recent statement</a> by the Afghan National Unity Government (NUG) gives some reassurance as to such guarantees through an Afghan-owned and Afghan-led negotiation process. The statement reiterates respect to the Afghan Constitution as a fundamental starting point. However, U.S. envoy Khalilzad has so far <a href="https://www.nytimes.com/2018/10/18/world/asia/afghanistan-us-taliban-ashraf-ghani.html">ostensibly circumvented</a> the government in Kabul by directly engaging in talks with the Taliban’s political office in Doha.</p>
<p>More importantly, there is suspicion regarding Khalilzad himself who is not known for being impartial in his past dealings and has previously expressed <a href="https://www.washingtonpost.com/archive/opinions/1996/10/07/afghanistan-time-to-reengage/300b1725-8d30-4b98-a916-03f7b588bb2c/?utm_term=.1d26a456fce9">favorable views</a> about the Taliban. Members of the main anti-Taliban group, the Northern Alliance, might be reluctant to cooperate with him because Khalilzad has made efforts to politically sideline the group in the past—about which he elaborates effusively in his book, <em>The Envoy</em>. At present, sitting with Khalilzad would be akin to a “fool me twice” scenario for most of these actors.</p>
<p>The U.S. strategy should be depersonalized—with an impartial diplomat essential for doing so. Khalilzad himself could be seen as ethnically biased as he belongs to the Pashtun ethnic group. Any deal struck by Khalilzad, even if it is of sound basis, will be treated with suspicion by other Afghan ethnic groups. Further, nothing endangers the credibility of a peace deal more than a prevailing doubt concerning the intentions behind it. Replacing Khalilzad as U.S. envoy would go a long way in inviting confidence that the interests of all ethnic groups will be taken into consideration.</p>
<p>Projecting respect for equality is paramount to ensure the implementation of a sustainable agreement that won’t result in a civil war in the future. If any one ethnic group is perceived as receiving special treatment, feelings of insecurity will increase among the other groups. Historically—in Afghanistan and throughout the world—such insecurity has led to armed resistance and violence. Should history repeat itself in this way, the current stalemate with the Taliban may be seen in a nostalgic light.</p>
<p><a href="https://globalsecurityreview.com/political-ramifications-trumps-haste-negotiate-with-taliban/">The Political Ramifications of Trump’s Haste to Make Peace with the Taliban</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Refining Strategic Autonomy: A Call for European Grand Strategy</title>
		<link>https://globalsecurityreview.com/strategic-autonomy-european-grand-strategy/</link>
		
		<dc:creator><![CDATA[Cameron Vaské]]></dc:creator>
		<pubDate>Mon, 10 Dec 2018 10:02:15 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Grand Strategy]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/strategic-autonomy-european-grand-strategy/</guid>

					<description><![CDATA[<p>Expanding the Lexicon Over the past year and a half, European foreign policymakers and thought leaders have adopted a new lexicon. Terms like strategic autonomy and defense union have become commonplace in the face of wavering American commitments to NATO and the transatlantic alliance. Europe has come to realize that the United States is no [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/strategic-autonomy-european-grand-strategy/">Refining Strategic Autonomy: A Call for European Grand Strategy</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Expanding the Lexicon</h2>
<p>Over the past year and a half, European foreign policymakers and thought leaders have adopted a <a   href="https://europa.eu/globalstrategy/en/security-our-union">new lexicon</a>. Terms like <a   href="https://www.foreignaffairs.com/articles/2018-07-06/letting-europe-go-its-own-way">strategic autonomy</a> and <a   href="https://www.politico.eu/article/angela-merkel-emmanuel-macron-eu-army-to-complement-nato/">defense union</a> have become commonplace in the face of wavering American commitments to NATO and the transatlantic alliance. Europe has come to realize that the United States is no longer the stalwart ally of the Cold War era. The shift in the discussion hints at a move towards greater European collective action on the world stage. With the resurgence of China, the return of Russia, the retreat of the United States, and the rise of the rest, Europe needs to define its own grand strategy.</p>
<blockquote><p>With the resurgence of China, the return of Russia, the retreat of the United States, and the rise of the rest, Europe needs to define its own grand strategy.</p></blockquote>
<p>The concept of American grand strategy is so well-established that it has all but become its own niche field within the realm of international relations studies. Over the last 70 years, the United States has pursued a grand strategy of &quot;liberal hegemony,&quot; establishing international institutions for the advancement of democracy, free market economics, and human rights. Despite the change in expression and tone of American foreign policy from administration to administration, liberal hegemony has remained the blueprint.</p>
<p>The European Union, in contrast, has never had an overarching strategy to interact with and define the global landscape, though it has a Common Foreign and Security Policy (CFSP) which in principle guides collective European policy. In reality, European CFSP follows the foreign policy initiatives of a few member states and has demonstrated a preference to follow Washington&#x27;s lead on major initiatives. For the past several decades, this system has worked extremely well for Europe; shared principles and foreign policy goals have allowed Europe to support most U.S. positions on foreign affairs and focus its energies on European economic development, integration, and domestic policy.</p>
<p>Yet, ever since the Iraq War, European and American foreign policy priorities, goals, and even principles have begun to diverge. The arrival of the Trump administration has further fractured the relationship and made clear to European leaders that the United States is no longer a reliable security guarantor or partner on human rights, nuclear non-proliferation, defense, and free trade issues. In an increasingly multipolar world with competing major powers vying to alter the terms of the liberal international order, Europe can no longer afford to solely rely on the United States.</p>
<h3>Unpacking Strategic Autonomy</h3>
<p>What would European strategic autonomy look like? It would require developing greater self-reliance, capacity, and capability (particularly in terms of defense and collective security) to act alone to achieve European interests. At the same time, the EU would have to remain willing and able to cooperate with international partners on areas of common interest. The final push towards this ideological shift has come from two years of butting heads with the Trump administration over everything from trade to the Joint Comprehensive Plan of Action (JCPOA—the Iran nuclear deal) to NATO spending. As the transatlantic relationship changes, so must European strategy for dealing with Washington.</p>
<p>The concept of strategic autonomy provides an ideological framework for working on an independent basis to resolve issues of European concern in terms of collective security as well as foreign policy. Under such a framework, the EU would selectively seek partners to address climate change, forced migration, and the advancement of human rights and democracy, and would operate alone when necessary. Properly applied and refined, strategic autonomy could become a powerful and effective grand strategy by which Europe engages the international community. But for a European grand strategy to evolve and be effective, Europe must stand united.</p>
<p>Yet Europe remains relatively divided and reactive. All too often, substantive collective European foreign policy has required American initiative, remained reactive in the face of conflict, or stripped of substance due to internal divisions. This last scenario has become all the more threatening to a collective grand strategy given the influence of targeted Chinese foreign direct investment (FDI) in Europe. Chinese FDI lobbying in Greece and Hungary has already <a   href="https://www.reuters.com/article/us-eu-un-rights/greece-blocks-eu-statement-on-china-human-rights-at-u-n-idUSKBN1990FP">derailed</a> the EU critique of Beijing&#x27;s human rights record and its activity in the South China Sea.</p>
<p>Despite the impact of Chinese FDI, the divergent priorities of EU member states remain the greatest obstacle to creating consensus in European foreign policy and strategy. The rise of Russian cyber warfare is of primary concern to the Baltic states but of less concern to Italy, France, Spain, Malta, Greece, and Hungary, who are primarily preoccupied with issues surrounding terrorism and migration. French and German foreign policy priorities are more comprehensive, but still focus largely on defense, international trade, and relations with the United States. Even among countries with common foreign policy priorities, perspectives often diverge on how to address them.</p>
<h3>Strategic Autonomy as Grand Strategy</h3>
<p>Yet there is cause to be optimistic at the prospect of collective grand strategy. In his July 2018 visit to the United States, European Commission President Jean-Claude Juncker reiterated the European commitment to multilateralism and free trade when possible, and resolved to take independent action and apply reciprocal sanctions when necessary. EU and national leaders continue to maintain strong support for the JCPOA and meet with Iranian leaders to find ways to encourage Iranian economic development. Most recently, in September 2018 the European Commission announced a proposal of a regulation to establish a <a   href="http://www.europarl.europa.eu/thinktank/en/document.html?reference=EPRS_BRI(2018)614667">framework for a collective screening mechanism</a> of foreign direct investments into the European Union by the end of 2018.</p>
<p>Europeans are also taking steps to create a more cohesive collective security apparatus. On December 11 2017, 26 EU member states formally created the Permanent Security Cooperation (PESCO) set forth in the Lisbon Treaty of 2009. In his now famous Sorbonne Speech in November 2017, Macron called for the creation of a European Intervention Initiative to enable Europe to act collectively and independently on behalf of its own defense. In May 2017, German Chancellor Angela Merkel publicly stated that Europe could no longer rely on the United States and urged Europe to &quot;take destiny into its own hands.&quot; Indeed, the United States now represents a serious threat to the current system of international affairs and the principle of open society.</p>
<blockquote><p>In an increasingly multipolar world with competing major powers vying to alter the terms of the liberal international order, Europe can no longer afford to solely rely on the United States.</p></blockquote>
<p>In order to determine its own future and protect the rules-based liberal international order which has enabled it to prosper, Europe must learn to work as one to create a robust grand strategy. Brussels and European states that are already pioneering European foreign policy initiatives should first aim to develop consensus on principles of action, eliminate redundancies in EU defense policy and industry, and establish more regular dialogue between EU leaders and foreign ministers to communicate concerns, coordinate priorities, and develop a coherent, single voice through the High Representative for CFSP supported by a chorus of member states.</p>
<p>Strategic autonomy must become the base upon which European grand strategy is formed. Operating as one, Europe can then seek allies to support a more inclusive rules-based world order, protect international institutions from aggressive and subversive international actors, and promote the principles of democracy and human rights on the world stage.</p>
<p>Under a cohesive grand strategy of strategic autonomy, EU member states should coordinate their strategic interests collectively and lead individually where they are most competent. Spain and Portugal, for example, maintain strong diplomatic and people-to-people relationships with the majority of Latin American countries, and could serve as the EU&#x27;s voice with the continent. Estonia, Latvia, and Lithuania have developed extremely capable cybersecurity and intelligence capacities and could pioneer European operations in cyberspace and intelligence gathering. France retains strong diplomatic ties with nations in North Africa and the Middle East, and could leverage those relations on behalf of collective European policy. France, Denmark, Poland, and Finland have well-developed militaries and could spearhead collective European defense operations and deployment to conflict zones.</p>
<p>Indeed, the framework for collective defense operations has already been laid through the foundation of <a   href="https://eeas.europa.eu/headquarters/headquarters-Homepage/34226/permanent-structured-cooperation-pesco-factsheet_en">PESCO</a> and the <a   href="https://berlinpolicyjournal.com/european-intervention-initiative-the-big-easy/">European Intervention Initiative</a> (E2I) agreed to in July 2018 by France, Germany, Belgium, Denmark, Estonia, Finland, Portugal, Spain, the Netherlands, and the United Kingdom. However, there is still much work to be done before Europe is capable of seamless joint operations; much of the defense industry remains fragmented due to protectionist national policies aimed at deterring the short-term losses that would result from developing a collective defense industry. To create a truly strategically autonomous union, equipment must be standardized and regiments made interoperable to work as a unified force. The European Army may never march by name, but European joint task forces will.</p>
<blockquote><p>To create a truly strategically autonomous union, equipment must be standardized and regiments made interoperable to work as a unified force. The European Army may never march by name, but European joint task forces will.</p></blockquote>
<p>Already, most EU countries participate in collaborative, NATO joint operations, but they are often highly reliant upon American leadership and forces. This was on open display in <a   href="https://www.cfr.org/article/natos-trident-juncture-exercises-what-know">Trident Juncture</a> held in October and November 2018 &#8211; the latest and largest NATO exercise since the Cold War. In a joint operation simulation of an Article 5 scenario calling NATO allies to defend an attack on Norway with 50,000 troops from 31 nations, the United States fielded 20,000 troops and an equally sizable proportion of its vessels, aircraft, and machinery. Without the United States&#x27; participation, NATO&#x27;s capacity to defend Norway—or any other European state, for that matter—would be seriously compromised.</p>
<p>Rather than a replacement, PESCO or another EU-level organization should serve as a bulwark to NATO while ensuring an autonomous defense and operations capacity for the European Union.</p>
<p>In a strategically autonomous Europe, the EU would be able to field its own collective defense force, equal in size, strength, and sophistication of its American counterpart. Rather than a replacement, PESCO or another EU-level organization should serve as a bulwark to NATO while ensuring an autonomous defense and operations capacity for the European Union.</p>
<p>More important than its defense capacity, if European grand strategy is to succeed in revitalizing the liberal international order, Europe must continue to play by the rules. The United States has failed to consistently adhere to the principles of the international world order that it created, notably pioneering the creation of the International Court of Justice and then refusing to join it. By neglecting the rules it established and failing to create a more inclusive system, Washington has lost credibility and encouraged rising powers to challenge the established order. Europe cannot make the same mistake.</p>
<p>Regardless of the form that European grand strategy takes and the world order it promotes, the EU can no longer afford to remain passive. For Europe to preserve its place in the world, it must learn to lead as one.</p>
<p><em>This article was originally published by the <a target="_blank"  href="https://www.carnegiecouncil.org/publications/ethics_online/refining-strategic-autonomy-a-call-for-european-grand-strategy" rel="noopener noreferrer">Carnegie Council for Ethics in International Affairs</a> and <a target="_blank" rel="nofollow noopener noreferrer" href="https://www.theintlscholar.com/periodical/refining-strategic-autonomy-call-european-grand-strategy">The International Scholar</a>.</em></p>
<p><!-- strchf script --><script>        if(window.strchfSettings === undefined) window.strchfSettings = {};    window.strchfSettings.stats = {url: "https://global-security-review.storychief.io/strategic-autonomy-european-grand-strategy?id=20829780&type=2",title: "Refining Strategic Autonomy: A Call for European Grand Strategy",id: "67a59392-0711-40d2-8ebe-f4788e7ac4fa"};            (function(d, s, id) {      var js, sjs = d.getElementsByTagName(s)[0];      if (d.getElementById(id)) {window.strchf.update(); return;}      js = d.createElement(s); js.id = id;      js.src = "https://d37oebn0w9ir6a.cloudfront.net/scripts/v0/strchf.js";      js.async = true;      sjs.parentNode.insertBefore(js, sjs);    }(document, 'script', 'storychief-jssdk'))    </script><!-- End strchf script --></p>
<p><a href="https://globalsecurityreview.com/strategic-autonomy-european-grand-strategy/">Refining Strategic Autonomy: A Call for European Grand Strategy</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The PLA in Transition: In Pursuit of the &#8216;China Dream&#8217;</title>
		<link>https://globalsecurityreview.com/pla-transition-pursuit-china-dream/</link>
		
		<dc:creator><![CDATA[Foreign Brief]]></dc:creator>
		<pubDate>Fri, 07 Dec 2018 05:22:20 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[South China Sea]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=9008</guid>

					<description><![CDATA[<p>This article was originally published on October 18, 2018, by Nick Lyall for Foreign Brief. What&#8217;s Happening? The PLA hierarchy is being overhauled to elevate officers more receptive to Beijing’s desires to build a modern military force. Key Insights President Xi’s sweeping reforms aim to develop a more centralized military force that has stronger joint operational [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/pla-transition-pursuit-china-dream/">The PLA in Transition: In Pursuit of the &#8216;China Dream&#8217;</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: center;"><a href="https://www.foreignbrief.com/asia-pacific/china/pla-transition-pursuit-china-dream/"><em>This article was originally published on October 18, 2018, by Nick Lyall for Foreign Brief.</em></a></p>
<h4>What&#8217;s Happening?</h4>
<p>The PLA hierarchy is being overhauled to elevate officers more receptive to Beijing’s desires to build a modern military force.</p>
<h4>Key Insights</h4>
<ul class="bs-shortcode-list list-style-check">
<li>President Xi’s sweeping reforms aim to develop a more centralized military force that has stronger joint operational capabilities.</li>
<li>If successful, the reforms could complicate Taiwanese moves towards independence and the ability of the U.S. to operate close to China.</li>
<li>New capabilities may lead to increased assertiveness in the South China Sea and on the Indian border, but China will not seek to provoke conflict.</li>
</ul>
<p>One of the key transitions expected from the 19th Congress of the Chinese Community Party (CCP), which commences on October 18, is that of the extensive overhauling of the People’s Liberation Army (PLA) leadership. In the lead up to the Congress multiple generals on the Central Military Commission (CMC)—the eleven-member top military governing body—have been dropped under suspicion of corruption. President Xi Jinping’s anti-graft crackdown has been ongoing for several years. However, the escalation of investigations into PLA leadership so close to the Congress reflects Beijing’s recognition of the need to spring clean the military’s senior hierarchy and organizational structure to support its desire for a more assertive stance on the world stage.</p>
<h3>Centralization, Centralization, Centralization</h3>
<p>President Xi laid out the reform’s driving factors in a speech at the beginning of August: “To achieve the dream of the great rejuvenation of the Chinese nation, we must quicken the pace of building the people’s army into a world-class army… To build a strong army, we must unswervingly adhere to the party’s absolute leadership over the army”. This requires centralization of two forms: in leadership and in organizational structure.</p>
<p>The sacked generals have been replaced by officials whose careers have for long periods been aligned with Xi, signaling the president’s desire to surround himself with those who subscribe to his vision. This is not surprising. Xi’s military reform program is vast and unprecedented; he needs people in top positions who he can rely on to push his desired changes through the inevitable resistance in the military bureaucracy.</p>
<p>The creation of the Strategic Support Force (SSF) in December 2015 is a sign of the sort of bureaucratic centralization that will continue to accompany the centralization of PLA leadership under the auspices of the reform program. The SSF subsumed the former Third Department of the People’s Liberation Army’s General Staff Department (3PLA), the former Fourth Department (4PLA), and elements of the PLA General Political Department. This gave it a sweeping mandate encompassing all of the PLA’s cyber espionage, ISR (intelligence, surveillance, and reconnaissance) systems, information operations, propaganda, and psychological warfare.</p>
<p>The salient feature of the SSF is its creation directly under CMC command, giving Xi’s inner circle close control over its operations. This represents recognition among CCP senior leadership of the limitations inherent in the military bureaucracy that has for so long stifled progress.</p>
<h3>From a Green to Purple Military</h3>
<p>The increasingly hybrid and non-traditional nature of war and the expanded scope of missions required to respond to modern security threats have exposed PLA shortcomings in contemporary military affairs. The PLA’s long-standing embodiment of a ‘green’ military—one overwhelmingly oriented toward the conduct of large-scale ground combat—means it lacks the ability to operate as a nimble joint force (a ‘purple’ military) capable of meeting contemporary security challenges. As a result, the PLA’s operational capabilities still lag behind the modern militaries of most major powers.</p>
<p>Ever since assuming the CMC leadership in 2012, Xi has unfolded successive stages of military reform to rectify this shortcoming in joint operational capability. In addition to the SSF’s launch, Xi reorganized the previous seven military commands into five as part of wider moves to make the organizational structure leaner and more agile. Additionally, a joint command-and-control system was established. This replaced the previous system whereby each service branch would report to their respective headquarters during peacetime, with an ad hoc headquarters being set up during a crisis.</p>
<p>A further obstacle to an advanced joint operational capability was the below-par quality of PLA officers and leaders. When Deng Xiaoping cut funding to the military in order to focus on China’s colossal economic recovery beginning in 1978, the implicit bargain was that the PLA could devise ways to profit from their services in order to stay afloat. This led to a culture of systemic and institutionalized corruption on a scale so severe that many PLA officials openly admit that China’s ability to wage war is entirely insufficient. Increasing PLA professionalism so that warfighting, rather than profit-making, is the priority has been a key concern of Xi’s reforms; the necessity being that the right personnel must be in place to implement the modernization initiatives.</p>
<h3>Improved PLA Deterrence?</h3>
<p>The sweeping reform process is geared toward enhancing PLA deterrence capabilities, primarily to prevent further moves by Taiwan towards independence and to dissuade U.S. reconnaissance missions close to China’s coastline as well as U.S. freedom of navigation operations in the Western Pacific. If the centralization initiatives and moves toward improving the PLA’s joint operational capability are successful, then the potency and range of Chinese military power will be closer to meeting these deterrence objectives.</p>
<p>Beijing is highly unlikely to test any newfound military acumen by provoking combat against an adversary. However, a newfound deterrence capability will likely see China become increasingly assertive in its peripheral regions. The expansion of Chinese sovereignty claims in the South China Sea seems the most likely arena in which this will unfold. Here, the PLA Navy and the various PRC civil-military bodies have been successful—and will likely continue to be—in incrementally furthering Chinese territorial designs without triggering military hostility from rival claimants and the U.S. This relatively free run is in contrast to Taiwan and the Senkaku Islands which are more tightly enmeshed in U.S security guarantees, making assertiveness of any degree from China more fraught. Considering that the PLA remains deployed in close proximity to Doklam—a border area dispute ostensibly resolved with India in August—it seems that this region will also continue to be a key theatre in which the PLA will look to test itself.</p>
<p>When considering the scale the reforms, the PLA is undergoing; the human element must be kept in the equation. While the PRC military establishment is unlikely to seek conflict if a volatile situation does arise then the newly anointed vanguard of youthful PLA officials may be keen to prove their worth. The potential then arises for miscalculation. Considering the PLA’s relative failure in the recent Doklam dispute, if the issue were to flare up again further down the track, then PLA leadership may again fail to calibrate goals with capabilities.</p>
<p>As PLA leaders themselves admit, there is still some way to go before the reforms will bear significant fruit; overhauling the leadership style and operational mindset is a generational process. Nonetheless, if the expected leadership reforms at the upcoming Party Congress are implemented and the broader PLA streamlining reforms continue, then the PRC will be on its way to building the military required for Beijing’s broader strategic vision.</p>
<p>The PRC has definitively abandoned Deng Xiaoping’s famous ‘hide your strength, bide your time’ foreign relations paradigm for Xi’s ‘China dream,’ and Beijing is pushing to restore Chinese pride on the world stage. It now needs a military able to support an assertive foreign policy. The recent military stand-off with India in Doklam exposed PLA shortcomings in being the agile, capable and modern force needed to support PRC assertiveness. As such, expect to see efforts to address these vulnerabilities continue with vigor going forward. If the reforms are executed successfully, then a newfound deterrence capability will change the character of contested areas like the South China Sea.</p>
<p><a href="https://globalsecurityreview.com/pla-transition-pursuit-china-dream/">The PLA in Transition: In Pursuit of the &#8216;China Dream&#8217;</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber Deterrence: An Oxymoron for Years to Come</title>
		<link>https://globalsecurityreview.com/cyber-deterrence-oxymoron/</link>
		
		<dc:creator><![CDATA[Jyri Raitasalo]]></dc:creator>
		<pubDate>Wed, 05 Dec 2018 15:15:48 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=8958</guid>

					<description><![CDATA[<p>The lack of empirical evidence of cyber warfare between states makes deterrence theorizing nearly impossible. Western states largely renounced the concepts of defense and deterrence after the end of the Cold War. Instead, Western powers focused on expeditionary warfare—military crisis management, counterterrorist operations, and counterinsurgency operations. Today Russia and China pose a challenge to the [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/cyber-deterrence-oxymoron/">Cyber Deterrence: An Oxymoron for Years to Come</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The lack of empirical evidence of cyber warfare between states makes deterrence theorizing nearly impossible.</h2>
<p>Western states largely renounced the concepts of defense and deterrence after the end of the Cold War. Instead, Western powers focused on expeditionary warfare—military crisis management, counterterrorist operations, and counterinsurgency operations. Today Russia and China pose a challenge to the Western-defined international security order. The United States and its allies in Europe have lost most of the analytical concepts that would be useful for the great-power politics to follow: defense and deterrence.</p>
<p>It will take years for the West to rediscover these concepts and to harness them for national security purposes. Moreover, truly understanding the concept of cyber deterrence will be even more difficult—as there is zero empirical material from cyber wars between states. Furthermore, the very nature of cyberwar prevents active communication about existing cyber warfare capabilities. This communication is necessary to convince one’s adversary about a cyber-retaliation in case of deterrence failure.</p>
<p>For more than two decades after the end of the Cold War, Western states were able to redefine the contours of international security and the associated rules related to the use of military force within the globalizing international system. During this period, between 1989/1991 and 2013, many traditional concepts of international relations and strategy were cast out onto the trash heap of history.</p>
<p><em>Great-power politics</em>, <em>spheres of influence</em>, <em>defense</em>, and <em>deterrence</em> were such concepts. They lost practically all of their political correctness and analytical usefulness with the winding down of the superpower confrontation and the dissolution of the Soviet Union in the early 1990s. From then on, Western statesmen, stateswomen, and strategic thinkers relied more on concepts such as <em>the liberal world order</em>, <em>engagement</em>, <em>democracy promotion</em>, <em>human security</em>, <em>humanitarian interventions,</em> and <em>counterinsurgency operations</em>.</p>
<p>Thus, between 1989/1991 and 2013, the Western security community fell out of touch with a vocabulary on great-power strategy. Such a strategy would be useful today to tackle existing and future security threats related to adversarial great-power relations and a potential for a large-scale war in Europe or Asia.</p>
<p>The loss of a framework for defense and deterrence within the West is bad enough for the conventional warfighting and nuclear realms. They are, however, the easy cases when compared to cyberspace. To date, we have witnessed zero cyber wars between states. A criminal act committed in cyberspace does not constitute an act of war. Nor do state-sponsored Distributed Denial of Service (DDoS) attacks, knocking off web-pages or online services. Similarly, spreading malign content in the social media is at most a nuisance—not even close to warfare.<span class="Apple-converted-space"> </span></p>
<h3>Cyberwar remains an abstract concept.</h3>
<p>Although <a href="https://www.rand.org/pubs/reprints/RP223.html">cyberwar has been coming for the last 25 years</a>, it has not once entered the realm of statecraft. Thus, all of the argumentation, doctrine formulation and policy articulation related to cyber war is, at best, speculation, and science fiction at worst. As the 2015 report published by the NATO Cooperative Cyber Defense Center of Excellence, <em><a href="https://ccdcoe.org/multimedia/cyber-war-perspective-russian-aggression-against-ukraine.html">Cyber War in Perspective: Russian Aggression against Ukraine</a></em>, noted: “everything we have seen so far falls well short of how national security thinkers—and Hollywood—have portrayed cyberwar.” In the report, Martic Libicki also noted—in his article titled <i>The Cyber War that Wasn’t, </i>“The most notable thing about the war in Ukraine, however, is the near-complete absence of any perceptible cyberwar.”</p>
<p>Today we live in a world where the role of cyberwar is much more opaque than was the case with nuclear war in the late 1940s and the next decades. During those times those focused on formulating deterrence theory had access to empirical evidence. Although “Little Boy” and “Fat Man” dropped on Japan were low-yield devices compared with the development of nuclear weapons during the following decades, the scale of destruction caused by them made it evident that a new conceptual approach to warfighting was warranted. This approach was named deterrence.<span class="Apple-converted-space">  </span></p>
<p>Despite this fact, both the Soviet Union and the U.S.-led NATO prepared to use hundreds of nuclear weapons in Central Europe against each other years on end. In addition, the nuclear arms race post-1949 (when the Soviet Union detonated its first nuclear weapon) touched only two states: the United States and the Soviet Union.</p>
<p>Even with these mitigating factors, it took almost twenty years to formulate a perspective on nuclear deterrence that was more or less shared by the two main protagonists of the bipolar confrontation. In the West, this shared understanding concerning nuclear weapons became known as the Mutually Assured Destruction (MAD).<span class="Apple-converted-space"> </span></p>
<h3>Developing credible cyber deterrence framework is unlikely for the foreseeable future.</h3>
<p>As our societies, government organizations and military forces are becoming more and more digitalized and cyberspace-reliant, it is natural for political leaders and analysts to ponder the positive and negative aspects of these trends. For years hubris about the upcoming cyberwar has dominated the headlines. <a href="https://foreignpolicy.com/2017/05/15/the-united-states-is-not-ready-for-cyber-pearl-harbor-ransomware-hackers-wannacry">“Cyber-Pearl Harbors”</a> or <a href="https://www.washingtonpost.com/business/2018/10/10/nearly-all-us-weapons-systems-have-critical-cyber-security-problems-auditors-say/?noredirect=on&amp;utm_term=.019fccf66572">“critical cybersecurity problems”</a> get a lot of media attention.</p>
<p>Today, cyberwar is defined as much by <a href="https://cybersecurityventures.com/movies-about-cybersecurity-and-hacking">Hollywood</a> as it is by national security decision-makers and analysts. This fact reflects the problems that Western states (and others) have trying to square the circle on cyber deterrence: how to deter something that is difficult to define (cyberwar/attack), hard to attribute to specific actors and has never happened so far?</p>
<p>Having lost a generation of deterrence experts and expertise after the end of the Cold War, many Western states are now jump-starting research programs focusing on conventional and nuclear deterrence in a world of great-power rivalries and power politics. In itself, such an undertaking will take years to produce a credible deterrence framework with the associated military capabilities needed in Europe and Asia.</p>
<p>Additionally, many Western states are trying to integrate the cyber domain into this emerging “new” deterrence framework—a nearly impossible task for the foreseeable future. The “nature” of cyberspace is so different from anything we have witnessed within our warfighting or deterrence paradigms in the past. Forging a credible cyber deterrence framework is likely to be impossible – at least for years to come. There are at least three reasons for this.</p>
<p>First of all, having zero cases of cyber warfare in the past provides a shaky foundation for deterrence theorizing. After all, how credible can deterrence be, when there is no shared understanding about the existing &#8211; or future &#8211; cyber warfare capabilities and their real-life effects? And the credibility of the threat is a crucial aspect of deterrence.<span class="Apple-converted-space"> </span></p>
<p>Second, the problem of lacking empirical material on cyber warfare is multiplied by the very nature of offensive cyber activity: in order not to provide tools for one’s adversary to establish any form of effective cyber defenses, one cannot communicate anything about the existing (and projected) cyber capabilities at one’s disposal.</p>
<p>The effectiveness of “cyber-weapons” is based on <em>not</em> communicating about the existing vulnerabilities within cyberspace in general and the adversary’s “cyber systems” in particular. Any effort to do so would decrease the effectiveness – and deterrent value – of existing “cyber weapons.” From a deterrence perspective, this is a significant problem: trying to communicate about one’s cyber warfare capabilities would end up undermining one’s deterrent capacity.</p>
<p>Third, the number of potential actors capable of executing some form of “cyber-attack” is so great—at least in the future—that any single framework or theory of deterrence will not be able to capture them all. Even though ninety-nine percent of cyber-attacks are criminal acts or hacktivist incidents, attribution (i.e., identifying the responsible actor) will be a problem for the foreseeable future. In addition, how to draw the line between criminal acts and warfare without information about the motivation of these cyber-attacks?<span class="Apple-converted-space">   </span></p>
<p>For cyber deterrence to make any sense for state actors, they need concrete indicators of others’ offensive cyber capabilities. Thus, in order to develop even a rudimentary cyber deterrence framework, states need some lessons learned from the effects of “cyber weapons” and cyberwar. The cases of nuclear war (1945) or the firebombing of cities (during World War II) are examples of the effects of concrete cases that influenced the way that states conceptualize the utility of certain weapons of war.</p>
<p>To date, there are no concrete cases of cyber warfare to draw lessons from. It is possible that this lack of empirical material related to cyber warfare will continue for years to come. While this is good news, it will also prevent the development and maturation of any meaningful cyber deterrence framework. States will not reveal their cyber weapon arsenals for deterrence purposes. They will reserve it for the possibility of waging offensive cyberwar.<span class="Apple-converted-space"> </span></p>
<p><a href="https://globalsecurityreview.com/cyber-deterrence-oxymoron/">Cyber Deterrence: An Oxymoron for Years to Come</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Unintended Consequences of Fake News</title>
		<link>https://globalsecurityreview.com/unintended-consequences-fake-news/</link>
		
		<dc:creator><![CDATA[Matthew Crosston]]></dc:creator>
		<pubDate>Mon, 03 Dec 2018 15:31:12 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[Fake News]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Tanzania]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=8948</guid>

					<description><![CDATA[<p>Unintended consequences are often found in the debris of partisan politics – and we’ve seen many there already during the short tenure of the Trump presidency.  But perhaps the most consequential yet unforeseen of the president’s unintended consequences has been the global impact of Trump’s comments regarding the so-called phenomenon of ‘fake news.’ Emblematic of Trump, despite [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/unintended-consequences-fake-news/">The Unintended Consequences of Fake News</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Unintended consequences are often found in the debris of partisan politics – and we’ve seen many there already during the short tenure of the Trump presidency.  But perhaps the most <em>consequential yet unforeseen</em> of the president’s unintended consequences has been the global impact of Trump’s comments regarding the so-called phenomenon of ‘fake news.’</p>
<p>Emblematic of Trump, despite warnings from various journalism watchdog groups that the global trend of his phrase may have restrictive and even deadly consequences – witness the suspected execution of columnist Jamal Khashoggi by the Saudi government, as well as the more recent anonymous delivery of a pipe bomb to CNN’s New York offices – the president seems to be taking the micro-narcissist view of the problem.  He expresses pride that a phrase he coined is gaining popularity around the world instead of focusing on the likelihood that his incessant criticism may likely be contributing to crackdowns by autocratic governments on freedom of expression and the press globally.</p>
<p>Ever resilient against criticism, if also ironically hyper-sensitive, Trump has ignored the United States’ precipitous fall to 45<sup>th</sup> place in the World Press Freedom Index because of his anti-news media rhetoric. And while it cannot be proven as causal, there does seem to be a strong inverse correlation between this decline and <a href="https://www.politico.com/story/2018/07/30/trump-media-fake-news-750536">the increase around the globe of arrests and the physical harassment of journalists.</a></p>
<p>The strongest sign that “fake news” is more than a passing political fad is the disturbing example of a world leader within the cradle of democracy giving in to the temptation of using it as a weapon.  <a href="https://newatlas.com/fake-news-laws-around-the-world/55737/">France’s Emmanuel Macron succeeded in passing a law which takes effect within three months of a general election</a> and allows for emergency governmental action to block ‘manipulative and misleading information’ within 48 hours of it being brought before a judge.</p>
<p>What so disturbed Macron was his sense of being the target during 2017 of a vicious and fallacious disinformation campaign by political opponents.  Sound familiar?</p>
<p>There is no doubt that France feels confident that it has crafted a rational ‘golden middle’ path through the fake news debate by limiting the time frame in which the law can be utilized (strictly before general elections) and by requiring the potential target of government action to be brought before the judiciary for formal legal approval.  But the reality is that this French initiative could create its own unintended consequences, as it no longer allows isolates press restrictions to the realm of dictators.  Indeed, Macron’s move has given flexibility to stable democracies to do similar undemocratic things.</p>
<p>Meantime, what of those nation states that might be defined as decidedly less democratic – perhaps as autocratic or semi-autocratic?  How are they dealing with “fake news”?  <a href="https://www.poynter.org/news/guide-anti-misinformation-actions-around-world">Here’s a quick world tour</a>:</p>
<ul>
<li>Belarus: passed media laws that permit the government to prosecute people who spread ‘false information online.’ The laws spread further into allowing the government to potentially block websites deemed in violation.</li>
<li>Brazil: the Federal Police announced the creation of a special task force to identify, locate, and punish authors of fake news.</li>
<li>Cambodia: in the weeks leading up to the country’s national elections, the government passed measures that gave it the right to block websites and other forms of media it deemed a ‘danger to national security.’</li>
<li>Croatia: similar to a move pursued in Germany, Croatian officials passed a law meant to stop the spread of hate speech and misinformation on social media platforms.</li>
<li>Egypt: the government now openly regulates any social media accounts that have large followings in order to make sure misinformation is not spread throughout the country.</li>
<li>Indonesia: a newly-formed National Cyber and Encryption Agency was tasked to help intelligence and police agencies combat online disinformation and social media hoaxes.</li>
<li>Kenya: the national government passed laws criminalizing 17 different forms of online activity.</li>
<li>Russia: despite being the most common target of countries around the world that criticize states trying to foment fake news, it didn’t stop Russia from introducing its own domestic legislation against disinformation.</li>
<li>Tanzania: the government, growing ever more concerned about the pervasiveness of online misinformation, has levied several possible legal initiatives that would constrict and/or punish online publishers.</li>
</ul>
<p>While this list is by no means exhaustive, it suggests a general global trend:  governments are actively attempting to regulate, monitor, limit, and restrict citizen impact within online social/political participation.</p>
<p>Through it all, there never seems to be any explicit attempt to define and describe fake news. Keeping terms amorphous and ambiguous allows governments to advantageously use the slippery slope approach to opposition forces: “If you are against me I will just make sure the arguments you make are deemed fake news.”</p>
<p>Indeed, many if not most of the initiatives do not seem to be motivated by a desire to improve the quality of news and resource information for the public. Instead, they are structured to simply provide greater obstacles and legal roadblocks to grassroots organizations that are unwilling to be in lockstep with central authorities. The bottom line: Many of these fake news policies are really just poorly masked proposals to prevent a more significant and healthy development of civil society in nations that are in desperate need of such development.</p>
<p>Finally, it is not a coincidence that in every case, regardless of political system or regime, there is no mention or discussion of repercussions and consequences <em>on the governments or their officials </em>if they are found guilty of spreading fake news themselves – perhaps because <a href="https://inhomelandsecurity.com/fake-news-propaganda-identify-can-useful/">governments have been issuing fake news – we used to call it propaganda – for ages.</a></p>
<p>If you accept all this to be true, then you are left with one very disturbing political conclusion about these fake news initiatives: they are not efforts to improve the quality of political dialogue but ultimately to shut down that dialogue altogether.</p>
<p>When governments seem intent to weaponize alleged fake news and use it to bludgeon opponents and opposition, then the ultimate political consequence is the crippling of public oversight, citizen criticism, and grassroots activism.</p>
<p>Which leads us back to the United States and President Trump.  Many here seem to view President Trump’s tirades against fake news with bemusement, yet a lack of real concern due to their enduring faith in the institutions of American democracy and its innate principles safeguarding freedom of the press, association, and expression. That is all well and good.  But many of the governments around the world, clearly inspired by Trumpian rhetoric, are not beholden to our check-and-balance structural limitations.  As such, their efforts do not bolster the quality of their politics but serve only to solidify their power.</p>
<p><a href="https://globalsecurityreview.com/unintended-consequences-fake-news/">The Unintended Consequences of Fake News</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Escalation in the Sea of Azov Benefits Putin and Poroshenko</title>
		<link>https://globalsecurityreview.com/escalation-sea-azov-benefits-putin-poroshenko/</link>
		
		<dc:creator><![CDATA[Gabriella Gricius]]></dc:creator>
		<pubDate>Thu, 29 Nov 2018 07:05:12 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Crimea]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Ukraine]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/escalation-in-the-sea-of-azov-benefits-putin-and-poroshenko/</guid>

					<description><![CDATA[<p>Tensions between Ukraine and Russia are riding a new high in the wake of Russia’s seizure of three Ukrainian navy ships in the Sea of Azov on Sunday, November 25th. The Ukrainian ships were attempting to pass through the Russian-controlled Kerch Strait to reach to the port of Mariupol. Although Ukraine claims to have informed [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/escalation-sea-azov-benefits-putin-poroshenko/">Escalation in the Sea of Azov Benefits Putin and Poroshenko</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a   href="https://themoscowtimes.com/articles/putin-and-poroshenko-dont-want-all-out-war-op-ed-63601">Tensions between Ukraine and Russia are riding a new high</a> in the wake of Russia’s seizure of three Ukrainian navy ships in the Sea of Azov on Sunday, November 25th. The Ukrainian ships were attempting to pass through the Russian-controlled Kerch Strait to reach to the port of Mariupol. </p>
<p>Although Ukraine claims to have informed the Russian coastguard ahead of time, a Russian ship nevertheless proceeded fire upon, and subsequently ram one of the Ukrainian ships, injuring six sailors. Russia accused the ships of acting recklessly and of illegally entering Russian territorial waters. </p>
<h3><strong>Tensions have been rising since Russia’s construction of the Kerch Strait Bridge in May 2018. </strong></h3>
<p><a   href="http://globalsecurityreview.com/russian-crimean-bridge-completion-escalates-ukraine-russia-tensions/">The bridge</a>, which crosses the Strait to connect the Russian mainland with the Crimean peninsula serves as an on-demand economic blockade of the Ukrainian ports of Mariupol and Berdyansk, both of which are located on the Sea of Azov. Ships carrying export goods from either port must pass through the Kerch Strait, and under the bridge,  to reach their destinations. </p>
<p>Furthermore, the bridge is too low for some Ukrainian ships to pass under at all. While both Russia and Ukraine routinely accuse the other of harassing their respectively-flagged ships, the Kerch Strait bridge has had an impact on trade from the ports of Mariupol and Berdyansk. </p>
<p>Ukraine claims that trade from these ports has <a   href="https://www.reuters.com/article/us-ukraine-crisis-russia-explainer/explainer-troubled-waters-whats-behind-the-russia-ukraine-naval-standoff-idUSKCN1NV1AR?feedType=RSS&#038;feedName=topNews">decreased by 30 percent</a> since Russia began harrassing Ukrainian ships. While traffic has resumed as of Monday, November 26, tensions remain high. </p>
<h3><strong>Ukraine Declares Martial Law </strong></h3>
<p>Following the incident, Ukraine called an emergency meeting of the United Nations Security Council, demanding increased sanctions. Domestically, Ukraine’s Security and Defense Council recommended imposing martial law for sixty days. </p>
<p>The imposition of martial law is something that has never occurred, despite the past four years of Crimean annexation and continued violence in the Donetsk and Luhansk regions. Legally, this makes sense. While Russia never admitted guilt for the Crimean annexation and the violence in the Donetsk and Luhansk region, Russian actions here are quite public.  </p>
<p>Martial law serves Poroshenko in more ways than one. The upcoming Ukrainian presidential election is set for March 31, 2019. Presidential elections cannot be held under martial law. On November 26th, one day after the incident, the Ukrainian Parliament overwhelmingly voted in favor of imposing martial law, albeit for a period of thirty days rather than the initially proposed sixty. </p>
<p>Furthermore, martial law was imposed in the coastal regions of Ukraine and in the regions bordering Russia and the breakaway Moldovan province of Transniestria (where Russian troops are stationed), rather than throughout the entire country.  </p>
<p>As of now, Poroshenko stands in third place in presidential election polls. He is trailing behind former populist prime minister Yulia Tymoshenko, and the comedian Volodymyr Zelensky. Looked at from that perspective, it&#x27;s possible that Poroshenko may be looking to increase support for his presidency—or at least decrease support for his opponents—before the election through the imposition of martial law. </p>
<h3><strong>Putin may think he also stands to benefit from escalating tensions with Ukraine.</strong></h3>
<p>Putin’s popularity in Russia has been declining for the past year. His approval ratings took a particularly substantial hit following the implementation of pension reforms that raised the retirement age. </p>
<p>Putin&#x27;s party, United Russia, also suffered four election losses in Russia’s countryside recently. Stirring up feelings of nationalism may serve to boost Putin’s domestic approval ratings and act as a distraction for the many Russians who are unhappy with the current status quo. </p>
<p>It does not serve Putin or Poroshenko to engage in a full-blown conflict. Escalating tensions to that extent would result in significant increases in civilian casualties and would almost certainly heighten tensions dramatically between Russia and the West. Raising the stakes—at least in the short term—benefits both presidents&#x27; interests.</p>
<p><!-- strchf script --><script>        if(window.strchfSettings === undefined) window.strchfSettings = {};    window.strchfSettings.stats = {url: "https://global-security-review.storychief.io/escalation-sea-azov-benefits-putin-poroshenko?id=1803522697&type=2",title: "Escalation in the Sea of Azov Benefits Putin and Poroshenko",id: "67a59392-0711-40d2-8ebe-f4788e7ac4fa"};            (function(d, s, id) {      var js, sjs = d.getElementsByTagName(s)[0];      if (d.getElementById(id)) {window.strchf.update(); return;}      js = d.createElement(s); js.id = id;      js.src = "https://d37oebn0w9ir6a.cloudfront.net/scripts/v0/strchf.js";      js.async = true;      sjs.parentNode.insertBefore(js, sjs);    }(document, 'script', 'storychief-jssdk'))    </script><!-- End strchf script --></p>
<p><a href="https://globalsecurityreview.com/escalation-sea-azov-benefits-putin-poroshenko/">Escalation in the Sea of Azov Benefits Putin and Poroshenko</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Tensions Between Russia and Ukraine Escalate to Four-Year High</title>
		<link>https://globalsecurityreview.com/tensions-between-russia-ukraine-escalate-four-year-high/</link>
		
		<dc:creator><![CDATA[Anna J. Davidson]]></dc:creator>
		<pubDate>Wed, 28 Nov 2018 15:53:36 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Crimea]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Ukraine]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=8873</guid>

					<description><![CDATA[<p>Geopolitical Language Barriers Between Russia and the West The actions of Russian President Vladimir Putin should be easy to comprehend. According to prevailing wisdom, he is desperately attempting to solidify a sphere of influence along Russia’s borders and redeem a state with an aging population and stagnating economy from the humiliations it endured during the [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/tensions-between-russia-ukraine-escalate-four-year-high/">Tensions Between Russia and Ukraine Escalate to Four-Year High</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Geopolitical Language Barriers Between Russia and the West</h2>
<p>The actions of Russian President Vladimir Putin should be easy to comprehend. According to prevailing wisdom, he is desperately attempting to solidify a sphere of influence along Russia’s borders and redeem a state with an aging population and stagnating economy from the humiliations it endured during the 1990s. To many in the West, however, Russia’s actions in the Sea of Azov on November 25th came as a complete surprise.</p>
<p>On Sunday, November 25, two Ukrainian gun-boats, the Nikopol and the Berdyansk, and a tugboat, the Yani Kapu, attempted to transit the Kerch Strait by passing beneath the newly constructed Kerch Strait bridge. However, Russian forces had <a href="https://www.reuters.com/article/us-ukraine-crisis-russia-kerch-idUSKCN1NU0LA">placed a cargo ship</a> beneath the bridge, blocking passage for any vessel attempting to transit between the Black and Azov Seas. The Kerch Strait is the only access point to the Sea of Azov—waters that are considered to be territory shared between Russia and Ukraine.</p>
<p>Soon after, four Russian <a href="http://www.hisutton.com/Naval_Capabilities-Sea_of_Azov.html">FSB Border Guard patrol boats</a> carrying “<a href="http://time.com/5463988/russia-ukraine-trump-putin-g20/">Spetznatz</a> — the Russian equivalent of U.S. Navy SEALS,” seized the Ukrainian gun-boats and tug for a so-called illegal attempt to enter Russian waters. The four Russian vessels were supported by a smaller coastguard boat and two non-identified helicopters as the vessels repeatedly rammed the Ukrainian vessels, causing damage to them and <u><a href="http://time.com/5463988/russia-ukraine-trump-putin-g20/">wounding six sailors</a></u>.</p>
<p>On the morning of November 26th, NATO Secretary General <a href="https://www.nato.int/cps/en/natohq/news_160780.htm">Jens Stoltenberg discussed</a> the developments on the Sea of Azov with Ukrainian President Petro Poroshenko, assuring the latter of “NATO’s full support for Ukraine’s territorial integrity and sovereignty, including its full navigational rights in its territorial waters under international law.” At Poroshenko’s request, NATO convened a Commission at the ambassadorial level in Brussels on Monday afternoon.</p>
<p>Poroshenko has since declared a thirty-day state of martial law and is <a href="http://time.com/5463988/russia-ukraine-trump-putin-g20/">operating under the assumption</a> that Putin’s actions on Azov indicate a potential intention to fully consolidate Russian control of the Donbass region on the border between Ukraine and Russia. Meanwhile, NATO is working to de-escalate tensions between Ukraine and Russia as we are left waiting for Putin’s next move.</p>
<p>However, the events of November 25th and 26th were not without pretext. Multiple factors have contributed to the tensions between Russia and Ukraine that should have indicated to those of us in the West that a high probability of Russian intervention in Ukraine was pending. Ukraine serves as a strategically significant buffer state between Russia and NATO.</p>
<p>Most <a href="https://www.foreignaffairs.com/articles/russia-fsu/2014-08-18/why-ukraine-crisis-west-s-fault">Realist scholars of international relations</a> believe that Russian leadership would never “tolerate a military alliance that was Moscow&#8217;s mortal enemy until recently moving into Ukraine. Nor would any Russian leader stand idly by while the West helped install a government there that was determined to integrate Ukraine into the West.” Therefore, intentional modifications to Ukraine’s orientation Westward are significant indicators to Russia that its border security may be vulnerable to NATO occupation; such indicators warrant an immediate reaction by the Russian government to decrease such a perceived vulnerability.</p>
<h3>Russia Fears Further NATO Expansion to the East</h3>
<p>The most recent indicator occurred just two days before the confrontation on the Sea of Azov when Ukrainian lawmakers voted in favor of amending the constitution to include NATO and E.U. membership as a strategic goal. Poroshenko described the vote as a message of Ukraine’s intentions of &#8220;<a href="https://www.rferl.org/a/ukraine-poroshenko-russia-/29616266.html">parting completely and irrevocably</a>&#8221; from Russia.</p>
<p>Given Russia’s keenness to prevent and counteract expansion by NATO and the European Union eastward, such a vote by the Ukrainian parliament sends signals to Russia that there is an increasing possibility that such an expansion may occur. NATO expansion has been considered a strategic threat by the Kremlin ever since the intention of NATO to eventually integrate Ukraine was announced during the 2008 Bucharest summit.</p>
<p>In a <a href="http://en.kremlin.ru/events/president/transcripts/24903">press statement</a> after a meeting of the Russia-NATO Council in Bucharest, Russian President Vladimir Putin indicated that a “powerful military bloc on our borders… [is perceived] as a direct threat to the security of our country.” Furthermore, when the E.U. attempted to propel Ukraine’s path to membership via an Association Agreement, the Russian government responded with a <a href="https://www.theguardian.com/world/2013/dec/17/ukraine-russia-leaders-talks-kremlin-loan-deal">counteroffer</a> to then-Ukrainian President Viktor Yanukovych via a loan of $15 billion and a decrease in gas prices, which Yanukovych accepted. In 2014, Russia then responded to the anti-Russian protests and the subsequent political coup that erupted in Kiev by annexing Crimea and amassing forces along the border with Ukraine&#8217;s eastern Donbass Region.</p>
<h3>The Ukrainian Orthodox Church Splits from Moscow</h3>
<p>A second significant indicator signifying an intentional reorientation Westward by Ukraine was the Ukrainian Orthodox Church’s formal intent to separate from Moscow in October. Patriarch of the Orthodox Church, Ecumenical Patriarch Bartholomew I of Constantinople, <a href="https://www.washingtonpost.com/news/monkey-cage/wp/2018/10/31/the-ukrainian-orthodox-church-is-trying-to-withdraw-from-moscows-control-the-kremlin-is-not-happy/?noredirect=on&amp;utm_term=.c86c5d1abff6">initiated a process</a> to grant the Ukrainian Orthodox Church independence from the Russian Orthodox Church. The decision, both geopolitical and religious, has been supported by the Ukrainian public since the Russian invasion of Ukraine in 2014.</p>
<p>The dominance of the Russian Orthodox Church over Ukrainian Orthodoxy is considered by many to be a form of Russian <span style="text-decoration: underline;"><a href="http://globalsecurityreview.com/hybrid-and-non-linear-warfare-systematically-erases-the-divide-between-war-peace/">hybrid warfare</a></span> given the proximity of the Russian Orthodox leadership to the Kremlin. In response to the Patriarch’s decision, the Russian Church has severed ties entirely with the global Orthodox Church. A Kremlin spokesperson <a href="https://www.washingtonpost.com/news/monkey-cage/wp/2018/10/31/the-ukrainian-orthodox-church-is-trying-to-withdraw-from-moscows-control-the-kremlin-is-not-happy/?noredirect=on&amp;utm_term=.c86c5d1abff6">justified the separation</a> as defending “the interests of Russians and Russian-speakers … [and] of Orthodox Christians.”</p>
<p>These two developments combined were sufficient to provoke Russian activity toward Ukraine as they indicated increased resolve by Ukraine to integrate Westward. As a strategic buffer state between Russia and the West, Ukraine’s integration is unthinkable to Russian leadership as it is perceived as directly threatening the country’s national security. Nevertheless, NATO membership is not feasible with the ongoing conflict in the Donbass.</p>
<p>Therefore, Moscow will do whatever it takes to maintain the conflict and unpredictability of its armed forces in the vicinity of Ukraine to decrease its perceived vulnerability and degrade NATO&#8217;s ability to present a potential security threat. As history has shown in Russia, a potential security threat is a legitimate security threat.</p>
<p><a href="https://globalsecurityreview.com/tensions-between-russia-ukraine-escalate-four-year-high/">Tensions Between Russia and Ukraine Escalate to Four-Year High</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Border Battle Against Asylum-Seekers</title>
		<link>https://globalsecurityreview.com/border-battle-against-asylum-seekers/</link>
		
		<dc:creator><![CDATA[Naina Azimov]]></dc:creator>
		<pubDate>Tue, 27 Nov 2018 16:11:38 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Central America]]></category>
		<category><![CDATA[Honduras]]></category>
		<category><![CDATA[Mexico]]></category>
		<category><![CDATA[Nicaragua]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=8857</guid>

					<description><![CDATA[<p>When migrants from Central America venture thousands of miles over dangerous terrain, they do so to escape substantial hardship and insecurity. The U.S.-Mexico border signifies a point of entry to a better life, but migrants and asylum-seekers from the south are greeted with adversity and disdain. Family separations, tear gas, and detentions in cage-like enclosures [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/border-battle-against-asylum-seekers/">The Border Battle Against Asylum-Seekers</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>When migrants from Central America venture thousands of miles over dangerous terrain, they do so to escape substantial hardship and insecurity. The U.S.-Mexico border signifies a point of entry to a better life, but migrants and asylum-seekers from the south are greeted with adversity and disdain. Family separations, tear gas, and detentions in cage-like enclosures are some of the current realities for those who&#8217;ve attempted to cross the border. Furthermore, President Trump has ordered the deployment of <a href="https://www.cnn.com/2018/11/15/politics/us-troop-level-border-deployment/index.html">5,900 U.S. troops</a>.</p>
<h3>Soldiers on the border are an unnecessary response to a non-existent threat.</h3>
<p>The military is not needed to protect the United States from mothers, children, and people escaping violence and persecution. Using troops and guns to prevent people from lawfully seeking asylum is anathema to American values.</p>
<p>The deployment will also cost approximately <a href="https://kdvr.com/2018/11/25/pentagon-says-troops-at-us-border-to-cost-about-210-million/">$72 million in taxpayer funds</a>, at the very least.  These funds would be better allocated to NGOs, which are positioned to provide visible assistance to migrants in need.</p>
<p>NGOs and nonprofits alike are already committed to the border to assist asylum seekers. Despite their benevolent intentions, they simply do not have the resources to keep pace with the influx of migrants. The reallocation of $72 million would provide humanitarian aid and legal services, a better use of taxpayer dollars.</p>
<p>The humanitarian aid would be for those in overcrowded and under-resourced detention centers and for new arrivals. Legal aid would alleviate the backlog of asylum applications for individuals and families currently in detention centers.</p>
<h3>The military deployment is a political stunt.</h3>
<p>According to the most recent White House “Cabinet order,&#8221; U.S. Armed Forces are authorized to detain or use lethal force against migrants in order to prevent them from crossing the border. However, according to Secretary of Defense James Mattis, troops have not been issued firearms, nor do they have the necessary authority under the law to carry out law enforcement responsibilities.</p>
<p>The order itself is a violation of the <a href="https://www.law.cornell.edu/uscode/text/18/1385">Posse Comitatus Act</a>. Military troops cannot detain migrants, they cannot stop asylum seekers, and they cannot seize any drugs that could potentially be carried across the border. All they can do is add to the barbed wire fencing and provide emergency medical assistance. Troop deployments don&#8217;t allow for the effective protection of the perceived threat, rather, the primary purpose of the troop presence is to deter the migrants from attempting to enter the United States.</p>
<p>Persecuted peoples risk drug cartels, disease, and death on their journey to the border. For them to arrive and be denied the opportunity to enter the U.S. and request asylum is both illegal and detrimental to the moral authority of the United States. As a Federal District Court just upheld, these people are legally allowed to enter the country and request asylum. It is illegal to keep them out of the country by deterrence or force.</p>
<p>The United States prides itself on being an example for the world. Border policy should not be an exception. In times of increasing global cooperation and interconnectivity, the U.S. cannot be a nation that shuts its doors to those in need. The United States has moral and international legal obligation to permit asylum seekers to enter the country and request asylum. It cannot ask other countries to meet such responsibilities if it refuses do so itself.</p>
<p>Some see this caravan, and migrants in general, as a threat to the very existence of the United States. They claim that militarizing the border is the exact step the U.S. needs to protect citizens at home. The Trump Administration employs this prejudiced rhetoric, placing travel bans on citizens from the Middle East and now denying entry for citizens from Central America.</p>
<p>From the administration’s perspective, the migrants from Central and South America do pose a threat. This threat is not based on fact, only xenophobia. It is not deserving of a $72 million deployment of over 5,900 troops.</p>
<p>Not only is the troop deployment an improper use of military resources, it is harmful to the United States&#8217; national security interests. The U.S. military is already over-committed and under-resourced. There are currently fewer troops in Syria than there are at the border. Domestic situations do not require such a large scale troop deployment, especially against a fabricated national security threat. Deploying troops to the border impairs existing deployments around the world.</p>
<p>The National Guard is already stationed at the border with over 2,000 troops, and significantly more resources. Using military resources at the border instead of supporting other, higher-priority overseas military operations is a logistical miscalculation on the part of the White House.</p>
<p><a href="https://globalsecurityreview.com/border-battle-against-asylum-seekers/">The Border Battle Against Asylum-Seekers</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is Security? Everything.</title>
		<link>https://globalsecurityreview.com/what-is-security-everything/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Thu, 15 Nov 2018 19:27:37 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Crimea]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[South China Sea]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/what-is-security-everything/</guid>

					<description><![CDATA[<p>The concept of security has evolved considerably since the end of the Cold War. Security is an inherently contested concept, encompassing a wide variety of scenarios, and is commonly used in reference to a range of personal and societal activities and situations. Security can be distinguished between day-to-day security at the individual level (nutritional, economic, [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/what-is-security-everything/">What is Security? Everything.</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The concept of security has evolved considerably since the end of the Cold War.</h2>
<p>Security is an inherently contested concept, encompassing a wide variety of scenarios, and is commonly used in reference to a range of personal and societal activities and situations.</p>
<p>Security can be distinguished between day-to-day security at the individual level (nutritional, economic, safety), security for favorable conditions (the rule of law and due process, societal development, political freedom), and security against adverse conditions or threats (war and violence, crime, climate change).</p>
<p>The term security is used in three broad segments. The first is the general, everyday use of the term. In this instance, security refers to the desire for safety or protection. Second is the usage of the word for political purposes; relating to political processes, structures, and actions utilized to ensure a given political unit or entity is secure.  The term “security” is frequently used as a political tool to assign priority to a given issue or perceived threat within the broader political realm.</p>
<p>Third, and finally, “security” can be employed as an analytical concept to identify, define, conceptualize, explain, or forecast societal developments such as security policy, institutions, and governance structures.</p>
<p>Politically speaking, the usage of the term &#8220;security&#8221; increased drastically in the second half of the twentieth century. Following the allied victory that ended World War II, the United States government&#8217;s military and intelligence institutions underwent a major restructuring.</p>
<h3>The Advent of National Security</h3>
<p>The <a href="https://history.state.gov/milestones/1945-1952/national-security-act" target="_blank" rel="noopener noreferrer">National Security Act of 1947</a> not only created a &#8220;National Military Establishment,&#8221; which would later become the Department of Defense, and the Central Intelligence Agency; the Act established the National Security Council (NSC) to serve as the primary vehicle for coordinating national security and defense policy across multiple government agencies.</p>
<p>The National Security Advisor oversees the U.S. National Security Council. This structure would become a model for other countries; the governments of Australia, Brazil, France, Germany, India, Japan, South Korea, Russia, Turkey, the Republic of China (Taiwan), and the United Kingdom, to name a few, all maintain NSCs responsible for coordinating policy and advising heads of government or state on national security issues.</p>
<p>The advent of national security as a concept enabled states, and their political leaders, to rhetorically pursue a particular security policy. National security policy is broader than defense policy or military policy, and it is more than merely preparing for armed conflict or responding to security threats.  National security policy encompasses all of the above while also aiming to avoid war.</p>
<p>National security includes both internal and external security, foreign policy, economic development, and education. As former U.S. Secretary of Defense Robert McNamara put it, &#8220;security is development.&#8221;</p>
<p>National security policy became a critical tool for states to protect and further their interests within the broader international system. International security policy, which the United Nations was responsible for promoting, was often at odds with the national security interests of individual member states. Thus, the UN lost much of its influence as the world become increasingly divided between the U.S.-led West and the Soviet Union-led East.</p>
<p>It was in this context that the understanding of national security as a concept expanded from being based mainly on defense and military issues to focusing on those matters in conjunction with diplomatic, economic, and political issues, both domestically and internationally. Two major geopolitical blocs competed for global influence, but differently than great powers of the past. The UN provided a forum for the two superpowers to engage with one another to avoid another, likely far more destructive, global conflict.</p>
<h3>A Shifting International Security Landscape</h3>
<p>After the Soviet Union collapsed, the international landscape changed fundamentally. The previously bipolar world order was restructured under as a unipolar order. The United States, being the sole remaining superpower, was ideally positioned as the global hegemon.</p>
<p>A new international security framework was required when the Cold War ended. The previously bipolar international system became replaced by a unipolar global order dominated by the United States. Globally, the odds of a major war between two great powers were increasingly low. From the 1990s through the first decade of the twenty-first century, major conflicts were asymmetrical. The United States and its allies, with or without a mandate from the UN Security Council, employed the use of force multiple times arguing that they were doing so on behalf of the international community.</p>
<p>Some actions, such as the first Gulf War and the U.S.-led invasion of Afghanistan in 2001, enjoyed broad support from the international community. The only time (to date) that Article 5 of the NATO charter has been enacted was following the September 11, 2001, terrorist attacks. These operations were authorized by the United Nations Security Council, which has the responsibility of acting on behalf of all UN member states in matters of global security. The threat of significant conflict between two sovereign states substantially dissipated, for a time.</p>
<h3>Security is Everything</h3>
<p>With a return to great power competition, national security priorities are shifting. States, rather than non-state actors like terrorist groups or insurgencies, are the primary security threat. The idea that security encompasses more than military and defense issues alone has returned, particularly in light of threats posed by rising nationalism and hostile foreign information operations. The security paradigm of the twenty-first century has expanded to nearly every facet of human life.</p>
<p>Rising nationalism is driving <a href="http://globalsecurityreview.com/ontological-security-balkans-lessons-macedonia/">ontological and societal insecurity</a>. This trend is fueled, in part, by economic inequality and stagnation, coupled with an influx of migrants and refugees fleeing violent conflicts, humanitarian disasters, and economic hardship. Unless Western societies implement substantial reforms for integrating immigrants and refugees, existing social divisions will widen, damaging the legitimacy of democratic institutions and polluting national identities with xenophobic sentiments.</p>
<p>There is also growing concern over gang violence, radicalization, transnational crime, privacy threats, and human rights violations worldwide. These issues all impact individual or personal security, and the widespread use of social media and other mass-communications technologies only serve to heighten the emphasis individuals and societies place on individual security.</p>
<p>Issues like climate change and pollution are also increasingly regarded through a security lens. These issues jeopardize human security, meaning they pose a threat to both individuals and humanity as a species.</p>
<p>Finally, cyberspace presents a whole host of new security threats. Cyber attacks not only compromise personal data and steal information, they can cause physical destruction, as well. Critical infrastructure like communications, power plants, water treatment centers, and oil refineries are all vulnerable to a debilitating cyber attack. Such an attack could disrupt operations, inflict sabotage, and even destroy the target facility. Cyber operations can be used by state and non-state actors to complement or augment kinetic operations to achieve a political goal. This is exemplified by <a href="http://globalsecurityreview.com/plausible-deniability-russias-hybrid-war-ukraine/" target="_blank" rel="noopener noreferrer">Russia&#8217;s invasion of Eastern Ukraine</a>.</p>
<p>In the twenty-first century, the concept of security is all-encompassing. The geopolitical element of great-power competition is further exacerbated by a transnational cyberspace, rapidly developing and increasingly accessible technologies, alongside a global economic system which has created complex inter-dependencies between states. In this new order, the traditional security debate between those who see it as a military and defense matter, and those who subscribe to the broader perspective that everything is security.</p>
<p>In this context, national security objectives can be only be achieved when hard power is seen as a compliment to soft power initiatives such as reducing societal and economic inequities, providing access to education and healthcare, and promoting intellectual and technological innovation.</p>
<p><!-- strchf script --><script>        if(window.strchfSettings === undefined) window.strchfSettings = {};    window.strchfSettings.stats = {url: "https://global-security-review.storychief.io/what-is-security-everything?id=660797116&type=2",title: "What is Security? Everything.",id: "67a59392-0711-40d2-8ebe-f4788e7ac4fa"};            (function(d, s, id) {      var js, sjs = d.getElementsByTagName(s)[0];      if (d.getElementById(id)) {window.strchf.update(); return;}      js = d.createElement(s); js.id = id;      js.src = "https://d37oebn0w9ir6a.cloudfront.net/scripts/v0/strchf.js";      js.async = true;      sjs.parentNode.insertBefore(js, sjs);    }(document, 'script', 'storychief-jssdk'))    </script><!-- End strchf script --></p>
<p><a href="https://globalsecurityreview.com/what-is-security-everything/">What is Security? Everything.</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Russia is Consolidating its Control Over the Black Sea</title>
		<link>https://globalsecurityreview.com/russia-consolidating-control-black-sea/</link>
		
		<dc:creator><![CDATA[Gabriella Gricius]]></dc:creator>
		<pubDate>Thu, 08 Nov 2018 19:28:55 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Black Sea]]></category>
		<category><![CDATA[Crimea]]></category>
		<category><![CDATA[Hybrid Warfare]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/russia-consolidating-control-black-sea/</guid>

					<description><![CDATA[<p>Russia&#x27;s actions are an immediate threat to Ukrainian national security, and pose a strategic threat to the interests of the West. Russia has substantially increased its presence in Black Sea since its annexation of Crimea in 2014. Under Russian administration, Crimea plays host to Bastion and Bal coastal defense systems that both employ anti-ship missiles. [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/russia-consolidating-control-black-sea/">Russia is Consolidating its Control Over the Black Sea</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Russia&#x27;s actions are an immediate threat to Ukrainian national security, and pose a strategic threat to the interests of the West.</h2>
<p>Russia has substantially increased its presence in Black Sea since its annexation of Crimea in 2014. Under Russian administration, Crimea plays host to<a   href="https://informnapalm.org/en/bastion-bal-coastal-defense-missile-systems/?fbclid=IwAR31SkGmKsO5TZWkmeJD7XxjoFn3fgpBCtRZMmOADDjBQMl22R2xpQQW0MY"> Bastion and Bal coastal defense systems</a> that both employ anti-ship missiles. Conceivably, the Bastion system can reach the Black Sea straits as well as Ukrainian, Bulgarian, Romanian, and Turkish ports. </p>
<p>Russia has also deployed <a   href="http://tass.com/defense/1022577">S-400 air defense systems</a> to the peninsula with the capability to target strategic bombers, ballistic, and cruise missiles as well as surface targets. The S-400 system is further enhanced by the <a   href="http://tass.com/defense/1002861">Pantsyr S1 anti-aircraft missile and gun system</a> which was provided to the Crimean air defense forces. </p>
<p>Through these measures<a   href="http://www.atlanticcouncil.org/blogs/ukrainealert/russia-shows-its-military-might-in-the-black-sea-and-beyond">, Russia has established an anti-access/area denial (A2/AD) zone</a> over the Black Sea. The establishment of this A2/AD zone means Russia has the capability to block NATO access to the Black Sea. Granted, NATO&#x27;s presence in the Black Sea is limited, but the threat remains nevertheless.  </p>
<h3>Russia&#x27;s moves in the Black Sea threaten Ukraine&#x27;s national security.</h3>
<p>While NATO&#x27;s interests aren&#x27;t directly threatened by Russian actions in the Black Sea, Ukraine&#x27;s are. Russian military deployments in the Black Sea region act as a deterrent to other Western forces who might consider assisting Ukraine militarily. Moscow&#x27;s control over the Black Sea and the Crimean Peninsula has also resulted in Russian control over the disputed Sea of Azov. </p>
<p>Prior to the Crimean annexation, Ukraine and Russia shared sovereignty over the sea. However, in the wake of the annexation, <a   href="http://www.atlanticcouncil.org/blogs/ukrainealert/why-is-the-sea-of-azov-so-important">Russian President Vladimir Putin claimed</a> that not only was Sevastopol perpetually a part of Russia, but Crimea as well as the Sea of Azov were inherently Russian, as well.  </p>
<p>In the case of the Sea of Azov, Russia&#x27;s actions speak louder than words. Earlier in 2018, <a   href="http://globalsecurityreview.com/russian-crimean-bridge-completion-escalates-ukraine-russia-tensions/">Russia completed construction a bridge over the Kerch Strait</a>, explicitly setting it at a height which prevented any Ukrainian commercial ships from transiting the Strait. In doing so, it has threatened the viability of Ukraine&#x27;s ports of Mariupol and Berdyansk. Furthermore, Russian officials have illegally boarded Ukrainian ships, essentially preventing Ukrainian usage of the Sea of Azov.   </p>
<p>These illegal actions act are parts of a psychological operation to convince the Ukrainian people that Russia has a right to act with impunity in its &quot;near-abroad.&quot; In other words, Russia is attempting to persuade Ukraine that NATO and the greater West lack the will to intervene on Ukraine&#x27;s behalf, despite political rhetoric to the contrary. </p>
<h3>Russia finally gets what it wants. </h3>
<p>In addition to impeding Ukraine&#x27;s political shift to the West, Russian objectives in the region include obtaining and maintaining access to and control over a warm water port. The A2/AD zone means that Russia has open access to the Balkans and the Mediterranean Sea. Access to a warm water port has been an objective that has been a cornerstone of Russian foreign policy <a   href="https://warontherocks.com/2018/08/russias-strategy-in-the-black-sea-basin/">since the days of Gregory Potemkin, an advisor to Catherine the Great</a>. </p>
<p>Potemkin advocated for Russian southward expansion through the Balkans, the Caucasus, and the northern Middle East. With control over the Black Sea, Russia has the capacity to embark on a significant naval buildup. This buildup would give a much-needed boost to Russia&#x27;s stagnating economy. </p>
<p>Access and control over the Black Sea also gives Russia a springboard from which to project power into the Middle East, the Balkans, and the greater-Mediterranean. Given Russia’s involvement in the Syrian war, this ability to project power could have measurable implications for that conflict. </p>
<p>Russia has also been conducting a soft power offensive in countries like Bulgaria, Greece, and Serbia, and looks to be maintaining its partnership with Armenia. Russia is also taking steps to improve regional tensions,  calling for an end to the Syrian war and <a   href="https://www.rferl.org/a/qishloq-ovozi-caspian-status-resolved-russia-says/28903729.html">agreeing to a resolution to the dispute over the legal status of the Caspian Sea</a>.  </p>
<p>The consequences of a delayed or minimal response to Russia&#x27;s increasing control over the Black Sea could be substantial. The Black Sea is but one example of Russia&#x27;s slow-but-steady consolidation of power and influence across the Eurasian landmass. If the United States and its fellow NATO allies fail to act, it may be too late to reverse shifting power dynamics in a region of major strategic value.</p>
<p><!-- strchf script --><script>        if(window.strchfSettings === undefined) window.strchfSettings = {};    window.strchfSettings.stats = {url: "https://global-security-review.storychief.io/russia-consolidating-control-black-sea?id=671528207&type=2",title: "Russia is Consolidating its Control Over the Black Sea",id: "67a59392-0711-40d2-8ebe-f4788e7ac4fa"};            (function(d, s, id) {      var js, sjs = d.getElementsByTagName(s)[0];      if (d.getElementById(id)) {window.strchf.update(); return;}      js = d.createElement(s); js.id = id;      js.src = "https://d37oebn0w9ir6a.cloudfront.net/scripts/v0/strchf.js";      js.async = true;      sjs.parentNode.insertBefore(js, sjs);    }(document, 'script', 'storychief-jssdk'))    </script><!-- End strchf script --></p>
<p><a href="https://globalsecurityreview.com/russia-consolidating-control-black-sea/">Russia is Consolidating its Control Over the Black Sea</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ontological Security in the Balkans: Lessons from Macedonia</title>
		<link>https://globalsecurityreview.com/ontological-security-balkans-lessons-macedonia/</link>
		
		<dc:creator><![CDATA[Gjorgji Kostojchinoski]]></dc:creator>
		<pubDate>Thu, 01 Nov 2018 14:55:39 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Balkans]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[Greece]]></category>
		<category><![CDATA[Macedonia]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[NATO]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=8553</guid>

					<description><![CDATA[<p>The historical and geopolitical context of the Balkans ensures the concept of national identity maintains a central place in the region&#8217;s politics. There is a lesson to be learned from recent events in Macedonia—and it must be taken seriously to better understand the interplay between national identity and foreign policy in the Balkans. Any foreign policy [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/ontological-security-balkans-lessons-macedonia/">Ontological Security in the Balkans: Lessons from Macedonia</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The historical and geopolitical context of the Balkans ensures the concept of national identity maintains a central place in the region&#8217;s politics.</h2>
<p>There is a lesson to be learned from recent events in Macedonia—and it must be taken seriously to better understand the interplay between national identity and foreign policy in the Balkans. Any foreign policy decision that is seen as a threat to the continuity of the national identity is perceived as a security threat, and therefore, it is rejected as ontologically unacceptable. The specific historical conditions in the Balkans (still recovering from the traumatic experience of ethnic conflicts) require a different approach than what is advocated by the European Union.</p>
<p>President George Ivanov of the Republic of Macedonia, during his second inaugural speech in 2014, stated that he “will not accept ideas or proposals that would threaten the Macedonian identity, distinctiveness of the Macedonian nation, the Macedonian language and the Macedonian model of coexistence.” Ivanov added that “the Republic of Macedonia and the Macedonian citizens are a benefit for the Union only if we enter as equal in the mosaic of diversity of the European Union, with our own identity and dignity.”<span class="Apple-converted-space"> </span></p>
<p>In his speech, Ivanov makes a clear distinction between Macedonia’s pursuit of its foreign policy interests and the need to ensure the continuity of the country’s national identity and explicitly states his reluctance to endorse any policy that would pose a threat to Macedonian’s self-image in the international arena. Taking this into consideration, one could legitimately expect that the recent political developments in Macedonia can shed new light into the complex relationship between a state’s national identity and its foreign policy.<span class="Apple-converted-space"> </span></p>
<h3>The Referendum in Macedonia</h3>
<p>The referendum held at the end of September 2018 in Macedonia—in contrast to Ivanov’s 2014 speech—conflates of the concept of national identity with foreign policy into a single question: “Are you in favour of European Union and NATO membership by accepting the agreement between the Republic of Macedonia and the Republic of Greece?”<span class="Apple-converted-space"> </span></p>
<p>The “Prespa” <a href="http://globalsecurityreview.com/macedonia-changes-name-or-does-it/">agreement between Macedonia and Greece</a> includes specific clauses about changes to Macedonia’s official name, in addition to modifications to an already-established historical narrative of its national identity. The text of the Agreement arguably indicates a degree of political control over the planned reconstruction of the historical elements of the Macedonian national identity: “The Parties shall establish […] a Joint Inter-Disciplinary Committee of Experts on historic, archeological and educational matters, to consider the objective, scientific interpretation of historical events based on authentic, evidence-based and scientifically sound historical sources and archeological findings. The Committee’s work shall be supervised by the Ministries of Foreign Affairs of the Parties […].” As such, established historical narratives that contribute to the Macedonian national identity would be revised based on a politically supervised “objective, scientific interpretation of historical events.&#8221;</p>
<p>Also, the wording of the referendum question implicitly points out the conditional relationship between the national identity and foreign policy objectives. In other words, the Macedonian voters were reminded that the full implementation of the “Prespa” agreement (and the subsequent amendments to historical elements of the national identity) is a crucial precondition for the realization of the country’s foreign policy goal—joining the E.U. and NATO.<span class="Apple-converted-space"> </span></p>
<p>However, a majority of Macedonians decided to boycott the referendum, illustrating a reluctance to answer a question in which they were asked to affirm the mutually exclusive nature of the relationship between Macedonia’s national identity and its foreign policy priorities. Voter turnout was low at 37 percent, thus failing to secure the 50 percent threshold required to make the vote legitimate. The concept of ontological security must be taken into account to understand why the Macedonian government was unsuccessful in legitimizing the referendum.</p>
<h3>The Referendum in the Context of Ontological Security</h3>
<p>The concept of <a href="https://link.springer.com/article/10.1057/s41268-017-0083-3">ontological security</a>, when applied to international relations, is defined as the unconscious and conscious possession of a fundamental national identity that justifies a country’s existence. It is argued that states pursue ontological security to ensure the continuity of the state’s identity. States must provide for their ontological security in addition to pursuing physical security objectives, such as ensuring the territorial integrity of the state.<span class="Apple-converted-space"> </span></p>
<p>Ontological security of the state is especially important when the national &#8216;self&#8217; interacts with the significant &#8216;other&#8217; in the international arena. The harmony between the already established narratives and discourses that comprise the state’s identity of the state and foreign policy objectives is something governments take into consideration when conducting international relations.</p>
<p>In some cases, however, foreign policy is not conducted by the established narratives of the national identity. Thus, these foreign policy decisions are arguably ontologically unacceptable. To overcome this obstacle, policymakers selectively use specific narratives and discourses to emphasize certain parts of the national identity that could justify the new foreign policy. This strategic manipulation of narratives is done to bridge the cognitive gap between national identity and a foreign policy that is perceived as controversial or disruptive.</p>
<p>The referendum in Macedonia and the events preceding present an ideal case study for analyzing the importance of ontological security in foreign policymaking. Consistent reminders from both E.U. and NATO officials that an agreement on the name issue between Macedonia and Greece is a crucial precondition for Macedonia’s integration both entities made both of these foreign policy objectives ontologically unacceptable for many voters in Macedonia.</p>
<p>After years of difficult negotiations between Greece and Macedonia, an agreement was reached. Voters were faced with a referendum where they were asked whether they would accept the “Prespa” name-change agreement for the sake of Macedonia’s integration into the E.U. and NATO. Undoubtedly aware of the substantial cognitive dissonance between the already established ontological narratives and the requirements set by foreign policy objectives, the government initiated a strategic and selective reshaping of narratives to improve the controversial perception of these conflated policies—thus reducing the perceived threat to Macedonia’s ontological security.</p>
<h3>The Macedonian Government’s Failed Strategy</h3>
<p>A major theme of the government’s pre-referendum strategy was portraying the referendum as an opportunity to affirm the &#8216;European&#8217; nature of Macedonia. The media and political elites in Macedonia told voters that they had the historic chance to vote for a ‘European&#8217; Macedonia. The Prime Minister of Macedonia Zoran Zaev said that “September 30 is a day to write history, for European Macedonia.” For months before the vote, the European dimension of the Macedonian national identity was emphasized through political rhetoric. In contrast, the country’s new name—the Republic of North Macedonia—decided in the agreement between Macedonia and Greece, was hardly mentioned.<span class="Apple-converted-space"> </span></p>
<p>This selective application of specific narratives and withdrawal of others to formulate a revised national identity represents a discursive manipulation aimed at bridging the cognitive gap between the national identity and the foreign policy goal. In other words, the Macedonian national identity was repeatedly ‘europeanized’ in political statements to portray the pro-European foreign policy as ontologically acceptable and compatible with the national identity—thus posing no threat to the continuity of the identity of the state.<span class="Apple-converted-space"> </span></p>
<p>However, low voter turnout for the referendum indicates the government’s pre-referendum campaign was not sufficient. Voters were not convinced of two crucial things: that if they vote ‘yes’ they vote for a ‘European’ Macedonia, and that the continuity of the national identity – the ontological security of the state – will be maintained if the referendum was successful. Put in other words, the government’s strategy of selective usage and strategic manipulation with different narratives did not succeed in its aim to bridge the gap between national identity and foreign policy priorities.<span class="Apple-converted-space"> </span></p>
<p>The events in Macedonia must be taken seriously to better understand the interplay between national identities and foreign policymaking, especially in the Balkans. A volatile security context such as that of Balkan states leaves relatively less space for political differentiation between the physical and ontological security of the state. The region’s historical and geopolitical context gives the historical element of the national identity a central place in the politics of the Balkan countries. Since the end of the Cold War, the continuity of the national identity has been considered as a crucial component of the security and sovereignty of the states in the Balkans.<span class="Apple-converted-space"> </span></p>
<p>Unfortunately, a crucial, yet oft-neglected, issue is that the E.U. conditional framework for states in the Balkans doesn’t entirely account for the importance of national identity in the region. On the contrary, E.U. conditionality criteria include clauses requiring that aspiring members enter into negotiations over their national identities. The specific historical conditions in the Balkans, which continue to recover from the trauma of multiple ethnic conflicts—mandate a different approach on the part of European institutions. The 2018 referendum in Macedonia should serve as a reminder that the geopolitical interests are not always the first choice in the Balkans, especially if they come at the cost of losing the ontological security of the state.<span class="Apple-converted-space"> </span></p>
<p><a href="https://globalsecurityreview.com/ontological-security-balkans-lessons-macedonia/">Ontological Security in the Balkans: Lessons from Macedonia</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The United States Announces Unilateral Termination of INF Treaty</title>
		<link>https://globalsecurityreview.com/united-states-unilateral-termination-inf-nuclear-treaty-russia/</link>
		
		<dc:creator><![CDATA[Gabriella Gricius]]></dc:creator>
		<pubDate>Thu, 25 Oct 2018 14:25:36 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Arms Control]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/united-states-unilateral-termination-inf-nuclear-treaty-russia/</guid>

					<description><![CDATA[<p>The U.S. is moving to withdraw from the Intermediate-range Nuclear Forces (INF) Treaty in response to alleged violations by Russia. Out of the few issues that Russia and the United States agreed on during the Cold War, arms control was one of the more prominent subjects. Both countries recognized that some form of control was [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/united-states-unilateral-termination-inf-nuclear-treaty-russia/">The United States Announces Unilateral Termination of INF Treaty</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The U.S. is moving to withdraw from the Intermediate-range Nuclear Forces (INF) Treaty in response to alleged violations by Russia.</h2>
<p>Out of the few issues that Russia and the United States agreed on during the Cold War, arms control was one of the more prominent subjects. Both countries recognized that some form of control was needed as tensions escalated in the early 1980s. This understanding culminated in the Intermediate-Range Nuclear Forces Treaty of 1987, known as the INF Treaty, signed by then-U.S. President Ronald Reagan and Soviet leader Mikhail Gorbachev. Forty years later, the United States has indicated it will withdraw from the treaty.</p>
<p>On October 20, 2018 U.S. National Security Advisor John Bolton <a href="https://www.rferl.org/a/trump-cites-china-nuclear-buildup-in-vowing-abandon-inf-treaty-with-russia/29558658.html" target="_blank" rel="noopener noreferrer">announced </a>that according to U.S. rationale, there are “Russian INF-violating missiles in Europe now… the threat is not American withdrawal from the treaty. The threat is Russian missiles already deployed.” Bolton also argued that the U.S. doesn’t find the treaty fair because other countries like Iran, China and North Korea can develop weapons that are prohibited under the treaty while the U.S. cannot.</p>
<p>According to Bolton, Russian violations of the INF treaty imply that the U.S. is the sole party in compliance. Kremlin spokesman Dmitry Peskov criticized the move, claiming that to proceed without any sort of new agreement was not welcomed by the Russian Federation.</p>
<h3>What is the INF Treaty?</h3>
<p>The INF Treaty prevents the United States and Russia from possessing, developing, or deploying ground-launched ballistic and cruise missiles with a range of between 500 and 5,500 kilometers. Almost 2,700 short and medium range missiles were eliminated by the Soviet Union and the United States.</p>
<p>The initial treaty was formed in response to a Cold War crisis, when Russia installed around 400 nuclear warheads pointed at Europe. In turn, the U.S. deployed Pershing and Cruise missiles within Europe itself. Anti-nuclear campaigners protested that the deployment would turn Europe into a nuclear battleground.</p>
<p>Negotiations were initiated in 1981 but only continued for two years before falling apart. However, in 1986, negotiations restarted thanks to the Prime Minister at the time, Margaret Thatcher. This time, talks not only surrounded the proposed INF treaty, but also the START I Treaty. Due to the bilateral nature of the treaty, neither China nor any other country besides Russia is party to the INF treaty.</p>
<h3>Accusations of non-compliance are nothing new.</h3>
<p>In 2014, the Obama administration accused Russia of violating the treaty by testing a ground-based cruise missile that fell within the intermediate range distance. This time, the accusation stems from that same missile, the 9M729, which the Trump administration claims has been successfully tested. However, in 2014 there was no threat of the then U.S. government leaving the treaty. Many of the United States&#8217; European allies objected to the idea, particularly Germany, as they saw it as a precursor to a new arms race.</p>
<p>Even now, Nikolai Patrushev, Secretary of Russia’s Security Council, has publicly stated that Russia is willing to discuss mutual grievances with the U.S. Ensuring that intermediate missiles are not a threat is a positive aspect of the treaty for both countries. It also means that European countries are not concerned about becoming the newest battleground between the US and Russia.</p>
<h3>Is terminating the INF treaty a mistake?</h3>
<p>Although it can be <a href="https://www.brookings.edu/blog/order-from-chaos/2018/10/19/the-trump-administration-is-preparing-a-major-mistake-on-the-inf-treaty/" target="_blank" rel="noopener noreferrer">argued</a> that the bilateral nature of the INF treaty is outdated in a world where the U.S. considers its main rival to be China, that is no reason to unilaterally withdraw from the treaty. In fact, by exiting first, the U.S. will receive all the blame for terminating the treaty.</p>
<p>Once the U.S. withdraws from the treaty, there will be no reason for Russia to, at the very least, feign compliance. In other words, Russia and the US will feel free to deploy these short and intermediate range missiles. That does not sit well with European allies, who have all cautioned that leaving the treaty is a mistake.</p>
<p>In the 1960s, the U.S. had more than 30,000 nuclear warheads. As of last year, that number dropped to around 4,480. Without arms control treaties, there is every chance that another arms race could commence. Particularly the New START treaty, which is set to expire in 2021, may no longer seem necessary in a world where, <a href="https://www.theguardian.com/world/2018/oct/22/eu-us-nuclear-arms-race-inf-treaty-bolton-moscow" target="_blank" rel="noopener noreferrer">according</a> to President Trump, “until they get smart, there’s going to be nobody that’s even going to be close to us.”</p>
<p><!-- strchf script --><script>        if(window.strchfSettings === undefined) window.strchfSettings = {};    window.strchfSettings.stats = {url: "https://global-security-review.storychief.io/united-states-unilateral-termination-inf-nuclear-treaty-russia?id=1766637952&type=2",title: "The United States Announces Unilateral Termination of INF Treaty",id: "67a59392-0711-40d2-8ebe-f4788e7ac4fa"};            (function(d, s, id) {      var js, sjs = d.getElementsByTagName(s)[0];      if (d.getElementById(id)) {window.strchf.update(); return;}      js = d.createElement(s); js.id = id;      js.src = "https://d37oebn0w9ir6a.cloudfront.net/scripts/v0/strchf.js";      js.async = true;      sjs.parentNode.insertBefore(js, sjs);    }(document, 'script', 'storychief-jssdk'))    </script><!-- End strchf script --></p>
<p><a href="https://globalsecurityreview.com/united-states-unilateral-termination-inf-nuclear-treaty-russia/">The United States Announces Unilateral Termination of INF Treaty</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>India Agrees to Buy Russian S-400 Air Defense System: What Does it Signify?</title>
		<link>https://globalsecurityreview.com/india-agrees-buy-russian-s400-air-defense-system-what-does-signify/</link>
		
		<dc:creator><![CDATA[Ilyssa Tuttelman]]></dc:creator>
		<pubDate>Fri, 12 Oct 2018 18:11:29 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Doklam]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=8448</guid>

					<description><![CDATA[<p>India&#8217;s $5 billion agreement to purchase Russia&#8217;s S-400 air defense system creates a potential wedge between the U.S. and India. Following the India-Russia summit in Sochi this past summer, a pivotal Eurasian arms agreement is emerging that is creating an opportunity to weaken the relationship between India and the United States. 23 bilateral agreements are [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/india-agrees-buy-russian-s400-air-defense-system-what-does-signify/">India Agrees to Buy Russian S-400 Air Defense System: What Does it Signify?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>India&#8217;s $5 billion agreement to purchase Russia&#8217;s S-400 air defense system creates a potential wedge between the U.S. and India.</h2>
<p>Following the India-Russia summit in Sochi this past <u><a href="https://www.brookings.edu/blog/up-front/2018/07/02/future-of-the-india-russia-relationship-post-sochi-summit/">summer</a></u>, a pivotal Eurasian arms agreement is emerging that is creating an opportunity to weaken the relationship between India and the United States. 23 bilateral agreements are being finalized in which Russia will sell India $5 billion-worth of Russian-made S-400 air defense <u><a href="https://www.businessinsider.com/trump-may-impose-sanctions-on-india-after-buying-russian-s-400-weapons-2018-10">systems</a></u>. The S-400 air defense systems have a range of up to 250 miles, and are capable of stealth aircraft detection.</p>
<p>India is an important partner of the U.S and the S-400 is a major arms export for Russia. As a result, President Trump responded to the summit and subsequent arms deal by threatening possible <u><a href="https://www.cnn.com/2018/10/05/asia/india-s400-deal-intl/index.html">sanctions</a></u> on India. These would be added to the sanctions India potentially faces for purchasing oil from <u><a href="https://www.brookings.edu/blog/up-front/2018/07/02/future-of-the-india-russia-relationship-post-sochi-summit/">Iran.</a></u> The monumental India-Russia arms deal sends multiple signals to the international community by both countries.</p>
<p>First, Russia has played an increasingly larger role in challenging U.S. dominance in global geopolitics. Russia conducting arms sales with a country in which the U.S. maintains good relations signals further challenging to the dominance of the U.S. there. As India has an important relationship with both the U.S. and Russia, signing a $5 billion arms agreement with Russia may perceived as India’s increased reliance on Russia rather than the United States. This is significant because, despite deteriorating relations between Russia and India in recent <u><a href="https://www.brookings.edu/blog/up-front/2018/07/02/future-of-the-india-russia-relationship-post-sochi-summit/">years</a></u>, the S-400 sale indicates both sides are opting to strengthen bilateral ties.</p>
<p>Second, the Russia-India arms deal represents increased tensions along the China-Indian borders. China and India had a standoff along their <u><a href="https://www.cnn.com/2017/07/19/asia/india-china-border-standoff/index.html">border</a></u> during the summer of 2017. By the end of August, the Chinese government warned India to withdraw troops from the Doklam border. A few days later, both agreed to withdraw troops from the Himalayan <u><a href="https://www.washingtonpost.com/world/india-withdraws-troops-from-disputed-himalayan-region-defusing-tension-with-china/2017/08/28/b92fddb6-8bc7-11e7-a2b0-e68cbf0b1f19_story.html?utm_term=.88077d86e745">border.</a></u></p>
<p>In June 2018, Chinese envoy to India, Luo Zhaohui said that the two countries could not handle another border <u><a href="https://www.newsweek.com/china-says-it-cannot-afford-another-conflict-india-985033">dispute:</a></u> &#8220;We need to control, manage, narrow differences through expanding cooperation. The boundary question was left over by history. We need to find a mutually acceptable solution through Special Representatives&#8217; Meeting while adopting confidence-building measures.” India purchasing an air defense systems of this magnitude can be interpreted as an attempt to deter China from further border clashes.</p>
<p>Lastly, the purchase of Russian air defense systems creates the opportunity for a shift in India’s security dilemma. It directly represents an increase in India’s preparation and willingness to defend itself &#8211; and the perceived need to do so. This is a reaction to the fact that China has a similar S-400 defense <u><a href="https://www.newsweek.com/china-says-it-cannot-afford-another-conflict-india-985033">system</a></u> which it bought from Russia in <u><a href="https://www.businessinsider.com/this-infographic-has-everything-you-need-to-know-about-the-russian-s-400-missile-defense-system-2015-11">2015.</a></u> The first shipment of Russian S-400s arrived in China this <u><a href="https://www.businessinsider.com/china-has-russian-s-400-air-defense-system-2018-5">May.</a></u> Consequently last month, Chinese President Xi Jinping remarked on the relationship between China and <u><a href="https://www.cnbc.com/2018/09/12/china-xi-wants-more-business-with-russia-amid-raising-protectionism.html">Russia:</a></u> “We have unique geographic benefits. China and Russia are the biggest neighbors, we have solid political ties … Chinese and Russian relationships are at an all time high level.”</p>
<p>As a response to the increased China-Russia partnership, India has also turned to Russia. On October 4, India Prime Minister Narendra Modi welcomed Russian President Putin to India. During a joint press meeting, Prime Minister Modi <u><a href="https://www.narendramodi.in/pm-modi-with-russian-president-vladimir-putin-at-a-joint-press-meet-541762">explained:</a></u> “India gives top priority to its relations with Russia. Changing the fast, our relationships in this world have become more relevant.”</p>
<p>The Indian purchase from Russia sends many indicators to the international community. India is clearly and deliberately increasing its air defense capabilities to deter China, protect itself, and retain its ties with Russia. The international community—and the United States as a global power—should respond to India’s clear military buildup and the increased India-Russian partnership. This must be done before signals are misread and a dangerous shift in geopolitics occurs. American sanctions on India may not result in desired effects.</p>
<p>Strengthened relations between India and Russia could weaken ties between the United States and India. To counter Russia’s influence in Southeast Asia, the U.S. must move quickly to strengthen and solidify the U.S.-India partnership. To do so, the U.S. should host Prime Minister Modi to reinforce the American-Indian partnership and avoid inadvertently pushing New Delhi closer to Moscow.</p>
<p><a href="https://globalsecurityreview.com/india-agrees-buy-russian-s400-air-defense-system-what-does-signify/">India Agrees to Buy Russian S-400 Air Defense System: What Does it Signify?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How an Ethiopia-backed port is changing power dynamics in the Horn of Africa</title>
		<link>https://globalsecurityreview.com/how-ethiopia-backed-port-changing-power-dynamics-horn-of-africa/</link>
		
		<dc:creator><![CDATA[Brendon J. Cannon&nbsp;&&nbsp;Ash Rossiter]]></dc:creator>
		<pubDate>Thu, 04 Oct 2018 14:54:45 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Djibouti]]></category>
		<category><![CDATA[Ethiopia]]></category>
		<category><![CDATA[Kenya]]></category>
		<category><![CDATA[Somalia]]></category>
		<category><![CDATA[United Arab Emirates]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=6916</guid>

					<description><![CDATA[<p>When Eritrea gained its independence from Ethiopia in 1993, Ethiopia became landlocked and therefore dependent on its neighbours – especially Djibouti – for access to international markets. This dependency has hampered Ethiopia’s aspiration to emerge as the uncontested regional power in the Horn of Africa. Recently, however, the ground has been shifting. As we point [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/how-ethiopia-backed-port-changing-power-dynamics-horn-of-africa/">How an Ethiopia-backed port is changing power dynamics in the Horn of Africa</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>When Eritrea gained its independence from Ethiopia in 1993, Ethiopia became landlocked and therefore dependent on its neighbours – especially Djibouti – for access to international markets. This dependency has hampered Ethiopia’s aspiration to emerge as the uncontested regional power in the Horn of Africa.</p>
<p>Recently, however, the ground has been shifting. As we point out in a <a href="http://risingpowersproject.com/quarterly/ethiopia-berbera-port-shifting-balance-power-horn-africa/">recent article</a>, Ethiopia has attempted to take advantage of the recent involvement of various Arab Gulf States in the Horn of Africa’s coastal zone to reduce its dependency on Djibouti’s port. The <a href="http://www.theeastafrican.co.ke/news/Ethiopia-to-trade-using-regional-ports/2558-2682324-11idtdp/index.html">port currently accounts</a> for 95% of Ethiopia’s imports and exports. It has done so by actively trying to interest partners in the refurbishment and development of other ports in the region: Port Sudan in Sudan, Berbera in the Somaliland region of Somalia, and Mombasa in Kenya.</p>
<p>But it is Berbera, in particular, that will prove the most radical in terms of challenging regional power dynamics as well as international law. This is because a port deal involving Somaliland will challenge Djibouti’s virtual monopoly over maritime trade. In addition, it may entrench the de-facto Balkanization of Somalia and increase the prospects of Ethiopia becoming the regional hegemon.</p>
<h3>Ethiopia’s regional policy</h3>
<p>Ethiopia’s interest in Berbera certainly makes sense from a strategic perspective. It is closest to Ethiopia and will connect the eastern, primarily Somali region of Ethiopia to Addis Ababa. It will also provide a much needed outlet for trade, particularly the export of livestock and agriculture.</p>
<p>The development and expansion of the port at Berbera supports two primary pillars of Ethiopia’s regional policy. The first is maintaining <a href="https://www.ajol.info/index.php/ajia/article/view/99572">Eritrea’s isolation</a>. The aim would be to weaken it to the point that it implodes and is formally reunited to Ethiopia. Or it becomes a <a href="https://www.ceeol.com/search/article-detail?id=539285">pliant, client state</a>.</p>
<p>The second pillar rests on maintaining the <a href="https://tandfonline.com/doi/abs/10.1080/10246029.2006.9627402">status quo in post-civil war Somalia</a>. Simply put, a weak and fractured Somalia enables Ethiopia to focus on quelling persistent internal security difficulties. It also keeps up pressure on Eritrea.</p>
<p>Ethiopia’s ambitions for Berbera have been hampered by two problems. Firstly the Republic of Somaliland – a <a href="https://www.tandfonline.com/doi/abs/10.1080/13698249.2017.1343411">de-facto independent state</a> since 1991 – still isn’t recognised internationally. This makes engagement a political and legal headache. Secondly, Ethiopia, doesn’t have the critical resources needed to invest and build a port.</p>
<p>Ethiopia had been trying to get Abu Dhabi and Dubai interested in the Berbera Port for years. It’s latest push was assisted by a number of factors. These included <a href="http://www.washingtoninstitute.org/policy-analysis/view/gulf-coalition-operations-in-yemen-part-3-maritime-and-aerial-blockade">a shift in the UAE’s military focus</a> in Yemen and Ethiopian assurances of more trade and some financing to upgrade the port.</p>
<p>Ethiopia’s diplomatic push – which coincided with developments across the Gulf of Aden – finally got it the result it craved. In May 2016, DP World, a global mega-ports operator, signed an agreement to develop and manage Berbera Port <a href="http://www.wsj.com/articles/dubais-dp-world-agrees-to-manage-port-in-somaliland-for-30-years-1464549937">for 30 years</a>.</p>
<h3>The Berbera Port deal</h3>
<p>It is unlikely that DP World would have signed the deal if it didn’t see some <a href="http://risingpowersproject.com/quarterly/ethiopia-berbera-port-shifting-balance-power-horn-africa/">long-term commercial benefit</a>. The deal also includes economic, military and political dimensions.</p>
<p>Economically, for example, there will be investments in Somaliland’s fisheries, transportation and hospitality industry. The UAE will also establish a <a href="http://www.janes.com/article/75758/uae-base-in-somaliland-under-construction">military installation</a> in Berbera. The base is intended to help the UAE tighten its blockade against Yemen and stop weapons being smuggled from Iran.</p>
<p>Politically, the Berbera Port deal has provoked mixed reactions in Somaliland. There has been some popular anger aimed at Somaliland’s former president, Ahmed Mohamed Mohamoud aka “Silanyo”, and his family who <a href="https://www.voanews.com/a/somali-official-says-somaliland-deal-with-uae-corrupt-illegal/3724682.html">reportedly benefited personally</a> from it. Anger also stems from inter-clan and sub-clan rivalry over land, particularly in the Berbera area.</p>
<p>But the anger in Somaliland pales in comparison to the reaction in Mogadishu. This is because the Somaliland government has remained largely isolated internationally – until the port deal.</p>
<p>Somalia Federal Government ministers have <a href="http://www.presstv.ir/Detail/2017/02/15/510655/Somalia-UAE-military-base-Somaliland-Nur-Jimale-Farah-Berbera-Yemeni-conflict">publicly challenged</a> the right of Somaliland to enter into official agreements with any country. The Ethiopian-driven deal means that Mogadishu’s claims over the breakaway territory have weakened substantially. The deal means that Somaliland has partially broken the glass ceiling of international recognition by entering into substantive deals with viable business partners and states operating <a href="http://risingpowersproject.com/quarterly/ethiopia-berbera-port-shifting-balance-power-horn-africa/">on the global stage</a>. Mogadishu can no longer pretend it controls the government in Somaliland’s capital Hargeisa.</p>
<h3>Ethiopia’s wins</h3>
<p>The bottom line is that Ethiopia has engineered access to another port and enhanced its security and strategic economic interests. With the growth in annual volumes of transit cargo, Ethiopia has, for a long time, needed <a href="http://www.portstrategy.com/news101/insight-and-opinion/post-script/The-Berbera-option">alternative routes</a> from Djibouti.</p>
<p>In addition, Ethiopia has ensured its presence in the running of the port by acquiring a <a href="https://www.khaleejtimes.com/ethiopia-acquires-19-stake-in-dp-world-berbera-port">19% share</a> in the deal.</p>
<p>And by wangling a legally binding agreement between Somaliland and another state, Ethiopia has potentially paved the way for eventual international recognition of Hargeisa.</p>
<p>Ethiopia has also further cemented its hold over Somaliland through a combination of pressure and material incentives. By bringing significant outside investment and recognition, Ethiopia can also increasingly meddle in its internal affairs. This is a conundrum for Hargeisa. It finds itself increasingly emboldened to act independently. Yet it remains constrained by the need to get Addis Ababa’s approval.</p>
<p>As Ethiopia begins to move increasing amounts of goods and services on Somaliland’s new highway to the refurbished port of Berbera, Hargeisa may begin to question key aspects of the port deal.</p>
<p>But one aspect will not be in question: Ethiopia’s rising power and influence over the entire region.</p>
<p><a href="https://globalsecurityreview.com/how-ethiopia-backed-port-changing-power-dynamics-horn-of-africa/">How an Ethiopia-backed port is changing power dynamics in the Horn of Africa</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Is China Weaponizing Blockchain Technology for Gray Zone Warfare?</title>
		<link>https://globalsecurityreview.com/china-weaponizing-blockchain-technology-gray-zone-warfare/</link>
		
		<dc:creator><![CDATA[Jahara Matisek]]></dc:creator>
		<pubDate>Fri, 28 Sep 2018 16:19:03 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=6314</guid>

					<description><![CDATA[<p>Disclaimer: The views presented in this article are those of the author and do not necessarily represent the views of the Department of the Air Force, U.S. Department of Defense, or U.S. Government. A Chinese cybersecurity expert might have let the “cat out of the bag.” Writing in the People’s Liberation Army (PLA) Daily, the [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/china-weaponizing-blockchain-technology-gray-zone-warfare/">Is China Weaponizing Blockchain Technology for Gray Zone Warfare?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h6 style="text-align: center;"><i>Disclaimer: The views presented in this article are those of the author and do not necessarily represent the views of the Department of the Air Force, U.S. Department of Defense, or U.S. Government.</i></h6>
<p>A Chinese cybersecurity expert might have let the “cat out of the bag.” Writing in the People’s Liberation Army (PLA) Daily, the author <a href="http://www.81.cn/jfjbmap/content/2018-02/02/content_198619.htm">highlights</a> how a component of Bitcoin technology known as “blockchain” (区块链) will have “military applications,” adding “there is no doubt that the future of media war must rely on a specific network media to start.”</p>
<p>More troubling though is that it was written specifically for the Chinese military as a specific call to action: “the media battle of wars will become an important form of future military struggles. If we do not take precautions in keeping with the pace of the times, we will be subject to control everywhere.” The PLA author is 100 percent correct, but does this mean the West should allow China take control of the “media battle of wars”?</p>
<p>Whichever countries successfully harness this emerging blockchain technology for military and intelligence operations in the 21st century will likely determine their future level of international influence and power. What exactly is blockchain and what are its implications for <a href="http://ndupress.ndu.edu/JFQ/Joint-Force-Quarterly-80/Article/643108/unconventional-warfare-in-the-gray-zone/">gray zone warfare</a>?</p>
<p>To the layman, discussions on some new <a href="https://s3.amazonaws.com/academia.edu.documents/32413652/BitCoin_P2P_electronic_cash_system.pdf?AWSAccessKeyId=AKIAIWOWYYGZ2Y53UL3A&amp;Expires=1520292774&amp;Signature=D%252FTeYvzmtsOkcjtAcPgcogNx6Q0%253D&amp;response-content-disposition=inline%253B%2520filename%253DBitcoin_A_Peer-to-Peer_Electronic_Cash_S.pdf">Bitcoin</a> technology (e.g., blockchain) influencing military and intelligence operations in a pivotal way may sound preposterous. However, blockchain when integrating into a specific national strategy has the potential to fundamentally alter the future of relations between states, societies, and citizens. If properly utilized as a national security instrument by the Chinese (and others), it can undermine Western governments by subverting standard mechanisms that detect criminal and subversive activities.</p>
<h3>The Importance of Blockchain</h3>
<p>To those unfamiliar with the subject, “<a href="https://books.google.com/books?id=9tgoDwAAQBAJ&amp;pg=PA21&amp;lpg=PA21&amp;dq=%2522blockchain%2522+warfare&amp;source=bl&amp;ots=d1l1_RQEXi&amp;sig=zq27c32EnNPz3oqFxdVhn7aTJEk&amp;hl=en&amp;sa=X&amp;ved=0ahUKEwjL1dG5vcvZAhWEtVkKHZKVCzUQ6AEIbzAI#v=onepage&amp;q=%2522blockchain%2522%2520warfare&amp;f=false">blockchain is considered the main technological innovation of Bitcoin</a>.” The rise of cryptocurrencies, such as Bitcoin, and the ability to authenticate and provide payment anonymously in a secure way relies on a “distributed ledger technology” enabled by blockchain. As identified by three Chinese researchers in a 2016 <a href="http://www.airitilibrary.com/Publication/alDetailedMesh?docid=gfkj201602007">article</a> titled  “Blockchain technology and its potential military value” (区块链技术及其潜在的军事价值]) in <i>National Defense Science &amp; Technology</i>, the authors highlight the value of blockchain technology, noting the numerous security ramifications, especially in the realm of defensive and offensive operations. Also, as written in a <i>China Management Informationization</i> <a href="http://www.cqvip.com/qk/91121a/201623/670794256.html">article</a>, blockchain supports “trustworthiness, reliability, openness, consensus mechanism and smart contract” in business transactions and other dealings where discrete payments are needed.</p>
<p>Scholars in India are similarly concerned about blockchain supporting the conduct of military operations, with one author <a href="http://www.claws.in/1666/military-applications-of-blockchain-technology-sanatan-kulshrestha.html">recognizing</a> that as governments and individuals develop quantum computing abilities, blockchain will make it easy to hack into highly secure networks. Such writings by foreign scholars suggest that blockchain will change the way countries alter the battlespace in their favor without even being detected. However, it is ironic that China recently <a href="http://www.scmp.com/news/china/economy/article/2132119/beijing-bans-bitcoin-when-did-it-all-go-wrong-cryptocurrencies">announced a ban</a> on cryptocurrencies, while their experts are advocating for ways in which to weaponize Bitcoin technology for war.</p>
<p>Blockchain presents an opportunity for numerous uses in the military and intelligence communities. The technology neatly into the paradigm of warfare in the <a href="https://warontherocks.com/2015/05/fighting-and-winning-in-the-gray-zone/">’Gray Zone</a>,’ where Chinese aggression defines the “ambiguity — about the ultimate objectives, the participants, whether international treaties and norms have been violated, and the role that military forces should play in response.” The uncertain nature of gray zone warfare is what makes blockchain so appealing as a tool. Adversarial governments and extremist groups can utilize it – with little fear of being caught “red-handed” – to further their interests at the expense of other countries unwilling or unable to stop it.</p>
<h3>Blockchain in the Gray Zone: China Attacking Western Civil Society?</h3>
<p>A U.S. Naval Officer, writing for <i>The Jamestown Foundation</i>, is rightly <a href="https://jamestown.org/program/beyond-bitcoin-china-embrace-blockchain-defense-security-applications/">concerned</a> that blockchain technology “has been recognized as having intrinsic value and utility for Chinese defense issues,” and “would align with the civil-military application goals tied to the broad <i>informatization</i> (信息化) campaign” espoused in <a href="http://www.chinadaily.com.cn/china/2015-05/26/content_20820628_5.htm">China’s 2015 Military Strategy</a>.</p>
<p>If we accept the notion that China is <a href="http://risingpowersproject.com/quarterly/china-as-a-rising-power-versus-the-us-led-world-order/">a rising power</a>, then we should also accept that – much like other historical “<a href="http://foreignpolicy.com/2017/06/09/the-thucydides-trap/">rising powers</a>” – China will increasingly want to exercise its instruments of national power in military, economic, and political spheres. If China is seeking to <a href="https://thediplomat.com/2017/06/would-china-be-a-benign-hegemon/">increase its regional hegemony</a> in the Pacific, and gray zone <a href="https://thediplomat.com/2017/05/chinas-maritime-operation-the-gray-zone-in-black-and-white/">actions</a> in the South China Sea are any indication of future behavior, then recent gray zone attacks against Australia and New Zealand indicate how blockchain might work on a global scale, and against the interests of the U.S. and her Western allies.</p>
<p><a href="http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&amp;objectid=11995384">Research</a> on Chinese “influence campaigns” in the Pacific by a professor in New Zealand has already drawn substantial international attention, not just for her findings, but because of what China did to her. As far as anyone can tell, her articles touched a nerve with Beijing, with Chinese agents appearing to <a href="http://www.newshub.co.nz/home/new-zealand/2018/02/new-zealand-academic-says-break-ins-at-her-home-are-intimidation-move-to-silence-research-on-china.html">intimidate</a> her. The reason why China had every reason to worry about her <a href="https://www.wilsoncenter.org/article/magic-weapons-chinas-political-influence-activities-under-xi-jinping">work</a> was that she specifically identified <a href="https://muse.jhu.edu/article/595922/summary">Chinese actions</a> to influence opinion in Australia and New Zealand on China by subverting their political system.</p>
<p>The author discovered the paper trail of money leading back to China (and their corporations), whereby China was giving substantial amounts of money numerous political parties in Australia and New Zealand. China was also financially courting current (and former) government officials and public intellectuals in each country as a way of undermining public debates about China.</p>
<p>Their campaign has chilling ramifications for how blockchain could make future Chinese operations impossible to uncover or detect, as they will likely continue their subversive operations against any countries that might oppose their rise to power.</p>
<p>What I am about to propose is purely speculative, but if we perceive the “<a href="https://www.project-syndicate.org/commentary/china-soft-and-sharp-power-by-joseph-s--nye-2018-01">Sharp Power</a>” actions by China as an attempt to undermine civil society and democracy in the West, then the “Gray Zone” war is about to escalate and shift in favor of China.</p>
<h4>Speculative blockchain uses could entail:</h4>
<ol>
<li>For espionage purposes, China could securely pay significant sums of money to trusted agents in Western societies that would be effectively untraceable. Such Chinese intelligence agents could – depending on the blockchain encrypted communications – pursue <a href="https://www.nbcnews.com/news/china/cia-china-turncoat-lee-may-have-compromised-u-s-spies-n839316">actions</a> meant to sow disunity or political polarization. This could come in the form of providing significant monetary contributions to extremist political parties on the left and right side. This would be quite a remarkable strategy and shift in tactics because instead of trying to support civil society groups and organizations towards the preferences of China, such an approach would just overall weaken the country as polarized politics would make it difficult to respond to growing Chinese power because Western politicians would be too divided and fragmented to mobilize an adequate response.</li>
<li><span style="text-transform: initial;">Blockchain security protocols, if properly implemented by Chinese intelligence and security agencies would essentially make their state secrets impenetrable. While I am not suggesting that the West should be trying to electronically infiltrate Chinese systems in an offensive fashion, it would at least serve as a future deterrent to Chinese cyber actions. Already China has been identified on </span><a style="text-transform: initial;" href="https://www.csmonitor.com/World/Passcode/Passcode-Voices/2017/0320/How-China-is-preparing-for-cyberwar">numerous occasions</a><span style="text-transform: initial;"> for conducting information collection operations (i.e., stealing classified and sensitive business information) that have relied on </span><a style="text-transform: initial;" href="http://nationalinterest.org/blog/the-buzz/report-chinas-military-growing-super-powerful-by-stealing-18677">cyber warfare tactics</a><span style="text-transform: initial;"> to steal technology from Western governments, militaries, and commercial companies (to include the </span><a style="text-transform: initial;" href="https://www.thetimes.co.uk/article/chinese-steal-jet-secrets-from-bae-dwwpgl00kwj">military-industrial complex</a><span style="text-transform: initial;">). </span></li>
<li><span style="text-transform: initial;">If the West were to attempt an information war within China, the authentication protocols provided by blockchain would make it nearly impossible to create and spread “</span><a style="text-transform: initial;" href="https://thenextweb.com/cryptocurrency/2017/10/23/an-ico-for-blockchain-technology-that-disrupts-fake-news-is-the-most-2017-thing-ever/">fake news</a><span style="text-transform: initial;">.” However, if the West did not use blockchain defensively, then China could create confusion in Western societies by distributing “fake news” through trusted Western media outlets. This could damage public debates about societal problems and international politics as each side of the political spectrum could be “duped” into believing false grievances and cleavages, which would undermine the policymaking process throughout all levels of government.</span></li>
</ol>
<p>Each of these hypothetical scenarios suggests are within the realm of possibility. China could integrate blockchain into their security and intelligence operations as a way of <a href="https://www.jstor.org/stable/43773703?seq=1#page_scan_tab_contents">leveraging</a> American structures against the U.S. and her allies.</p>
<h3>Conclusion</h3>
<p>Disruptive blockchain technology is coming – whether or not we want it. There are staggering implications for gray zone warfare, especially from China and other hostile adversaries using Bitcoin technologies against the U.S. and her allies. Western defense communities will need to handle this and acknowledge the troubling reality that gray zone warfare will be harder to detect and <a href="http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1589&amp;context=jss">deter</a>. Moreover, besides state threats, Bitcoin technologies also make it easier for terrorist groups and violent non-state actors (e.g., criminals, gangs, etc.) to operate as it is almost impossible for security</p>
<p>Luckily, the West is not entirely unprepared about blockchain applicability for military uses: the Pentagon is looking into <a href="https://i-hls.com/archives/78395">securing databases</a>, the American Defense Advanced Research Project Agency (DARPA) is <a href="https://www.coindesk.com/darpa-seeks-blockchain-messaging-system-for-battlefield-back-office-use/">developing</a> a secure battlefield communication system, and Estonia has <a href="https://e-estonia.com/wp-content/uploads/faq-a4-v02-blockchain.pdf">rebuilt its government</a> around the technology. These are promising signs, but whoever weaponizes blockchain the fastest (i.e., establishing supremacy in this emerging technology), will undoubtedly achieve the sought after <a href="https://obamawhitehouse.archives.gov/files/documents/cyber/Davidson%2520MaryAnn%2520-%2520The%2520Monroe%2520Doctrine%2520in%2520Cyberspace.pdf">Monroe Doctrine in Cyber Space</a>.</p>
<p>However, much is left to be done with trying to modernize defense systems in the West using blockchain. Moreover, there is a need to ‘harden’ and ‘strengthen’ civil society against foreign subversion that might rely on blockchain to create and spread fake news (i.e., propaganda). Additionally, the prospect of untraceable monetary donations to influence important individuals, politics, and policies in the West, poses tremendous challenges to the workings of liberal Western democracies.</p>
<p>While my three blockchain examples were hypothetical, there is no evidence to suggest this has occurred yet. Unfortunately, from a logical and intuitive position, these are entirely within the realm of reality, especially in a gray zone war context of the 21st century. Hard military power appears to be exercised less by rising powers such as China, and thus far, Chinese behavior in the international community appears bent on shaping narratives, politics, and negotiations in favor of their own interests.</p>
<p><a href="https://globalsecurityreview.com/china-weaponizing-blockchain-technology-gray-zone-warfare/">Is China Weaponizing Blockchain Technology for Gray Zone Warfare?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>To Counter Hybrid Threats, U.S. Must Redefine Conception of Warfare</title>
		<link>https://globalsecurityreview.com/reconceptualizing-acts-foreign-aggression/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Thu, 27 Sep 2018 04:01:27 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Abkhazia]]></category>
		<category><![CDATA[Crimea]]></category>
		<category><![CDATA[Georgia]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[South Ossetia]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/reconceptualizing-acts-foreign-aggression/</guid>

					<description><![CDATA[<p>The United States perceives warfare in a fundamentally different way than its adversaries—that needs to change. The status of U.S.-Russia relations is often explained by commentators as a &#8220;second Cold War.&#8221; This, however, is a misstatement. The Soviet Union and the United States were nowhere near as interconnected as Russia and the U.S. today. Even [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/reconceptualizing-acts-foreign-aggression/">To Counter Hybrid Threats, U.S. Must Redefine Conception of Warfare</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The United States perceives warfare in a fundamentally different way than its adversaries—that needs to change.</h2>
<p>The status of U.S.-Russia relations is often explained by commentators as a &#8220;second Cold War.&#8221; This, however, is a misstatement. The Soviet Union and the United States were nowhere near as interconnected as Russia and the U.S. today. Even despite Western sanctions, Russia remains deeply integrated into the global trading, financial, and political systems—and it has exploited them.</p>
<p>American (and European) institutions, civil society, and social discourse—at all levels—have been caught almost entirely off-guard by the Kremlin’s strategic exploitation of a rigid military taxonomy.</p>
<p>Failure to accurately conceptualize war threatens national security and risks destabilizing the rules-based global order. Changing the perception that cyber and traditional warfare are distinct—or even mutually exclusive—entities is a prime example of a necessary step forward.</p>
<h3>21st Century Wars Are Fought in all Domains</h3>
<p>U.S. leaders have struggled to conceptualize asymmetric measures of influence-projection,  like the Russian concept of nonlinear warfare. In the aftermath of the U.S.-led NATO intervention in Yugoslavia, Russian military planners recognized that—a considerable <a href="http://globalsecurityreview.com/nuclear-de-escalation-russias-deterrence-strategy/" target="_blank" rel="noopener noreferrer">nuclear arsenal</a> notwithstanding—Russia&#8217;s conventional forces would have no means of matching NATO in terms of conventional force parity.</p>
<p>In the first decade of the twenty-first century, the U.S. military underwent a restructuring based on its experience fighting mostly insurgents and other non-state actors in the Middle East. Meanwhile, an increasingly emboldened Russia embarked an multi-domain campaign to counter what it perceives as the threat of <a href="http://globalsecurityreview.com/russian-expansionism-consequence-geography/" target="_blank" rel="noopener noreferrer">NATO encirclement</a>.</p>
<p>First and foremost, the U.S. must restructure the civilian and military components of its national security apparatus. Accordingly, the core notions of national security and warfare as legal, practical, and existential concepts that have been maintained for over seven decades are no longer applicable. Policymakers and strategists must regard warfare in an entirely new light.</p>
<p>Western military strategists over-rely on a rigid structure of categories or taxonomies in their effort to build a useful model for various types of conflict. Cyber operations have been treated as a distinct domain—a domain of lower strategic importance than warfare in the traditional sense.</p>
<blockquote><p>Changing the perception that cyber and traditional warfare are distinct entities is a prime example of a necessary step forward.</p></blockquote>
<p>In contrast—to the detriment of U.S. strategic interests—adversarial powers have learned to rely on a nuanced mixture of conventional forces, cyber warfare, and the dissemination of strategic communications (propaganda) through traditional, digital, and social media outlets to deliberately sow confusion and dissent within a target territory or state.</p>
<h3>Agile Warfare</h3>
<p>With a perpetual “innovation-cycle,” Russian nonlinear tactics are strikingly similar to the Agile development methodology used by engineering teams in the technology sector.</p>
<p>The iterative cycle of establishing a hypothesis, experimentation (also known as a/b testing), analysis, and iterative review, repeated endlessly, has been a remarkably efficient way of creating disorder.</p>
<p>Such chaos makes it difficult for dissenters both outside and inside the country to effectively mobilize their compatriots, overloading social media and data streams with information and traffic from botnets and trolls.</p>
<h3>The Age of Nonlinear Combat</h3>
<p>Nonlinear warfare has been described by some “the Gerasimov doctrine”—following the publication of an essay by General Valeriy Gerasimov, Chief of the Russian General Staff —this is a misnomer. In contemporary parlance, nonlinear warfare is synonymous with <a href="http://globalsecurityreview.com/hybrid-and-non-linear-warfare-systematically-erases-the-divide-between-war-peace/" target="_blank" rel="noopener noreferrer">hybrid warfare</a>. The U.S. Department of Defense uses the term &#8220;hybrid threat.&#8221;</p>
<p>The notion of hybrid or nonlinear warfare is also incorrectly associated with the concept of asymmetric warfare, which originated following the U.S.-led invasions of Afghanistan and Iraq, and the insurgencies that arose in the aftermath.</p>
<p>The U.S. had limited experience with long-term combat against non-state actors and lengthy counter-insurgency campaigns prior to the 2001 and 2003 invasions of Afghanistan and Iraq, respectively. The term asymmetric warfare was used to define this new paradigm.</p>
<p>However, the system of classification has, yet again, proved to be the United States&#8217; achilles heel. Without a doubt, the United States possesses insurmountable conventional military strength and continues to pose an undoubtedly credible threat of mutually assured destruction through its strategic nuclear arsenal.</p>
<p>Both Russia and China realized early that technological advancements in the fields of information technology and population or market research and analysis could be effectively weaponized and integrated into a multichannel offensive military strategy that would have far-reaching advantages when it came to confrontations with the less-agile policies pursued by U.S. military planners.</p>
<p>Moscow’s success stems from its total or &#8220;all-in&#8221; conception of war. The Kremlin has been heavily investing in modernizing its outdated soviet-equipped military. This model depends on the blurring of lines between state and non-state actors, alliances and adversaries; even war and peace.</p>
<p>Starting in 2008, Russian special and conventional forces were assisted by political subversion, information warfare, and other active measures in simultaneous and complementary assault on Georgian infrastructure and territory. As a result, the Georgian state was paralyzed and unable to act to prevent the de-facto secession of the territories of Abkhazia and South Ossetia.</p>
<figure class="image large"><picture><source srcset="https://d2ijz6o5xay1xq.cloudfront.net/account_4692/crimea-spetznaz_bc9d258220cb01ac8dfbc73ee5f26ad6_800.jpg 1x, https://d2ijz6o5xay1xq.cloudfront.net/account_4692/crimea-spetznaz_bc9d258220cb01ac8dfbc73ee5f26ad6_1600.jpg 2x" media="(max-width: 768px)" /><source srcset="https://d2ijz6o5xay1xq.cloudfront.net/account_4692/crimea-spetznaz_bc9d258220cb01ac8dfbc73ee5f26ad6_1000.jpg 1x, https://d2ijz6o5xay1xq.cloudfront.net/account_4692/crimea-spetznaz_bc9d258220cb01ac8dfbc73ee5f26ad6_2000.jpg 2x" media="(min-width: 769px)" /><img decoding="async" src="https://d2ijz6o5xay1xq.cloudfront.net/account_4692/crimea-spetznaz_bc9d258220cb01ac8dfbc73ee5f26ad6_1000.jpg" alt="" /></picture><figcaption><em>Russian Spetsnaz (special forces) in Crimea, Ukraine in 2014. Labeled &#8220;little green men&#8221; by Ukrainians, they lacked any identifying insignia which provided Moscow with a degree of plausible deniability.</em></figcaption></figure>
<p>A similar scenario occurred in Moscow’s annexation of Crimea from Ukraine in 2014, with an executed apparatus of plausible deniability using information warfare, insurgent funding, and economic warfare to utilize proxy “local actors” to achieve individual goals. In the Crimean campaign, Russia&#8217;s non-kinetic operations—information, economic, and cyber attacks—laid the groundwork for a complementary military operation.</p>
<h3>Nonlinear Thought and Military Planning</h3>
<p>Linear thinking has long-dominated military planning and has dominated Western military strategy until the end of the twentieth century. In a linear thought model, a strategy is laid out through detailed planning, established processes, step by step detail management tips, and stakeholder expectations.</p>
<p>To combat <a href="http://globalsecurityreview.com/hostile-foreign-interference-2016-election/" target="_blank" rel="noopener noreferrer">foreign influence operations</a>, all levels of the private and public sectors must develop and implement strategic plans to protect intellectual property, secure sensitive information, and deter acts of aggression. This requires a substantial degree of nonlinear thought. Nonlinear thought is less constrictive than linear thinking. A nonlinear combatant employs a range of tactics and measures across domains to gauge what is effective and what isn&#8217;t.</p>
<p>The ability to project force through a multitude of mediums is tantamount to U.S. national security interests—particularly if those means are utilized by a foreign adversary to subvert or threaten the interests of the United States.</p>
<p><!-- Piwik --><script type="text/javascript">    var _paq = _paq || [];    var url = "https://global-security-review.storychief.io/reconceptualizing-acts-foreign-aggression?id=8005579&type=2";    const queryDict = {};    location.search.substr(1).split("&").forEach(function(item) {queryDict[item.split("=")[0]] = item.split("=")[1]});    if ('contact' in queryDict){      const separator = (url.indexOf("?")===-1)?"?":"&";      url = url + separator + "contact="+queryDict['contact'];    }    if ('list' in queryDict){      const separator = (url.indexOf("?")===-1)?"?":"&";      url = url + separator + "list="+queryDict['list'];    }    _paq.push(['setDocumentTitle', 'To Counter Hybrid Threats, U.S. Must Redefine Conception of Warfare']);    _paq.push(['setCustomUrl', url]);    _paq.push(['trackPageView']);    _paq.push(['enableHeartBeatTimer', 15]);    _paq.push(['enableLinkTracking']);    (function() {        var u="//storychief.piwikpro.com/";        _paq.push(['addTracker', u+'piwik.php', '67a59392-0711-40d2-8ebe-f4788e7ac4fa']);        var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0];        g.type='text/javascript'; g.async=true; g.defer=true; g.src=u+'piwik.js'; s.parentNode.insertBefore(g,s);    })();</script><!-- End Piwik Code --><!-- strchf script --><script async src="https://d37oebn0w9ir6a.cloudfront.net/scripts/v0/strchf.js"></script><!-- End strchf script --></p>
<p><a href="https://globalsecurityreview.com/reconceptualizing-acts-foreign-aggression/">To Counter Hybrid Threats, U.S. Must Redefine Conception of Warfare</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Georgia: A solitary peacekeeping mission on the edge of Europe</title>
		<link>https://globalsecurityreview.com/georgia-solitary-peacekeeping-mission-edge-europe/</link>
		
		<dc:creator><![CDATA[Giorgi Lomsadze]]></dc:creator>
		<pubDate>Tue, 18 Sep 2018 15:48:32 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[Georgia]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Russia]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=8261</guid>

					<description><![CDATA[<p>This article was originally published on Eurasianet. For nearly a decade, peacekeepers backed by the European Union have kept watch over a shaky peace at the far corner of Europe – along the contested boundary left after the Georgian-Russian war. The patrol is the EU’s only peace mission of its kind. It also remains the [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/georgia-solitary-peacekeeping-mission-edge-europe/">Georgia: A solitary peacekeeping mission on the edge of Europe</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: center;"><em>This article was originally published on <a href="https://eurasianet.org/georgia-a-solitary-peacekeeping-mission-on-the-edge-of-europe">Eurasianet</a>.</em></p>
<p>For nearly a decade, peacekeepers backed by the European Union have kept watch over a shaky peace at the far corner of Europe – along the contested boundary left after the Georgian-Russian war. The patrol is the EU’s only peace mission of its kind. It also remains the only dispassionate witness and deterrent to flare-ups in a region taut with ethnic tensions, unpredictability, and unclear borders.</p>
<p>When the EU brokered the <a href="https://www.eurasianet.org/on-anniversary-of-war-georgians-curse-putin">ceasefire</a> between Georgia and Russia in August 2008, it also took upon itself the task of monitoring compliance, setting up a 200-person contingent known as the European Union Monitoring Mission (EUMM). But Russia developed its own plan: It declared the <a href="https://www.eurasianet.org/georgia-aims-at-better-future-with-breakaway-abkhazia-and-south-ossetia">disputed territories</a> of Abkhazia and South Ossetia independent states, gave them its full military protection and effectively barred all international monitoring inside them.</p>
<p>Moscow’s veto ended the consensus-based, long-standing peacekeeping operations in the two Soviet-era administrative regions. Until 2008, the regions – which broke away from Georgia just after Georgia broke away from the crumbling USSR – <a href="https://www.eurasianet.org/georgia-international-observer-missions-face-uncertain-future">had been monitored</a> by both the United Nations and the Organization for Security and Cooperation in Europe (OSCE).</p>
<p>“Now we are the only international presence, which means that we […] are the eyes and ears of the international community in a wider sense,” Erik Høeg, head of the EUMM, told Eurasianet.</p>
<p>But unlike the previous missions, the EUMM is not allowed into Abkhazia and South Ossetia. It does its monitoring from the Georgian-controlled side. When German Chancellor Angela Merkel <a href="https://www.eurasianet.org/merkels-visit-to-tbilisi-leaves-georgians-disappointed">visited</a> Georgia in late August and joined the patrol, she, just as the patrollers do, had to peek through binoculars to take a look at South Ossetia.</p>
<section class="content-embed">Headquartered in the OSCE’s former Tbilisi building, EUMM has field offices near the two flashpoints. It dispatches daily unarmed patrols to observe and mitigate incidents across the line that divides Georgia from the separatist regions, a line defended heavily by Russian troops.“We have a number of patrols every day. They vary, some days it&#8217;s 11 or 12, some days 16,” Høeg told Eurasianet. “These patrols then come back and report their findings.” The findings are combined into reports for European capitals and also are reviewed at internationally meditated peace talks focused on preventing escalations in the regions. The mission also monitors Georgian compliance to the peace plan.Russia’s Foreign Ministry, as well as authorities in Abkhazia and South Ossetia, did not respond to requests for comment.</p>
<p>The EUMM can’t physically prevent Russian troops from arresting Georgian citizens across the boundary of breakaway South Ossetia, the main battleground of the 2008 war. Russian troops sometimes detain Georgian farmers who venture or stray across the boundary, which cuts through Georgian farms and villages. The farmers are usually released after paying a fine, which the Georgian side describes as a ransom.</p>
<p>“We have had 72 cases of arrests of Georgians at the South Ossetian ABL [administrative boundary line] just this year and sometimes we were able to negotiate humane solutions,” said Høeg. For instance, when the detained were elderly or sick, the EUMM was able to convince Russian border guards not to take the individuals to Tskhinvali, the South Ossetian capital.</p>
<p>To ensure the Georgians adhere to the boundary, Russian troops have been building a fence, walling South Ossetia off from the rest of Georgia. “From 2009 on we observed an increase in what we call borderization – the establishment of physical infrastructure that creates barriers for people moving: fencing, observation towers, surveillance equipment, controlled crossing points, patrolling,” said Høeg. “So the key finding that we saw through these years is the hardening of the ABL, as we call it.”</p>
<p>Tbilisi describes this as a “<a href="https://www.eurasianet.org/georgian-vigilantes-take-on-south-ossetias-creeping-border-crisis">creeping annexation</a>,” complaining that Russia keeps moving the border deeper into Georgian territory. Høeg sees the process differently: “Mainly, it is more about the line becoming more impenetrable, rather than [them] physical moving the boundary.” Until the 2008 war, farmers freely crossed their property when it straddled the South Ossetian separatist line. Now some find a Russian-built fence cutting through their property – even in some cases right through houses – taking bits of their land. “So for the people living there, the border has moved,” Høeg explained.</p>
<p>Perhaps the most unnerving incidents in recent years were the deaths of two Georgian men. One <a href="https://www.eurasianet.org/family-still-waiting-for-body-of-georgian-killed-in-south-ossetia">died mysteriously</a> in South Ossetian custody last February; the other was <a href="https://www.eurasianet.org/georgia-south-ossetia-exchange-magnitsky-like-lists">shot by an Abkhaz border guard</a> following a public argument in 2016. The incidents underscored Georgia’s and the observers’ limited ability to defend civilians.</p>
<p>But, despite these limits, the Georgian government is happy to have the monitors. “Although the mission is denied to enter [sic] the [Russian-] occupied territories of Abkhazia and Tskhinvali region (South Ossetia), it represents an important stabilizing instrument that, at the same time, contributes to confidence-building among the war-torn societies,” Georgia’s Foreign Ministry told Eurasianet in emailed comments.</p>
<p>“Besides, the mission represents an impartial and reliable source for the international society to get accurate information about the security and human rights situation on the ground,” the statement added.</p>
<p>Protected and endowed by Russia, the separatist regions have little incentive to negotiate their status with Georgia. But even so, the EUMM says, all sides involved do have an interest in maintaining daily stability.</p>
<p>There are quotidian matters such as shared irrigation systems and electricity supplies that the breakaway regions need to coordinate, however grudgingly, with the Georgians. “There can be simple matters like a cow is missing and, it turns out, it went to the other side,” Høeg said, adding that the EUMM helps facilitate such discussions, leaving aside the question of a long-term solution. “We call it managed stability.”</p>
</section>
<p><a href="https://globalsecurityreview.com/georgia-solitary-peacekeeping-mission-edge-europe/">Georgia: A solitary peacekeeping mission on the edge of Europe</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>12 Predictions for Global Geopolitics for 2019 through 2025—and Beyond</title>
		<link>https://globalsecurityreview.com/world-will-look-like-2025/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Sat, 15 Sep 2018 18:54:19 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United Nations]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/world-will-look-like-2025/</guid>

					<description><![CDATA[<p>Geopolitical tensions will continue to escalate over the course of the next seven years. Governments and institutions will be tested by considerable challenges over the next decade as the international order is restructured and global trends converge. All forms of government in every region will face increasing tensions both domestic and foreign. In the short-term, [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/world-will-look-like-2025/">12 Predictions for Global Geopolitics for 2019 through 2025—and Beyond</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Geopolitical tensions will continue to escalate over the course of the next seven years.</h2>
<p>Governments and institutions will be tested by <a href="http://globalsecurityreview.com/why-are-global-tensions-escalating/">considerable challenges</a> over the next decade as the international order is restructured and global trends converge.</p>
<p>All forms of government in every region will face increasing tensions both domestic and foreign. In the short-term, these global trends will increase the threat posed by all types of terrorism, and the ability for asymmetrically-powerful state and non-state actors to adversely affect the International order and the global balance of power.</p>
<p>Tensions are rising because citizens around the world are raising questions about the relationship that exists between governments and themselves. The social contract that exists between society and their governments is unraveling as people demand increasing levels of security and prosperity. Globalization means that domestic conditions are shaped, to an ever-greater degree, by occurrences overseas.</p>
<p><a href="http://globalsecurityreview.com/trend/populism/">Growing populism</a> in the West threatens an international order governed by rule-of-law. Tensions between governing elites and their citizens are reshaping global geopolitics. A weakened United States would mean less of an emphasis on human rights and maintenance of global order.</p>
<p>Less of a U.S. presence on the global stage creates gaps for authoritarian powers like China and Russia. It also means a heightened risk of conflict arising between competing for regional powers like India and Pakistan or Iran and Saudi Arabia, and an international order comprised of competing “spheres of influence.”</p>
<h3>1. Sharpening tensions and heightened doubts concerning the U.S. role in the world will continue for several years.</h3>
<p>In the short term, the U.S. will have a <a href="http://globalsecurityreview.com/changing-role-united-states/">diminished presence</a> abroad due to domestic political divisions. These political divisions compounded by with the Trump administration&#8217;s preference for unilateral action, which threaten to isolate the U.S. diplomatically.</p>
<p>Economic crises and inequality have contributed to widening societal and class divisions. The number of men who are not working and not seeking work is at its highest since the Great Depression. However, incomes have risen slowly, and investors see high rates of return on both domestic and foreign investments.</p>
<p>Politically, the country is still profoundly divided. However, growing solidarity and activism around critical issues such as healthcare have been useful in checking executive and congressional power.</p>
<h3>2. The European Union will need to implement badly needed reforms to maintain its legitimacy.</h3>
<p>The Brexit vote of 2016 and <a href="http://globalsecurityreview.com/european-union-chance-lead/">rising popularity of far-right</a> nationalist political parties in Western Europe has led many observers to question the long-term viability of a united Europe. In the aftermath of the 2016 U.S. presidential election, many were concerned that European far-right politicians like Marine Le Pen would gain traction in their electoral contests.</p>
<p>However, despite considerable attempts by Le Pen’s campaign—and the Kremlin—Emmanuel Macron led a stunning rebuke of the populist trend circumventing the globe. Europe initially seemed to be trending away from the right as the United States Government continued to be paralyzed by the competing factions of the governing Republican Party. In light of a slew of populist and right-wing victories across E.U. member state, however, it&#8217;s clear that politics on both sides of the Atlantic are increasingly polarized.</p>
<p>Rising ethnic, demographic, and economic tensions will make European integration more difficult. Furthermore, Europeans must repair the structural problems in E.U. institutions.</p>
<p>For example, E.U. agencies set monetary policy for members of the Eurozone; however, member states retain control over their financial and security obligations. This leaves poorer E.U. states like Greece with vast amounts of debt and decreasing growth prospects. There is no unified E.U. security policy; each member state determines its national security strategy.</p>
<h3>3. Ongoing uncertainty surrounding the future North Korea&#8217;s nuclear program threaten East Asian security.</h3>
<p>In <a href="http://globalsecurityreview.com/northeast-asia-japan-south-korea/">North Korea</a>, Kim Jong Un has consolidated his grip on power through patronage and fear and has doubled down on his nuclear and missile programs, developing long-range missiles that may soon endanger the continental USA.</p>
<p>Beijing, Seoul, Tokyo, and Washington have a shared incentive to handle security risks in Northeast Asia, but a history mutual distrust, warfare, and occupation makes cooperation between the different parties difficult.</p>
<p>A resumption of North Korean provocations, such as nuclear and missile tests, may destabilize the balance of power in the region and result in the North&#8217;s immediate neighbors potential taking unilateral action to defend their security interests.  Kim is determined to secure international recognition of the North as a nuclear power, for security, prestige, and political legitimacy.</p>
<p>Contrary to his father and grandfather, he’s had substantial success in terms of achieving those goals.  He codified the North’s nuclear status in the party constitution in 2012 and reaffirmed it during the Party Congress in 2016.</p>
<p>Beijing faces a continuing strategic conundrum about the North.  Pyongyang’s behavior both undermines China’s argument that the US army presence in the region is anachronistic and demonstrates Beijing’s lack of influence–or perhaps lack of political will to exert influence—within its neighbor and customer.</p>
<p>North Korean behavior leads to tightening U.S. alliances, more assertive action by US allies, and, on occasion, greater cooperation between these partners themselves—and might lead to a change in Beijing’s approach to North Korea with time. However, long-simmering tensions between South Korea and Japan fueled by the South&#8217;s historical grievances may hinder Washington&#8217;s efforts to present a united front against North Korea.</p>
<h3>4. Populism and dissent will spread across Latin America.</h3>
<p>Leftist governments have been <a href="http://globalsecurityreview.com/central-south-america/">kicked out</a> in Argentina, Peru, and Guatemala. Venezuela’s left-wing populist government is stripping the country of its democratic institutions in a sharp slide towards authoritarianism, leading to a sharp increase in lawlessness across the country.</p>
<p>Furthermore, while Venezuela doesn’t produce drugs, it’s become a major transport hub for drugs going to Europe or  Africa before being routed to Europe. Drug trafficking increases under as the rule of law decreases. After a 2009 coup in Honduras, the country was run by a fragile government—lawlessness increased dramatically.</p>
<p>Honduras now has one of the highest homicide rates in the world. Countries like the United States are seeing a significant increase in the number of people arriving from countries like Honduras that are plagued with violence.</p>
<h3>5. Expect increasing assertiveness from Beijing and Moscow as both governments seek to lock in competitive advantages.</h3>
<p><a href="http://globalsecurityreview.com/assertions-rising-declining-world-powers/">Beijing and Moscow</a> will seek to lock in competitive advantages and also to right what they perceive as historical wrongs before economic and demographic trends can present impediments and the West regains its foundation.</p>
<p>Both China and Russia maintain worldviews where they’re rightfully dominant in their regions and able to form regional politics and economics to match their security and material interests.</p>
<p>Both have moved aggressively in latest years to exert more considerable influence in their regions, to contest the U.S., and also to force Washington to accept exclusionary regional spheres of influence—a situation that the US has historically opposed.</p>
<h3>6. The standoff between Russia and the West will continue throughout 2019.</h3>
<p>Diplomatic spats, strategic political and political tensions will last between <a href="http://globalsecurityreview.com/russia-ongoing-tensions-west-throughout-2018/">Russia and the U.S</a>. In Washington, U.S. President Donald Trump’s administration may have few choices for relieving the strain because of increased checks on the president’s power and enlarged sanctions from the U.S. Congress.</p>
<p>In Moscow, meanwhile, forthcoming local and national elections will prevent the Kremlin from creating significant concessions. Consequently, sanctions enacted on Russia from the US along with the European Union probably will stay through the end of the year. Depending upon how investigations into Russia’s role at the 2016 U.S. Presidential election shape upward, Washington might even ramp up the political and financial pressure on Russia.</p>
<p>Similarly, North Korea will remain a factor in determining the direction of U.S.-Russian relations over the next several months. Russia will keep going along with the overtures that Washington has made to Pyongyang, but will skirt sanctions requirements and continue provide economic aid to North Korea as it sees fit.</p>
<h3>7. China, for its part, may have domestic concerns to grapple with this year.</h3>
<p>The <a href="http://globalsecurityreview.com/china-xi-jinping-consolidates-power-china-reasserts-abroad/">Chinese Communist Party’s</a> careful preparation for a change of direction was realized in the October 2017 party congress. The event reshuffled the highest ranks of the party and was a proof of President Xi Jinping&#8217;s near-absolute consolidation of power.</p>
<p>To date, all indications point to the Xi&#8217;s success in strengthening his grip over top decision-making bodies of both the Party and the state. Xi has already achieved the status of core leader of the Communist Party, the Chinese state and People&#8217;s Liberation Army (PLA).</p>
<p>Xi has also managed to quickly promote a lot of his partners to prestigious positions in 2017 and 2018. Even more significant, party members nearly unanimously endorsed the addition of Xi’s philosophy of the Communist Party Constitution at the Party Congress, positioning him alongside the venerated figures of Deng Xiaoping and Mao Zedong.</p>
<h3>8. Expect Persisting Volatility in Southeast Asia</h3>
<p>Nuclear deployment requirements for naval-based delivery vehicles remove a safety valve that, until now, has kept atomic weapons stored separately from <a href="http://globalsecurityreview.com/south-asia-india-pakistan/">missiles in South Asia</a>.</p>
<p>At-sea deployments of atomic weapons by India, Pakistan, and perhaps China, would increasingly militarize the Indian Ocean throughout the next two decades.</p>
<p>The presence of multiple nuclear powers with uncertain doctrine for controlling your stresses at sea incidents between nuclear-armed vessels increases the potential risk of miscalculation and inadvertent escalation.</p>
<p>New Delhi, however, will continue to offer smaller South Asian nations a stake in India’s financial growth through development assistance and increased connectivity to India’s economy, contributing to India’s broader effort to assert its role as the predominant regional power.</p>
<p>India will be the world’s fastest-growing economies throughout the next five years as China’s economy cools and growth elsewhere sputters, but internal tensions over inequality and religion will complicate its expansion.</p>
<h3>9. Violent extremism, terrorism, and instability will continue to hang over Afghanistan, Pakistan, and the region’s fragile communal relations.</h3>
<p>The threat of terrorism, from Lashkar-e-Tayyiba (LET), Tehrik-i-Taliban Pakistan (TTP), and al-Qaeda and its affiliates as well as the Islamic State&#8217;s expansion and sympathy for associated ideologies—will remain prominent in the area.</p>
<p>Competition for jobs, coupled with discrimination against minorities, might contribute to the radicalization of the region’s youth, especially given unbalanced gender ratios favoring males in several nations.</p>
<p>Populism and sectarianism will intensify if Bangladesh, India, and Pakistan fail to provide employment and education for growing urban populations and officials continue to govern principally through identity politics.</p>
<h3>10. The Middle East and North Africa will see continued, if not escalating instability.</h3>
<p>Continuing <a href="http://globalsecurityreview.com/africa-middle-east/">conflict and lack of political and economic reform</a> threaten poverty reduction, the area’s one last bright spot.  Resource dependence and foreign assistance have propped up elites even as it fostered widespread reliance on the nation by inhibiting markets, employment, and human capital.</p>
<p>With oil prices unlikely to recover to levels of the petroleum boom governments may have to limit cash payments and subsidies.  In the meantime, social networks have provided new tools for citizens to vent their political frustrations.  Conservative religious groups—including Brotherhood affiliates and movements—and ethnically-based organizations like those based on Kurdish identity are poised to be superior alternatives to weak governments in the region.</p>
<p>Such groups typically supply social services better than the nation and their politics resonate with a general public that is more conservative and religious than the region’s political and economic elites.</p>
<h3>11. Sub-Saharan Africa will struggle with authoritarian regimes</h3>
<p>Practices have changed, civil society groups have proliferated, and citizens across the region demand better and more just governance.  However, many nations continue to struggle with authoritarian rule, patronage politics, and favoritism.  Many leaders remain focused on political survival as opposed to reform–with a few term limitations.</p>
<p>Global economic headwinds also threaten improvement by keeping commodity prices low and investment weak.  Some nations who’ve made progress toward democracy remain fragile and predisposed towards violence corresponding elections.  Tensions between Muslim and Christian groups can escalate into conflict.</p>
<h3>12. Threats from terrorist and insurgent groups will persist and are likely to become more decentralized.</h3>
<p>The threat of <a href="http://globalsecurityreview.com/non-state-actors-terrorist-groups-insurgencies/">terrorism</a> is likely to increase as the means and the motivations of states, groups, and people to impose harm diversify. Prolonged conflicts and the info age allow terrorists to recruit and operate on a large scale, demonstrating the evolving nature of the threat.</p>
<p>Terrorism kills fewer people globally than crime or disease, but the potential for new capabilities reaching the hands of people bent on apocalyptic destruction is all too real. This ultimate low-probability, high-impact event underscores the imperative of international cooperation and state attention to the issue.</p>
<p>Terrorists will continue to justify their violence by their very own interpretations of religion, but several underlying drivers are also in play. Within nations, the breakdown of state structures in much of the Middle East carries on to create space for extremists.</p>
<h3>The world order is changing. The question is, how?</h3>
<p>The post-World War II <a href="http://globalsecurityreview.com/global-shifts-geopolitical-trends/">international order</a> that enabled today’s political, economic, and security arrangements and institutions is in question. As power diffuses worldwide, seats at the table of global decision making are reshuffled.  Today, aspiring powers seek to adjust the rules of the game and international context in a way beneficial to their interests.</p>
<p>This complicates reform of international institutions such as the UN Security Council or the Bretton-Woods institutions, also brings into question whether political, civil and human rights—hallmarks of liberal values and US leadership since 1945—will continue to be so.</p>
<p>Norms that were believed to be settled will be increasingly threatened if present trends hold, and consensus to build standards can be elusive as Russia, China, along with other actors such as the Islamic State seek to shape regions and international norms in their favor.</p>
<p><!-- strchf script --><script>        if(window.strchfSettings === undefined) window.strchfSettings = {};    window.strchfSettings.stats = {url: "https://global-security-review.storychief.io/world-will-look-like-2025?id=1985706229&type=2",title: "12 Predictions for Global Geopolitics for 2018 through 2025—and Beyond",id: "67a59392-0711-40d2-8ebe-f4788e7ac4fa"};            (function(d, s, id) {      var js, sjs = d.getElementsByTagName(s)[0];      if (d.getElementById(id)) {window.strchf.update(); return;}      js = d.createElement(s); js.id = id;      js.src = "https://d37oebn0w9ir6a.cloudfront.net/scripts/v0/strchf.js";      js.async = true;      sjs.parentNode.insertBefore(js, sjs);    }(document, 'script', 'storychief-jssdk'))    </script><!-- End strchf script --></p>
<p><a href="https://globalsecurityreview.com/world-will-look-like-2025/">12 Predictions for Global Geopolitics for 2019 through 2025—and Beyond</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Russia&#8217;s Military Buildup: Posturing or Preparation?</title>
		<link>https://globalsecurityreview.com/russia-military-buildup-posturing-preparation-war/</link>
		
		<dc:creator><![CDATA[Gabriella Gricius]]></dc:creator>
		<pubDate>Thu, 13 Sep 2018 15:45:01 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Estonia]]></category>
		<category><![CDATA[Mongolia]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/russia-military-buildup-posturing-preparation-war/</guid>

					<description><![CDATA[<p>As Russia puts its military might on display in the Vostok-2018 war games, many NATO members are concerned about the ramp-up in Russia&#x27;s military posturing. However, the Vostok-2018 games are only one instance where the Russian military is, for lack of a better term, showing off. Over the last few months, Russian planes have repeatedly [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/russia-military-buildup-posturing-preparation-war/">Russia&#8217;s Military Buildup: Posturing or Preparation?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="7i8sn">As Russia puts its military might on display in the <a target="_blank"  href="http://globalsecurityreview.com/vostok-2018-russias-largest-war-games-since-1981/" rel="noopener noreferrer">Vostok-2018 war games</a>, many <a   href="https://www.military.com/daily-news/2018/09/12/nato-members-concerned-about-russia-military-posturing.html">NATO members are concerned</a> about the ramp-up in Russia&#x27;s military posturing. However, the Vostok-2018 games are only one instance where the Russian military is, for lack of a better term, showing off. </p>
<p class="2f1s">Over the last few months, Russian planes have repeatedly violated NATO airspace. Two U.S. fighter jets <a   href="https://www.cbsnews.com/news/us-fighter-jets-intercept-russian-bombers-over-arctic-ocean-2018-09-07/">intercepted Russian bombers</a> over the Arctic Ocean in both September and May of 2018. </p>
<p class="fftgm">In August, <a   href="https://www.rferl.org/a/british-jets-again-scramble-from-romania-to-investigate-russian-aircraft/29451564.html">British jets were scrambled </a>to investigate provocative Russian incursions into NATO airspace. Increased deployments of military troops and equipment have also been reported in both Crimea and Kaliningrad. </p>
<h3>Historically, military buildups have preceded major wars. Is this century different?</h3>
<p class="ed8o8">The question remains, to what end? Many historians and international relations scholars point to specific events prior to large-scale conflicts in the first half of the 20th century, like the assassination of Archduke Franz Ferdinand or the surprise attack on Pearl Harbor by the Japanese Empire.</p>
<p class="6rtjf">However, the world works differently in this century. At least for now, large-scale conventional warfare seems like a remote possibility. Instead, the great power conflicts of this century have thus far been relegated <a target="_blank"  href="http://globalsecurityreview.com/cold-war-2-0-russian-information-warfare/" rel="noopener noreferrer">active measures and information warfare</a> campaigns, designed to subvert democratic systems and sow disorder. </p>
<p class="1b6hr">Despite the growing tensions on each side of the Atlantic, the most active front seems to be virtual. While the United States and Germany have accused Russia of interfering in their political systems, the primary focus is on defending public opinion in vulnerable countries from Russian manipulation. </p>
<h3>One such country is Macedonia, where the conflict between Russia and the West seems to be reaching a boiling point. </h3>
<p class="18iv9">With the highly anticipated <a target="_blank"  href="http://globalsecurityreview.com/macedonia-changes-name-or-does-it/" rel="noopener noreferrer">referendum on a name change</a>, Macedonia has a high chance of joining the EU. It is not a surprise that both the United States and Russia are quite interested in the result of this referendum. </p>
<p class="2fij4">U.S. Defense Secretary Jim Mattis even stated that he was, &quot;<a   href="https://www.rferl.org/a/mattis-us-macedonia-russia/29485112.html">concerned about&#8230;the kind of mischief that Russia has practiced from Estonia to the United States, from Ukraine and now to Macedonia</a>.” </p>
<p class="8upcl">At the very least, it seems less probable that this form of digital proxy war could easily escalate into a violent <a target="_blank"  href="http://globalsecurityreview.com/hybrid-and-non-linear-warfare-systematically-erases-the-divide-between-war-peace/" rel="noopener noreferrer">hybrid conflict</a>. </p>
<h3>Growing Chinese-Russian military ties could raise the possibility of conflict nonetheless. </h3>
<p class="22v2l">At a visit to the Vostok-2018 training grounds, Russian Defense Minister Sergei Shoigu noted that this was <a   href="https://nationalinterest.org/blog/buzz/russia-and-china-will-now-hold-military-exercises-regular-basis-31157">just the first of a series of regular training exercises</a> between China and Russia. </p>
<p class="7hoq0">While this could just be a sign of closer cooperation between the two countries as relations with Europe and the United States worsen, the large-scale posturing could devolve into a military conflict. </p>
<p class="beo04">While Russian posturing is effective in deterring foreign aggression and diverting domestic attention away from divisive issues, it could also suggest that actual conflict is not as remote a possibility as we would like to believe. </p>
<p class="6cg3f">Despite hopes for peace and reconciliation, countries are allocating more money to their defense departments and military budgets. Conflict is always on the horizon, whether diplomats and politicians prefer to acknowledge it or not.  </p>
<p class="923q">War remains a realistic possibility, and Russia&#x27;s actions indicate an effort to prepare for a range of scenarios, ranging from large-scale great power conflict to smaller-scale proxy wars in its periphery. </p>
<p><!-- Piwik --><script type="text/javascript">    var _paq = _paq || [];    var url = "https://global-security-review.storychief.io/russia-military-buildup-posturing-preparation-war?id=1969671349&type=2";    const queryDict = {};    location.search.substr(1).split("&").forEach(function(item) {queryDict[item.split("=")[0]] = item.split("=")[1]});    if ('contact' in queryDict){      const separator = (url.indexOf("?")===-1)?"?":"&";      url = url + separator + "contact="+queryDict['contact'];    }    if ('list' in queryDict){      const separator = (url.indexOf("?")===-1)?"?":"&";      url = url + separator + "list="+queryDict['list'];    }    _paq.push(['setDocumentTitle', 'Russia&#039;s Military Buildup: Posturing or Preparation?']);    _paq.push(['setCustomUrl', url]);    _paq.push(['trackPageView']);    _paq.push(['enableHeartBeatTimer', 15]);    _paq.push(['enableLinkTracking']);    (function() {        var u="//storychief.piwikpro.com/";        _paq.push(['addTracker', u+'piwik.php', '67a59392-0711-40d2-8ebe-f4788e7ac4fa']);        var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0];        g.type='text/javascript'; g.async=true; g.defer=true; g.src=u+'piwik.js'; s.parentNode.insertBefore(g,s);    })();</script><!-- End Piwik Code --><!-- strchf script --><script async src="https://d37oebn0w9ir6a.cloudfront.net/scripts/v0/strchf.js"></script><!-- End strchf script --></p>
<p><a href="https://globalsecurityreview.com/russia-military-buildup-posturing-preparation-war/">Russia&#8217;s Military Buildup: Posturing or Preparation?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Is the U.S.-Saudi Partnership in Yemen Strengthening Al-Qaeda?</title>
		<link>https://globalsecurityreview.com/us-saudi-partnership-yemen-strengthening-al-qaeda/</link>
		
		<dc:creator><![CDATA[Alexandra Gilliard]]></dc:creator>
		<pubDate>Tue, 11 Sep 2018 14:46:56 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[United Arab Emirates]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Yemen]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/us-saudi-partnership-yemen-strengthening-al-qaeda/</guid>

					<description><![CDATA[<p>Ultimately, the strength of AQAP may grow as more civilians begin to support its cause against the Saudi monarchy and the West.</p>
<p><a href="https://globalsecurityreview.com/us-saudi-partnership-yemen-strengthening-al-qaeda/">Is the U.S.-Saudi Partnership in Yemen Strengthening Al-Qaeda?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>In 2015, Yemen&#8217;s civil war evolved into a proxy war between Saudi Arabia and Iran.</h2>
<p class="bvljo">Both powers are vying for regional hegemony as Iran seeks a foothold in the Arabian Peninsula, while Saudi Arabia works to remain at the top of the region’s hierarchy and protect its national security.</p>
<p class="49te2">The people of Yemen continue to languish in the <a href="https://news.un.org/en/focus/yemen">world’s worst humanitarian crisis</a> as the conflict persists. The situation has been aggravated by violent attacks against cities alongside growing food insecurity perpetuated by closed ports and embattled infrastructure. The proxy war has fomented widespread instability in Yemen, creating a breeding ground for Al-Qaeda in the Arabian Peninsula (AQAP).</p>
<p class="e9phl">While most Al-Qaeda offshoots have died out or reduced their presence, the AQAP branch has remained intact by taking advantage of Yemen&#8217;s instability while continuing to make threats against Saudi Arabia and the West.</p>
<p class="fnimp">Today, a large proportion of U.S. security experts believe that <a href="https://www.npr.org/sections/parallels/2017/03/03/518146483/u-s-ramps-up-its-fight-against-al-qaida-in-yemen">AQAP is the largest terrorist threat</a> to the United States—more so than the Islamic State, the strength of which is consistently sensationalized by the media. Experts believe AQAP is capable of building bombs without metal, making them easy to transfer across international borders and nearly impossible to detect.</p>
<p class="4d96k">As the Saudi Arabian-led coalition—backed U.S. weapons, equipment, and intelligence—fights Iranian-backed Houthi forces in the northern Yemen, it is also combating AQAP militants in the country&#8217;s south.</p>
<p class="epsnn">The U.S. and Saudi Arabia escalated operations against AQAP, using drone strikes in Yemen to target the group&#8217;s leaders. Unfortunately, these counter-terrorism efforts have actually made the situation worse.</p>
<h3>Saudi Arabia pursues its national security interests on the Peninsula.</h3>
<p class="647nc">The deterioration of Yemen&#8217;s internal security has allowed AQAP to gain a strong foothold in a relatively lawless and unstable state.</p>
<p class="647nc">The terrorist group’s close vicinity to Saudi Arabia has made the monarchy uneasy due to its hatred of the Saudi monarchy for its relationship with the United States.</p>
<p class="plha">Saudi Arabia’s shared border with Yemen allows AQAP members to easily enter Saudi Arabia, allowing the group to destabilize the Kingdom.</p>
<p class="4gmfm">With Iranian-backed forces in northern Yemen and AQAP militants in Yemen&#8217;s south, the situation is increasingly precarious for Saudi Arabia.</p>
<p class="c8q9v">To prevent the two aggressors from advancing, Saudi Arabia seems likely to continue carrying out airstrikes and ground assaults as the two groups gain ground and threaten not only Saudi Arabia’s regional interests and its national security.</p>
<h3>The U.S. moves to stop the spread of AQAP.</h3>
<p class="5dps2">U.S. weapons sales to Saudi Arabia over the past few years have not only supported the country&#8217;s fight against Houthi rebels in Yemen. They have also been intended to eliminate the growing threat of Al-Qaeda in the Arabian Peninsula and limit its potential expansion.</p>
<p class="7115o">Prior to the Houthi rebellion, the U.S. and Yemeni President Hadi maintained built a strong alliance, with U.S. officials touting Hadi as a <a href="https://www.nytimes.com/2018/03/22/us/politics/us-arms-sales-saudi-arabia-.html">leader in counterterrorism</a>.</p>
<p class="7115o">Once Hadi’s regime collapsed, however, U.S. policymakers had to depend more heavily on the alliance with the Saudi monarchy to target AQAP.</p>
<p class="bg6ik">In 2017, the White House stated that its recent arms deal with Saudi Arabia was struck not only to protect Saudi Arabia’s national security, but to assist in counter-terrorism operations in the Peninsula.</p>
<p class="bg6ik">Reportedly, the sale would <a href="https://www.cnbc.com/2017/05/20/us-saudi-arabia-seal-weapons-deal-worth-nearly-110-billion-as-trump-begins-visit.html">reduce the need for the U.S. military</a> to participate in combat operations. However, U.S. special forces were deployed to assist Saudi troops in Yemen later that year.</p>
<p class="43h23">As of 2018, anti-AQAP efforts have targeted over 3,000 Al-Qaeda members, <a href="https://www.nytimes.com/2018/05/03/us/politics/green-berets-saudi-yemen-border-houthi.html">forcing them into Yemen’s interior</a>. However, the group continues to benefit from the lack of stable leadership in Sana’a, continuing its attempts to fill the power vacuum despite U.S. and Saudi efforts to eliminate it.</p>
<h3>AQAP is easily exploiting the situation in Yemen.</h3>
<p class="6n4hk">Despite U.S. and Saudi efforts, experts have argued that the campaign against AQAP in Yemen may have actually <a href="http://www.atlanticcouncil.org/blogs/menasource/us-strikes-on-al-qaeda-in-yemen-not-separate-from-ongoing-civil-war">helped the group prosper</a> by destabilizing the region and providing new gaps for the terrorist group to exploit.</p>
<p class="8au8c">Al Qaeda has been able to further capitalize on the fact that many Yemeni civilians are turning against both the U.S. and Saudi Arabia as they watch the actions of the two countries deepen Yemen’s humanitarian crisis.</p>
<p class="a9t89">Despite this, both the U.S. and Saudi Arabia have continued their strikes upon AQAP, though their imprecision has resulted in numerous civilian deaths.</p>
<p class="a9t89">Over the course of just two days in January 2017, the U.S. military performed a ground operation in Al Bayda Province that resulted in the <a href="https://www.npr.org/sections/parallels/2017/03/03/518146483/u-s-ramps-up-its-fight-against-al-qaida-in-yemen">death of 24 civilians</a>.</p>
<p class="326qg">Just a few months later, 30 U.S. airstrikes against AQAP killed a few dozen more. The U.S. declared these actions a success—but to Yemeni civilians, these events were further proof that the U.S. is not a benevolent actor, but would continue to steer the fate of the Middle East to ensure its own national security interests.</p>
<p class="90okj">Naturally, the number of civilian casualties has brewed distaste for the U.S. in the Yemeni psyche, a feeling that is rapidly replacing their once pro-U.S. attitudes.</p>
<p class="aef6d">As stated by Dafna H. Rand, a representative of the U.S. State Department, the continuity of the war and U.S. involvement in Yemen will potentially foster anger against the U.S. that could <a href="https://www.newyorker.com/magazine/2018/01/22/how-the-us-is-making-the-war-in-yemen-worse">encourage radicalization and increase AQAP membership</a>.</p>
<p class="57b43">AQAP’s anti-Saudi Arabia and anti-Western stance has resonated with some Yemeni civilians who feel that the Saudi-U.S. partnership has devastated their country and deteriorated their quality of life. Eventually, larger numbers of Yemeni civilians may see AQAP as the only secure and stable option for their country.</p>
<h3>U.S. soft power is the key to countering AQAP.</h3>
<p class="ct3p9">Ultimately, the strength of AQAP may grow as more civilians begin to support its cause against the Saudi monarchy and the West.</p>
<p class="4n3k2">While both the U.S. and Saudi Arabia have entered the fray with AQAP on grounds of preserving their own respective national securities, their biggest accomplishment thus far has been to foment hatred within Yemen, all while plunging more cities into crisis.</p>
<p class="b9dvc">If Yemeni civilians continues to perceive the U.S. as a threat, AQAP’s anti-U.S. sentiments will gain steam. Instead, the U.S. needs to reduce involvement in airstrikes and ground assaults and take on a more humanitarian role—ensuring food security, providing medical aid and access to education, and rebuilding critical infrastructure.</p>
<p class="142tk">Facilitating reconstruction in Yemen would benefit all parties. Yemeni civilians will benefit from increased humanitarian aid, the U.S.’s assistance would hopefully engender more positive feelings in Yemeni civilians and slow the acceptance and spread of AQAP.</p>
<p><!-- Piwik --><script type="text/javascript">    var _paq = _paq || [];    var url = "https://global-security-review.storychief.io/us-saudi-partnership-yemen-strengthening-al-qaeda?id=677275557&type=2";    const queryDict = {};    location.search.substr(1).split("&").forEach(function(item) {queryDict[item.split("=")[0]] = item.split("=")[1]});    if ('contact' in queryDict){      const separator = (url.indexOf("?")===-1)?"?":"&";      url = url + separator + "contact="+queryDict['contact'];    }    if ('list' in queryDict){      const separator = (url.indexOf("?")===-1)?"?":"&";      url = url + separator + "list="+queryDict['list'];    }    _paq.push(['setDocumentTitle', 'Is the US-Saudi Partnership in Yemen Strengthening Al-Qaeda?']);    _paq.push(['setCustomUrl', url]);    _paq.push(['trackPageView']);    _paq.push(['enableHeartBeatTimer', 15]);    _paq.push(['enableLinkTracking']);    (function() {        var u="//storychief.piwikpro.com/";        _paq.push(['addTracker', u+'piwik.php', '67a59392-0711-40d2-8ebe-f4788e7ac4fa']);        var d=document, g=d.createElement('script'), s=d.getElementsByTagName('script')[0];        g.type='text/javascript'; g.async=true; g.defer=true; g.src=u+'piwik.js'; s.parentNode.insertBefore(g,s);    })();</script><!-- End Piwik Code --><!-- strchf script --><script async src="https://d37oebn0w9ir6a.cloudfront.net/scripts/v0/strchf.js"></script><!-- End strchf script --></p>
<p><a href="https://globalsecurityreview.com/us-saudi-partnership-yemen-strengthening-al-qaeda/">Is the U.S.-Saudi Partnership in Yemen Strengthening Al-Qaeda?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What Next for U.S.-India Military Ties?</title>
		<link>https://globalsecurityreview.com/what-next-us-india-military-ties/</link>
		
		<dc:creator><![CDATA[Alyssa Ayres]]></dc:creator>
		<pubDate>Mon, 10 Sep 2018 17:27:26 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=8225</guid>

					<description><![CDATA[<p>This week, U.S. Secretary of State Mike Pompeo and Secretary of Defense Jim Mattis met with their Indian counterparts, External Affairs Minister Sushma Swaraj and Defense Minister Nirmala Sitharaman, reaching a number of new defense-related agreements. In New Delhi, the “two-plus-two” dialogue was at long last able to complete an agreement to enhance communications sharing [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/what-next-us-india-military-ties/">What Next for U.S.-India Military Ties?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, U.S. Secretary of State Mike Pompeo and Secretary of Defense Jim Mattis met with their Indian counterparts, External Affairs Minister Sushma Swaraj and Defense Minister Nirmala Sitharaman, reaching a number of new defense-related agreements.</p>
<p>In New Delhi, the <a href="https://www.cfr.org/blog/background-brief-meet-us-india-22">“two-plus-two” dialogue</a> was at long last able to complete an agreement to enhance communications sharing on defense platforms—something called the <a title="Communications Compatibility and Security Agreement" href="https://economictimes.indiatimes.com/news/defence/seven-reasons-why-comcasa-is-so-important-for-india/articleshow/65707682.cms" target="_blank" rel="noopener noreferrer">Communications Compatibility and Security Agreement</a>, or COMCASA. It will allow India access to more advanced communications technology for defense equipment purchased from the United States, and as a result will also make it easier for India and the United States, as well as U.S. allies with similar equipment, to coordinate more fully in real time (or, in defense speak, enhance interoperability). It’s been under negotiation for years, so this achievement deserves praise.</p>
<h3>Naval exchanges, counterterrorism cooperation, and North Korea</h3>
<p>The two plus two produced several other <a title="important advances" href="https://www.state.gov/r/pa/prs/ps/2018/09/285729.htm" target="_blank" rel="noopener noreferrer">important advances</a>:</p>
<ul>
<li>A new “tri-services exercise,” increasing the complexity of military cooperation.</li>
<li>More military personnel exchanges, and in particular a new exchange between the U.S. Navy’s Central Command and the Indian Navy. This will help deepen their naval cooperation across Asia, especially in light of the United States’ and India’s <a href="https://www.cfr.org/expert-brief/us-indo-pacific-strategy-needs-more-indian-ocean">very different conceptions</a> of how they delineate the Indo-Pacific.</li>
<li>A new agreement on defense innovation.</li>
<li>The reaffirmation of existing areas of agreement on counterterrorism and cybersecurity. The joint statement calls on Pakistan to do more to stop terrorism emanating from territory under its control and pledges more cooperation in cyberspace and more support for an “Afghan-owned, Afghan-led” peace process.</li>
<li>The launch of secure hotlines between Pompeo and Swaraj, and Mattis and Sitharaman, building on the <a title="high-level hotlines" href="https://timesofindia.indiatimes.com/world/us/Modi-Obama-hotline-becomes-operational/articleshow/48568491.cms" target="_blank" rel="noopener noreferrer">high-level hotlines</a> established in the Obama administration.</li>
</ul>
<p>Also of interest in the joint statement is the brief paragraph on North Korea, which included a pledge “to work together to counter North Korea’s weapons of mass destruction programs and to hold accountable those countries that have supported them.” North Korea has not traditionally been an area of significant U.S.-India cooperation, so it will be interesting to see where this leads.</p>
<h3>Missing pieces and next steps</h3>
<p>Absent from the statements were any details on U.S.-India trade frictions, but given the security focus of the two plus two, this should not surprise. The U.S.-India Trade Policy Forum, which will <a title="meet in November" href="https://blogs.economictimes.indiatimes.com/et-commentary/instead-of-trading-blows/" target="_blank" rel="noopener noreferrer">meet in November</a>, is a more apt venue for technical discussion of trade issues.</p>
<p>Also absent were any resolutions on two thorny issues: first, whether President Donald J. Trump will provide a waiver to India for its long-in-the-works purchase of a <a title="Russian air defense missile system" href="https://carnegieendowment.org/2018/08/29/how-can-u.s.-india-relations-survive-s-400-deal-pub-77131" target="_blank" rel="noopener noreferrer">Russian air defense missile system</a>, thus avoiding sanctions that could result from the Countering America’s Adversaries Through Sanctions Act (CAATSA) legislation focused on Russia, and second, <a title="what will happen" href="https://www.reuters.com/article/us-india-usa-iran/us-to-help-nations-replace-iran-oil-may-consider-waivers-idUSKCN1LM0FW" target="_blank" rel="noopener noreferrer">what will happen</a> with U.S. sanctions and India’s oil procurement from Iran. Despite the dialogue’s progress, these questions will continue to hover over the security relationship for the time being.</p>
<p><a href="https://globalsecurityreview.com/what-next-us-india-military-ties/">What Next for U.S.-India Military Ties?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What are the Consequences of Militarizing Outer Space?</title>
		<link>https://globalsecurityreview.com/consequences-militarization-space/</link>
		
		<dc:creator><![CDATA[Alexandra Gilliard]]></dc:creator>
		<pubDate>Thu, 06 Sep 2018 14:17:03 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United Nations]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=8201</guid>

					<description><![CDATA[<p>In June 2018, President Trump directed General Joseph Dunford Jr., chairman of the Joint Chiefs of Staff, to begin laying the groundwork for the establishment of a new military branch—in space.  The stated purpose of the new branch of service would be to protect U.S. space interests by overseeing debris and commercial movement. Implicitly, however, [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/consequences-militarization-space/">What are the Consequences of Militarizing Outer Space?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>In June 2018, President Trump directed General Joseph Dunford Jr., chairman of the Joint Chiefs of Staff, to begin laying the groundwork for the establishment of a new military branch—in space.<span class="Apple-converted-space"> </span></h2>
<p>The stated purpose of the new branch of service would be to protect U.S. space interests by overseeing debris and commercial movement. Implicitly, however, this could mark the first overt step towards the militarization of space, in order to maintain global hegemony and achieve strategic dominance over rival powers like China and Russia. Both countries have civilian and military space programs of their own, but could this move by the Trump administration lead to an arms race in space?</p>
<p>Ultimately, the creation of a sixth branch of the U.S. Armed Forces would have to be approved by Congress—and even if it isn’t, the Air Force would remain the service branch responsible for military strategy and operations in space as it is now. Regardless of what branch of the military is responsible, what are the ramifications for the militarization of space—by the United States and other powers?</p>
<h3>Protecting National Interests Extends to Outer Space</h3>
<p>The efforts of any one state to place armaments in space would disrupt the global balance of power, and encourage others to follow suit, setting in motion a race for strategic dominance that could well lead to weapons testing and further escalation. When on actor assumes a dominant position, rival actors will need act similarly in order to maintain deterrence and ensure the security of their respective national interests.</p>
<p>The rise of globalization and ever-increasing global inter-connectivity has led to a dependence on space-based technology like the Global Positioning System (GPS) for everything from simple navigation to the coordination of military operations. Such a reliance has made the destruction of satellites a priority for military planners in the event of a conflict.</p>
<p>As the potential for space-based threats grows, more world leaders will move to protect against the potential destruction of their space-based assets by deploying the necessary technology to deter such an attack.</p>
<h3>Challenges of Arms Control in Space</h3>
<p>Though the United Nations has advocated for a complete ban on the armament of space, it lacks the support of the United States in related Proposed Prevention of an Arms Race in Space (PAROS) resolutions. Since the U.S. has such a well-developed military, civilian, and commercial presence in space, it would be senseless to attempt to incur a treaty without U.S. participation, as other states would still feel the need to protect their interests.</p>
<p>Beyond the question of U.S. participation in any international conventions, a strong space-based arms control policy would still be difficult to implement. In space, almost anything can be used as a weapon. With enough speed in orbit, an object no larger than a rock can destroy a satellite. Simply put, even if something is not designed to be a weapon, it can be used as one in space. If policymakers cannot effectively identify what constitutes a weapon in space, weapons cannot be regulated or prohibited, making verification and enforcement close to impossible.</p>
<h3>Consequences of Armament and Aggression in Space</h3>
<p>The consequences of weapons testing and aggression in space could span generations, and current technological advances only increase the urgency for policymakers to pursue a limitations treaty. As it stands, there are three major ramifications of a potential arms race in space:</p>
<h4>The destruction of satellites</h4>
<p>As both financial and technological barriers to the space services industry have decreased, the number of governmental and private investors with assets in space has inevitably increased. There is now an abundance of satellites in space owned by multiple states and corporations. These satellites are used to not only coordinate military actions, but to perform more mundane tasks, like obtaining weather reports, or managing on-ground communications, and navigation.</p>
<p>Should states begin weapons testing in space, debris could cloud the orbit and make positioning new satellites impossible, disrupting our current way of life. More pressing, however, is that if a country’s satellites are successfully destroyed by an enemy state, military capabilities can be severely hindered or destroyed, leaving the country vulnerable to attack and unable to coordinate its military forces on the ground.</p>
<h4>Diminished future use of near space</h4>
<p>Whether caused by weapons testing or actual aggression, the subsequent proliferation of debris around the planet would damage our future ability to access space. Not only would debris act as shrapnel to preexisting assets in space, but it would also become much more difficult to launch satellites or rockets, hindering scientific research, space exploration, and commercial operations.</p>
<p>From the past fifty-odd years of activity in space alone, the debris left behind in Earth’s orbital field has already become hazardous to spacecraft — a main reason why the U.S. and the Soviet Union did not continue with <a href="https://www.nytimes.com/2008/03/09/weekinreview/09myers.html">ASAT testing during the Cold War</a>. If greater pollution were to occur, space itself could be become unusable, resulting in the collapse of the global economic system, air travel, and various communications.</p>
<h4>Power imbalances and proliferation on the ground</h4>
<p>Only so many states currently have access to space—which means any militarization be by the few, while other states would be left to fend for themselves. This would establish a clear power imbalance that could breed distrust among nations, resulting in a more insecure world and a veritable power keg primed for war. Additionally, deterrence measures taken by states with access to space would escalate, attempting to build up weapons caches not dissimilar to the nuclear weapons stockpiling activities of the Cold War.</p>
<p>In any arms race, it is inevitable that more advanced weaponry is created. Yet, this does not only pose a risk to assets in space. Should a terrestrial war break out, this weaponry may eventually be deployed on the ground, and space-faring states would be able to capitalize on the power imbalance by using these new developments against states that have not yet broken into the space industry or developed equally-advanced weaponry.</p>
<h3>Into the Future</h3>
<p>The militarization of space would inevitably increase the chances of war, and also threaten the industries that rely on space to carry out their daily operations. Without treaties and resolutions to regulate and limit armament in space, the international community risks facing extreme consequences. Furthermore, with the history of U.S. disinterest in UN efforts to regulate space, the implementation of a meaningful, multilateral agreement for arms control in space is unlikely.</p>
<p>Ultimately, the international community will need to regulate actions, militarization, and the possibility of eventual armament in space sooner rather than later in order to reduce the threat of major war, economic destruction, and global insecurity.</p>
<p><a href="https://globalsecurityreview.com/consequences-militarization-space/">What are the Consequences of Militarizing Outer Space?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Vostok-2018: Russia&#8217;s Largest War Games Since 1981</title>
		<link>https://globalsecurityreview.com/vostok-2018-russias-largest-war-games-since-1981/</link>
		
		<dc:creator><![CDATA[Gabriella Gricius]]></dc:creator>
		<pubDate>Mon, 03 Sep 2018 09:00:05 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Mongolia]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Ukraine]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=8151</guid>

					<description><![CDATA[<p>The Vostok-2018 war games will involve over 300,000 troops from the Russian, Chinese, and Mongolian militaries. From September 11 to 15, Russia will hold its largest war games since 1981. The exercise is called Vostok-2018 and will involve more than 300,000 troops, two Russian naval fleets, more than 1,000 military aircraft and all of Russia’s [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/vostok-2018-russias-largest-war-games-since-1981/">Vostok-2018: Russia&#8217;s Largest War Games Since 1981</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The Vostok-2018 war games will involve over 300,000 troops from the Russian, Chinese, and Mongolian militaries.</h2>
<p>From September 11 to 15, <a href="https://www.reuters.com/article/us-russia-wargames/russia-to-hold-biggest-war-games-in-nearly-four-decades-idUSKCN1LD0OP?feedType=RSS&amp;feedName=topNews">Russia will hold its largest war games since 1981</a>. The exercise is called Vostok-2018 and will involve more than 300,000 troops, two Russian naval fleets, more than 1,000 military aircraft and all of Russia’s airborne units.</p>
<p>Chinese and Mongolian military units will participate alongside Russian forces. Despite Russia not being obligated to do so as the exercises will be held to the east of the Ural Mountains, NATO military attachés were invited to observe the exercises.</p>
<p>In justifying Moscow&#8217;s reasoning for holding Vostok-2018, Kremlin spokesman Dmitry Peskov asserted Russia&#8217;s right to self-defense, noting that the international community is increasingly hostile towards Russia.</p>
<p>Moscow has cited the steady increase of NATO forces deployed in eastern Europe and the United States&#8217; ship-based Aegis Ballistic Missile Defense System deployed in Japan as evidence of a Western military buildup.</p>
<p>Russia, however, has been increasingly aggressive in developing and demonstrating its military capabilities. Russian warships have been deployed to the Mediterranean Sea, part of the country&#8217;s <a href="https://www.rferl.org/a/russia-builds-up-mediterranean-fleet-amid-rising-tensions-over-syria-idlib-province-assad/29458959.html">largest naval presence in the Mediterranean since 2015</a>.</p>
<p>Russia&#8217;s Mediterranean fleet is comprised of ten vessels in total, each armed with long-range Kalibr cruise missiles. More provocative, British Royal Air Force fighter jets twice intercepted Russian military aircraft over the Black Sea in a <a href="https://www.bbc.co.uk/news/uk-45301539">single week in August</a>.</p>
<h3>War games are often a response to escalating tensions.</h3>
<p>More often than not, war games are a way to demonstrate power-projection capabilities. The Vostok-2018 military exercises are a predictable reaction to increasing economic sanctions and perceived threats to the Kremlin&#8217;s hold on power.</p>
<p>While coverage of the Russian annexation of Crimea seems to have stagnated in the international media, the issue continues to be of interest to Russian officials. Serhiy Kostynsky, a member of the National Council for TV and Radio Broadcasting in Ukraine, <a href="https://www.rferl.org/a/russia-ukraine-crimea-radio-jamming/29457799.html">discussed Russian transmissions</a> jamming Ukrainian frequencies in Crimea and neighboring provinces within unoccupied Ukraine.</p>
<p>The Ukrainian government has constructed taller radio towers to combat Russian interference, but the Russian operations will likely continue. Concurrently, Russian &#8220;active measures,&#8221; or information warfare operations, <a href="https://www.buzzfeednews.com/article/holgerroonemaa/russia-propaganda-baltics-baltnews">spread fake news propaganda throughout the Baltic states</a>.</p>
<p>While operations such as these may seem insignificant, they reveal the degree of aggression Russia is willing to employ to secure its interests. <a href="http://globalsecurityreview.com/cold-war-2-0-russian-information-warfare/">Information warfare</a>, whether through the dissemination of fake news or jamming radio signals, is a cornerstone of Russia&#8217;s response to what it perceives as NATO expansionism.</p>
<h3>Every Russian action merits a reaction.</h3>
<p>While Russia may continue to employ subversive measures in addition to increasing the frequency and scope of its war games, its actions are not without consequence. In 2018, Ukrainian President Petro Poroshenko withdrew Ukraine from the Commonwealth of Independent States (CIS), an organization comprised of former Soviet republics.</p>
<p>In August 2018, <a href="https://www.rferl.org/a/ukraine-shuts-down-offices-in-cis-member-states/29457859.html">Ukraine officially closed its offices in all CIS member states</a>. Again, this action may seem purely political in nature, but Ukraine’s departure is viewed in Russia an unacceptable move against what it sees as its traditional sphere of influence.</p>
<p>On the military front, <a href="https://www.rferl.org/a/us-revives-navy-2nd-fleet-counter-russian-presence-north-atlantic-/29452420.html">the U.S. Navy reactivated its Second Fleet</a> responsible for combatting Russia&#8217;s presence in the North Atlantic Ocean. The Second Fleet was initially formed in 1950 as a response to a Soviet force buildup. The Second Fleet&#8217;s reactivation is a high-level indicator of the increasing tensions between the U.S. and Russia.</p>
<h3>War games can also distract from internal difficulties.</h3>
<p>War games, much like actual conflict, have been used to distract from lackluster economic performance, diverting the attention of disaffected citizens. <a href="https://www.bbc.co.uk/news/world-europe-45342721">A planned increase in the retirement age sent Russian President Vladimir Putin’s approval ratings from 80 percent to 64 percent.</a></p>
<p>The original plan to raise the retirement age was scrapped after tens of thousands of Russians rallied throughout the country. The scale and coverage of the Vostok-2018 war games will likely soothe internal tensions, as coverage of the proposed increase of the retirement age is overshadowed by coverage of the military exercises.</p>
<h3>Judging the Impact of Vostok-2018</h3>
<p>On the one hand, regarding demonstrating the ability to mobilize military resources, Vostok-2018 will most be judged as a success by the Kremlin. Any form of mass military mobilization is done with the intent of maximizing the perception of power and strength.</p>
<p>On the other hand, it remains to be seen as to how effective the war games will be in tempering domestic discontent. Domestic Russian rhetoric regularly projects anti-Western viewpoints, so it is plausible the Vostok-2018 war games will serve to amplify this narrative.</p>
<p>The Levada Center, an independent Russian polling organization, stated in July 2018 that <a href="https://www.rferl.org/a/russia-xenophobia-poll-on-the-rise/29457742.html">19 percent of respondents supported the ‘Russia for Russians’ slogan</a>—almost double the percentage of respondents asked the same question one year ago.</p>
<p>Given Russia&#8217;s documented success in manipulating public opinion through propaganda and control of the media, the Vostok-2018 war games will likely increase the nationalist fervor within Russia, at the expense of discontent directed towards the country&#8217;s stagnating economy and unpopular pension reforms.</p>
<p><a href="https://globalsecurityreview.com/vostok-2018-russias-largest-war-games-since-1981/">Vostok-2018: Russia&#8217;s Largest War Games Since 1981</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>China and the U.S. are Racing to Develop A.I. Weapons</title>
		<link>https://globalsecurityreview.com/china-us-racing-to-develop-artificial-intelligence-ai-weapons/</link>
		
		<dc:creator><![CDATA[James Johnson]]></dc:creator>
		<pubDate>Fri, 31 Aug 2018 10:00:28 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=8158</guid>

					<description><![CDATA[<p>When Google’s AlphaGo defeated the Chinese grandmaster at a game of Go in 2017, China was confronted with its own “Sputnik moment”: a prompt to up its game on the development of artificial intelligence (AI). Sure enough, Beijing is pursuing launch a national-level AI innovation agenda for “civil-military fusion”. It’s part of China’s ambitious quest [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/china-us-racing-to-develop-artificial-intelligence-ai-weapons/">China and the U.S. are Racing to Develop A.I. Weapons</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>When Google’s AlphaGo <a href="https://theconversation.com/googles-latest-go-victory-shows-machines-are-no-longer-just-learning-theyre-teaching-78410">defeated the Chinese grandmaster</a> at a game of <a href="https://gogameguru.com/what-is-go/">Go</a> in 2017, China was confronted with its own “Sputnik moment”: a prompt to up its game on the development of artificial intelligence (AI). Sure enough, Beijing is pursuing launch a national-level AI innovation agenda for “civil-military fusion”. It’s part of China’s <a href="https://www.mitpressjournals.org/doi/pdf/10.1162/itgg.2006.1.4.111">ambitious quest</a> to become a “science and technology superpower” – but also a new front in an increasingly worrisome arms race.</p>
<p>In 2017, the Chinese president, <a href="http://www.china.com.cn/19da/2017-10/27/content_41805113_3.htm">Xi Jinping</a> explicitly called for the acceleration of military AI research to better prepare China for future warfare against a major adversary such as the US. China’s approach to AI has been heavily influenced by its assessment of US military initiatives, in particular, the Pentagon’s <a href="https://www.defense.gov/News/Article/Article/991434/deputy-secretary-third-offset-strategy-bolsters-americas-military-deterrence/">Third Offset Strategy</a>, an Obama-era plan that gave the Pentagon a mandate to experiment with cutting-edge weapons technologies, AI among them.</p>
<p>Beijing still hasn’t formally articulated a coherent strategic framework or operational concepts but, like Russia, it continues to pursue a range of <a href="https://thestrategybridge.org/the-bridge/2017/9/5/-and-trump-cards-andleapfrogging">military-use AI technologies</a> as part of a broader effort to exploit vulnerabilities in US military assets.</p>
<p>While the US (for now) retains the upper hand in AI innovation across the board, China is catching up. It is a strong competitor in all kinds of military innovation and is expected to overtake the US in AI development in the not-so-distant future. And, as the US and China race to innovate in AI, the uncertainties surrounding their respective advances (and setbacks) will have profound and potentially destabilizing implications for the <a href="https://www.amazon.com/US-China-Military-Relationship-Presidency-Challenges/dp/3319758373">strategic balance</a> of the world order.</p>
<p>Among all the risks that this entails, top of the list is that as the US and China’s approaches to military innovation diverge, new prejudices and preferences – for instance, criteria to decide when the use of lethal force is appropriate and ethically defensible – will be “baked into” their respective AI weapons systems, resulting in intelligent weapons that act on the basis of flawed human logic or assumptions (<a href="https://fivethirtyeight.com/features/technology-is-biased-too-how-do-we-fix-it/">as has already been observed</a> in algorithms developed to assess criminals’ propensity to re-offend). The resulting <a href="https://thenextweb.com/artificial-intelligence/2018/04/10/human-bias-huge-problem-ai-heres-going-fix/">cognitive biases</a> could exacerbate the two countries’ mutual <a href="https://www.tandfonline.com/doi/abs/10.1080/09512748.2016.1239129?tab=permissions&amp;scroll=top">mistrust, suspicion, and misperceptions</a>, and possibly nudge them closer to a major conflict.</p>
<h3>Hot on the heels</h3>
<p>China has several structural, political and societal advantages in the AI arms race. Its national strategic planning is far more coherent than that of the US, and its national datasets are unparalleled in size. Xi’s sprawling “<a href="https://www.reuters.com/article/us-china-congress-silkroad/pressure-on-as-xis-belt-and-road-enshrined-in-chinese-party-charter-idUSKBN1CT1IW">One Belt, One Road</a>” initiative, a plan to build a vast international network of trade links and infrastructure, has a nascent virtual counterpart: the so-called “<a href="https://www.economist.com/china/2018/06/02/china-talks-of-building-a-digital-silk-road">Digital Silk Road</a>”, which encompasses not just AI but also quantum computing, nanotechnology, big data, and cloud storage.</p>
<p>The situation in the US is far messier. The Trump administration and Silicon Valley share an increasingly <a href="https://www.technologyreview.com/s/603084/the-pentagons-innovation%20experiment">strained relationship</a>, meaning they will struggle to work together on AI technologies the US military can use. If American commercial AI innovation continues to rapidly outpace the Pentagon’s far more sluggish approach to AI procurement and development, the two won’t complement each other as they should – leaving China a major opportunity to get the upper hand.</p>
<p>The US seems to be taking steps to address these problems. Despite a brief pause in the development of the US’s AI strategic roadmap, the <a href="https://www.nextgov.com/emerging-tech/2018/05/white-house-announces-select-committee-federal-ai-experts/148123/">White House recently announced</a> the creation of a new committee of AI experts to advise it on policy choices. And in 2017, Donald Trump blocked a Chinese firm from acquiring <a href="https://www.reuters.com/article/us-lattice-m-a-canyonbridge-trump/trump-bars-chinese-backed-firm-from-buying-u-s-chipmaker-lattice-idUSKCN1BO2ME">Lattice Semiconductor</a>, a US company that manufactures chips critical to the operation of AI applications.</p>
<p>These steps reflect a deepening concern that China’s strategy of <a href="https://www.cnas.org/publications/reports/battlefield-singularity-artificial-intelligence-military-revolution-and-chinas-future-military-power">fusing civil and military technological innovation</a> could allow American technology, expertise and intellectual property shared with Chinese commercial entities to be transferred to China’s military.</p>
<h3>The Terminator conundrum</h3>
<p>It seems that China – like Russia – has relatively few moral, legal or ethical qualms in deploying lethal autonomous weapons. <a href="https://www.cnas.org/publications/reports/battlefield-singularity-artificial-intelligence-military-revolution-and-chinas-future-military-power">Recent reports</a> suggest that China has already begun to incorporate AI technologies into its next-generation <a href="https://www.technologyreview.com/s/603084/the-pentagons-innovation%20experiment">conventional missiles</a> and missile defense intelligence, surveillance, and reconnaissance systems to enhance their precision and legality.</p>
<p>The US will likely be much more constrained in the development of these technologies. The Pentagon’s reticence to incorporate AI into existing weaponry is grounded in liberal democratic norms governing the use of military force, and in a concern to avoid what the Pentagon has called the <a href="https://www.nytimes.com/2016/10/26/us/pentagon-artificial-intelligence-terminator.html">Terminator conundrum</a> – the prospect that military robots could one day decide independently whether or not to take a human life.</p>
<p>That said, propelled by the rapid pace of technological trends in AI – and the aggressive pursuit of these capabilities by rival powers – the US’s current commitment to keeping humans in charge could waver. If the present trajectory holds, China will soon challenge the US’s lead in several emerging military-technological strategic fields. That is likely to accelerate the Pentagon’s efforts to innovate offsetting initiatives and concepts – and in turn, make it harder to keep this disruptive high-tech arms race in check.</p>
<p><a href="https://globalsecurityreview.com/china-us-racing-to-develop-artificial-intelligence-ai-weapons/">China and the U.S. are Racing to Develop A.I. Weapons</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Crisis in the Congo: A New Role for NATO’s Southern Hub</title>
		<link>https://globalsecurityreview.com/crisis-drc-congo-new-role-nato-southern-hub/</link>
		
		<dc:creator><![CDATA[Robert Clark&nbsp;&&nbsp;Christopher Galvin]]></dc:creator>
		<pubDate>Wed, 29 Aug 2018 18:26:02 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Democratic Republic of the Congo]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=7934</guid>

					<description><![CDATA[<p>The growing violence in the Democratic Republic of the Congo is the latest in a series of decades-long bloody conflicts. The ongoing humanitarian crisis in the Democratic Republic of the Congo (DRC) has been described by the U.N. as the &#8220;highest level of emergency;&#8221; comparable with Yemen, Syria, and Iraq. In January 2018 Jean-Pierre Lacroix, the [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/crisis-drc-congo-new-role-nato-southern-hub/">Crisis in the Congo: A New Role for NATO’s Southern Hub</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The growing violence in the Democratic Republic of the Congo is the latest in a series of decades-long bloody conflicts.</h2>
<p>The ongoing humanitarian crisis in the Democratic Republic of the Congo (DRC) has been described by the U.N. as the <a href="https://www.bbc.co.uk/news/world-africa-44613147">&#8220;highest level of emergency;&#8221;</a> comparable with Yemen, Syria, and Iraq.</p>
<p>In January 2018 Jean-Pierre Lacroix, the head of U.N. peacekeeping operations, informed the Security Council of the recently deteriorating situation and the urgent need to <a href="https://www.devex.com/news/drc-peacekeeping-forces-prepare-for-a-worsening-2018-un-s-lacroix-says-91856">bolster peacekeeping efforts</a> within the country. However, in contrast to the latter crises, the ongoing conflict in the DRC has received far less attention from international media platforms.</p>
<p>Since 2016, at least 3000 civilians have been killed and a further 1.4 million displaced. A catalyst for this conflict has been significant public resistance to the rule of President Joseph Kabila. In June 2016, a traditional chief within the central Kasia region called for a popular uprising against the government and state institutions.</p>
<p>Following the chief’s death two months later, the result of a police raid, civil unrest escalated to a disturbing level unprecedented in recent years; including the alarming re-emergence of <a href="https://www.aljazeera.com/news/2017/02/soldiers-kill-101-clashes-kamwina-nsapu-170214110027063.html">child soldiers</a>.</p>
<p>The grievances voiced over President Kabila’s rule, which caused the initial protests earlier that year, intensified in December 2016 when the president refused to step down after his five-year term concluded.</p>
<p>Despite the earlier implementation of the United Nations Organization Stabilization Republic Mission in the Democratic of the Congo (MONUSCO), with a mandate aimed at protecting civilians, humanitarian personnel and stabilizing the government, civil conflict has continued to rise.</p>
<h3>The current escalation in violence in the DRC is the latest in a series of bloody civil conflicts dating back to the mid-1990s.</h3>
<p>The Second Congo War (1998-2003) was the deadliest conflict globally since the Second World War, resulting in <a href="https://www.reuters.com/article/us-congo-democratic-death/congo-war-driven-crisis-kills-45000-a-month-study-idUSL2280201220080122">5.4 million deaths</a>. The nature of violence was so extreme that children under the age of five were the hardest hit, accounting for almost half of all those killed.</p>
<p>The scale of the war was so vast that it destabilized the entire region, as foreign armies and rebel groups fought for control over the country’s natural resources; recently estimated to be worth more than <a href="http://africanleadership.co.uk/10-most-mineral-rich-countries-in-africa/">$24 trillion.</a></p>
<p>The conflict, exacerbated by endemic corruption, forced millions to flee their homes, further destabilizing the region. The ongoing failure of the DRC security forces to prevent the humanitarian crisis has continued to this day.</p>
<p>The inherent weakness of those forces to protect civilians ultimately led to U.N. Resolution 1279, and the creation of the United Nation Organization Mission in the Democratic Republic of the Congo (MONUC).</p>
<p>Charged with the observation of the Lusaka Ceasefire Agreement, it was replaced in 2010 by the current MONUSCO mission, which as previously stated was to ensure the protection of civilians.</p>
<p>The latest manifestations of the conflict witnessed since 2016, have highlighted the glaring failures of the current U.N. mission in achieving that mandate.</p>
<h3>The Failures and Shortcomings of U.N. Peacekeeping Forces</h3>
<p>In addition to being unable to fulfill its overall purpose, the latest U.N. mission has endured considerable losses; most recently the deaths of 15 Tanzanian peacekeepers in December 2017; in total, U.N. peacekeeping missions in the DRC have suffered the loss of 93 personnel.</p>
<p>A U.N. <a href="https://uk.reuters.com/article/uk-congo-violence-un/u-n-inquiry-blames-congos-adf-rebels-for-deadly-attack-on-peacekeepers-idUKKCN1GE2QA">report</a> from March 2018 investigating these deaths highlighted shortcomings in the training of its troops as a significant causal factor. Although contributing substantial troop numbers, the majority of the MONUSCO assisting militaries are from developing states themselves, inevitably posing limitations to the overall capability of the mission.</p>
<p>Despite some of these contributing states, specifically Tanzania, offering evident military strengths such as regional expertise, those forces do not provide the mission access to the technological military resources required by the mission’s efforts. For example, UAV <a href="https://www.globalpolicy.org/security-council/index-of-countries-on-the-security-council-agenda/democratic-republic-of-congo/52169-un-wants-to-use-drones-for-peacekeeping-missions.html?itemid=id#38525">surveillance</a> technology has already been requested as a necessity. A further weakness of the current U.N. peacekeeping mission is the sizable <a href="https://www.reuters.com/article/us-un-peacekeepers/u-n-peacekeepers-pressed-to-do-more-with-less-as-further-cuts-loom-idUSKCN1BU0F3">reduction to its budget</a> announced by the U.S. in 2017.</p>
<p>The ongoing conflict is by its nature a complex and fragmented issue which can only be resolved through a multi-dimensional approach, encompassing transformations in international assistance and new efforts which tackle corruption and the under-resourced security forces.</p>
<h3>International Economic Legislation Exacerbates Destabilization in the DRC</h3>
<p>Disconcertingly, the international economic legislation spearheaded by the Obama Administration, compels many corporations to avoid mineral extraction in conflict-prone areas.</p>
<p>While initially supported by the international community, this measure, known as the broader U.S. economic reform the <a href="https://www.gpo.gov/fdsys/pkg/PLAW-111publ203/pdf/PLAW-111publ203.pdf">Dodd-Frank Act</a>, has propelled millions of miners and their families deeper into poverty.  As a direct result of reduced employment prospects for miners, destabilization has increased.</p>
<p>The growing unemployment has encouraged individuals to join the ranks of militias involved in the DRC conflict, exacerbating local corruption; DRC security forces themselves have routinely been involved in mineral extraction and subsequent smuggling into neighboring countries.</p>
<p>By some estimates, <a href="https://www.theguardian.com/world/2014/dec/02/conflict-minerals-law-congo-poverty">$400 million dollars</a> in gold was smuggled out by militias the year after the U.S. legislation was passed. Although the negative impact on regional turbulence may be reduced with a redress of economic policy from the international community, the civil unrest has already generated long-term security issues for the European continent.</p>
<h3>Recommendations for Policymakers</h3>
<p>A 2017 <a href="https://news.gallup.com/poll/211883/number-potential-migrants-worldwide-tops-700-million.aspx">Gallup Poll</a> highlighted how in 2016, 50% of people within the DRC wished to migrate, accounting for approximately 40 million people. As recent migratory trends suggest, this would unequivocally place further strain on southern Europe. To prevent the danger of a mass exodus of the Congolese population, presenting a catastrophic risk to the DRC and the European continent alike, it is essential that the international community now provides a more suitable and capable approach to dealing with the increasing civil unrest within the country.</p>
<p>With the need for a more comprehensive approach, aimed at increasing the operational effectiveness of the current peacekeeping mission and alleviating the obstructive effect of the economic legislation, there leaves an opportunity for NATO’s recently operationalized Southern Hub.</p>
<p>This new facility, located in Naples, Italy, has been charged with the mandate of responding more effectively to security challenges beyond Europe’s southern boundary. This strategic aim is supported by leading European Security experts; <a href="https://carnegieendowment.org/files/NATO_Southern_Flank.pdf">Carnegie Europe</a> claims that NATO is obligated to mitigate the consequences of security threats facing state failure.</p>
<p>The July 2018 NATO Summit has solidified the geopolitical climate for a NATO-led training mission to the DRC, aimed at the protection of civilians through the development of the DRC security forces. Secretary-General Jens Stoltenberg highlighted the need for <a href="https://www.nato.int/cps/en/natohq/opinions_156738.htm">&#8220;a package of additional measures for the South.&#8221;</a></p>
<p>The increased deployment of short-term training teams by NATO members has proven highly effective in increasing the operational capabilities of European-allied states across Africa, including Uganda, Kenya, Somalia, Mali, Nigeria and Sierra Leone.</p>
<p>Such training missions, often small enough in number to ensure political sustainability, enhance regional stability by increasing the capabilities of the local security forces themselves. This is in direct contrast to the hands-on approach witnessed by the U.N. peacekeepers, resulting in the significant death toll. As previously discussed, issues of civil unrest in the DRC require attention in various areas, with a particular emphasis for future missions potentially placed on anti-smuggling.</p>
<p>Of course, to address the root causes of the conflict, a unilateral security approach will not counter essential issues such as high unemployment, large-scale corruption and lack of social mobility. However, what a proposed NATO-led training mission would deliver is a hopeful reduction in the high figure of peacekeeping fatalities and an improvement in the local security situation in the DRC.</p>
<p>This would subsequently improve the security situation currently facing Europe’s Southern flank. With Europe’s politicians having only recently managed to implement systems to reduce the high levels of migration to the continent, a new migrant crisis numbering several million refugees fleeing this latest conflict presents a threat to European security which cannot be ignored.</p>
<p><a href="https://globalsecurityreview.com/crisis-drc-congo-new-role-nato-southern-hub/">Crisis in the Congo: A New Role for NATO’s Southern Hub</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Lack of Economic Transparency &#038; Corruption Threaten Ukraine&#8217;s National Security</title>
		<link>https://globalsecurityreview.com/lack-economic-transparency-corruption-threaten-ukraines-national-security/</link>
		
		<dc:creator><![CDATA[Gabriella Gricius]]></dc:creator>
		<pubDate>Tue, 21 Aug 2018 19:40:57 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Ukraine]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=8066</guid>

					<description><![CDATA[<p>Corruption in Ukraine threatens the country&#8217;s sovereignty and advances Russian interests. Although Ukraine has received $8.7 billion in low-interest loans from the International Monetary Fund (IMF) since 2015, the government continues to lose $4.8 billion a year from corruption. In total, Ukraine has lost over $14.4 billion to corrupt officials. While a simple number does [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/lack-economic-transparency-corruption-threaten-ukraines-national-security/">Lack of Economic Transparency &#038; Corruption Threaten Ukraine&#8217;s National Security</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Corruption in Ukraine threatens the country&#8217;s sovereignty and advances Russian interests.</h2>
<p>Although Ukraine has received $8.7 billion in low-interest loans from the International Monetary Fund (IMF) since 2015, <a href="https://www.kyivpost.com/ukraine-politics/suddeutsche-zeitung-ukraine-loses-4-8-billion-a-year-due-to-corruption-at-customs.html?utm_source=traqli&amp;utm_medium=email&amp;utm_campaign=traqli_daily_editors&amp;tqid=gOC9Z2AnBUAB7rLAKSlYfeuQJCodI9ioTkYoSxE%24">the government continues to lose $4.8 billion a year</a> from corruption.</p>
<p>In total, Ukraine has lost over $14.4 billion to corrupt officials.</p>
<p>While a simple number does not provide a definitive understanding of corruption, it does reveal the degree to which corruption has become endemic to Ukraine.</p>
<p>Corruption is not uncommon in former Soviet states, where customs officials are commonly bribed by smugglers and traffickers.</p>
<h3>Ukraine’s anti-corruption policies have been lackluster in the past.</h3>
<p>Ukraine has initiated several measures to address the problem of corruption within the government. The government overhauled the State Fiscal Service and has launched the “Ukraine Without Smuggling” campaign.</p>
<p>However, Ukraine requires more than a public relations campaign to solve its corruption problems. As a result of Ukraine’s geopolitically precarious position between the West and Russia, a solution is required sooner rather than later.</p>
<p>Ukraine has been relying on IMF and World Bank funds to stabilize the national currency (the hryvnia), reduce the budget deficit and bolster international currency reserves.</p>
<p>Without such funds, Ukraine is more likely to make a strategic tilt towards Russia. The loss of funds for Ukrainian oligarchs, in particular, that would result from a loss of international funding would present the Kremlin with the opportunity to re-exert its influence in Kiev.</p>
<p>A substantially decreased cashflow into Ukraine would require replacement funds. Russia would be more than willing to use the situation to pull Ukraine away from the West.</p>
<h3>The World Bank seems to be making progress in stabilizing Ukraine&#8217;s economy.</h3>
<p>The World Bank reported <a href="https://www.rferl.org/a/world-bank-says-preparing-650-million-dollar-loan-guarantee-ukraine-if-complies-imf-economic-reforms/29438515.html">it is preparing a $650 million guarantee</a> for Ukraine to fund its entry into global-debt markets, which would allow the country to raise around $800 billion. However, the Ukrainian government must implement IMF economic reforms to receive the guarantee.</p>
<p>Ukraine has already achieved a number of the reforms, such as the successful enactment of stronger banking and credit laws, which were passed in July 2018.</p>
<p>In September, an IMF mission will be visiting Ukraine to report on the state of Ukraine’s economic reforms.</p>
<p>While it is not definite that Ukraine has wholly fulfilled its IMF obligations, the possibility of receiving substantial funding from the West should be a great enough incentive to induce lasting economic reform.</p>
<p>The question remains, however, as to whether or not Ukraine can overcome the prevalence of public sector corruption?</p>
<h3>Corruption threatens Ukraine&#8217;s sovereignty.</h3>
<p>While corruption is widespread, it&#8217;s entirely possible that Ukraine will choose to implement substantial economic reforms in addition to significantly reducing corruption within the country.</p>
<p>Not only does IMF and World Bank financial assistance come at an opportune time for Ukrainian investors, it serves to further solidify Ukraine’s position as a Western democracy.</p>
<p>With Western financing, Ukraine can take further steps on a path towards European integration and fight back against Russian aggression.</p>
<p>Ukraine is already acting out against Russian provocations, by <a href="https://www.ukrinform.net/rubric-defense/2519119-ukrainian-navy-to-increase-its-presence-in-the-sea-of-azov.html">increasing its naval presence in the Sea of Azov</a>.</p>
<p>In doing so, the country shows Russia that monetary persuasion is much more convincing than the history that it shares with Russia itself.</p>
<p>However, it may also be that corruption proves too difficult to unseat, as the World Bank and IMF funds are tied to Ukraine&#8217;s implementation of major economic reforms.</p>
<p><a href="https://www.bloomberg.com/news/features/2018-08-01/ukraine-reforms-stall-as-economy-lags-and-corruption-lingers">Transparency International’s Corruption Perception Index</a> rates Ukraine at 130/180, which is on the lower end of the scale.</p>
<p>However, in 2015, Ukraine established the National Anti-Corruption Bureau, and three years later established an anticorruption court.</p>
<p>Signs may indicate a move towards meaningful reform, but only time will tell whether it will be successful.</p>
<p><a href="https://globalsecurityreview.com/lack-economic-transparency-corruption-threaten-ukraines-national-security/">Lack of Economic Transparency &#038; Corruption Threaten Ukraine&#8217;s National Security</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Expect Rising Tensions Between China and Taiwan for the Foreseeable Future</title>
		<link>https://globalsecurityreview.com/expect-rising-tensions-between-china-taiwan-foreseeable-future/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Wed, 15 Aug 2018 06:00:40 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=7782</guid>

					<description><![CDATA[<p>Beijing could attempt to reunify China by force within the next decade. The issue of reunification between mainland China and the island of Taiwan is one of the most significant obstacles to Chinese President Xi Jinping&#8217;s drive for &#8220;national rejuvenation,&#8221; a campaign to restore China&#8217;s position as a global power by 2049. Since the end [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/expect-rising-tensions-between-china-taiwan-foreseeable-future/">Expect Rising Tensions Between China and Taiwan for the Foreseeable Future</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Beijing could attempt to reunify China by force within the next decade.</h2>
<p>The issue of reunification between mainland China and the island of Taiwan is one of the most significant obstacles to Chinese President Xi Jinping&#8217;s drive for &#8220;national rejuvenation,&#8221; a campaign to restore China&#8217;s position as a global power by 2049.</p>
<p>Since the end of the Chinese Civil War, Taiwan has been <em>de facto</em> independent, and Beijing has not made forcible attempts to recapture what the Chinese Communist Party considers a wayward province. However, China has made attempts to lure Taiwan closer while preventing it from formally declaring independence.</p>
<p>The Taiwanese independence movement has steadily grown in influence over the past few decades, while the United States has signaled its willingness to provide a greater degree of support for the democratically-ruled island, factors which have contributed to the highest cross-straight tensions in over ten years. The Trump Administration will likely lay the groundwork for a closer relationship with Taiwan as it ratchets up pressure on China.</p>
<p>The Chinese government has shifted between threatening of military force to economic incentives in its campaign to draw Taiwan into Beijing&#8217;s sphere of influence. Throughout 2017 and 2018, the growing military strength of mainland China alongside its aggressive reunification rhetoric and coercive diplomacy has led the U.S. to increase arms sales to Taiwan, increase official-level communications between Taipei and Washington, and improve U.S.-Taiwan defense cooperation.</p>
<h3>Strengthened Taiwan-U.S. Ties</h3>
<p>The growing cooperation between the U.S. and Taiwan has, in turn, aggravated tensions between the U.S. and China, as the latter regards the former as challenging the &#8220;One China&#8221; principle that states that mainland China holds sovereignty over the island of Taiwan. While the Trump Administration is by no means the first to draw China&#8217;s ire in this arena, strengthened ties between the U.S. and Taiwan are accompanied by a shifting geopolitical landscape in the Indo-Pacific.</p>
<p>China’s rising economic, political, and military power has greatly changed the Indo-Pacific balance of power. China is more willing to use force to achieve its aims—one of which is reuniting Taiwan with the mainland. Reunification would be of both symbolic and strategic significance—Xi Jinping has declared reunification a key facet of his “national rejuvenation” by 2049 initiative, and establishing control over Taiwan would allow China to project power unimpeded into the Pacific.</p>
<p>Taiwan’s location, and de facto independence, currently present an impediment to Beijing’s global ambitions. Furthermore, China sees the island as a potential national security threat, as an independent Taiwan could be utilized by the U.S. as a jumping-off point for sorties against mainland China in any U.S.-China conflict.</p>
<h3>Growing Urgency in China</h3>
<p>Reunification is an increasingly urgent issue for Beijing<span style="background-color: #f5f6f5;">—</span>which has historically employed patience<span style="background-color: #f5f6f5;">—</span>due to Xi Jinping’s self-imposed deadline for reunification by 2049. Simultaneously, perceived growing U.S. support for an independent Taiwan, and the failure of the mainland&#8217;s previous efforts at reunification through economic incentives is raising the pressure on China.</p>
<p>Increased U.S.-Taiwan defense cooperation would likely be met with condemnation by Beijing, however, it may be the most effective means of deterring a mainland invasion of the island. Increased cooperation between the U.S. and Taiwan could take the form of the U.S. taking a visible and active presence on the island. This would ensure that China would find itself at war with the U.S. in the event of any attempt at reunification by force.</p>
<p>Regardless, it&#8217;s unlikely that China will attempt to reunify the mainland with Taiwan within the next decade. Taiwan maintains a strong conventional military, and the risk of a U.S. intervention remains high. However, China is steadily increasing its hard power capabilities and is projected to have a military capable of true power projection on a global scale by 2030. For the foreseeable future, reunifying China will remain a key strategic objective of Beijing.</p>
<p><a href="https://globalsecurityreview.com/expect-rising-tensions-between-china-taiwan-foreseeable-future/">Expect Rising Tensions Between China and Taiwan for the Foreseeable Future</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>U.K. Statutory Prevent Duty: The Creation and Consequences of a Police-State</title>
		<link>https://globalsecurityreview.com/uk-statutory-prevent-duty-creation-consequences-police-state/</link>
		
		<dc:creator><![CDATA[Antonio Perra]]></dc:creator>
		<pubDate>Fri, 03 Aug 2018 14:07:50 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Al Qaeda]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[ISIS]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=6549</guid>

					<description><![CDATA[<p>Introduced by Section 26 of the Counter-Terrorism and Security Act 2015, the Prevent Duty seeks to prevent people from being drawn into terrorism by leveraging on the notion of “non-violent extremism.” In July 2015, a new Prevent statutory duty was introduced, which compelled specified authorities to have “due regard to the need to prevent people [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/uk-statutory-prevent-duty-creation-consequences-police-state/">U.K. Statutory Prevent Duty: The Creation and Consequences of a Police-State</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Introduced by Section 26 of the Counter-Terrorism and Security Act 2015, the Prevent Duty seeks to prevent people from being drawn into terrorism by leveraging on the notion of “non-violent extremism.”</h2>
<p>In July 2015, a new <a href="http://www.legislation.gov.uk/ukpga/2015/6/contents/enacted">Prevent statutory duty</a> was introduced, which compelled specified authorities to have “due regard to the need to prevent people from being drawn into terrorism.&#8221;</p>
<h3>Introduction</h3>
<p>This duty was introduced by Section 26 of the Counter-Terrorism and Security Act 2015, and it seeks to prevent people from being drawn into terrorism by leveraging on the notion of “non-violent extremism.” The section represents a significant change to the Prevent strand of the overall counter-terrorism strategy, CONTEST, because it placed specific legal responsibility on a number of public bodies to tackle radicalization and extremism.</p>
<p>Over the years, Prevent attracted broad criticism for lacking empirical evidence in support of its main corollaries and for being based on the study, “Extremism Risk Guidance” (ERG22+), which however was never validated by the normal process of independent peer review and scientific scrutiny. As a result, in September 2016, over 140 experts and academics criticised Prevent in an open letter to the Government, in which they <a href="https://www.theguardian.com/politics/2016/sep/29/anti-radicalization -strategy-lacks-evidence-base-in-science">wrote</a>:</p>
<blockquote><p>&#8220;We are concerned with the implementation of “radicalization ” policies within the UK Prevent strategy, internationally referred to as countering violence extremism. Tools that purport to have a psychology evidence base are being developed and placed under statutory duty while their “science” has not been subjected to proper scientific scrutiny or public critique.&#8221;</p></blockquote>
<p>Prevent originates from the assumption that radicalization is a linear process towards terrorism, which some people are vulnerable to. It also assumes that it is possible to identify someone on a trajectory towards acts of terror, and that, consequently, this trajectory can be interrupted through a process of de-radicalization.</p>
<p>While a large volume of <a href="http://journals.sagepub.com/doi/10.1177/0306396812454984#articleCitationDownloadContainer">research</a> has been conducted on this topic, statistics keep showing that Prevent is not fit for purpose; instead, it rests on a largely discriminatory interpretation of “radicalization” and “extremism.” Even the <a href="https://mend.org.uk/wp-content/uploads/2017/05/MEND-Muslim-Manifesto-2017_FINAL_lowres-1.pdf">National Police Chief’s Council</a> (NPCC) admitted that 80% of referrals to Channel are redundant, pointing out that there was, in fact, no risk of radicalization.</p>
<p>Further statistics from the <a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/677646/individuals-referred-supported-prevent-programme-apr2015-mar2016.pdf">Home Office</a>, covering April 2015 to March 2016, show that in 2015/16, a total of 7,631 individuals were subject to a referral due to concerns that they were vulnerable to being drawn into terrorism, with most referrals (2,539 – accounting for 33%) coming from the education sector. Of the 7,631 individuals referred in 2015/16, 2,766 (36%) left the process requiring no further action, 3,793 (50%) were signposted to alternative services and 1,072 (14%) were deemed suitable, through preliminary assessment, to be discussed at a Channel panel. In 2015/16, 381 people received Channel support following a Channel panel. Of these, 365 (96%) have subsequently left the process.</p>
<p>Prevent casts a wide net seemingly disregarding the profound consequences that the process has on individuals who are mistakenly identified as subjects at risk. This trend was strongly amplified by the introduction of the statutory Prevent duty.</p>
<h3><b>Towards a police state </b></h3>
<p>The introduction of the statutory Prevent duty compelled the government to find models to train public sector workers to identify and prevent radicalization and extremism. However, the mandatory training is based on the assumptions underpinning the Government’s counter-extremism strategies and, as such, it is marred by the same flawed methodology at the base of the Prevent study. This research identifies four major problems with the legislation.</p>
<p>The first issue is that the Prevent strategy moves from a position of suspicion, that is, everyone is a potential suspect, and everyone can be deterred from committing acts of violent extremism. While the effort to prevent such acts is commendable, the making of the statutory Prevent duty co-opts public sector workers (teachers, nurses, counsellors etc.) into an intelligence tactical role that turns public bodies into sites of securitisation and would require a level of training far superior to that currently provided by the Prevent training course.</p>
<p>In short, not only does the Prevent duty create a climate of suspicion and mistrust between public workers and society, but also puts an enormous responsibility on people who do not necessarily have the background, skills, training, and overall in-depth understanding of radicalization, terrorism, insurgency and related issues. Individuals who have never been involved in the field of counter-extremism are suddenly expected, and in fact compelled, to refer people who they think might be on the path to <a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/263181/ETF_FINAL.pdf">violent extremism</a>.</p>
<p>The second issue concerns the fact that the Prevent training is shaped upon the faulty assumptions underpinning the Government’s counter-extremism strategies, as well as its understanding of radicalization and extremism. According to the <a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/263181/ETF_FINAL.pdf">2011 revised Prevent strategy</a>, the Government has defined extremism as: “vocal or active opposition to fundamental British values, including democracy, the rule of law, individual liberty and mutual respect and tolerance of different faiths and beliefs.” This definition, however, poses a number of issues:</p>
<ol>
<li>British values remains a nebulous concept when used to identify individuals at risk of radicalization. Indeed, democracy, the rule of law, individual liberty and mutual respect and tolerance of different faiths and beliefs are arguably universal and human values and do not necessarily reflect the ‘level of Britishness’ of an individual. When such values as transposed into a purely British context, one could then wonder if, for example, criticism of the UK government or of the monarchy could be seen as a <a href="http://azizfoundation.org.uk/wp-content/uploads/2017/07/What-the-Prevent-Duty-means-for-schools-and-colleges-in-England.pdf">sign of un-Britishness</a> and consequently of extremism.</li>
<li>The rhetoric of Britishness and British values provides a fertile environment for the festering of <a href="https://mend.org.uk/wp-content/uploads/2017/05/MEND-Muslim-Manifesto-2017_FINAL_lowres-1.pdf">far-right ideas</a> and the myth of ‘non-integration’ by Muslim communities. The nearly two decades of constant negative depictions of Islam has resulted in a widespread demonization of British Muslims for their diversities and complexities, which are perceived and portrayed as characterizing various degrees of ‘un-Britishness.’ Such perception can have a profound impact on the way Prevent referrals are made.</li>
<li>British values are often defined in opposition to others. For example, <a href="http://www.bbc.co.uk/news/uk-politics-16224394">David Cameron</a>’s 2011 speech in which he declared “we are a Christian country. And we should not be afraid to say so”, suggests that non-Christians inherently do not belong in Britain. This contributes to creating a climate in which diversity – or more specifically non-Christianity – might be perceived as an indicator of un-Britishness and therefore extremism.</li>
<li>Finally, public sector workers such as teachers are required to promote British values as a crucial step to undertake in an effort to prevent radical ideologies. This can result in increasing censorship of dissenting voices, even when these are fully legitimate. It can also result in a profound sense of alienation for all individuals who legitimately disagree with canonical rules or with what is subjectively (and the confusion over British values inherently requires a certain degree of subjective interpretation) perceived as being ‘British values’.</li>
</ol>
<p>In short, tackling extremism on the basis of an ambiguous definition of ‘British values’ is as dangerous as it is counterproductive. Such a paradigm inevitably frames race relations in light of the Government’s security agenda, while having a profound impact on freedom of expression, diversity, legitimate dissent, and overall multiculturalism.</p>
<p>The third problem is that the Prevent training is based on the presumption that there are clear, identifiable signs that an individual is drifting towards violent extremism.  This conveyor-belt theory, however, is based upon a number of studies conducted on individuals who had in fact committed acts of terror. For instance, the authors of “<a href="http://www.defenddemocracy.org/content/uploads/documents/HomegrownTerrorists_USandUK.pdf">Homegrown Terrorists in the U.S. and U.K</a>” identified six signs of radicalization 1] by analyzing the behavior of “terrorists known to have participated in an attack or an attempted attack.” However, there was no control-study of those who were <i>not</i> terrorists to compare/contrast these signs with, which means that all the identifiers led to terrorism not because there is a linear pattern but because of the selected case studies.</p>
<p>Likewise, the government-funded ERG22+ research conducted by Dean and Lloyd suffers from the same limitations caused by the omission of control-studies. Even the <a href="https://www.theguardian.com/uk/2008/aug/20/uksecurity.terrorism1">MI5</a> confirmed in its report “Behavioural Science Unit Operation Briefing Note: Understanding radicalization and violent extremism in the UK,” that the several hundred terrorists it analyzed “had taken strikingly different journeys to violent extremist activity.”</p>
<p>There are two consequent problems with this. First, a public worker is not necessarily equipped to understand the nuances of religiosity, theology, political activism, and to differentiate between them and a potentially real ongoing radicalization process. Indeed, as pointed out by <a href="https://www.opendemocracy.net/can-europe-make-it/paul-thomas-ted-cantle/extremism-and-%27prevent%27-need-to-trust-in-education">Paul Thomas</a>, Professor of Youth and Policy at the University of Huddersfield, questions should be asked as to whether a one-hour-long course can equip a public worker (for example, a teacher) to discern between extremism and conservativism, particularly when this distinction applies to individuals belonging to communities already considered ‘at risk’, such as the Muslim one. A second issue concerns the fact that Prevent <a href="https://www.nspcc.org.uk/what-you-can-do/report-abuse/dedicated-helplines/protecting-children-from-radicalization /">identifies</a> a number of extremely loose and generic behaviors that might indicate radicalization. These include:</p>
<ol>
<li>Isolating themselves from family and friend</li>
<li>Talking as if from a scripted speech, unwillingness or inability to discuss their views</li>
<li>A sudden disrespectful attitude towards others</li>
<li>increased levels of anger</li>
<li>Increased secretiveness, especially around internet use.</li>
</ol>
<p>These identifiers are however extremely ambiguous, especially for a teacher dealing with teenagers in the midst of adolescence. As such, it can be contended that a teacher, or any other public worker for that matter, might be inclined to look for other factors to fulfill his/her Prevent duty, such as the level of an individual’s religiosity.</p>
<p>Finally, it is unclear what the duty seeks to tackle, and more specifically, at what point of the presumed radicalization process is Prevent attempting to intervene. If the public worker is expected to intervene to forestall a violent act of extremism, then s/he is effectively pre-empting a terrorist attack – an enormous responsibility to put on the shoulders of a non-expert with merely a one-hour-long training. If the public worker is expected to intervene to forestall acts of non-violent extremism – thus “ideas that are also part of a <a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/97976/prevent-strategy-review.pdf">terrorist ideology</a>” –then s/he is challenging and stopping ideas from being expressed. This has potentially disastrous consequences for freedom of speech, particularly within the Education Sector, where debate is key for the advancement and development of pupils and students.</p>
<h3>Neoliberalism and Muslim Identity</h3>
<p>The statutory Prevent duty has created a profound fracture among Muslim communities and between the Muslim and non-Muslim community because it adds a bottom-up level to the traditional top-down securitization process. This, in turn, adds to the jurisprudential transition towards – and effectively establishment of – a legal system based on pre-crime, in which individuals are not prosecuted for committing a crime, but for fear that they might.</p>
<p>As such, while Britain’s pre-crime-based legal system has created a nation of potential suspects, the introduction of the statutory Prevent duty has also created a nation of potential police officers, effectively crystallizing societal divisions based on suspicion. In turn, difficulties in defining radicalization, terrorism, extremism and ‘British values,’ creates a climate of profound legal, social, and political uncertainty, in which other, and certainly more subjective, factors come into play.</p>
<p>An individual’s level of religiosity appears to be a predominant factor in the determination of subjects considered at risk of radicalization. An increasing number of studies is pointing at an inherent, and seemingly irreconcilable, distinction between British and Muslim identities, with the former being built primarily in opposition to the latter – a trend further evidenced by the Brexit vote.</p>
<p>According to <a href="https://www.amazon.co.uk/radicalization -Prevent-Strategy-Routledge-Terrorism/dp/1138281042">M. S. Elshimi</a>, a Research Analyst at the Royal United Services Institute specialising in Countering Violent Extremism, the fracture is not caused by an alleged inability of Muslims to subscribe to the set of British values encompassed in the government’s Prevent definition (democracy, the rule of law, individual liberty and mutual respect and tolerance of different faiths and beliefs) – which are in fact largely shared by British Muslims. Instead, it is provoked by the construction of a British identity according to the model of neoliberal nation-states, and which appears incompatible with some of the more prominent traits of Islam.</p>
<p>Materialism, secularism, modernity, and individualism – just some of the most defining characteristics of a neoliberal state –are inherently at odds with Islam, but their rejection, or a lesser degree of acceptance of them, cannot and should not be seen as a sign of radicalization. The age of globalism, however, has led to a question of reconciliation of multitude identities beyond normative universal values. As such, normality is ascribed to consumerism, secularism, individualism and a general de-politicisation, which constitute an acceptable level of conduct in a neoliberal state. Too much religiosity, consequently, is abnormal and challenged as a sign of radicalization.</p>
<p>In short, it is the Muslim identity that is being problematized and challenged in the current counter-extremism legislation, not terrorism. The difficulty in defining British values makes it impossible to define what a threat to British values is, and in turn, this leads to a more subjective and arguably over-conjectural categorization of individuals at risk.</p>
<h3>Conclusion</h3>
<p>The introduction of the statutory Prevent duty has severely altered the fabric of British society by extending the scope of the current pre-crime system to dangerous new levels. As noted above, while a preventative legal system turns everyone into potential suspects, the bottom-up securitization introduced by the statutory Prevent duty turns non-experts into overly zealous officers.</p>
<p>The problems outlined above revolve around the major issue of not knowing what terrorism and radicalization mean, and consequently of being unable to address it satisfactorily. Furthermore, the government’s attempt to frame extremism in opposition to British values has created ulterior confusion due to the difficulty of defining what ‘British values’ actually means. The issue of British identity – or lack thereof – coupled with nearly two decades of anti-Islam rhetoric, has led to an inevitable clash between neoliberal and Islamic values, with the former being formulated in opposition to the latter.</p>
<p>Religiosity, and even more so religious conservativism, seemingly remains a problem in British society. On the one hand, the secularism and modernity embedded in neoliberal states make religion a suspicious presence in the country; while on the other, the rejection of diversity (perfectly illustrated by the Brexit vote) has led to a societal embracement of cultural isolationism.</p>
<p>Muslims are disproportionally impacted by the framework within which Prevent operates. Statistics presented by the Government’s <a href="https://cage.ngo/publication/blacklisted-the-secretive-home-office-unit-silencing-voices-of-dissent/">Research, Information and Communications Unit</a> (RICU) show that a Muslim is almost 80 times more likely to be referred by Prevent for Channel de-radicalization since 2012. Of the 7,361 individuals referred to Prevent in 2015/16, 4,997 were referred for “Islamist extremism”, but only 5% went on to receiving <a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/677646/individuals-referred-supported-prevent-programme-apr2015-mar2016.pdf">Channel support</a>. This shows that, while Muslims are the prime suspects, there is still very little understanding of what ‘Islamist extremism’ actually means, and what the identifiers of radicalization are.</p>
<p>The widespread belief among Muslims that the Government’s strategies are aimed at enforcing a political, religious and moral revisionism, contributes to the polarization of communities and in reducing the chances of bridging the gap between them. With the statutory Prevent duty co-opting public workers into the process of securitization, this fracture is amplified on every level of society. This also contributes to perpetuating the Huntingtonian paradigm that there is an “us” and a “them” and that the two are very distinct and irreconcilable. The ambiguities resulting from this model cause widespread misunderstandings, which often result in nothing short of a witch-hunt against Muslims. Marginalisation, stigmatization, and resentment thus become embedded in the relationship between Muslims and non-Muslims.</p>
<p>The Prevent duty casts a long shadow of fear and suspicion while demanding idealistic results from public workers with no experience in the field of radicalization and counter-extremism. As argued by <a href="https://www.amazon.co.uk/Terrorism-How-Respond-Richard-English/dp/0199590036">Professor Richard English</a>, an authority in the field of terrorism, what really matters is not that we deal with violent extremism but <i>how </i>we do so. Encroaching civil liberties in the name of security legitimizes terrorism because it leads to a dramatic overturn of our societal values and its defining features, while simultaneously eradicating the very ethics we are attempting to protect.</p>
<hr />
<p>[1]<em> The signs identified in the study are: 1) The Adopting a Legalistic Interpretation of Islam; 2) Trusting Only Select Religious Authorities; 3) Perceived Schism Between Islam and the West; 4) Low Tolerance for Perceived Theological Deviance; 5) Attempts to Impose Religious Beliefs on Others; 6) Political Radicalization. </em></p>
<p><a href="https://globalsecurityreview.com/uk-statutory-prevent-duty-creation-consequences-police-state/">U.K. Statutory Prevent Duty: The Creation and Consequences of a Police-State</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Georgia Realizes Strategic Significance Amidst Tense Russia-NATO Relations</title>
		<link>https://globalsecurityreview.com/south-ossetia-abkhazia-georgia-tensions-us-russia-nato-relations/</link>
		
		<dc:creator><![CDATA[Anna J. Davidson]]></dc:creator>
		<pubDate>Mon, 02 Jul 2018 12:58:34 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[Georgia]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=7808</guid>

					<description><![CDATA[<p>Georgia seeks closer ties with NATO while the regions of Abkhazia and South Ossetia remain occupied by Russia. In the South Caucuses, the Republic of Georgia is caught in the middle of a geopolitical tug-of-war between Russia and the West. Nestled on the Russian border between the Caspian and Black Seas, Georgia finds itself in [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/south-ossetia-abkhazia-georgia-tensions-us-russia-nato-relations/">Georgia Realizes Strategic Significance Amidst Tense Russia-NATO Relations</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Georgia seeks closer ties with NATO while the regions of Abkhazia and South Ossetia remain occupied by Russia.</h2>
<p>In the South Caucuses, the Republic of Georgia is caught in the middle of a geopolitical tug-of-war between Russia and the West. Nestled on the Russian border between the Caspian and Black Seas, Georgia finds itself in a position of strategic significance.<span class="Apple-converted-space"> </span>Georgia, a former Soviet republic, has embarked on a path towards liberal democracy and is actively pursuing membership within the North Atlantic Treaty Organization (NATO).<span class="Apple-converted-space"> </span></p>
<p>International organizations such as the United Nations Development Program and numerous European research centers have been embraced by the Georgian government as it works to increase the rule of law, political transparency, human rights, civil liberties, and economic security in Georgia.</p>
<p>Simultaneously, Georgia is caught in a territorial dispute, claiming that the two northern territories of Abkhazia and South Ossetia are under illegal Russian occupation. The <a href="http://www.mid.ru/en/web/guest/foreign_policy/international_safety/conflicts/-/asset_publisher/xIEMTQ3OvzcA/content/id/3266713">Russian government, however, refutes this claim</a>.<span class="Apple-converted-space"> </span></p>
<p>Though the 2008 five-day war between Georgia and Russia resulted in a ceasefire, it left Abkhazia and South Ossetia under Russian protection while legally remaining within Georgian territory.<span class="Apple-converted-space"> </span>After the war, Georgia withdrew its position as a member of the Commonwealth of Independent States (CIS), a loose <a href="https://www.rferl.org/a/Georgia_Finalizes_Withdrawal_From_CIS/1802284.html">re-grouping of former Soviet Union member states,</a> including Russia.</p>
<h3>Georgia is strengthening political and security ties with the West.</h3>
<p>One of the most significant developments of late are remarks made May 2018 <a href="https://www.reuters.com/article/us-usa-georgia/uss-pompeo-pledges-support-for-georgia-calls-for-russia-troop-pullout-idUSKCN1IM23D">by U.S. Secretary of State</a> Mike Pompeo during a joint press conference with Georgian Prime Minister Giorgi Kvirikashvili. In his remarks, Secretary Pompeo issued a call for Russian troop withdrawal from the occupied regions of Abkhazia and South Ossetia in accordance with the 2008 ceasefire agreement.<span class="Apple-converted-space"> </span></p>
<p><a href="https://www.state.gov/secretary/remarks/2018/05/282300.htm">Secretary Pompeo&#8217;s condemnation of the occupation</a> as a “violation of international peace and security” and contrary to the Charter of the United Nations and the Helsinki Final Act is a firm position against Russian regional aggression.<span class="Apple-converted-space"> </span></p>
<p>Furthermore, Secretary Pompeo’s charge against Russia’s involvement in Georgia is essentially an ultimatum that Russia has violated international law. Given the degree to which Russian leadership has employed concepts of international law in its endeavors, this ultimatum has significant implications for the legitimacy of Russia’s foreign policy.</p>
<p>In addition to the continued strengthening of U.S.-Georgian security and economic ties, <a href="https://www.state.gov/secretary/remarks/2018/05/282300.htm">Secretary Pompeo highlighted</a> Georgia as a “steadfast partner” with the United States and NATO in safeguarding “common security interests,” emphasizing U.S. support for Georgia’s acceptance as a NATO member.<span class="Apple-converted-space"> </span></p>
<p>The European Parliament has since <a href="https://www.rferl.org/a/eu-lawmakers-urge-russia-to-reverse-recognition-of-abkhazia-south-ossetia-independence/29290370.html">called upon Russia to renounce</a> its recognition of Abkhazia and South Ossetia as independent from Georgia. Syria, in the meantime, <a href="https://www.rferl.org/a/georgia-syria-establishes-diplomatic-relations-with-abkhazia-south-ossetia/29257063.html">has joined Russia</a> in its support of Abkhazian and South Ossetian independence. The Georgian government has severed diplomatic ties with Syria in response. Moscow has dismissed such claims as politicized and biased, and that Russian involvement in Georgia has been one of peacekeeping.</p>
<h3>Tensions are growing over Russia’s troop presence in Abkhazia and South Ossetia.</h3>
<p>In late June, representatives from Russia, the United States, Georgia, South Ossetia, and Abkhazia engaged in somewhat fervent <a href="http://www.mid.ru/en/web/guest/foreign_policy/international_safety/conflicts/-/asset_publisher/xIEMTQ3OvzcA/content/id/3266713">consultations</a> that were co-chaired by the U.N, the E.U., and the Organization for Security and Cooperation in Europe (OSCE). <a href="https://ge.usembassy.gov/u-s-participation-in-the-geneva-international-discussions-gid-on-georgian-conflict-june-20/">The United States reiterated</a> the call for a Russian withdrawal of forces and its support for maintaining the integrity of Georgia’s territorial sovereignty.</p>
<p>The <a href="http://www.mid.ru/en/web/guest/foreign_policy/international_safety/conflicts/-/asset_publisher/xIEMTQ3OvzcA/content/id/3266713">Russian representatives emphasized</a> the threat to regional security presented by the growing presence of NATO forces, and that any chance at increased productivity is dependent upon Georgia’s willingness “to engage in a direct and respectful dialogue with the representatives of Abkhazia and South Ossetia and to abandon any confrontational rhetoric and behavior.”<span class="Apple-converted-space"> </span></p>
<p>Ultimately, the consultations increased frustrations between Russia as the defender of Abkhazian and South Ossetian sovereignty and the United States as the proponent of Georgian territorial integrity. With the increase in geopolitical tensions between Georgia, Abkhazia, and South Ossetia exhibited by these developments, the United States and Russia face decisions of profound significance toward regional stability as crucial allies of opposing blocs.<span class="Apple-converted-space"> </span></p>
<p>The upcoming summit between Russian President Vladimir Putin and U.S. President Donald Trump may very well shed light on what the future holds for the South Caucuses. Nevertheless, one would do well to keep a weather eye on Georgia.</p>
<p><a href="https://globalsecurityreview.com/south-ossetia-abkhazia-georgia-tensions-us-russia-nato-relations/">Georgia Realizes Strategic Significance Amidst Tense Russia-NATO Relations</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Russia Transfers Five Warships Out of Caspian Sea</title>
		<link>https://globalsecurityreview.com/russia-transfers-five-warships-out-caspian-sea/</link>
		
		<dc:creator><![CDATA[Joshua Kucera]]></dc:creator>
		<pubDate>Wed, 27 Jun 2018 18:23:32 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[Turkey]]></category>
		<category><![CDATA[Ukraine]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=7787</guid>

					<description><![CDATA[<p>This story was originally published by Eurasianet. Russia has transferred at least five warships out of the Caspian Sea into European waters in response to threats in that theater, at least temporarily leaving Russia without a substantial portion of its Caspian firepower. There have been two separate redeployments over the past month. In the first, [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/russia-transfers-five-warships-out-caspian-sea/">Russia Transfers Five Warships Out of Caspian Sea</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: center;"><em>This story was originally published by <a href="https://eurasianet.org/s/russia-transfers-five-warships-out-of-caspian-sea">Eurasianet</a>.</em></p>
<p>Russia has transferred at least five warships out of the Caspian Sea into European waters in response to threats in that theater, at least temporarily leaving Russia without a substantial portion of its Caspian firepower.</p>
<p>There have been two separate redeployments over the past month. In the first, Russia sent three missile ships into the Sea of Azov, between Ukraine and Russia, along with two auxiliary vessels. In the second, it sent two corvettes into the Sea of Azov and then onward to the Black Sea and the Mediterranean.</p>
<p>The former deployment appears to be related to Russia&#8217;s ongoing conflict with Ukraine: the Russian military blog BMPD and other observers have <a href="https://bmpd.livejournal.com/3216755.html">linked it</a> to the opening of the new bridge across the Kerch Straits connecting Crimea to Russia. “It appears very likely that they are not preparing to return to the Caspian,” wrote analyst Sergey Ishchenko on the website Svobodnaya Pressa.</p>
<p>The latter is related to Russia&#8217;s operations in Syria, the state news website RT <a href="https://russian.rt.com/russia/article/524819-korabli-sredizemnoe-more-kalibry">reported</a>. After that, the ships could be heading to join the Baltic Fleet, BMPD <a href="https://bmpd.livejournal.com/3241204.html">speculated</a>. “It&#8217;s not yet clear whether they will return to the Caspian Sea upon the completion of their military service in the Mediterranean,” BMPD wrote.</p>
<p>The Caspian is a closed sea, but a series of canals and the Volga and Don rivers connect it to the Sea of Azov, allowing Russia to move ships in and out.</p>
<p>The two corvettes are two of the Caspian Flotilla&#8217;s most powerful ships, having <a href="https://eurasianet.org/s/russia-launches-more-cruise-missiles-from-caspian-to-syria">launched</a> some of the Kalibr missiles that Russia used to <a href="https://eurasianet.org/node/75456">strike targets in Syria</a> in 2015. (The two ships now off the Syrian coast are the Grad Sviyazhsk and Veliky Ustyug. Another Corvette of the same class, the Uglich, remains on the Caspian, as do two frigates, the Tatarstan and Dagestan.)</p>
<p>The redeployments take place as the Caspian Flotilla is getting ready to move from its current home base in Astrakhan to Kaspiysk, in Dagestan. Russian officials have vowed that the new base at Kaspiysk will be one of Russia&#8217;s most technologically advanced naval bases.</p>
<p>“Enormous construction works are taking place now” in Kaspiysk, Russian Defense Minister Sergey Shoigu <a href="https://russian.rt.com/russia/article/499196-kaspiiskaya-flotiliya-baza-dagestan">said in April</a>. “Piers, berths, servicing points, residences. The quantity of our officers and soldiers is going to grow manifold.”</p>
<p>At the same time, tension appears to be diminishing on the Caspian, with many of the other littoral states – Azerbaijan, Iran, Kazakhstan, and Turkmenistan – cooperating recently <a href="https://eurasianet.org/s/russia-to-build-new-home-base-for-caspian-flotilla">to an unprecedented degree</a>. The five littoral states <a href="https://www.azernews.az/region/133828.html">reportedly</a> recently agreed on a long-awaited convention delimiting the sea, the foundation of much of the strategic uncertainty there, and so Moscow may be calculating that its limited resources are not best spent on the Caspian. In any case, the ships could always go back the way they came.</p>
<p><a href="https://globalsecurityreview.com/russia-transfers-five-warships-out-caspian-sea/">Russia Transfers Five Warships Out of Caspian Sea</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Saudi Arabia Threatens Military Action if Qatar Purchases Russian S-400 Air Defense System</title>
		<link>https://globalsecurityreview.com/saudis-seek-prevent-qatar-buying-russian-missiles/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Thu, 07 Jun 2018 12:40:44 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[Qatar]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[United Arab Emirates]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">https://www.voanews.com/a/saudis-seek-to-prevent-qatar-from-buying-russian-missiles/4421440.html</guid>

					<description><![CDATA[<p>Saudi Arabia Seeks to Prevent Qatar from Buying the Russian S-400 Air Defense System. According to reports in the French newspaper Le Monde, Saudi Arabia has asked the government of France to assist it in preventing Qatar from buying the S-400 system from Russia. The S-400 is Russia&#8217;s most advanced air defense missile system, and both Turkey [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/saudis-seek-prevent-qatar-buying-russian-missiles/">Saudi Arabia Threatens Military Action if Qatar Purchases Russian S-400 Air Defense System</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Saudi Arabia Seeks to Prevent Qatar from Buying the Russian S-400 Air Defense System.</h2>
<p>According to reports in the French newspaper <em>Le Monde</em>, Saudi Arabia has asked the government of France to assist it in preventing Qatar from buying the S-400 system from Russia.</p>
<p>The S-400 is Russia&#8217;s most advanced air defense missile system, and both Turkey and Saudi Arabia have signed agreements to purchase the S-400 system.</p>
<p>The report states that King Salman of Saudi Arabia expressed his &#8220;deep concerns&#8221; concerning Qatar&#8217;s intentions to purchase the air defense system.</p>
<p>Furthermore, the King specifically threated to take military action against Qatar if the S-400 sale goes forward and the missile system is deployed.</p>
<p>King Salman reportedly stated in the letter that &#8220;the kingdom [Saudi Arabia] would be ready to take all necessary measures to eliminate this defense system, including military action.</p>
<p>Qatar and Russia signed a military and technical cooperation agreement on military in 2017.</p>
<p>In January of 2018, the Qatari ambassador to Russia was quoted saying that Qatar&#8217;s government was in talks at the &#8220;advanced stage&#8221; to acquire the Russian S-400 missile air defense system.</p>
<h3>Despite Saudi Threats, Russia Indicates S-400 Deal Will Go Forward</h3>
<p>A senior Russian politician has said that Russia will supply Qatar with an anti-aircraft missile system despite Saudi Arabia&#8217;s reported threats.</p>
<p>Russian Lawmaker Aleksei Kondratyev, a member of the Russian upper house and the deputy chairman of the committee on Defence and Security, said Russia would pursue its own objectives in determining the countries that it allows to purchase its S-400 surface-to-air missile system.</p>
<p>&#8220;Russia seeks its own interest, supplying S-400 to Qatar and earning money for the state budget. Saudi Arabia&#8217;s position has nothing to do with it, Russia&#8217;s plans will not change,&#8221; Kondratyev said in remarks to Russian state media, adding that &#8220;it is clear that Riyadh plays a dominant role in the region, but Qatar gets an advantage by enhancing its armed forces due to the acquisition of Russian S-400 systems.&#8221;</p>
<h3>No End in Sight</h3>
<p>Saudi Arabia, backed by other regional powers including Bahrain, Egypt, and the United Arab Emirates, broke off relations with Qatar in June last year, after harshly criticizing Qatar&#8217;s deepening ties with Iran, Saudi Arabia&#8217;s strategic rival in the region, and accusing the Gulf state of funding terrorism throughout the region.</p>
<p>In April of 2018, Saudi Foreign Minister Adel al-Jubeir warned Qatar that it faced “imminent demise” unless it provided funding and support for a U.S.-led military presence in Syria.</p>
<p>Foreign Minister of Bahrain Sheikh Khalid bin Ahmed al-Khalifa said in a May interview with a Saudi-owned newspaper that there was no &#8220;glimmer of hope&#8221; for an end to the crisis.</p>
<p><a href="https://globalsecurityreview.com/saudis-seek-prevent-qatar-buying-russian-missiles/">Saudi Arabia Threatens Military Action if Qatar Purchases Russian S-400 Air Defense System</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>In-Depth: Russian Active Measures, Information Warfare,  and Big Data in the 2016 Presidential Election</title>
		<link>https://globalsecurityreview.com/hostile-foreign-interference-2016-election/</link>
		
		<dc:creator><![CDATA[Sophia Porotsky]]></dc:creator>
		<pubDate>Fri, 25 May 2018 04:15:46 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Netherlands]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=3671</guid>

					<description><![CDATA[<p>Russian Information Warfare and Active Measures in the 2016 U.S. Presidential Election “Part of the misinformation, disinformation campaign that was launched was launched in three key states, Wisconsin, Michigan, and Pennsylvania, and it was launched…not to reinforce Trump voters to go out but actually targeted at potential Clinton voters, with misinformation in the last week [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/hostile-foreign-interference-2016-election/">In-Depth: Russian Active Measures, Information Warfare,  and Big Data in the 2016 Presidential Election</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Russian Information Warfare and Active Measures in the 2016 U.S. Presidential Election</h2>
<blockquote><p><i>“Part of the misinformation, disinformation campaign that was launched was launched in three key states, Wisconsin, Michigan, and Pennsylvania, and it was launched…not to reinforce Trump voters to go out but actually targeted at potential Clinton voters, with misinformation in the last week where they were…suddenly reading, if they got their news from Facebook and Twitter…stories about Clinton being sick and other things…the Russians, they’re very good at this technology piece, they might not have been so good at being able to target to a precinct level American political turnout. That would mean they might be actually receiving some…information or alliance from some American political expertise to be able to figure out where to focus these efforts.”</i></p>
<p><i>U.S. Senator Mark Warner</i></p></blockquote>
<h3 style="text-align: left;">Social media and the access it provides to voter data give <a href="http://globalsecurityreview.com/cold-war-2-0-russian-information-warfare/">Russian active measures</a> the ability to influence the outcome of an election.</h3>
<p>As made clear by Senator Warner during a Senate Intelligence Committee hearing on Russia’s involvement in the 2016 U.S. Presidential Election, social media, the content published on it, and the access it provides to voters can have the power to influence the outcome of an election. In the case of the 2016 elections, both Russia and the Trump campaign relied heavily on social media.</p>
<p>It is necessary to consider Donald Trump’s role, complicit or otherwise, in propagating Russia’s ‘active measures’ on social media. It is also imperative to scrutinize the campaign’s use of the data analysis company, Cambridge Analytica, whose exploitation of social media enables “micro-targeted” political messaging to reach individual voters with unprecedented precision. It’s increasingly clear that both Russia and the Trump campaign harnessed social media to influence public opinion, suppress voter segments, and arguably steer the outcome of an election.</p>
<h3>What is Information Warfare?</h3>
<p>Russian Information Warfare (<i>informatsionaya voyna</i>) is rooted in Soviet thinking, dating back to the beginning of the Cold War <a href="https://www.osw.waw.pl/sites/default/files/the_anatomy_of_russian_information_warfare.pdf">in the form of </a><a href="https://www.osw.waw.pl/sites/default/files/the_anatomy_of_russian_information_warfare.pdf"><em>spetspropaganda</em></a> (special propaganda). <a href="http://www.realcleardefense.com/articles/2017/05/09/russias_approach_to_cyber_warfare_111338.html">Information warfare</a> is a “holistic concept that includes computer network operations, electronic warfare, psychological operations, and information operations.”</p>
<p>The 2010 Military Doctrine of the Russian Federation says that these measures are implemented “to achieve political objectives without the utilization of military force.” In contrast to Soviet propaganda—which the regime went to great lengths to proclaim as the truth—modern Russian information warfare does not prioritize this; modern<a href="http://www.politico.eu/article/russias-information-warfare/"> information warfare</a> seeks to plant seeds of doubt and distrust; to confuse, distract, polarize and demoralize.</p>
<p>Accordingly, the creation and dissemination of misinformation, disinformation; what has commonly become known as ‘fake news,’ is a vital component of the Russian information warfare offensive strategy.</p>
<p>This approach is often referred to by the Soviet term, ‘<a href="http://intellit.muskingum.edu/russia_folder/pcw_era/">active measures</a>,’ which “refers to the manipulative use of slogans, arguments, disinformation, and carefully selected accurate information, which the Soviets used to try to influence the attitudes and actions of foreign publics and governments.”</p>
<h3>The Cyber Component of Active Measures</h3>
<p>There is much disagreement over the definition of ‘cyber.’ For this report, ‘cyber’ will be <a href="http://www.stratcomcoe.org/afoxall-putins-cyberwar-russias-statecraft-fifth-domain">defined as</a> “involving the ‘command and control of computers’… cyber attacks can be described as ‘all efforts to disrupt, deny, degrade, distort, the information that they [computers] rely upon, store, process, and generate.’”</p>
<p>A crucial distinction to grasp is that Russia views cyber operations differently than the West. Russia <a href="http://www.realcleardefense.com/articles/2017/05/09/russias_approach_to_cyber_warfare_111338.html">generally does not use the terms</a> ‘cyber’ or ‘cyber warfare’ and instead incorporates cyber into their broader conceptualization of information warfare. In short, ‘cyber’ operations are a means to an end in a more significant campaign.</p>
<p>For Russia, the Cold War never really ended, and the distinction between <a href="http://www.realcleardefense.com/articles/2017/05/09/russias_approach_to_cyber_warfare_111338.html">war and peacetime</a> is blurred; “Moscow perceives the struggle within the ‘information space’ to be more or less constant and unending.” This perception runs parallel with the Kremlin’s belief that while matching the conventional military power of the U.S. is out of the question; they can conduct efficient operations in the information domain. In doing so, they can achieve political and military objectives <a href="https://relayto.com/the-henry-jackson-society/YDD2kgI1">using far fewer resources</a>: “As far as the Kremlin is concerned, geeks and hackers now rank alongside soldiers and spies as weapons of the state.”</p>
<p>In sum, Russia views cyber as an essential component of information warfare, which is a vital element of their overarching military strategy. Furthermore, as the Kremlin sees itself as being in an eternal struggle with the West, and desires to increase its sphere of influence, they have been pouring considerable resources into building up their information warfare capabilities.</p>
<h3>The Security Gap</h3>
<p>There is a <a href="http://www.stratcomcoe.org/next-phase-russian-information-warfare-keir-giles">vital discrepancy</a> between the Russian definition of ‘Information War’ – “all-encompassing, and not limited to wartime – and the Western one – limited, tactical information operations carried out during hostilities.” The most critical elements of the Russian definition are: information warfare is ‘all-encompassing,’ and there is no distinction between war and peacetime, creating a security gap. While the West is on guard to combat information warfare during hostilities, Russia is perpetually mounting an information warfare offensive.</p>
<p>Furthermore, Russia views propaganda and disinformation as “at least as important as the traditional…notion of crippling cyber attacks on critical national infrastructure. By contrast, the Western approach to cyber threats has typically focused on technical responses to technical threats, mostly disregarding the interface with information warfare in the broad sense.”</p>
<p>This revelation ties into the 2016 US Presidential election: once the US was alerted to the threat of cyber intrusion from a foreign adversary, they focused their efforts on protecting the hardware: the voting machines, when in fact Russia was <a href="http://www.slate.com/articles/technology/future_tense/2016/12/how_russia_hacked_american_voters.html">focusing its efforts on manipulating the voters</a> (facilitated by social media). The outcome is the manifestation of the diverging understandings of information warfare between Russia and the West.</p>
<hr />
<h2 class="single-post-title"><a href="http://globalsecurityreview.com/russia-manipulated-u-s-voters-social-media/"><span class="post-title">Facebook, Compromised: How Russia Manipulated U.S. Voters</span></a></h2>
<p>Conceptually, Information warfare is by no means a new concept. However, the broad reach of social media has created an entirely new and highly effective avenue for Russian ‘active measures’ to penetrate into and influence the minds of the American public.  <a href="https://warontherocks.com/2016/11/trolling-for-trump-how-russia-is-trying-to-destroy-our-democracy/">Active measures</a> “employ a three-pronged approach that attempts to shape foreign policy…state-to-people, People-To-People, and state-to-state…The Russian government today uses the state-to-people and people-to-people approaches on social media and the internet.”</p>
<p><a href="https://warontherocks.com/2016/11/trolling-for-trump-how-russia-is-trying-to-destroy-our-democracy/">According to researchers</a> who conducted a post-mortem of social media activity during the election using internet analytics tools, Russian Information Warfare content on social media attempts to subvert Western democracies in five ways: undermine public confidence in democratic government, exacerbate internal political divisions, erode trust in government, push the Russian agenda in foreign populations, and create confusion and distrust by blurring fact and fiction. Russian propaganda on social media can be divided into four themes: political messages intended to foster distrust in government (e.g., allegations of voter fraud, corruption), financial propaganda (i.e., create distrust in Western financial institutions), social issues (e.g., ethnic tensions, police brutality), and doomsday-style conspiracy theories.</p>
<h3>Russian Information Warfare Operations &amp; Active Measures</h3>
<p>Information warfare content is generated and disseminated through channels that fall into three attribution categories: white (overt), grey (less-overt), and black (covert) channels. They propagate a blend of authentic, manipulated, and fake stories and they feed off of and reinforce each other.</p>
<p>White or overt channels include state-sponsored pro-Russian news outlets such as Sputnik and RT, the grey less-overt outlets include data dump sites, such as Wikileaks, and more sinister black channels involve covert operations such as hacking. The agents disseminating the information include bots (automated web robots), and real people, often presenting themselves as innocuous news aggregators. These agents form the critical engine for distributing misinformation and disinformation.</p>
<p>Black or covert measures—once highly risky and dangerous to carry out—are now quickly and efficiently carried out through social media. Russia is now able to remotely coordinate an army of hackers, honeypots (in this instance, social media profiles used to bait other users into giving compromising or embarrassing information), and hecklers or internet trolls (individuals who purposely create discord or provoke).</p>
<h3>The Role of Non-State Cyber Hackers: Advanced Persistent Threat (APT) Groups</h3>
<p>Cyber hacking groups—or advanced persistent threat (APT) groups—are a <a href="https://weaponizednarrative.asu.edu/library/russia%E2%80%99s-approach-cyber-warfare">critical component</a> of the Kremlin’s information operations. The fact that it is challenging to definitively prove ties to the Russian government is what endears them to the Kremlin. However, while there isn’t necessarily a ‘smoking gun,’ evidence gleaned from previous cyber attacks has allowed the top US intelligence agencies to reach conclusions, with a substantial degree of confidence, that <a href="https://www.nytimes.com/2017/01/06/us/politics/russian-hack-report.html">the Kremlin was involved</a>.</p>
<p><a href="http://www.slate.com/articles/news_and_politics/war_stories/2016/07/the_dnc_email_leaks_show_that_russia_is_trying_to_influence_the_u_s_election.html">For example</a>,  “the facts that the hackers’ work hours aligned with Moscow’s time zone, operations ceased on Russian holidays, their techniques carried signatures common to other Russian hacks, and their targets were of clear interest to Moscow.” In the social media realm, hackers provide the fodder for the narratives of disinformation/misinformation generated. “<a href="https://warontherocks.com/2016/11/trolling-for-trump-how-russia-is-trying-to-destroy-our-democracy/">The most notorious Russian-linked hacker</a>…Guccifer 2.0, targets current and former U.S. government officials, American security experts, and media personalities by seeking access to their private communications and records,” and whatever information may come to light then presents itself in the propaganda created and disseminated.</p>
<h3>What are Honeypots?</h3>
<p><a href="https://warontherocks.com/2016/11/trolling-for-trump-how-russia-is-trying-to-destroy-our-democracy/">Honeypots are fake social media profiles</a> which are designed to lure in real people to engage with them online: “today’s honeypots may include a component of sexual appeal or attraction, but they just as often appear to be people who share a target’s political views, obscure personal hobbies, or issues related to family history.”</p>
<p>The objective of the honeypot accounts is to earn the trust of unsuspecting users in order to conduct a range of activities including disseminating content from white and gray propaganda channels, attempting to entrap users with compromising propositions such as offers of sexual exchanges, or trying to persuade targets to click on malicious links or deceive people into downloading malware (software intended to damage a computer).</p>
<p>If the target exposed to a malicious link or malware is a person of interest, such as a politician or public figure, this enables APT groups to access personal information and post it on grey channels such as data dump sites. The information revealed in turn <a href="http://www.bbc.com/news/world-us-canada-39435786">helps construct the narrative of misinformation</a> posted on white channels, such as RT or Sputnik, and eventually trickling down to conservative news sites such as Breitbart, before being picked up by the mainstream media.</p>
<h3>Hecklers: Trolls &amp; Troll Farms</h3>
<p>Hecklers, or trolls, give life to Russia’s influence operations. There have been reports of “troll farms,” <a href="https://weaponizednarrative.asu.edu/library/russia%E2%80%99s-approach-cyber-warfare">employing hundreds of people</a>, formed to actively disseminate pro-Kremlin propaganda. It is important to note, “the information contained in the comments and posts by the trolls ranges from misleading to verifiably fraudulent.” The objective of trolls is not necessarily to defend or validate the pro-Russian propaganda posted, but rather to flood the social media space with such a high volume of misinformation, as to create a state of confusion and calamity.</p>
<p>Senator Mark Warner, the ranking Democrat on the Senate Intelligence Committee, has <a href="http://Army%20of%20Russian%20Trolls%20Reportedly%20Targeted%20Swing%20States%20with%20Anti-Clinton%20Fake%20News">said</a> that “there were upwards of a thousand paid internet trolls working out of a facility in Russia, in effect taking over a series of computers which are then called a botnet, that can then generate news down to specific areas.” The implication here: a sophisticated and coordinated social media disinformation campaign was able to micro-target vulnerable voter populations. The reason they were vulnerable is that they received their news from social media, which had been powerfully harnessed to manipulate voters in the critical weeks leading up to Election Day.</p>
<h3>The Ramifications of a Compromised Social Media Space</h3>
<p>Social media, a Western innovation, at a glance seems like an ideal manifestation of a free and open society. Social media platforms enable users to share information, freely express opinions, and connect with other individuals. However, these same platforms were harnessed to wage a full-scale coordinated Information warfare offensive. False articles—“fake news” content—that favored Trump were <a href="http://www.newyorker.com/magazine/2017/03/06/trump-putin-and-the-new-cold-war">four times as likely</a> to be shared on social media platforms when compared with false stories endorsing Secretary Clinton.</p>
<p>“Fabricated pro-Trump stories were shared four times as often as fabricated pro-Clinton stories…researchers also found that roughly half the readers of a fake news story believed it…automated Twitter accounts, known as “bots,” generated four tweets in favor of Trump for everyone in favor of Clinton…a substantial number of these bots were aligned with individuals and organizations supported, and sometimes funded, by the Kremlin.”</p>
<p>Russia utilized generations’ worth of acquired expertise in the art of Information warfare and adapted it to social media in a way that was agile, penetrating and efficient. There is evidence suggesting there were efforts to suppress voters in key precincts in Pennsylvania, Michigan, and Wisconsin.</p>
<p><a href="http://washingtonmonthly.com/2017/03/30/why-did-russia-hack-the-voter-rolls/">These states, which were crucial</a> in determining the winner of the Presidential election, were flooded with disinformation in the week leading up to the election. While it is difficult to conclusively demonstrate a causal relationship between the election results and Russian active measures targeted at these populations, it is highly likely, given that all three states <a href="https://constitutioncenter.org/blog/voting-history-of-the-15-battleground-states">voted Democrat in the past 5 Presidential elections</a>.</p>
<p>Donald Trump, a fringe candidate with a radical platform, emerging victorious in these historically moderate voting districts, begs the question of what was the variable that impacted the election? The penetration of Russian Information warfare efforts, so effective due to the successful harnessing of social media, increasingly seems to be the culprit. However, the social media-facilitated assault on the democratic process had another devastating angle: the Trump campaign.</p>
<hr />
<h2 class="single-post-title"><a href="http://globalsecurityreview.com/trump-campaigns-exploitation-social-media/"><span class="post-title">How the Trump Campaign Exploited Social Media</span></a></h2>
<p>Through analyzing Donald Trump’s role in legitimizing Russia’s propaganda, and the separate—though arguably related—issue of the Trump campaign’s manipulation of voters via social media, it becomes apparent that, when all elements are considered together, there is a substantial argument to be made that social media was used to manipulate voters and swing an election. The precision with which voters were targeted was unprecedented.</p>
<h3>The Trump campaign’s message was amplified by Twitter bots, trolls, and precision-targeted Facebook advertisements.</h3>
<p>Presently, Trump’s controversial Twitter activity is under scrutiny as part of the ongoing Senate Intelligence Committee investigation and hearings.</p>
<blockquote><p>“Today, ‘gray outlets,’ Soviet-pushing accounts, tweet at President Trump during high volumes, when they know he’s online, and they push conspiracy theories’…Watts flatly stated that the president himself has become a cog in such Russian measures… why, if Russians have long used these methods, they finally worked in this election cycle, Watts’ answer… ‘I think this answer is very simple and is one no one is really saying in this room…the commander in chief has used Russian active measures at times against his opponents.’”</p>
<p><i>Former FBI Special Agent Clint Watts</i></p></blockquote>
<p>Regardless of whether or not the Trump campaign’s alleged coordination with Russian government-directed misinformation/disinformation campaigns was intentional, the result was nevertheless devastating. Donald Trump wields immense influence in the social media sphere: <a href="http://www.telegraph.co.uk/technology/2017/01/17/donald-trump-reaches-landmark-20-million-followers-twitter/">an article</a> published in January 2017 reveals his combined following on popular social media platforms Twitter, Facebook, and Instagram allows him to reach an audience of over 46 Million people.</p>
<h3>Exploiting the Platform of the Presidency</h3>
<p>Furthermore, Trump’s elevated status as the Republican Presidential candidate, and subsequently as Commander-in-Chief, arguably provides him with the discursive power necessary to validate the authenticity of his claims in cyberspace (and the real world). The audience exposed to information shared by Trump is primed to believe in its authenticity. During his testimony, Watts substantiates the claim above with the following evidence:</p>
<blockquote><p>Trump’s citation of an apparently false Sputnik story at an October 2016 campaign appearance; his ongoing denial before and after the campaign of U.S. intelligence of Russian interference in the election; his claims of voter fraud and election rigging, which Watts said was pushed by RT and Sputnik; and Trump’s questioning of the citizenship of former President Barack Obama and even his primary rival Ted Cruz.</p></blockquote>
<p>Echoing the aforementioned themes of Russian propaganda, the examples Watts provides elucidate the relationship between the Russian Information warfare operation and the Trump campaign’s (intentional or otherwise) complicity in the spread of fake news. Trump and his associates’ repeated claims from fake news sites, implicitly sanctioning their authenticity, then feeding it back into the social media sphere, where it was then widely disseminated by real people and automated bots.</p>
<p>Watts explains that “the disinformation is kept alive and gradually becomes more real and plausible.” If this social media platform-mediated sabotage of the truth was not enough, the Trump campaign also employed other social media manipulation maneuvers, made possible with Big Data analytics.</p>
<hr />
<h2 class="single-post-title"><a href="http://globalsecurityreview.com/cambridge-analytica-darker-side-big-data/"><span class="post-title">Cambridge Analytica: The Darker Side Of Big Data</span></a></h2>
<p>Before closer scrutiny of the implications of the Trump campaign’s use of Cambridge Analytica’s services, it is imperative to grasp the methodology behind Cambridge Analytica’s services fully. The <a href="https://motherboard.vice.com/en_us/article/mg9vvn/how-our-likes-helped-trump-win">two fundamental concepts</a> underlying the ‘election management’ company is <i>Big Data </i>and <i>psychometrics</i>: “Big Data means, in essence, that everything we do, both on and offline, leave digital traces…every movement we make…every “like” is stored.” While psychometrics “focuses on measuring psychological traits, such as personality.”</p>
<h3>The “election management” company uses big data and psychometric profiling in operations designed to suppress voter segments.</h3>
<p>How these two concepts intertwine is crucial to an understanding of what Cambridge Analytica claims to do. Using the OCEAN model, an acronym for personality traits considered the “‘Big Five’…openness (how open you are to new experiences?), conscientiousness (how much of a perfectionist are you?), extroversion (how sociable are you?), agreeableness (how considerate and cooperative you are?) and neuroticism (are you easily upset?),” relatively accurate assessments can be made about a person. The Big Data facet came into play with the work of Cambridge Ph.D. student Michal Kosinski.</p>
<p>According to reports, Kosinski helped build an app called MyPersonality, which was designed to create “personality profiles” for users filling out psychometric questionnaires. Millions of people participated in the survey and had the option to share their Facebook profile data with the researchers.</p>
<p>Kosinski and his partner were reportedly in possession of “the largest dataset combining psychometric scores with Facebook profiles ever to be collected…Kosinski proved that by an average of 68 Facebook ‘likes’ by a user, it was possible to predict their skin color (with 95 percent accuracy), their sexual orientation (88 percent accuracy), and their affiliation with the Democratic or Republican party (85 percent).”</p>
<p>Not only does the data create a psychological profile, but the methodology can also be used as a ‘people search engine,’ or mechanism for microtargeting: narrowing down results based on desired personality characteristics.</p>
<p>Kosinski’s findings supposedly paved the way for the technology that is currently a significant selling point for Cambridge Analytica, and this was not a coincidence. Aleksandr Kogan, a lecturer at Cambridge University, <a href="https://theintercept.com/2017/03/30/facebook-failed-to-protect-30-million-users-from-having-their-data-harvested-by-trump-campaign-affiliate/">approached Kosinski in early 2014</a>. Kogan, who was contracted by Cambridge Analytica’s parent company SCL, took an interest in Kasinski’s work and as reported by The Guardian, introduced SCL to Kasinski’s methodology. While Kasinski refused to do business with SCL, it appears that Kogan mimicked his methods:</p>
<p>“Kogan had arranged for more than 100,000 people to complete the Facebook survey and download an app… obtained data from 185,000 survey participants as well as their Facebook friends… and that it yielded 30 million available profiles… No one in this larger group of 30 million knew that “likes” and demographic data from their Facebook profiles were being harvested by political operatives hired to influence American voters.”</p>
<p>SCL—and Cambridge Analytica, by extension—were given an immense amount of usable personal data, obtained without the knowledge or consent of the vast majority of harvested user profiles. According to political communications expert <a href="https://www.washingtonpost.com/politics/after-working-for-trumps-campaign-british-data-firm-eyes-new-us-government-contracts/2017/02/17/a6dee3c6-f40c-11e6-8d72-263470bf0401_story.html">Emma Briant</a>, this ethically dubious behavior exploits users’ dependence on social media and can be used to manipulate the public. Currently, Cambridge Analytica claims to have “a database of 230 million American adults, with up to 5,000 pieces of demographic, consumer and lifestyle information about each.” The company markets its services based on claims of being able to influence voter behavior with “microtargeting.”</p>
<p>The Trump campaign paid Cambridge Analytica millions of dollars during the election process, and interestingly, Stephen K. Bannon, Trump’s Chief Strategist and former head of Breitbart News (which was mentioned earlier as an active participant in spreading Russian-generated misinformation/disinformation), used to sit on Cambridge Analytica’s board.</p>
<h3>The Implications of “Microtargeting”</h3>
<p>According to a recent scientific analysis by Kosinski, individually tailored Facebook advertising based on personality targeting can attract up to 63 percent more clicks and up to 1,400 more conversions. These statistics reveal the implications of any campaigning politician possessing social media microtargeting capabilities. Social media enabled the delivery of strategic information, without knowledge or consent, to a company whose objective is to exploit users’ data to influence voter behavior.</p>
<p>Crucially as well, social media provided the access Cambridge Analytica needed for their microtargeting campaigns to reach the intended audience. In the words of Professor and data scientist <a href="https://scout.ai/story/the-rise-of-the-weaponized-ai-propaganda-machine">Jonathan Albright</a>, “This is a propaganda machine. It’s targeting people individually to recruit them to an idea. It’s a level of social engineering that I’ve never seen before. They’re capturing people and then keeping them on an emotional leash.”</p>
<p>The way in which Cambridge Analytica operates is insidious and often invisible, “leveraging automated emotional manipulation alongside swarms of bots, Facebook dark posts [a tool for tailoring sponsored Facebook posts to specific audiences], A/B testing, and fake news networks.”</p>
<p>Senator Mark Warner’s <a href="http://globalsecurityreview.com/american-security/security-policy/russia-manipulated-u-s-voters-social-media/">statement once again comes to mind</a>: reports presented to the Senate Intelligence Committee alleged that <a href="http://washingtonmonthly.com/2017/03/30/why-did-russia-hack-the-voter-rolls/">voter suppression campaigns</a> on social media were targeted with precision down to the precinct level in crucial battleground states. Aiding in voter suppression efforts is nothing new for SCL (Cambridge Analytica’s parent company), which reportedly provided its services to support a <a href="https://www.buzzfeed.com/kendalltaggart/the-truth-about-the-trump-data-team-that-people-are-freaking">voter suppression campaign in Nigeria</a>.</p>
<p>The ramifications of these revelations are highly significant. Social media and Big Data analytics are changing the way in which political candidates conduct their campaigns. The personal information and preferences shared on social media leave voters vulnerable to influence, and Big Data allows politicians to know <i>exactly </i>which buttons to push.</p>
<h3>The West Has Critical Vulnerabilities to Information Warfare Operations</h3>
<p>While it is beyond the scope of this work to definitively prove intentional collusion between the Russian government and the Trump campaign (although evidence continues to emerge at the time of publication), there is ample information to substantiate that there were unsavory influence campaigns conducted on both sides. To better understand the Russian angle, this analysis outlined the <a href="http://globalsecurityreview.com/cold-war-2-0-russian-information-warfare/">concept of Russian Information Warfare</a> and elucidated the critical difference in its conceptualization between Russia and the West.</p>
<p>It emerges that this contrast has led to a security gap in Western cyber strategy: there has been too much of a focus on the technical aspects of cyber threats. While the US was trying to protect voting machines from getting hacked, the actual voters were the ones left most vulnerable. It becomes evident that social media not only made activities for generating disinformation/misinformation easier, but it facilitated its dissemination with penetrating precision and efficacy.</p>
<p>Based on the evidence put forth in this article, it can be assumed that the Trump campaign harnessed social media in two ways. Firstly, Trump exploited his status and power to legitimize Russian active measures; social media was vital in providing an avenue of communication with a direct audience of over 46 million.</p>
<p>Secondly, the Trump campaign used the big data ‘election management’ company Cambridge Analytica, which uses a database of stolen personal details to micro-target voters, and has a history of running voter suppression campaigns. If the insinuation in Senator Warner’s quote (from the beginning of this paper) is true, according to the panel of experts he asked at the hearing, it is possible that Russian-hacked voter database rolls could have been used in coordination with.</p>
<p>Social media personal data gives context to the voter registration database information, and microtargeting tools such as Facebook dark posts allow voter suppression campaigns to be executed with razor precision down to the voting precinct. Cambridge Analytica is only one of some similar companies that are emerging.</p>
<p>Social media and big data analytics are changing the way political campaigns are run, and the sinister side of it is: they know how to pull the right emotional strings to elicit the exact desired response. This is a perversion of the democratic process, especially if fake news, generated by a foreign adversary with the explicit purpose of subverting Western institutions, is used as a tool to influence public opinion.</p>
<p>It should be noted that these implications don’t apply to the US alone. Cambridge Analytica has <a href="http://www.tabletmag.com/jewish-news-and-politics/211152/trump-data-analytics-russian-access">provided its services</a> to the Leave.eu (Brexit) campaign, two US Presidential election candidates, countries in Africa and the Caribbean, and their client list is only growing in light of their runaway success. In parallel to these revelations, Russia has also poured resources into Brexit, the US election, as well as French, Dutch, German, and Austrian far-right political parties.</p>
<p>Russia is aggressively pursuing a political agenda, and the Kremlin&#8217;s expertise in the cyber domain is just a facet of a sophisticated political and military strategy—a demonstrable threat to liberal democracy.</p>
<p>The West needs to adapt to the changing cyber landscape and begin to perceive threats differently. Cyber is much more than just the technical or the hardware. The exploitation of social media in the 2016 US Presidential election proved to be the perfect example of how information can be weaponized to swing an outcome and achieve a desired strategic objective.</p>
<p><a href="https://globalsecurityreview.com/hostile-foreign-interference-2016-election/">In-Depth: Russian Active Measures, Information Warfare,  and Big Data in the 2016 Presidential Election</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Escalation in Syria After Israel Strikes 70 Iranian Targets</title>
		<link>https://globalsecurityreview.com/escalation-syria-israel-strikes-70-iranian-targets/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Fri, 11 May 2018 19:37:20 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=6950</guid>

					<description><![CDATA[<p>There has been a serious escalation in Syria between Israel and Iran. In the early hours of May 10, 2018, Iranian forces in Syria reportedly launched 20 rockets against Israeli targets in the Golan Heights, territory occupied and administered by Israel. The move was likely made in retaliation against repeated Israeli air strikes against Iranian [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/escalation-syria-israel-strikes-70-iranian-targets/">Escalation in Syria After Israel Strikes 70 Iranian Targets</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>There has been a serious escalation in Syria between Israel and Iran.</h2>
<p>In the early hours of May 10, 2018, Iranian forces in Syria reportedly launched 20 rockets against Israeli targets in the Golan Heights, territory occupied and administered by Israel.</p>
<p>The move was likely made in retaliation against repeated Israeli air strikes against Iranian military targets in Syria. The <a href="http://globalsecurityreview.com/israeli-military-high-alert-anticipation-iranian-attack/">Israeli military had mobilized</a> beforehand in preparation for such an attack.</p>
<p>According to the Israeli army, none of the rockets hit their targets, with some being destroyed by Israel&#8217;s Iron Dome missile defense system and the rest falling short of their targets in Syrian territory.</p>
<p>In response, Israel launched air strikes against seventy Iranian targets in Syria. The Israeli Air Force struck weapons depots, logistics sites, military compounds, and intelligence facilities used by the Iranian Revolutionary Guard Corps and its elite Quds Force. Many of the targets were located near Damascus or in southern Syria.</p>
<p>Israeli fighter jets fired missiles at and subsequently destroyed several Syrian air defense systems after coming under heavy fire. No Israeli planes were hit by Syrian air defenses.</p>
<h3>Israeli Jets Target Iranian Infrastructure in Syria</h3>
<p>The Israeli military said that Israeli jets struck &#8220;dozens of military targets&#8221; that belong to Iran in Syria. Specific targets include intelligence sites used by Iran, Syria, Hezbollah, and Hamas, a Quds Force logistics compound, a military logistics compound south of Damascus, and Iranian military compound in Damascus, Quds Force munitions depots, intelligence systems, and posts, and the Iranian launching platform from which the missiles were fired at Israeli positions.</p>
<p>Israeli Defense Minister Avigdor Lieberman stated that Israel has a “very clear policy,” regarding Iran&#8217;s activity in Syria and that Israel would not permit Iran to establish a permanent presence in the country, which sits along Israel&#8217;s northern border. Lieberman said that Israel struck nearly all of Iran&#8217;s infrastructure within Syria.</p>
<p>“If we get rain, then they will get a flood,” Lieberman said, adding that he hoped this round of violence is over.</p>
<p>The Israeli military stated that it would &#8220;not allow the Iranian threat to establish itself in Syria,&#8221; adding that the Syrian government will be held accountable for &#8220;everything happening in its territory.&#8221;</p>
<h3>Will Iran decide to escalate tensions further?</h3>
<p>Israeli government officials say that while Israel does not want a significant escalation, the ball is in Iran&#8217;s court. Iran can either choose to increase tensions and further escalate what has been (until now) a shadow conflict between the two regional powers, or it can decide to stand down and tamper its activity within Syria.</p>
<p>The latter is unlikely, as it would amount to de-facto victory by Israel in the eyes of the international community. However, it remains to be seen how the situation will develop.</p>
<p>Russia, an ally of both Syrian President Bashar al-Assad and Iran, did not engage itself in defending Syrian positions from Israeli air strikes, and Russian air defense systems were not activated during the Israeli assault.</p>
<h3>Unprecedented actions by both sides</h3>
<p>The actions undertaken by Iran and Israel posit a significant escalation in what was previously a low-level conflict being waged within the chaos and shadows of the Syrian civil war.</p>
<p>The May 10th air strikes were one of the most extensive military operations carried out by Israel in Syria in decades.</p>
<p>Iran itself had acted without precedent in launching an estimated 20 rockets at Israeli forces positioned in the Golan Heights, according to the Israeli military.</p>
<p>However, now that the Assad government in Damascus, backed by Russia and Iran, is seizing control over crucial territories from rebel forces, and with the threat posed by the Islamic State dying down, the Syrian civil war may turn into a broader, high-stakes, and more conventional conflict between regional powers.</p>
<p><a href="https://globalsecurityreview.com/escalation-syria-israel-strikes-70-iranian-targets/">Escalation in Syria After Israel Strikes 70 Iranian Targets</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Israeli Military on &#8216;High Alert&#8217; in Anticipation of Iranian Attack</title>
		<link>https://globalsecurityreview.com/israeli-military-high-alert-anticipation-iranian-attack/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Wed, 09 May 2018 05:01:42 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Hezbollah]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Lebanon]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=6922</guid>

					<description><![CDATA[<p>The Israeli army is on high alert with defense systems being deployed in anticipation of an Iranian attack. In Washington and in Israel, there is a growing concern that Iran may soon initiate a military assault against Israel, according to United States military officials who spoke with CNN on May 8, 2018. The report notes [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/israeli-military-high-alert-anticipation-iranian-attack/">Israeli Military on &#8216;High Alert&#8217; in Anticipation of Iranian Attack</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The Israeli army is on high alert with defense systems being deployed in anticipation of an Iranian attack.</h2>
<p>In Washington and in Israel, there is a growing concern that Iran may soon initiate a military assault against Israel, according to United States military officials who spoke with <a href="https://www.cnn.com/2018/05/08/politics/us-concerns-iran-israel-attack/index.html">CNN</a> on May 8, 2018.</p>
<p>The report notes that “intelligence is not clear on when an attack could come and what form it would take…with one official noting that ‘if there is an attack it might not be immediately clear it’s Iran.”</p>
<p>The U.S. State Department has issued an alert for U.S. citizens in the Golan Heights region citing security concerns.</p>
<p>The State Department’s security warning states that travel to the Golan Heights should be carefully considered “until the situation stabilizes.”</p>
<p>U.S. intelligence and military officials haven’t found a direct connection between the announcement that the <a href="http://globalsecurityreview.com/trump-says-us-will-withdraw-iran-nuclear-deal/">U.S. would withdraw from the Iran nuclear agreement</a> (known as the JCPOA or Joint Comprehensive Plan of Action.”</p>
<h3>Rapidly Rising Tensions Between Iran and Israel</h3>
<p>However, tensions are rapidly escalating in the region following <a href="http://globalsecurityreview.com/major-israeli-air-strikes-target-iranian-syrian-military-installations/">multiple Israeli airstrikes</a> against Iranian targets in Syria.</p>
<p>Israeli Prime Minister Benjamin Netanyahu said he “fully supports” the United States’ withdrawal, initiated by President Trump, blaming the JCPOA for “increased Iranian aggression.”</p>
<p>Netanyahu stated that “for months now, Iran has been transferring lethal weaponry to its forces in Syria, with the purpose of striking at Israel.”</p>
<p>The Prime Minister continued by saying that “we will respond mightily to any attack on our territory.”</p>
<p>If Iran were to launch an assault against Israeli targets, it would likely be done in retaliation for Israel’s airstrikes. On Tuesday, <a href="https://www.wsj.com/articles/syria-accuses-israel-of-striking-iran-linked-army-base-1525819832">Syria accused Israel</a> of targeting an area south of Damascus with air strikes.</p>
<h3>Israeli Troops Mobilized</h3>
<p>Citing “irregular Iranian activity” in Syria, the Israeli military has directed authorities to open and prepare bomb shelters in the occupied Golan Heights region.</p>
<p>Israeli troops are on “high alert for an attack” in the area, according to the military.</p>
<p>According to Israeli media, this is the first time there has been an order to open bomb shelters in the region since the beginning of the Syrian civil war.</p>
<p>According to statements from the Israeli Defense Forces (IDF), reserve forces have been mobilized in limited numbers, which one IDF spokesperson said was a “specific call-up based on need.”</p>
<p>Furthermore, non-combat reserves—which include those acting in medical or intelligence capacities—were also being mobilized, according to a separate IDF statement.</p>
<h3>Could Israel Launch a Preemptive—or Preventive—Strike?</h3>
<p>If Iran were to launch an attack against Israeli targets, either directly or with the involvement of a proxy such as Hezbollah, Israel could—and is likely to—respond by significantly escalating the situation.</p>
<p>Israel would likely launch a large-scale aerial—or ground—assault against Iranian or Hezbollah positions in Syria or even within Lebanon if Hezbollah is involved.</p>
<p>Alternatively, Israel could initiate a preemptive—or even preventive—assault against Iranian targets. In a preemptive strike, Israel would be launching an attack in anticipation of immediate aggression by Iran or Iranian proxy groups.</p>
<p>By contrast, a preventive attack would be launched to eliminate (i.e. destroy) the potential threat posed by Iranian or proxy groups, without there being an imminent attack or planned attack on Israel.</p>
<p><a href="https://globalsecurityreview.com/israeli-military-high-alert-anticipation-iranian-attack/">Israeli Military on &#8216;High Alert&#8217; in Anticipation of Iranian Attack</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Resurrection of Al-Qaeda</title>
		<link>https://globalsecurityreview.com/resurrection-al-qaeda/</link>
		
		<dc:creator><![CDATA[Bruce Hoffman]]></dc:creator>
		<pubDate>Sat, 05 May 2018 21:25:36 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Al Qaeda]]></category>
		<category><![CDATA[ISIS]]></category>
		<category><![CDATA[Libya]]></category>
		<category><![CDATA[Somalia]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[Yemen]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=6231</guid>

					<description><![CDATA[<p>With the demise of the Islamic State, a revived al-Qaeda and its affiliates should now be considered the world’s top terrorist threat. While the self-proclaimed Islamic State has dominated the headlines and preoccupied national security officials for the past four years, al-Qaeda has been quietly rebuilding. Its announcement last summer of another affiliate—this one dedicated [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/resurrection-al-qaeda/">The Resurrection of Al-Qaeda</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>With the demise of the Islamic State, a revived al-Qaeda and its affiliates should now be considered the world’s top terrorist threat.</h2>
<p>While the self-proclaimed Islamic State has dominated the headlines and preoccupied national security officials for the past four years, al-Qaeda has been quietly rebuilding. Its announcement last summer of another affiliate—this one dedicated to the liberation of Kashmir—coupled with the resurrection of its presence in Afghanistan and the solidification of its influence in Syria, Yemen, and Somalia, underscores the resiliency and continued vitality of the United States’ preeminent terrorist enemy.</p>
<p>Although al-Qaeda’s rebuilding and reorganization predates the 2011 Arab Spring, the upheaval that followed helped the movement revive itself. At the time, an unbridled optimism among local and regional rights activists and Western governments held that a combination of popular protest, civil disobedience, and social media had rendered terrorism an irrelevant anachronism.</p>
<p>The longing for democracy and economic reform, it was argued, had decisively trumped repression and violence. However, where the optimists saw irreversible positive change, al-Qaeda discerned new and inviting opportunities.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-6541" src="http://globalsecurityreview.com/wp-content/uploads/2018/04/AQ-graphic.png" alt="" width="520" height="342" srcset="https://globalsecurityreview.com/wp-content/uploads/2018/04/AQ-graphic.png 520w, https://globalsecurityreview.com/wp-content/uploads/2018/04/AQ-graphic-300x197.png 300w" sizes="(max-width: 520px) 100vw, 520px" /></p>
<p>The successive killings in 2011 and 2012 of Osama bin Laden; Anwar al-Awlaki, the movement’s chief propagandist; and Abu Yahya al-Libi, its second-in-command, lent new weight to the optimists’ predictions that al-Qaeda was a spent force. In retrospect, however, it appears that al-Qaeda was among the regional forces that benefited most from the Arab Spring’s tumult. Seven years later, Ayman al-Zawahiri has emerged as a powerful leader, with a strategic vision that he has systematically implemented.</p>
<p>Forces loyal to al-Qaeda and its affiliates now number in the tens of thousands, with a capacity to disrupt local and regional stability, as well as launch attacks against their declared enemies in the Middle East, Africa, South Asia, Southeast Asia, Europe, and Russia. Indeed, from northwestern Africa to southeastern Asia, al-Qaeda has knit together a global movement of more than two dozen franchises. In Syria alone, al-Qaeda now has upwards of twenty thousand men under arms, and it has perhaps another four thousand in Yemen and about seven thousand in Somalia.</p>
<h3>The Arab Spring’s Big Winner</h3>
<p>The thousands of hardened al-Qaeda fighters freed from Egyptian prisons in 2012–2013 by President Mohammed Morsi galvanized the movement at a critical moment, when instability reigned and a handful of men well-versed in terrorism and subversion could plunge a country or a region into chaos.</p>
<p>Whether in Libya, Turkey, Syria, or Yemen, their arrival was providential in terms of advancing al-Qaeda’s interests or increasing its influence. The military coup that subsequently toppled Morsi validated Zawahiri’s repeated warnings not to believe Western promises about either the fruits of democracy or the sanctity of free and fair elections.</p>
<p>It was Syria where al-Qaeda’s intervention proved most consequential. One of Zawahiri’s first official acts after succeeding bin Laden as emir was to order a Syrian veteran of the Iraqi insurgency named Abu Mohammad al-Julani to return home and establish the al-Qaeda franchise that would eventually become Jabhat al-Nusra.</p>
<p>Al-Qaeda’s blatantly sectarian messaging over social media further sharpened the historical frictions between Sunnis and Shias and gave the movement the entrée into internal Syrian politics that it needed to solidify its presence in that country. Al-Qaeda’s chosen instrument was Jabhat al-Nusra, the product of a joint initiative with al-Qaeda’s Iraqi branch, which had rebranded itself as the Islamic State of Iraq (ISI). But as Nusra grew in both strength and impact, a dispute erupted between ISI and al-Qaeda over control of the group.</p>
<p>In a bold power grab, ISI’s leader, Abu Bakr al-Baghdadi, announced the <a title="forcible amalgamation" href="https://www.cbsnews.com/news/iraqi-al-qaeda-and-syria-militants-announce-merger/" target="_blank" rel="noopener noreferrer">forcible amalgamation</a> of al-Nusra with ISI in a new organization to be called the Islamic State of Iraq and Syria (ISIS). Julani refused to accede to the unilateral merger and appealed to Zawahiri. The quarrel intensified, and after Zawahiri’s attempts to mediate it collapsed, he expelled ISIS from the al-Qaeda network.</p>
<p>Although ISIS—which has since rebranded itself the Islamic State—has commanded the world’s attention since then, al-Qaeda has been quietly rebuilding and fortifying its various branches. Al-Qaeda has systematically implemented an ambitious strategy designed to protect its remaining senior leadership and discreetly consolidate its influence wherever the movement has a significant presence.</p>
<p>Accordingly, its leaders have been dispersed to Syria, Iran, Turkey, Libya, and Yemen, with only a hard-core remnant of top commanders still in Afghanistan and Pakistan. Advances in commercial digital communication tools, alongside successive public revelations of U.S. and allied intelligence services’ eavesdropping capabilities, have enabled al-Qaeda’s leaders and commanders to maintain contact via secure end-to-end <a title="encryption technology" href="https://www.longwarjournal.org/archives/2017/12/al-qaedas-external-communications-officer-weighs-in-on-dispute-over-syria.php" target="_blank" rel="noopener noreferrer">encryption technology</a>.</p>
<h3>The Importance of Syria</h3>
<p>The number of top al-Qaeda leaders sent to Syria over the past half-dozen years underscores the high priority that the movement attaches to that country. Among them was Muhsin al-Fadhli, a bin Laden intimate who, until his death in a 2015 U.S. air strike, commanded the movement’s elite forward-based operational arm in that country, known as the Khorasan Group. He also functioned as Zawahiri’s local emissary, charged with attempting to heal the rift between al-Qaeda and ISIS.</p>
<p>Haydar Kirkan, a Turkish national and long-standing senior operative, was sent by bin Laden himself to Turkey in 2010 to lay the groundwork for the movement’s expansion into the Levant, before the Arab Spring created precisely that opportunity. Kirkan was also responsible for facilitating the movement of other senior al-Qaeda personnel from Pakistan to Syria to escape the escalating drone strike campaign ordered by President Barack Obama. He was killed in 2016 in a U.S. bombing raid.</p>
<p>The previous fall marked the arrival of Saif al-Adl, who is arguably the movement&#8217;s most battle-hardened commander. Adl is a former Egyptian Army commando whose terrorist pedigree, dating to the late 1970s, includes assassination plots against Egyptian President Anwar al-Sadat, the 1998 bombings of the U.S. embassies in Kenya and Tanzania, and al-Qaeda’s post-9/11 terrorist campaigns in Saudi Arabia and South Asia. He also served as mentor to bin Laden’s presumptive heir, his son Hamza, after both Adl and the boy sought sanctuary in Iran following the commencement of U.S. and coalition military operations in Afghanistan in late 2001. The younger bin Laden’s own reported appearance in Syria this past summer provides fresh evidence of the movement’s fixation with a country that has become the most popular venue to wage holy war since the seminal Afghan jihad of the 1980s.</p>
<p>Indeed, al-Qaeda’s presence in Syria is far more pernicious than that of ISIS. Hayat Tahrir al-Sham (HTS), the latest name adopted by al-Qaeda’s local affiliate, is now the largest rebel group in the country, having extended its control last year over all of Idlib Province, along the Syrian-Turkish border. This is the culmination of a process al-Qaeda began more than three years ago to annihilate the Free Syrian Army and any other group that challenges al-Qaeda’s regional aspirations.</p>
<h3>Filling the ISIS Vacuum</h3>
<p>ISIS can no longer compete with al-Qaeda in terms of influence, reach, manpower, or cohesion. In only two domains is ISIS currently stronger than its rival: the power of its brand and its presumed ability to mount spectacular terrorist strikes in Europe. But the latter is a product of Zawahiri’s strategic decision to prohibit external operations in the West so that al-Qaeda’s rebuilding can continue without interference.</p>
<p>The handful of exceptions to this policy—such as the 2015 Charlie Hebdo attacks in Paris and the 2017 St. Petersburg Metro bombing in Russia—provide compelling evidence that al-Qaeda’s external operations capabilities can easily be reanimated. Yemen-based al-Qaeda in the Arabian Peninsula’s capacity to commit acts of international terrorism—especially the targeting of commercial aviation—was recently the subject of a <a title="revealing New York Times story" href="https://www.nytimes.com/2017/12/30/world/middleeast/yemen-al-qaeda-us-terrorism.html" target="_blank" rel="noopener noreferrer">revealing </a><a title="revealing New York Times story" href="https://www.nytimes.com/2017/12/30/world/middleeast/yemen-al-qaeda-us-terrorism.html" target="_blank" rel="noopener noreferrer"><em>New York Times </em></a><a title="revealing New York Times story" href="https://www.nytimes.com/2017/12/30/world/middleeast/yemen-al-qaeda-us-terrorism.html" target="_blank" rel="noopener noreferrer">story</a>.</p>
<p>Al-Qaeda’s success in resurrecting its global network is the result of three strategic moves made by Zawahiri. The first was to strengthen the decentralized franchise approach that has facilitated the movement’s survival. Over the years, the leaders and deputies of al-Qaeda’s far-flung franchises have been integrated into the movement’s deliberative and consultative processes. Today, al-Qaeda is truly “glocal,” having effectively incorporated local grievances and concerns into a global narrative that forms the foundation of an all-encompassing grand strategy.</p>
<p>The second major move was the order issued by Zawahiri in 2013 to avoid mass casualty operations, especially those that might kill Muslim civilians. Al-Qaeda has thus been able to present itself through social media, paradoxically, as “moderate extremists,” ostensibly more palatable than ISIS.</p>
<p>This development reflects Zawahiri’s third strategic decision, letting ISIS absorb all the blows from the coalition arrayed against it while al-Qaeda unobtrusively rebuilds its military strength. Anyone inclined to be taken in by this ruse would do well to heed the admonition of Theo Padnos (née Peter Theo Curtis), the American journalist who spent two years in Syria as a Nusra hostage.</p>
<p>Padnos <a title="related in 2014" href="https://www.nytimes.com/2014/10/28/magazine/theo-padnos-american-journalist-on-being-kidnapped-tortured-and-released-in-syria.html" target="_blank" rel="noopener noreferrer">related in 2014</a> how the group’s senior commanders “were inviting Westerners to the jihad in Syria not so much because they needed more foot soldiers—they didn’t—but because they want to teach the Westerners to take the struggle into every neighborhood and subway station back home.”</p>
<p>A parallel thus exists between the U.S. director of national intelligence’s <a title="depiction of the al-Qaeda threat today" href="https://www.dni.gov/files/documents/Newsroom/Testimonies/2018-ATA---Unclassified-SSCI.pdf" target="_blank" rel="noopener noreferrer">depiction of the al-Qaeda threat today</a> [PDF] as mainly limited to its affiliates and the so-called Phoney War in western Europe between September 1939 and May 1940, when there was a strange lull in serious fighting following the German invasion of Poland and the British and French declarations of war against Germany. Prime Minister Neville Chamberlain visited British forces arrayed along the Franco-Belgian border that Christmas.</p>
<p>“I don’t think the Germans have any intention of attacking us, do you?” he asked Lieutenant General Bernard Law Montgomery, the commander of an infantry division defending the front. The Germans would attack when it suited them, <a title="Montgomery brusquely replied" href="https://www.amazon.com/Dunkirk-Retreat-Victory-Julian-Thompson/dp/162872515X" target="_blank" rel="noopener noreferrer">Montgomery brusquely replied</a>. It is a point worth keeping in mind as al-Qaeda busily rebuilds and marshals its forces to continue the war against the United States it declared twenty-two years ago.</p>
<p><a href="https://globalsecurityreview.com/resurrection-al-qaeda/">The Resurrection of Al-Qaeda</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>American and Bulgarian Weapons Shipments Enter Ukraine</title>
		<link>https://globalsecurityreview.com/bulgarian-and-american-lethal-weapons-enter-ukraine/</link>
		
		<dc:creator><![CDATA[Gabriella Gricius]]></dc:creator>
		<pubDate>Fri, 04 May 2018 09:50:28 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=6882</guid>

					<description><![CDATA[<p>The war in Ukraine enters a new phase with the delivery of U.S. Javelin anti-tank missiles. The recent announcement by the United States of Javelin anti-tank missile system shipments to Ukraine has been met with a litany of gratitude from Ukrainian President Petro Poroshenko and condemnation from Moscow. In March, the U.S. State Department approved [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/bulgarian-and-american-lethal-weapons-enter-ukraine/">American and Bulgarian Weapons Shipments Enter Ukraine</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The war in Ukraine enters a new phase with the delivery of U.S. Javelin anti-tank missiles.</h2>
<p>The recent announcement by the United States of Javelin anti-tank missile system shipments to Ukraine has been met with a litany of gratitude from Ukrainian President Petro Poroshenko and condemnation from Moscow. In March, the U.S. State Department approved the sale of <a href="http://www.dsca.mil/major-arms-sales/ukraine-javelin-missiles-and-command-launch-units">210 Javelin Missiles and 37 Javelin Command Launch Units to Ukraine</a>, worth $47 million.</p>
<p>However, it is not only American lethal aid that is being provided to Ukraine. Since 2015, Bulgaria has been exporting weapons to Ukraine, <a href="https://medium.com/dfrlab/minskmonitor-bulgarian-lethal-arms-exports-to-ukraine-54f2d305cb5d">including DRTG-73 anti-tank grades</a>. These have been used in combat operations by the Ukrainian Armed Forces as recently as November 2017.</p>
<h3>The proliferation of Lethal Weapons</h3>
<p>Bulgarian arms shipments aren’t just going to the Ukrainian Armed Forces, however. They are also going to Russian-backed separatists in the eastern Ukrainian regions of Donetsk and Luhansk. In December 2016, Bulgarian defense manufacturer <a href="https://medium.com/dfrlab/minskmonitor-bulgarian-lethal-arms-exports-to-ukraine-54f2d305cb5d">VMZ’s RPG-22 </a><a href="https://medium.com/dfrlab/minskmonitor-bulgarian-lethal-arms-exports-to-ukraine-54f2d305cb5d">weapon </a><a href="https://medium.com/dfrlab/minskmonitor-bulgarian-lethal-arms-exports-to-ukraine-54f2d305cb5d">w</a><a href="https://medium.com/dfrlab/minskmonitor-bulgarian-lethal-arms-exports-to-ukraine-54f2d305cb5d">as discovered</a> to be in use by separatist forces by Ukrainian Security Services. There is no question that Bulgarian lethal weapons have been widely proliferated throughout the Donetsk and Luhansk regions. In 2015, <a href="http://www.novinite.com/articles/175345/Bulgaria%27s+Arms+Exports+Rose+59+in+2015">Bulgaria exported over </a><a href="http://www.novinite.com/articles/175345/Bulgaria%27s+Arms+Exports+Rose+59+in+2015">€</a><a href="http://www.novinite.com/articles/175345/Bulgaria%27s+Arms+Exports+Rose+59+in+2015">16 million </a><a href="http://www.novinite.com/articles/175345/Bulgaria%27s+Arms+Exports+Rose+59+in+2015">of armaments</a> to Ukraine in 2016.</p>
<p>It isn’t surprising that these weapons are being proliferated on both sides of the Ukrainian conflict—it exemplifies a trend of foreign arms manufacturers exacerbating the conflict through increased arms shipments. As early as 2015, Lithuania was also in the business of sending lethal weapons to Ukraine.</p>
<p>In 2017, Lithuania announced that they intended to deliver weapons worth €1.93 million to Ukraine this year. Included, reportedly, are “<a href="https://www.unian.info/politics/2264336-lithuania-mulls-eur-193-mln-worth-of-arms-supplies-to-ukraine-media.html">more than 7,000 Kalashnikov rifles, two million cartridges, more than 80 machine guns, several mortars, anti-tank weapons and other military equipment</a>.”</p>
<h3>Escalation and the Javelin missiles</h3>
<p>With the <a href="https://www.rferl.org/a/javelin-missile-delivery-ukraine-us-confirmed/29200588.html">confirmation of delivery of U</a><a href="https://www.rferl.org/a/javelin-missile-delivery-ukraine-us-confirmed/29200588.html">.</a><a href="https://www.rferl.org/a/javelin-missile-delivery-ukraine-us-confirmed/29200588.html">S</a><a href="https://www.rferl.org/a/javelin-missile-delivery-ukraine-us-confirmed/29200588.html">.</a><a href="https://www.rferl.org/a/javelin-missile-delivery-ukraine-us-confirmed/29200588.html"> Javelin missiles</a>, the war in Ukraine enters a new phase. Western support of Ukraine creates the impression that this conflict is merely another proxy war between Russia and the United States. Although lethal weapons have been sent before from Bulgaria and Lithuania to Ukrainian forces, the higher caliber of Javelin missiles introduces a new level of escalation. The proliferation of these weapons is less likely—however, the danger lies in what now Russian-backed separatists will do.</p>
<p>In recent weeks, there has been an uptick in fighting between Ukrainian forces and separatists in Donetsk and Luhansk. Despite the <a href="http://globalsecurityreview.com/ukraines-occupied-territories-bill-continued-unrest-donbas-region/">Minsk II Accords</a>, the four-year-old conflict continues to simmer.</p>
<p>This new variable begs the question of what will happen next? Generally, when a country party to a conflict receives stronger weapons, the opposing side will attempt to match it in an arms-race-like scenario. Russian-backed separatists may be supplied with heavier-caliber armaments, and it&#8217;s possible Russia’s involvement in Ukraine will become more overt in the near future.</p>
<p>For now, the increased proliferation of weapons in Ukraine may increase Ukrainian President Poroshenko&#8217;s gratitude to the United States, but it remains to be seen how this will affect the conflict&#8217;s strategic landscape.</p>
<p><a href="https://globalsecurityreview.com/bulgarian-and-american-lethal-weapons-enter-ukraine/">American and Bulgarian Weapons Shipments Enter Ukraine</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Russian Election Interference Campaign Was a Well-Oiled Information Warfare Machine</title>
		<link>https://globalsecurityreview.com/russian-election-interference-campaign-well-oiled-information-warfare-machine/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Wed, 02 May 2018 12:41:29 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[Netherlands]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=6105</guid>

					<description><![CDATA[<p>The Russian government developed and implemented a &#8220;full-spectrum&#8221; disinformation machine to influence the political system in the United States. The attempt to influence the 2016 U.S. election through social media is but one example of how traditional espionage, foreign government propaganda, and information warfare tactics have evolved to make use of social media and other [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/russian-election-interference-campaign-well-oiled-information-warfare-machine/">Russian Election Interference Campaign Was a Well-Oiled Information Warfare Machine</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The Russian government developed and implemented a &#8220;full-spectrum&#8221; disinformation machine to influence the political system in the United States.</h2>
<p>The <a href="http://globalsecurityreview.com/series/russian-information-warfare-interference-2016-election/">attempt to influence the 2016 U.S. election</a> through social media is but one example of how traditional espionage, foreign government propaganda, and <a href="http://globalsecurityreview.com/cold-war-2-0-russian-information-warfare/">information warfare</a> tactics have evolved to make use of social media and other technologies to pose a more significant national security threat than ever before.</p>
<p>Researchers from the Digital Forensic Research Lab at the Atlantic Council reviewed and analyzed hundreds of thousands of social media messages, botnets, and bot accounts that were allegedly under the control or influence of the Kremlin.</p>
<p>The team presented their findings at the February 2018 Munich Security Conference, where they demonstrated how the Kremlin tightly coordinates different branches of its multi-faceted and far-reaching disinformation system.</p>
<p>The announcement follows the <a href="http://globalsecurityreview.com/special-counsel-charges-russian-nationals-involved-in-u-s-elections-interference/">indictments</a> filed in February by the U.S. Department of Justice and Special Counsel Robert Mueller against 13 Russian nationals and three entities associated with certain social media accounts and botnets, which were allegedly employed as part of the Kremlin&#8217;s campaign to interfere in the U.S. political system.</p>
<p>The accounts and botnets were reportedly used to <a href="http://globalsecurityreview.com/twitter-bots-affected-u-s-presidential-election/">amplify messaging</a> designed to influence the 2016 election, according to an indictment filed by the office of Special Counsel Robert Mueller.</p>
<h3>A tightly-coordinated system for disseminating Kremlin disinformation</h3>
<p>The bots were just one component of a multi-faceted strategy employed by the Russians. Overt propaganda outlets masquerading as genuine news sources, such as RT and Sputnik, will publish fake news stories designed to influence a particular population (fake news), and post likes to those stories on social media.</p>
<p>Alongside these outlets, diplomatic social media accounts such as that of the Russian embassy in London will push messaging that aligns with the narrative being driven by the media outlets.</p>
<p>At the same time, websites, which claim to be independent, but have been proven by whistle-blowers or forensic researchers to have been funded by the Russian government, publish content that supports the narrative being pushed by outlets like RT and official Russian government social media accounts.</p>
<p>To amplify this content, troll accounts (which are fake accounts that are operated by a human being) and automated ‘bots,’ comment, repost or employ other methods to increase the reach of a particular message.</p>
<p>Russian hackers obtained emails from the Democratic National Committee in mid-2016. Subsequently, Wikileaks published the stolen emails.  The timeline of the hacking and publications of the hacked documents reveals the different elements of the Russian&#8217;s propaganda machine and illustrates the disinformation distribution system employed by Russian government operatives.</p>
<p>For example, one Twitter account that was known to be run by the St. Petersburg  Troll Factory, Tennessee GOP, rapidly gained several thousand retweets for a tweet linking to the hacked DNC content published by Wikileaks.  At the same time, RT and Sputnik were reporting on the contents of the DNC leaks.</p>
<h3>Russia is engaged in a sustained information warfare campaign</h3>
<p>The Russian government has <a href="http://globalsecurityreview.com/russia-denies-interfering-u-s-elections-special-counsel-indictments/">repeatedly denied</a> any involvement in the 2016 or any U.S. election. Nevertheless, it&#8217;s increasingly clear that the Russian&#8217;s interference in the 2016 U.S. election is just the beginning of a more sustained campaign designed to divide society and breed institutional distrust.</p>
<p>This effort to discredit the global standing of the United States and its allies is one that requires an improved defense, which includes a <a href="http://globalsecurityreview.com/cyber-deterrence-cybersecuritys-next-phase/">deterrent</a> component.</p>
<p>Private sector companies like Facebook and Twitter—whether they like it or not—are where this &#8220;information war&#8221; is being waged. Rather than protesting regulations and subsequently reacting to them, private sector firms should proactively engage in collaboration with the intelligence and national security communities.</p>
<p>Proactive public-private engagement and collaboration between the national security community and companies like Google, Facebook and Twitter is in the best interest of all parties and should be regarded as critical to U.S. national security.</p>
<p><a href="https://globalsecurityreview.com/russian-election-interference-campaign-well-oiled-information-warfare-machine/">Russian Election Interference Campaign Was a Well-Oiled Information Warfare Machine</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5 Predictions of Major Global Security Threats in 2018</title>
		<link>https://globalsecurityreview.com/5-predictions-of-major-global-issues-in-2018/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Mon, 30 Apr 2018 10:47:28 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=3654</guid>

					<description><![CDATA[<p>Predictions for the Islamic State, the global economy, ongoing tensions with North Korea, climate change, and the fallout from the massive cyber attacks of 2017. ﻿ Editor&#8217;s note: This video was produced by the Lee Kuan Yew School of Public Policy at the University of Singapore. Global Security Review content was used to source some [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/5-predictions-of-major-global-issues-in-2018/">5 Predictions of Major Global Security Threats in 2018</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Predictions for the Islamic State, the global economy, ongoing tensions with North Korea, climate change, and the fallout from the massive cyber attacks of 2017.</h2>
<p style="text-align: center;"><iframe src="https://www.youtube.com/embed/8edbQ-A81uQ?rel=0&amp;showinfo=0&amp;amp" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"><span data-mce-type="bookmark" style="display: inline-block; width: 0px; overflow: hidden; line-height: 0;" class="mce_SELRES_start">﻿</span></iframe><br />
<em><strong>Editor&#8217;s note:</strong> This video was produced by the <a href="https://lkyspp.nus.edu.sg">Lee Kuan Yew School of Public Policy</a> at the University of Singapore. </em>Global Security Review<em> content was used to source some of the information provided.</em></p>
<h3>Geopolitics in 2018: Non-state actors, economic growth, climate change, cyber attacks, and North Korea</h3>
<ol>
<li>The Islamic State threat moves to Southeast Asia, where over 1,000 fighters have joined their ranks. The Islamic State is active in the Mindanao region of the Philippines, and it is responsible for at least one attack carried out in Indonesia in 2017.</li>
<li>The global economy is projected to grow by almost 4% in 2018. Oil prices are expected to remain stable through the year, and the Federal Reserve of the United States is widely expected to continue raising interest rates.</li>
<li><a href="http://globalsecurityreview.com/north-korea-war-quagmire/">Tensions on the Korean Peninsula</a> continue to persist.  The chance of a war with North Korea could be close to 70% if there is no cessation of nuclear threats from the North Koreans, says Senator Lindsay Graham. <a href="http://globalsecurityreview.com/china-constructing-refugee-camps-along-north-korean-border/">China is preparing</a> for a flood of refugees across its border.</li>
<li>Climate change will accelerate in 2018.  Scientists are observing an acceleration in rising sea levels.</li>
<li>The fallout from the massive cyber attacks in 2017 will begin to emerge. Data breaches affected governments, corporations, and private citizens across the world.</li>
</ol>
<p><a href="https://globalsecurityreview.com/5-predictions-of-major-global-issues-in-2018/">5 Predictions of Major Global Security Threats in 2018</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>OSCE Drones Reintroduced into Ukraine&#8217;s Donbass and Donetsk Warzones</title>
		<link>https://globalsecurityreview.com/osce-drones-reintroduced-ukraine-donbass-warzone/</link>
		
		<dc:creator><![CDATA[Gabriella Gricius]]></dc:creator>
		<pubDate>Wed, 25 Apr 2018 09:00:37 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Ukraine]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=6691</guid>

					<description><![CDATA[<p>The OSCE is reintroducing long-range unmanned drones to Ukraine&#8217;s Donetsk and Luhansk Regions. Two years after drone operations were suspended in August 2016, the OSCE has elected to again introduce long-range unmanned drones (i.e., aerial vehicles – UAVs) to Ukraine’s Donetsk and Luhansk regions. The OSCE will be using long-range Camcopter S-100 UAVs, which will [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/osce-drones-reintroduced-ukraine-donbass-warzone/">OSCE Drones Reintroduced into Ukraine&#8217;s Donbass and Donetsk Warzones</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The OSCE is reintroducing long-range unmanned drones to Ukraine&#8217;s Donetsk and Luhansk Regions.</h2>
<p>Two years after drone operations were suspended in August 2016, the OSCE has elected to again introduce long-range unmanned drones (i.e., aerial vehicles – UAVs) to Ukraine’s Donetsk and Luhansk regions. The OSCE will be using long-range Camcopter S-100 UAVs, which will both operate at night and during the day in areas where ground patrols of the OSCE are not permitted.</p>
<p><a href="https://www.osce.org/special-monitoring-mission-to-ukraine/376456">Principal Deputy Chief Monitor Alexander Hug stated that</a> “Given that the Minsk agreements envisage the use of unmanned aerial vehicles and other technology by the OSCE SMM, we expect the sides, as signatories to these agreements, to not interfere, by jamming, shooting or otherwise, with the operation of these UAVs.”</p>
<p>Part of the reason this monitoring system was initially canceled was that several of the OSCE’s drones were shot down using surface-to-air missiles and rifle fire, and were subjected to interference from jamming equipment.</p>
<p>Due to a lack of access to the crash sites, no blame was assigned to the downing of the drones. However, there was suspicion that the fire came from Russian-backed separatists.</p>
<p>Both Ukrainian fighters and Russian-backed separatists have attempted to shoot down drones in the past. After the cancellation of the long-range drones, short- and medium-range drones continued to function.</p>
<h3>Lack of Enforcement of the Minsk Agreements</h3>
<p>Perhaps one of the most concerning detriments in the Minsk Agreements was the lack of options on how to enforce it. Although the OSCE can act as a reasonably neutral actor in observing both sides of the conflict, there are many parts of the region where OSCE monitors are not allowed.</p>
<p>Naturally, these are the more common regions where violations are more likely to occur such as artillery attacks, weapons positioning, and prohibited weapons systems.</p>
<h3>Why is the OSCE Reinstating the Program Now?</h3>
<p>So, what has made it a necessity to restart this program? The main reasoning comes from a <a href="https://www.rferl.org/a/ukraine-osce-conflict-monitors-drone-program-relaunch/29127731.html">video sourced at Ukrainian NGO Come Back Alive</a>, which shows a new electronic warfare system. Come Back Alive claims that this new system comes from Russia. However, Russia has disputed these statements.</p>
<p>The situation in Ukraine’s Donetsk and Luhansk’s regions has become somewhat of a hybrid conflict, where actual progress from either side does not occur often, but actual fighting and violations of the negotiated Minsk Accords continue to take place.</p>
<p>The real question is whether reintroducing the drone program will offer any new way of maintaining peace. While some state that monitoring systems decrease violence and increase incentives to follow the rules, what would stop separatists from shooting down these multi-million costing drones to merely be shot down again?</p>
<p>The reason why the OSCE is choosing to reinstate the drone program may have to do with <a href="https://medium.com/dfrlab/minskmonitor-long-range-monitoring-drones-return-to-eastern-ukraine-378b5b698ce4">the new electronic warfare system</a>, with some stating it is an escalation of electronic warfare. The maintenance of such a program is, however, questionable.</p>
<p><a href="https://globalsecurityreview.com/osce-drones-reintroduced-ukraine-donbass-warzone/">OSCE Drones Reintroduced into Ukraine&#8217;s Donbass and Donetsk Warzones</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Series: Geopolitics &#038; North Korea&#8217;s Nuclear Ambitions</title>
		<link>https://globalsecurityreview.com/series-geopolitics-north-koreas-nuclear-ambitions/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Fri, 20 Apr 2018 04:00:26 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[South Korea]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=3376</guid>

					<description><![CDATA[<p>The risk of conflict on the Korean Peninsula is higher than any time since the end of the Korean War. North Korea’s nuclear program began in the early 1990s, and in its first decade or so was often thought to be a means of extorting financial and material support. The Agreed Framework, established in 1994 [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/series-geopolitics-north-koreas-nuclear-ambitions/">Series: Geopolitics &#038; North Korea&#8217;s Nuclear Ambitions</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The risk of conflict on the Korean Peninsula is higher than any time since the end of the Korean War.</h2>
<p>North Korea’s nuclear program began in the early 1990s, and in its first decade or so was often thought to be a means of extorting financial and material support. The Agreed Framework, established in 1994 to manage the crisis, looks in hindsight like a reward for stopping the country from misbehaving.</p>
<p>North Korea got the world’s attention – and Donald Trump’s – when it said on July 4 that it had successfully launched an intercontinental ballistic missile for the first time. The weapon, potentially equipped with a nuclear warhead, could reach Alaska.</p>
<p>On November 28, 2017, North Korea conducted a test launch of a long-range intercontinental ballistic missile capable of carrying a nuclear warhead to almost any target located within the United States—continental or otherwise. This test was conducted after a hiatus of more than 70 days and has served to escalate tensions.</p>
<h4>There are few options for dealing with North Korea—and none are good.</h4>
<p>Leaders around the world agree that North Korea should be a top priority, but given the reclusive nation’s belligerence, options are scarce. Furthermore, ties between North Korea and its traditional ally China are growing increasingly fraught, as China reduces coal exports to the “hermit kingdom.” As China withdraws, Russia steps in to exploit the crisis by propping up the North Korean regime with energy and technology.</p>
<p>The U.S. has three options for managing the North Korea crisis. The U.S. could agree with the North Korean regime over accepting some degree of the North’s nuclear capabilities, it could use military force to decapitate the government of North Korea and secure its nuclear weapons, or the U.S. could steadfastly continue on its current (somewhat provocatory) strategy of containment. Through diplomatic efforts, economic sanctions, force posturing, and investment in ballistic missile defense systems innovation, the U.S. would seek to contain the North Korean regime to contain any future escalation.</p>
<hr />
<p style="text-align: center;"><a class="btn btn-default btn-md" href="http://globalsecurityreview.com/north-korea-war-quagmire/" target="_blank" rel="noopener noreferrer">Explore the Series: Geopolitics &amp; North Korea&#8217;s Nuclear Ambitions</a></p>
<h3 style="text-align: center;">Recently Published in this Series</h3>
<hr />
<h3 class="single-post-title"><span class="post-title"><a href="http://globalsecurityreview.com/north-korea-war-quagmire/" target="_blank" rel="http://globalsecurityreview.com/north-korea-war-quagmire/ noopener noreferrer"><img loading="lazy" decoding="async" class="alignleft wp-image-3362" src="http://globalsecurityreview.com/wp-content/uploads/2017/12/size0.jpg" alt="" width="365" height="221" srcset="https://globalsecurityreview.com/wp-content/uploads/2017/12/size0.jpg 640w, https://globalsecurityreview.com/wp-content/uploads/2017/12/size0-300x181.jpg 300w" sizes="(max-width: 365px) 100vw, 365px" /></a></span><span class="post-title"><a href="http://globalsecurityreview.com/north-korea-war-quagmire/">Sleepwalking Into War: The North Korean Quagmire</a></span></h3>
<p>The escalating war of words between U.S. President Donald Trump and North Korean Leader Kim Jung-Un has effectively created a situation in which the U.S. Government has three strategic options for dealing with a crisis that continues to escalate further as each day passes.</p>
<p><em><a href="http://globalsecurityreview.com/north-korea-war-quagmire/">Continue reading&#8230;</a></em></p>
<hr />
<p><a href="http://globalsecurityreview.com/dont-rely-china-north-korea-wont-kowtow-beijing/" target="_blank" rel="http://globalsecurityreview.com/dont-rely-china-north-korea-wont-kowtow-beijing/ noopener noreferrer"><img loading="lazy" decoding="async" class="alignright wp-image-3342" src="http://globalsecurityreview.com/wp-content/uploads/2017/12/North_Korea_-_China_friendship_5578914865-1024x448.jpg" alt="" width="398" height="174" srcset="https://globalsecurityreview.com/wp-content/uploads/2017/12/North_Korea_-_China_friendship_5578914865-1024x448.jpg 1024w, https://globalsecurityreview.com/wp-content/uploads/2017/12/North_Korea_-_China_friendship_5578914865-300x131.jpg 300w, https://globalsecurityreview.com/wp-content/uploads/2017/12/North_Korea_-_China_friendship_5578914865-768x336.jpg 768w, https://globalsecurityreview.com/wp-content/uploads/2017/12/North_Korea_-_China_friendship_5578914865.jpg 1906w" sizes="(max-width: 398px) 100vw, 398px" /></a></p>
<h3 class="single-post-title"><a href="http://globalsecurityreview.com/dont-rely-china-north-korea-wont-kowtow-beijing/"><span class="post-title">Don’t Rely On China: North Korea Won’t Kowtow To Beijing</span></a></h3>
<p>Those who want to end North Korea’s nuclear threats often point to China as the sole actor who could save the day by making Kim Jong-Un and his regime stand down. Beijing provides about 90 percent of imports that North Koreans rely on, mainly food and oil. Many academics and policy analysts in the United States, South Korea, and Japan agree that China holds the magic key to making North Korea cease its nuclear activities. It is a view based on the assumption of a “patron-client” relationship between China and North Korea. I have studied such lopsided alliances and I’ve learned that no matter how in sync the national security goals of the two countries may be or how much the stronger power may have helped the weaker, the weaker never merely rolls over and obeys.</p>
<p style="text-align: left;"><a href="http://globalsecurityreview.com/dont-rely-china-north-korea-wont-kowtow-beijing/">Continue Reading&#8230;</a></p>
<hr />
<h3 class="single-post-title"><a href="http://globalsecurityreview.com/north-koreas-military-capabilities/" target="_blank" rel="http://globalsecurityreview.com/north-koreas-military-capabilities/ noopener noreferrer"><img loading="lazy" decoding="async" class="alignleft wp-image-2946" src="http://globalsecurityreview.com/wp-content/uploads/2017/10/fada0c2d05fdc05f27b97d29a60253a5.jpg" alt="" width="360" height="180" srcset="https://globalsecurityreview.com/wp-content/uploads/2017/10/fada0c2d05fdc05f27b97d29a60253a5.jpg 800w, https://globalsecurityreview.com/wp-content/uploads/2017/10/fada0c2d05fdc05f27b97d29a60253a5-300x150.jpg 300w, https://globalsecurityreview.com/wp-content/uploads/2017/10/fada0c2d05fdc05f27b97d29a60253a5-768x384.jpg 768w" sizes="(max-width: 360px) 100vw, 360px" /></a><a href="http://globalsecurityreview.com/north-koreas-military-capabilities/"><span class="post-title">What Are North Korea’s Military Capabilities?</span></a></h3>
<p class="subhead">North Korea has embarked on an accelerated buildup of weapons of mass destruction and modernization of its already large conventional force. The U.S. and its Asian allies regard North Korea as a grave security threat. It has one of the world’s most substantial conventional military forces, which, combined with its escalating missile and nuclear tests and aggressive rhetoric, has aroused concern worldwide. But world powers have been ineffective in slowing its path to acquire nuclear weapons.</p>
<p><em><a href="http://globalsecurityreview.com/north-koreas-military-capabilities/">Continue reading&#8230;</a></em></p>
<hr />
<h3><a href="http://globalsecurityreview.com/north-korea-launches-icbm-capable-reaching-continental-u-s/" target="_blank" rel="http://globalsecurityreview.com/north-korea-launches-icbm-capable-reaching-continental-u-s/ noopener noreferrer"><img loading="lazy" decoding="async" class="alignright wp-image-3218" src="http://globalsecurityreview.com/wp-content/uploads/2017/11/north-korean-ballistic-missile-1024x681.jpg" alt="" width="365" height="243" srcset="https://globalsecurityreview.com/wp-content/uploads/2017/11/north-korean-ballistic-missile-1024x681.jpg 1024w, https://globalsecurityreview.com/wp-content/uploads/2017/11/north-korean-ballistic-missile-300x200.jpg 300w, https://globalsecurityreview.com/wp-content/uploads/2017/11/north-korean-ballistic-missile-768x511.jpg 768w, https://globalsecurityreview.com/wp-content/uploads/2017/11/north-korean-ballistic-missile-1536x1022.jpg 1536w, https://globalsecurityreview.com/wp-content/uploads/2017/11/north-korean-ballistic-missile.jpg 2000w" sizes="(max-width: 365px) 100vw, 365px" /></a><a href="http://globalsecurityreview.com/north-korea-launches-icbm-capable-reaching-continental-u-s/">North Korea Launches ICMB Capable of Hitting Targets in the Continental States</a></h3>
<p>On November 28, 2017, North Korea conducted a test launch of a nuclear-capable intercontinental ballistic missile after over 70 days without any such activity. This is the third ICBM test launch of 2017.  U.S. Secretary of Defense James Mattis stated that this missile “went higher, frankly, than any previous shot they’ve taken.”</p>
<p><a href="http://globalsecurityreview.com/north-korea-launches-icbm-capable-reaching-continental-u-s/">Continue reading&#8230;</a></p>
<hr />
<p style="text-align: left;">Explore the analysis, assessments, forecasts, and commentary in our series: &#8220;<a href="http://globalsecurityreview.com/series/geopolitics-and-north-koreas-nuclear-ambitions/">Geopolitics and North Korea&#8217;s Nuclear Ambitions.</a>&#8220;</p>
<p style="text-align: center;"><a class="btn btn-default btn-md" href="http://globalsecurityreview.com/north-korea-war-quagmire/" target="_blank" rel="noopener noreferrer">Explore the Series: Geopolitics &amp; North Korea&#8217;s Nuclear Ambitions</a></p>
<p><a href="https://globalsecurityreview.com/series-geopolitics-north-koreas-nuclear-ambitions/">Series: Geopolitics &#038; North Korea&#8217;s Nuclear Ambitions</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Spies on Campus Pose Threat to Academia</title>
		<link>https://globalsecurityreview.com/spies-on-campus-pose-threat-to-academia/</link>
		
		<dc:creator><![CDATA[Tina Trinh]]></dc:creator>
		<pubDate>Mon, 02 Apr 2018 15:09:43 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=6516</guid>

					<description><![CDATA[<p>It’s a typical scene at college campuses across the country — students with their noses buried in books, engaged in the pursuit of knowledge and hoping to one day make their mark on the world. It&#8217;s not the first place one would imagine finding government spies, but investigative reporter Dan Golden said you would be [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/spies-on-campus-pose-threat-to-academia/">Spies on Campus Pose Threat to Academia</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It’s a typical scene at college campuses across the country — students with their noses buried in books, engaged in the pursuit of knowledge and hoping to one day make their mark on the world.</p>
<p>It&#8217;s not the first place one would imagine finding government spies, but investigative reporter Dan Golden said you would be surprised.</p>
<p>“There’s an awful lot more international students, international professors at American universities. Some of them are here to gather information for their countries, scientific secrets or cultivate sources,” said Golden, author of &#8220;Spy Schools.&#8221;</p>
<p>Golden discusses various instances of espionage in academia and said the free flow of ideas and cultural exchange fostered by universities make them vulnerable to acts of espionage.</p>
<p>At the FBI’s field office in New York, Charlie McGonigal, a special agent in charge of the counterintelligence division, said espionage on campus is a big problem.</p>
<p>“In the United States, our academic institutions are very open,” said McGonigal. “There’s a lot of research and development at major universities in the United States that a foreign government would look to exploit by sending students to study at these universities.”</p>
<p>Americans studying abroad can also become targets of foreign governments. In 2014, the FBI commissioned a <a class="wsw__a" href="https://www.youtube.com/watch?v=R8xlUNK4JHQ" target="_blank" rel="noopener noreferrer">film</a> based on the real-life exploits of Glenn Shriver, an American student recruited to spy for China.</p>
<p>“Students are recruited by those governments, and then they’re asked to go and apply for employment with the U.S. government or in a sensitive private sector area where we know those governments are targeting that type of specific information,” said McGonigal.</p>
<h3>Going both ways</h3>
<p>But spy efforts are a two-way street, and the United States is no stranger to intelligence-gathering operations in academia, either. Alex van Schaick was a Fulbright scholar researching organized labor movements in Bolivia when he met a U.S. government official for what he presumed to be a customary security briefing.</p>
<p>Van Schaick was troubled by the request from the official. “He said, ‘Oh, and if you’re out doing field work out in the countryside, if you run into any Cuban doctors or Venezuelan officials, we’d like you to report their whereabouts back to the U.S. embassy, because we know they’re out there, and we want to keep tabs on them.’”</p>
<p>“My first thinking was, ‘Whoa, this person just kind of asked me to spy for the U.S. government.’ And I’m here as part of a program that is supposed to encourage solidarity and people-to-people exchange,” added van Schaick.</p>
<p>McGonigal contends that these kinds of recruitment efforts are rare.</p>
<p>“We do periodically enter in that type of agreement, but it’s not as prevalent or nefarious as what you see from our students being exploited by the Chinese government or Russian government,” McGonigal said.</p>
<p>Golden said raising awareness about the prevalence of espionage is key, citing the 2010 case of Russian sleeper agents who for years posed as ordinary Americans.</p>
<p>“The vast majority of them were going to American colleges and universities, or had gone to them. That seemed to be something that Russia regarded as a crucial part of legitimizing a spy, an American college degree,” Golden said.</p>
<p><a href="https://globalsecurityreview.com/spies-on-campus-pose-threat-to-academia/">Spies on Campus Pose Threat to Academia</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fears of War Between Iran &#038; Israel Increase</title>
		<link>https://globalsecurityreview.com/fears-war-between-iran-israel-increase/</link>
		
		<dc:creator><![CDATA[Steve Herman]]></dc:creator>
		<pubDate>Fri, 30 Mar 2018 10:00:49 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=6502</guid>

					<description><![CDATA[<p>Israel and Iran, with two of the most powerful militaries in the Middle East, appear on a collision course that some experts fear could ignite a regional war that might ultimately drag in the United States and Russia. The tensions are centered in Israel&#8217;s northern neighbor Syria, where both Russia and Iran have been emboldened [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/fears-war-between-iran-israel-increase/">Fears of War Between Iran &#038; Israel Increase</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Israel and Iran, with two of the most powerful militaries in the Middle East, appear on a collision course that some experts fear could ignite a regional war that might ultimately drag in the United States and Russia.</h2>
<p>The tensions are centered in Israel&#8217;s northern neighbor Syria, where both Russia and Iran have been emboldened by their success in shoring up the government of President Bashar al-Assad. The war has occasionally spilled across Israel&#8217;s borders, causing alarm in the Jewish state.</p>
<p>“If a Hezbollah missile or mortar shell hits a kindergarten or a school bus — a terror attack that causes major damage in terms of Israeli lives — this would be a tactical incident that entails a strategic price,” predicts Lior Weintraub, a former Israeli diplomat and now a lecturer at the Interdisciplinary Center Herzliya.</p>
<p>“That would be translated into a significant Israeli retaliation and from there you might see a slippery slope.”</p>
<p>Christopher Kozak, a senior analyst at the Institute for the Study of War, also worries about an incident spinning out of control.</p>
<p>“That’s why I am greatly concerned in the next several months we are going to get, if not a total regional conflagration, then at least a more direct Israel-Iran confrontation on a new third front,” he told Voice of America.</p>
<p>Iran’s Islamic Revolutionary Guard Corps and the Lebanese Hezbollah have stationed resources along the eastern Golan Heights and deployed key commanders to the area.</p>
<p>“Jerusalem’s liberation is near,” hardline Iranian cleric Ebrahim Raisi said in January during a tour of the Israel-Lebanon border, where he was flanked by Hezbollah commanders and Iranian officers.</p>
<p>Weintraub says Israel understands there is “only one reason” for Iran to entrench itself Syria, and that is “to build a launching pad for an attack against Israel.”</p>
<p>Some analysts worry that the situation will only get worse if the United States renounces the nuclear non-proliferation deal (the Joint Comprehensive Plan of Action), between Iran and the international community.</p>
<p>“Beyond allowing Iran to re-initiate a nuclear weapons program, our trashing of the deal would send a signal to Israel that Washington would countenance something as bold as an Israeli military strike on Iran,” Ned Price, a National Security Council spokesman in the Obama administration told Voice of America.</p>
<p>“That could well be the spark that sets the region ablaze, with Hezbollah then potentially doing the bidding of Tehran in locales near and far,” says Price, who spent a decade at the Central Intelligence Agency as a senior analyst and then spokesman.</p>
<p>Acknowledging that tension and that &#8220;fears have been developing around the worst-case scenario”, Pierre Pahlavi, assistant professor of defense studies at the Royal Military College of Canada, says war is not inevitable.</p>
<p>In February, the Middle East appeared on the edge of a wider war after an Iranian drone was shot down in Israeli airspace and an Israeli fighter jet was hit by anti-aircraft fire from Syria when attacking an Iranian base. Israel retaliated by hitting a dozen more targets in Syria, including four additional purported Iranian military facilities.</p>
<p>Even before those incidents, the International Crisis Group had warned that “a broader war could be only a miscalculation away.”</p>
<p>Pahlavi asserts that &#8220;neither Israel nor Iran wants to start a clash that would spiral up.”</p>
<p>In Israel, Weintraub concurs but warns “if the sword would be on Israel’s neck, then Israel will act. And if Israel will act, there’ll be a price for it. But when you fight for your survival, you do what you have to do, and you take what you have to take.”</p>
<p>Last week, Israel openly acknowledged for the first time that it bombed a suspected nuclear reactor in Syria in 2007 and suggested the air strike should be a reminder to Tehran it will never be allowed to develop nuclear weapons.</p>
<p>&#8220;The Iranians are absolutely aware that they have no capacity to confront the Israeli forces conventionally,” says Pahlavi, whose great uncle was the last shah of Iran. &#8220;I do believe &#8212; but maybe it&#8217;s wishful thinking, the Iranians will do whatever they have to in order to keep things under control.&#8221;</p>
<p>Russia has an effective coalition with Iran in the Middle East while it is also interested in managing its relationship with Israel. That has allowed Moscow generally to turn a blind eye to Israeli actions against Iran inside Syria.</p>
<p>If Russia has to choose between Jerusalem and Tehran, most analysts see Moscow more closely aligning with Iran.</p>
<p>“Do they go all the way to shooting down an Israeli jet? I don&#8217;t know if they’d go that far,” says Kozak.</p>
<p>Israelis express confidence they would not need American forces to help fight Iran, but they also do not expect the Trump administration to try to restrain them.</p>
<p>Weintraub notes that it is “very visible to all of the Middle East that the United States stands behind Israel. It means a lot, in terms of national security, for the lives of Israelis. … But I’m not talking about moving one [additional] American soldier onto the soil of the Middle East.”</p>
<p>The United States military intends to keep forces in Syria, Secretary of State Rex Tillerson said in January, not only for mopping up Islamic State and al-Qaida fighters, but also as a signal to the forces controlled by Damascus and Tehran.</p>
<p>However, analysts say, Washington has effectively outsourced to Moscow the job of enforcing several so-called de-escalation zones in Syria, giving it the upper hand at a time of rising tension between the two countries.</p>
<p>Should any of its forces be hit by U.S. strikes, such as those conducted to punish Syria for chemical attacks, Russia’s military has issued an unprecedented blunt threat.</p>
<p>“If lives of the Russian officers are threatened, the Armed Forces of the Russian Federation will retaliate against missile and launch systems,” said Army General Valery Gerasimov, chief of the general staff of the Russian armed forces, earlier in March.</p>
<p>U.S. President Donald Trump and Russian President Vladimir Putin spoke by phone last week. Trump told reporters they discussed the Syrian civil war — which is the world’s deadliest conflict in recent decades — and that the two leaders are looking to meet soon.</p>
<p>Arranging such a summit may prove difficult as the climate of U.S.-Russian relations plunges to its lowest temperature since the Cold War.</p>
<p>Moscow on Monday vowed retaliation after the United States — joined by numerous allies — expelled dozens of its diplomats it considers spies, in response to a nerve gas attack in Britain that is blamed by the West on Russia.</p>
<p><a href="https://globalsecurityreview.com/fears-war-between-iran-israel-increase/">Fears of War Between Iran &#038; Israel Increase</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Japan Will Enhance Its Military Posture to Counter China</title>
		<link>https://globalsecurityreview.com/northeast-asia-japan-south-korea/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Wed, 28 Mar 2018 09:30:38 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[South Korea]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?post_type=forecast&#038;p=2530</guid>

					<description><![CDATA[<p>In Northeast Asia, growing tensions around the Korean Peninsula are likely, with the possibility of a confrontation in the coming years. Kim Jong Un is consolidating his grip on power through a combination of patronage and dread and is doubling down on his nuclear and missile programs, developing long-range missiles that may soon endanger the [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/northeast-asia-japan-south-korea/">Japan Will Enhance Its Military Posture to Counter China</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>In Northeast Asia, growing tensions around the Korean Peninsula are likely, with the possibility of a confrontation in the coming years.</h2>
<p>Kim Jong Un is consolidating his grip on power through a combination of patronage and dread and is doubling down on his nuclear and missile programs, developing long-range missiles that may soon endanger the continental USA.</p>
<p>Beijing, Seoul, Tokyo, and Washington have a shared incentive to handle security risks in Northeast Asia, but a history of warfare and occupation along with current distrust makes cooperation difficult.</p>
<p>Continued North Korean provocations, such as additional nuclear and missile tests, may worsen equilibrium in the region and immediate nations to take actions, sometimes unilaterally, to defend their security interests.</p>
<p>Kim is determined to secure international recognition of the North as a nuclear-nation, for safety, prestige, and political legitimacy. With the news from U.S. President Donald Trump that he would be willing to engage in a meeting with the North Korean dictator, it now seems that Kim is on track to securing that status which he so deeply craves.</p>
<p>Contrary to his father and grandfather, he has previously signaled little interest in participating in talks on denuclearization.  He codified the North&#8217;s nuclear status in the party constitution in 2012 and reaffirmed it during the Party Congress in 2016.</p>
<p>Now, that seems to have changed, as well. North Korea is reportedly willing to discuss the possibility of their relinquishing their nuclear weapons in exchange for a security guarantee, according to statements made by South Korean officials.</p>
<p>Beijing faces a continuing strategic conundrum about the North.  Pyongyang&#8217;s behavior both undermines China&#8217;s argument that the US army presence in the region is anachronistic and demonstrates Beijing&#8217;s lack of influence—or perhaps lack of political will to exert influence—within its neighbor and customer. Now, with North Korea seeming to be on track to engage in direct talks with the U.S., China has been summarily cut out of the process.</p>
<p>North Korean behavior leads to tightening US alliances, more assertive action by US allies, and, on occasion, greater cooperation between these partners themselves—and might lead to a change in Beijing&#8217;s approach to North Korea with time.</p>
<h3>Japan Will Enhance Its Military and Security Capabilities</h3>
<p>Having come out of a particularly disruptive year in terms of domestic politics and subsequently securing another term as Prime Minister,  Shinzo Abe, has the political mandate to pursue his agenda of reforming the Japanese constitution.</p>
<p>The snap election in October 2017 was seen as a referendum on Abe&#8217;s ambitious proposal to revise the Japanese Constitution to pave the way for the normalization of the country&#8217;s military and to pass an enormous economic reform package.</p>
<p>North Korea&#8217;s persistent weapons tests, particularly the ones which involve launching missiles on Japanese territory, undoubtedly helped to drum up support for the Prime Minister and his party.</p>
<p>Japan will likely pursue increased spending on its military and become a more significant presence in the region, particularly as China has begun flexing its maritime muscles in the East China Sea and the heavily contested South China Sea.</p>
<p>If China continues to escalate its island-building and militarization programs in the South China Sea, Japan will likely join the U.S. in performing &#8220;freedom of navigation&#8221; exercises in an attempt to de-normalize Chinese encroachment in the region.</p>
<p><a href="https://globalsecurityreview.com/northeast-asia-japan-south-korea/">Japan Will Enhance Its Military Posture to Counter China</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>&#8220;Plausible Deniability&#8221; in Russia&#8217;s Hybrid War in Ukraine</title>
		<link>https://globalsecurityreview.com/plausible-deniability-russias-hybrid-war-ukraine/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Thu, 22 Mar 2018 14:35:16 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Crimea]]></category>
		<category><![CDATA[Georgia]]></category>
		<category><![CDATA[International Security]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecuritybrief.com/?p=116</guid>

					<description><![CDATA[<p>From the beginning of Russia’s engagement in Crimea, there was a profound emphasis on maintaining a degree of plausible deniability. The Russian flag was raised by residents of Crimea, not Russian soldiers. Russian forces were stripped of any identifying markers or insignia. Cyber attacks launched at Ukrainian infrastructure and internet domains were structured in a manner [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/plausible-deniability-russias-hybrid-war-ukraine/">&#8220;Plausible Deniability&#8221; in Russia&#8217;s Hybrid War in Ukraine</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>From the beginning of Russia’s engagement in Crimea, there was a profound emphasis on maintaining a degree of plausible deniability.</h2>
<p>The Russian flag was raised by residents of Crimea, not Russian soldiers. Russian forces were stripped of any identifying markers or insignia. <span style="text-transform: initial">Cyber attacks launched at Ukrainian infrastructure and internet domains were structured in a manner that obfuscated Russia’s involvement.</span></p>
<p>It’s widely understood that Russia was responsible for the violation of Ukraine’s sovereignty. However, the confusion spawned by the disinformation campaigns, cyber attacks, and unmarked special forces, and the later actions in eastern Ukraine, would see the west committing further inaction allowing the Kremlin to consolidate, and then normalize the acquisition of Crimea by the Russian Federation.</p>
<p>After the conspicuous invasion of Georgia in 2008, the 2014 Crimea operation employed subtle paramilitary and special forces to seize critical points of interest while securing internal order. Russia applied a  broad swath of non-military, <a href="http://globalsecurityreview.com/hybrid-and-non-linear-warfare-systematically-erases-the-divide-between-war-peace/">hybrid or &#8220;non-linear&#8221; warfare</a> tactics designed to foster the rapid integration of the Crimean political, security, media, and financial sectors with those in Russia.</p>
<h3>The period between the initial “invasion” of information and cyber attacks and the eventual referendum deciding Russian sovereignty over the peninsula was little more than a month.</h3>
<p>The military involvement served as a deterrent to Ukrainian troops, while the lack of insignia or identifying features on Russian special forces provided a degree of plausible deniability. Accordingly, the NATO powers in Europe and North America would not have apparent cause to intervene.</p>
<p>Simultaneously, the political, economic, and information warfare campaigns that had been set in motion were masked by the threat of a full-scale Russian invasion in other parts of Ukraine.  Russian troop mobilizations and activity near the Ukrainian border diverted international attention from Crimea while pro-Russian non-military measures were implemented to politically, socially, and economically integrate the Crimean peninsula with Russia.</p>
<p>Having learned the mistakes of overt military action, and the risks that such action has for becoming embroiled in a heated civil war, Russian military strategists employed a mixture of both state-sponsored actors, state actors, and pro-Russian Crimean civilian protestors and militia groups.</p>
<h3>All state-actors in Crimea were bereft of identifying marks that would associate Russia with the incursion.</h3>
<p>All that was required for the Kremlin to deny any responsibility was for their special forces to show up wearing un-flagged uniforms. Regarding ensuring the viability and legitimacy of their actions in Ukraine, Russia proceeded to launch an aggressive campaign in the United Nations. As they had done before their 2008 invasion of Georgia, their disinformation campaign extended to Russian delegates at the United Nations.</p>
<p>Russia’s ambassador repeatedly—and forcefully—asserted that Ukrainian authorities were threatening and committing acts of violence against ethnic Russians in Ukraine. Superficially, the carefully crafted (artificial) legal context for this argument was structured similarly to the 1999 NATO bombing of Yugoslavia.</p>
<p>It must be noted that the latter was to ensure the security and existence of critically vulnerable civilians. This is a stark contrast to the underlying reason for Russian aggression, which is to provide the continued hegemony of Russia in the post-Soviet space.</p>
<h3>The efficacy of the Crimean campaign (and Russian non-linear warfare as a strategy) is evidenced by two factors.</h3>
<p>One is the degree to which Russia was able to normalize the annexation. The other is the masterful execution of diplomatic and legal rhetoric which rendered the West inability of Western military intervention, to realize a controlled process of de-escalation and normalization.</p>
<p>The ongoing exploitation—and arguably weaponization—of International law and legal framework by State actors posits a critical urgency to reform theoretical conceptualizations of international law governing conflict, especially since purely conventional battles will be the exception in the 21st century. The blending of non-linear tactics with plausibly deniable conventional forces actively threatens the rule of law in the international order.</p>
<p><a href="https://globalsecurityreview.com/plausible-deniability-russias-hybrid-war-ukraine/">&#8220;Plausible Deniability&#8221; in Russia&#8217;s Hybrid War in Ukraine</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Gina Haspel is Trump&#8217;s Chance to Reset His Bad Start with CIA</title>
		<link>https://globalsecurityreview.com/gina-haspel-trumps-chance-reset-bad-start-cia/</link>
		
		<dc:creator><![CDATA[Brent Durbin]]></dc:creator>
		<pubDate>Mon, 19 Mar 2018 13:17:45 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=6370</guid>

					<description><![CDATA[<p>The CIA had a tough first year under President Donald Trump. It started with the president making a brashly political speech in front of the agency’s Memorial Wall, which is hallowed ground to CIA officers. This was soon after Trump seemed to compare U.S. intelligence agencies to Nazis. More recently, Trump has publicly challenged intelligence [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/gina-haspel-trumps-chance-reset-bad-start-cia/">Gina Haspel is Trump&#8217;s Chance to Reset His Bad Start with CIA</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The CIA had a tough first year under President Donald Trump.</h2>
<p>It started with the president making a <a href="https://www.newyorker.com/news/news-desk/trumps-vainglorious-affront-to-the-c-i-a">brashly political speech in front of the agency’s Memorial Wall</a>, which is hallowed ground to CIA officers. This was soon after Trump seemed to <a href="https://twitter.com/realdonaldtrump/status/819164172781060096?lang=en">compare U.S. intelligence agencies to Nazis</a>.</p>
<p>More recently, Trump has <a href="https://www.washingtonpost.com/graphics/2017/world/national-security/donald-trump-pursues-vladimir-putin-russian-election-hacking/?utm_term=.3fa1d7011b75">publicly challenged intelligence assessments</a> about Russian interference in the 2016 election. Republican leaders of the House intelligence committee have also <a href="https://www.cnn.com/2018/03/12/politics/house-republicans-russia-conclusions/index.html">undermined the CIA</a> by echoing the president’s criticisms. Even Republican Rep. Tom Rooney has said the committee has <a href="https://www.cnn.com/2018/03/12/politics/house-intel-rep-tom-rooney-russia-investigation-erin-burnett-outfront-cnntv/index.html">“lost all credibility”</a> due to its Russia investigation.</p>
<p>The president needs a CIA he can trust. The CIA, for its part, needs to feel its work is heard and respected by leaders committed to protecting American security. Although the president seemingly valued the contribution of Mike Pompeo as CIA director, that respect wasn’t reflected in the president’s attitude toward the agency as a whole. Until this relationship is repaired, the country will face unnecessary risks – and not only from Vladimir Putin and his cyber trolls.</p>
<p>So how can Haspel gain the president’s trust, while staying true to the CIA mission?</p>
<h2>A history of unease</h2>
<p>Trump is not the first president to be suspicious of the CIA. My <a href="https://www.cambridge.org/core/books/cia-and-the-politics-of-us-intelligence-reform/FDDB47B0D88F3F1FE128DB23964C9061">new book on U.S. intelligence reform</a> describes the often uncomfortable relationship between presidents and the agency.</p>
<p>President Richard Nixon thought the CIA was filled with <a href="https://books.google.com/books?id=vAAtDwAAQBAJ&amp;lpg=PA108&amp;ots=xPKD5S6K4H&amp;dq=nixon%20and%20the%20cia%20durbin&amp;pg=PA108#v=onepage&amp;q=nixon%20and%20the%20cia%20durbin&amp;f=false">“Ivy League liberals” who had helped John F. Kennedy</a> defeat him in 1960, and who were trying to undermine his administration’s policies from Moscow to Vietnam.</p>
<p>Bill Clinton campaigned on <a href="https://books.google.com/books?id=vAAtDwAAQBAJ&amp;lpg=PA108&amp;ots=xPKD5S6K4H&amp;dq=nixon%20and%20the%20cia%20durbin&amp;pg=PA186#v=onepage&amp;q=clinton%20campaign&amp;f=false">deep cuts to the intelligence budget</a>. His first director of the CIA, James Woolsey, was left out of major decisions – so much so that when a deranged pilot flew a small plane into the White House, people joked that it was <a href="https://millercenter.org/the-presidency/presidential-oral-histories/r-james-woolsey-oral-history-director-central">Woolsey trying to get a meeting with the president</a>.</p>
<p>Bad relations between a president and the CIA can have disastrous effects. Members of the George W. Bush administration believed the agency’s views on Iraq were too rosy, so they <a href="https://www.foreignaffairs.com/articles/iraq/2006-03-01/intelligence-policy-and-war-iraq">pushed for more aggressive analysis and bypassed the agency</a> to justify going to war. The Iraq War resulted in <a href="http://icasualties.org/Iraq/index.aspx">thousands of U.S. battlefield deaths</a>, <a href="https://news.nationalgeographic.com/news/2013/10/131015-iraq-war-deaths-survey-2013/">hundreds of thousands of civilian deaths</a>, and close to <a href="https://www.csis.org/analysis/us-military-spending-cost-wars">$2 trillion in direct U.S. spending</a> on the war.</p>
<p>If the president wants to benefit from the best information about the most important challenges facing America, he needs to believe the CIA is doing its job well. That trust starts at the top.</p>
<p><span style="text-transform: initial;">Trump’s announced nominee to succeed Pompeo is a promising choice, though a controversial one. </span><a style="text-transform: initial;" href="http://time.com/5198054/gina-haspel-cia-torture-senate/">Gina Haspel</a><span style="text-transform: initial;"> is a decorated agency </span>veteran <span style="text-transform: initial;">and would be the first woman to head the CIA. At least symbolically, her appointment helps address </span><a style="text-transform: initial;" href="https://www.tandfonline.com/doi/abs/10.1080/02684527.2014.913395?journalCode=fint20">the historical imbalance of female representation at the agency</a><span style="text-transform: initial;">. CIA insiders also </span><a style="text-transform: initial;" href="https://www.cbsnews.com/news/who-is-gina-haspel-cia-director-seasoned-spymaster-2018-03-13/">seem to respect her</a><span style="text-transform: initial;">.</span></p>
<p>Yet Haspel’s selection has raised concerns among many – including key Democrats on the Senate intelligence committee – regarding <a href="https://www.washingtonpost.com/world/national-security/trump-nominates-gina-haspel-to-head-cia-an-agency-veteran-tied-to-use-of-brutal-interrogation-measures/2018/03/13/bd47c8ce-26c6-11e8-874b-d517e912f125_story.html">her role in approving the torture of detainees</a> during the Bush years. She is even purported to have been at the heart of “<a href="http://www.nbcnews.com/id/22474868/ns/politics/t/mukasey-criminal-inquiry-begins-cia-tapes/#.Wqhj5OjwauU">tapegate</a>,” when videotapes showing prisoner torture were illegally destroyed at the agency.</p>
<p>Critics are right to condemn this history. Even though Haspel is likely to be confirmed, she must work to restore confidence that she will follow the law and resist political influence. If she can do this, she will be well positioned to start rebuilding relations between the CIA and senior policymakers in both the White House and Congress.</p>
<h2>Haspel’s challenge</h2>
<p>Successful leadership is only one piece of the intelligence puzzle. For a more effective CIA, three things must happen.</p>
<p><figure id="attachment_6374" aria-describedby="caption-attachment-6374" style="width: 240px" class="wp-caption alignleft"><img loading="lazy" decoding="async" class="wp-image-6374 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2018/03/Gina_Haspel_official_CIA_portrait-1-240x300.jpg" alt="Gina Haspel in 2017." width="240" height="300" srcset="https://globalsecurityreview.com/wp-content/uploads/2018/03/Gina_Haspel_official_CIA_portrait-1-240x300.jpg 240w, https://globalsecurityreview.com/wp-content/uploads/2018/03/Gina_Haspel_official_CIA_portrait-1-768x960.jpg 768w, https://globalsecurityreview.com/wp-content/uploads/2018/03/Gina_Haspel_official_CIA_portrait-1-819x1024.jpg 819w" sizes="(max-width: 240px) 100vw, 240px" /><figcaption id="caption-attachment-6374" class="wp-caption-text">Gina Haspel in 2017.</figcaption></figure></p>
<p>First, the White House must stop challenging the professionalism of intelligence officers. Morale matters. While much of the CIA’s mission is defined by world events, it also tries to foresee and support the priorities of the president. If it’s not able or motivated to do this, America is more likely to blunder into foreign mistakes, including war.</p>
<p>Second, the congressional oversight committees must <a href="https://www.nytimes.com/2018/02/08/us/politics/house-intelligence-committee-russia-nunes.html">stop bickering</a> and return to the bipartisan cooperation that was the norm for most of their 40-year history. This will be hard – these are not bipartisan times. But without effective oversight, the intelligence community can become either irrelevant or irresponsible in how it conducts its duties.</p>
<p>Finally, the CIA director cannot simply tell the president what he wants to hear. This is where Haspel’s career is important. After serving in several senior positions at the agency, her commitment to the CIA culture of speaking truth to power will be critical to her success. And if she and the CIA don’t have the respect and trust of the people making life-or-death decisions about national security, America – and the world – will face an even more uncertain future.</p>
<p><a href="https://globalsecurityreview.com/gina-haspel-trumps-chance-reset-bad-start-cia/">Gina Haspel is Trump&#8217;s Chance to Reset His Bad Start with CIA</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Top Putin Aide&#8217;s Hacked Emails Reveal Secret Plan to Invade Ukraine</title>
		<link>https://globalsecurityreview.com/top-putin-aides-hacked-emails-reveal-secret-plan-invade-ukraine/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Sat, 17 Mar 2018 19:35:53 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Georgia]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=1900</guid>

					<description><![CDATA[<p>Hacked emails, allegedly belonging to top Putin advisor Vladislav Surkov, reveal a Kremlin plot to create conditions for the annexation of parts of eastern Ukraine that coincides with the aftermath of the 2016 U.S. Election. In the early autumn of 2016, a Ukrainian hacker collective calling itself CyberJunta obtained and subsequently published emails reportedly belonging [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/top-putin-aides-hacked-emails-reveal-secret-plan-invade-ukraine/">Top Putin Aide&#8217;s Hacked Emails Reveal Secret Plan to Invade Ukraine</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Hacked emails, allegedly belonging to top Putin advisor Vladislav Surkov, reveal a Kremlin plot to create conditions for the annexation of parts of eastern Ukraine that coincides with the aftermath of the 2016 U.S. Election.</h2>
<p>In the early autumn of 2016, a Ukrainian hacker collective calling itself CyberJunta obtained and subsequently published emails reportedly belonging to Vladislav Surkov, a senior advisor and personal aide to Russian President Vladimir Putin.</p>
<p>CyberJunta stated that its efforts were undertaken in conjunction with other hacker collectives; specifically, groups referred to as &#8220;FalconsFlame,&#8221; &#8220;RUH8,&#8221; and &#8220;Trinity.&#8221; This grouping refers to itself the Cyber Alliance. Oft-referred to as the&#8221; Gray Cardinal of the Kremlin,&#8221; Surkov is considered the be the architect of Russia&#8217;s contemporary political system.<br />
<iframe src="//players.brightcove.net/2097119709001/S1EBSbDn_default/index.html?videoId=5199991863001" width="100%" height="300" frameborder="5" align="aligncenter" allowfullscreen="allowfullscreen"></iframe></p>
<h3>Who is Vladislav Surkov?</h3>
<p>From 1999 to 2011, while serving as the First Deputy Chief of the Russian Presidential Administration, Surkov acted as the Kremlin&#8217;s main ideologist; proposing and subsequently implementing the concept of &#8220;sovereign democracy&#8221; in Russia. Surkov is perceived by many—both in Russia and in the West—as a key figure with considerable influence in the Kremlin. According to <i><a href="https://themoscowtimes.com/articles/same-old-kremlin-same-old-surkov-28364">The Moscow Times</a>, </i>this power is independent of any official title Surkov has held within the Putin administration or in the Russian government.</p>
<p>Observers have credited Surkov&#8217;s keen ability to manipulate public perception through an intricate blend of theater and managed politics with keeping Putin in power since 2000. As First Deputy Head of the Presidential Administration, Surkov sat a desk laden with phones labeled with the names of nearly all of Russia&#8217;s &#8220;independent&#8221; or &#8220;opposition&#8221; political party leaders, &#8220;<a href="https://www.theatlantic.com/international/archive/2014/11/hidden-author-putinism-russia-vladislav-surkov/382489/">calling them and directing them at any moment, day or night</a>.&#8221;</p>
<h3>The Puppet Master of Moscow</h3>
<p><figure id="attachment_1959" aria-describedby="caption-attachment-1959" style="width: 215px" class="wp-caption alignleft"><img loading="lazy" decoding="async" class="wp-image-1959" src="http://globalsecurityreview.com/wp-content/uploads/2017/09/13zYd2PzNjU-295x300.jpg" alt="Vladislav surkov gray cardinal of Kremlin " width="215" height="218" srcset="https://globalsecurityreview.com/wp-content/uploads/2017/09/13zYd2PzNjU-295x300.jpg 295w, https://globalsecurityreview.com/wp-content/uploads/2017/09/13zYd2PzNjU-768x780.jpg 768w, https://globalsecurityreview.com/wp-content/uploads/2017/09/13zYd2PzNjU-1008x1024.jpg 1008w, https://globalsecurityreview.com/wp-content/uploads/2017/09/13zYd2PzNjU-100x100.jpg 100w" sizes="(max-width: 215px) 100vw, 215px" /><figcaption id="caption-attachment-1959" class="wp-caption-text">Vladislav Surkov is a senior advisor to Russian President Vladimir Putin</figcaption></figure></p>
<p>Rather than directly oppressing opposition as traditional authoritarian governments had done, Surkov&#8217;s strategy was more complex. Under Surkov&#8217;s direction, dominant ideologies and movements were infiltrated with propaganda and misinformation, sewing chaos by exploiting their internal disagreements, rendering them ineffective.</p>
<p>This strategy is exemplified by Surkov funding civic forums and foreign non-governmental organizations while simultaneously providing support and encouragement to Russian nationalists who would accuse NGOs of being &#8220;tools of the west.&#8221; By placing itself at the center of all forms of political and ideological discourse, the Kremlin effectively owns any narrative an independent movement might try to seize.</p>
<p>In December of 2011, Surkov was appointed Deputy Prime Minister. In May of 2013, Surkov forced to resign his position within the government, returned to the Presidential Administration to serve as a personal adviser to Vladimir Putin on Abkhazia, South Ossetia, Crimea, and Ukraine. Surkov has since been placed on U.S. and E.U. sanctions lists for his role in orchestrating the Crimean annexation.</p>
<h3>The Kremlin Plot to Normalize Ukraine</h3>
<p>The hacked emails detailed a Kremlin plan to further destabilize Ukraine in an effort favor Russia&#8217;s interests, by pushing for early Parliamentary elections through the extensive use of cyber and information warfare tactics, and through increased financial support to separatist or &#8220;pro-Russia&#8221; politicians.  Also published by hackers were copies of passports that are alleged to belong to Surkov and members of his family, which have been verified as authentic.</p>
<p>The plan detailed in Surkov&#8217;s purported emails states that de-escalating the conflict in eastern Ukraine on Russian terms is possible—if the Kremlin can fundamentally shift the Ukrainian political landscape in its favor. De-escalation and normalization would then create favorable circumstances for the integration of the Donbass with Russia—Russian-armed separatist militias, and &#8220;little green men&#8221;—widely known to be Russian troops in unmarked uniforms continue to <a href="http://globalsecurityreview.com/russias-plausible-deniability-in-the-hybrid-war-in-ukraine/">wage war against the Ukrainian armed forces</a> in the Donbass and Donetsk regions of eastern Ukraine.</p>
<p><figure id="attachment_1960" aria-describedby="caption-attachment-1960" style="width: 1200px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-1960 size-full" src="http://globalsecurityreview.com/wp-content/uploads/2017/09/ukrainemap.jpeg" alt="ukraine_russia_civil_war" width="1200" height="738" srcset="https://globalsecurityreview.com/wp-content/uploads/2017/09/ukrainemap.jpeg 1200w, https://globalsecurityreview.com/wp-content/uploads/2017/09/ukrainemap-300x185.jpeg 300w, https://globalsecurityreview.com/wp-content/uploads/2017/09/ukrainemap-768x472.jpeg 768w, https://globalsecurityreview.com/wp-content/uploads/2017/09/ukrainemap-1024x630.jpeg 1024w" sizes="(max-width: 1200px) 100vw, 1200px" /><figcaption id="caption-attachment-1960" class="wp-caption-text">Donetsk and Luhansk are part of a land bridge that separates Crimea and Russia. The only problem for Russia is separatist-claimed Donetsk and Luhansk are separated by hundreds of miles of Ukrainian territory. This is an area of concern.</figcaption></figure></p>
<p>The campaign detailed in the alleged Surkov emails would increase <a href="http://globalsecurityreview.com/hybrid-and-non-linear-warfare-systematically-erases-the-divide-between-war-peace/">non-kinetic tactics</a>—i.e. active measures (subversion, <em>kompromat</em>, propaganda, economic influence)—that would bolster support for Russian interests in Kiev. If more pro-Russia or &#8220;separatist&#8221; politicians were elected to the Ukrainian parliament,  Russia&#8217;s influence would undoubtedly increase exponentially, allowing it to &#8220;de-escalate&#8221; the conflict on its terms.</p>
<p>Oleksandr Tkachuk, the chief of staff to the Head of the Security Service of Ukraine (the SBU), said on Television Tuesday that after a thorough examination by experts, Ukraine&#8217;s intelligence services believe the emails to be authentic.  At the time, Tkachuk reiterated that the SBU only has access to documents that were released to the public and does not have any connections with CyberJunta or related hacker groups.</p>
<p>The Ukrainian presidential administration and the SBU declined requests for comment from domestic and international media regarding the alleged hack. Kremlin spokesman Dmitry Peskov denied Surkov&#8217;s participation in any Russian plot to further destabilize in Ukraine and insisted that the documents released by the hacking group were forgeries.</p>
<h3>Analysis: Kremlin Timeline Coincides with Political Disorder and Confusion in Post-Election U.S.</h3>
<p>The leaked documents allege that the optimum time to proceed with the initiative was from November of 2016 through to March of 2017. Just as the United States&#8217; presidential election was ending. In hindsight, one can note that this timetable perfectly coincided with increased dysfunction and divisions within the United States government.</p>
<p>This may indicate that senior Kremlin officials were <a href="http://globalsecurityreview.com/series/second-cold-war/">anticipating a U.S. government in chaos</a>, distracted by domestic issues and by the well-documented Russian-directed disinformation campaigns and cyber operations designed to damage the integrity of the United States&#8217; democratic process and institutions. Surkov was—at the time—confident in the detrimental effect Russia&#8217;s interference would have on the U.S. political system, and in the U.S.&#8217;s ability to deter normalization in Ukraine that would favor Russia&#8217;s interests.</p>
<p><a href="https://globalsecurityreview.com/top-putin-aides-hacked-emails-reveal-secret-plan-invade-ukraine/">Top Putin Aide&#8217;s Hacked Emails Reveal Secret Plan to Invade Ukraine</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>European Union Extends Arms Embargo Against Belarus</title>
		<link>https://globalsecurityreview.com/european-union-extends-arms-embargo-against-belarus/</link>
		
		<dc:creator><![CDATA[Gabriella Gricius]]></dc:creator>
		<pubDate>Mon, 12 Mar 2018 11:32:31 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Belarus]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[Hungary]]></category>
		<category><![CDATA[Russia]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=6291</guid>

					<description><![CDATA[<p>On February 14, 2018, European Union officials voted to extend the EU arms embargo against Belarus for another year. These measures include “an arms embargo, ban on the export of goods for internal repression and an asset freeze and travel ban against four people.” An exception was made for small caliber sports guns due to [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/european-union-extends-arms-embargo-against-belarus/">European Union Extends Arms Embargo Against Belarus</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>On February 14, 2018, European Union officials voted to extend the EU arms embargo against Belarus for another year. These measures include “<a href="http://www.consilium.europa.eu/en/press/press-releases/2018/02/23/belarus-eu-prolongs-arms-embargo-and-sanctions-against-4-individuals-for-one-year/?utm_source=dsms-auto&amp;utm_medium=email&amp;utm_campaign=Belarus%253A%2520EU%2520prolongs%2520arms%2520embargo%2520and%2520sanctions%2520against%25204%2520individuals%2520for%2520one%2520year">an arms embargo, ban on the export of goods for internal repression and an asset freeze and travel ban against four people</a>.” An exception was made for small caliber sports guns due to support for the measure from Hungary and Slovakia.</p>
<p>Earlier in the negotiation process, <a href="https://www.rferl.org/a/eu-extends-belarus-arms-ban-exception/29039503.html">Radio Free Europe reported</a> that Hungary additionally wanted to include helicopter spare parts to the exemption list along with biathlon rifles and small caliber sports guns. However, this was later taken off the table. With these two exceptions, both Hungary along with Slovakia see the potential for the small arms market in Belarus. Sports hunting is popular in the post-Soviet country; both small caliber guns and biathlon rifles are popularly used.</p>
<h3>Why the embargo?</h3>
<p>The arms embargo was initially announced in 2011 after Belarusian officials initiated a violent crackdown on protestors in the 2010 presidential election. This election brought Belarusian President Alexander Lukashenko another term in office, an office he held which he’s <a href="https://www.neweurope.eu/article/eu-extends-arms-embargo-belarus/">held since 1993.</a> Four Belarusian companies had their assets frozen and access to EU visas restricted. Also, 174 individuals, including President Lukashenko, were sanctioned.</p>
<p>EU-Belarusian relations were somewhat tarred with the feathers of human rights violations, and the rule of law violations and a lack of press freedom. That all began to change in 2015 when Belarus <a href="http://www.bbc.com/news/world-europe-34674183">released the country’s final remaining six political prisoners</a>. Why bother? As a dictator, what could motivate Lukashenko to don a mantle of European civility?</p>
<p>The answer is Russian leverage. Lukashenko was under pressure to allow a Russian airbase to be constructed in Belarus. In the background of this Russian move towards a more concrete show of their power was the fear of NATO beginning to reach eastward. Rather than agree with Russia, however, Lukashenko believed that the construction of such a base would exacerbate tensions. So, when Belarus began to court the European Union, the reasoning was not so difficult to understand.</p>
<p>Two years ago, in February of 2016, the EU removed four companies and 170 individuals from the sanctions list, leaving four individuals remaining. The rationale given was that the human rights situation in Belarus had improved. However, the four individuals remain on the sanctions list. The EU claims that these four individuals played roles in the unresolved political disappearances of four Belarusians in 1999-2000. They consisted of opposition politicians Yuri Zakharanka and Viktar Hanchar, businessman Anatol Krasouski and journalist Dzmitry Zavadski.</p>
<p>So, <a href="http://belsat.eu/en/news/eu-prolongs-arms-embargo-against-belarus-and-sanctions-against-four-individuals/">who is still sanctioned</a>?</p>
<ul>
<li>Former Interior Minister Uladzimir Naumau</li>
<li>Former Head of the Presidential Administration Viktor Sheiman</li>
<li>Former Head of the Ministry of Internal Affairs Yury Sivakou</li>
<li>And Former Commander of the Special Forces Brigade of the Interior Ministry Dzmitry Paulichenka</li>
</ul>
<p>It’s an interesting list—particularly given that Uladzimir Naumau, Dzmitry Paulichenka, and Yury Sheiman are also included on the list of sanctions in the United States. Though given their role in the earlier repressive steps taken by the Belarusian government, it&#8217;s not surprising. Their continued lack of ability to travel to Europe and the United States as well as their overseas assets being frozen is business as usual.</p>
<p>The arms embargo today is more a symbolic statement, a sign that the European Union is promoting democracy and human rights, even in countries with which they share a border. But if the tendency to add more and more exceptions continues to grow—it won’t be surprising if all that remains is the four individuals associated with political disappearances. After all, more often than not, economic gains rates higher on the scale of political choice than the idealistic urges of human rights advocates.</p>
<p><a href="https://globalsecurityreview.com/european-union-extends-arms-embargo-against-belarus/">European Union Extends Arms Embargo Against Belarus</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Russia Poised to Challenge U.S. &#038; NATO Allies for Military Dominance</title>
		<link>https://globalsecurityreview.com/russia-poised-to-challenge-us-for-military-dominance/</link>
		
		<dc:creator><![CDATA[Jeff Seldin]]></dc:creator>
		<pubDate>Fri, 09 Mar 2018 14:30:58 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=6245</guid>

					<description><![CDATA[<p>Russia’s campaign to modernize and strengthen its armed forces is increasingly putting U.S. and European forces at risk, with some defense officials raising concerns Moscow’s military soon could challenge the U.S. and its allies for dominance across the continent. Most of the focus in recent weeks has been on Russia’s newfound confidence in its nuclear [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/russia-poised-to-challenge-us-for-military-dominance/">Russia Poised to Challenge U.S. &#038; NATO Allies for Military Dominance</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Russia’s campaign to modernize and strengthen its armed forces is increasingly putting U.S. and European forces at risk, with some defense officials raising concerns Moscow’s military soon could challenge the U.S. and its allies for dominance across the continent.</p>
<p>Most of the focus in recent weeks has been on Russia’s newfound confidence in its nuclear arsenal after President Vladimir Putin boasted about four new delivery systems designed to make U.S. defenses “useless.”</p>
<p>Of equal concern to U.S. and European officials, however, is Russia’s remade conventional military might, which has been displayed and tested in places like Ukraine and Syria.</p>
<p>“Russia’s increasingly modernized military is operating at levels not seen since the Cold War,” the commander of U.S. forces in Europe, Gen. Curtis Scaparrotti, told lawmakers in Washington, Thursday, warning the U.S. has no choice but to keep pace.</p>
<p>“Given their [Russia’s] modernization and the pace that it’s on, and what we are aware of they’re doing, we have to maintain our modernization so we can remain dominant in the areas that we are dominant today,” he said.</p>
<h3>Dominance possible by 2025 or sooner</h3>
<p>Scaparrotti, who also serves as NATO’s Supreme Allied Commander, further underscored that any failure by Washington to continue to modernize its forces could enable Russia to challenge the U.S. “in almost every domain, in a military perspective, by 2025.”</p>
<p>In some areas, like the Arctic, Russian dominance could come even sooner, Scaparrotti said, estimating Moscow could exert control over northern routes there in as little as two to three years.</p>
<p>The U.S. and NATO are not alone in their concern.</p>
<p>A <a class="wsw__a" href="https://www.rand.org/pubs/research_reports/RR2080.html" target="_blank" rel="noopener noreferrer">new report by the Rand Corporation concludes Eastern Europe</a> is especially vulnerable, warning NATO ground forces there would be “badly outnumbered and outgunned” if Moscow were to launch a conventional attack.</p>
<p>“Russia would have a substantial time-distance advantage in the initial days and weeks of its ground campaign because of its strong starting position,” the report states.</p>
<p>It also determined Russia forces would benefit from a strategy “that emphasizes mobility and repower and trains to conduct larger-scale operations, strengthening Russia’s ability to engage in conflicts between mechanized forces close to its border.”</p>
<h3>More tanks, troops</h3>
<p>According to the report, while Russia has about 78,000 troops along Europe’s eastern flank, NATO has 32,000. Russian tanks also outnumber NATO tanks 757 to 129.</p>
<p>Questioned by members of the Senate Armed Services Committee Thursday, Scaparrotti pushed back against some of those concerns, noting any potential conflict would not be fought with ground forces and tanks alone.</p>
<p>There also are some doubts about the likelihood Russia would try to engage in such a conflict.</p>
<p>The <a class="wsw__a" href="https://www.valisluureamet.ee/pdf/raport-2018-ENG-web.pdf" target="_blank" rel="noopener noreferrer">Estonian Foreign Intelligence Service asserts in a report</a> earlier this year the threat of a direct Russian military attack in 2018 “is low.”</p>
<p>Still, the Estonian report cautioned that Russian forces along Europe’s eastern flank and the Baltics “have consistently strengthened their presence in the region with the most modern weapon systems as well as the establishment of new units and commands.”</p>
<p>Equally concerning to U.S. and European military and intelligence officials is Russia’s ongoing influence campaign — part of what Scaparrotti describes as Moscow’s “whole of society approach” that can soften up potential targets well in advance of any use of force.</p>
<p>“It can really undermine a nation because all they have to do is sow some confusion,” he said. “It’s subtle but it’s constant.”</p>
<h3>Every aspect of Europe</h3>
<p>The commander of U.S. forces in Europe also expressed concern that Washington may not be doing enough to counter Russia, questioning whether there is “an effective unification across the interagency, with the energy and the focus that we could attain,” despite reinforcing the military’s cyber operations across Europe.</p>
<p>“They’re involved in just about every aspect of Europe in one way or the other,” Scaparrotti said, pointing to the Balkans, and Serbia, in southeastern Europe, as a particular area of concern.</p>
<p>“Russia’s at work in the Balkans, and I think we’ve kind of taken our eye off of the area,” he warned. “I’ve seen an increase in the year and a half I’ve been on the job.”</p>
<div class="wsw">
<p>Russia, which has religious and historical ties to Serbia, has long objected to efforts by other Balkan nations to move closer to the West, including NATO’s acceptance of Montenegro as a full member this past June.</p>
<p>Following Russia’s invasion of Ukraine, the U.S. began deploying additional rotational forces to Europe as part as its European Deterrence Initiative.</p>
<p>For fiscal 2019, the Pentagon is planning to boost spending on those forces to $6.5 billion, an increase of nearly $2 billion.</p>
</div>
<p><a href="https://globalsecurityreview.com/russia-poised-to-challenge-us-for-military-dominance/">Russia Poised to Challenge U.S. &#038; NATO Allies for Military Dominance</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>U.S. Lacks Strategy to Combat Foreign Interference in 2018</title>
		<link>https://globalsecurityreview.com/u-s-lacks-strategy-to-combat-foreign-interference-in-2018/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Wed, 07 Mar 2018 13:53:10 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=6211</guid>

					<description><![CDATA[<p>The U.S. lacks a strategy to combat Russian interference, as China is rapidly expanding its foreign influence efforts. On March 6, The U.S. Director of National Intelligence told a Senate Armed Services Committee hearing on worldwide threats that the U.S. government is lacking in any &#8220;coherent strategy&#8221; to defend the against Russian interference in the [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/u-s-lacks-strategy-to-combat-foreign-interference-in-2018/">U.S. Lacks Strategy to Combat Foreign Interference in 2018</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The U.S. lacks a strategy to combat Russian interference, as China is rapidly expanding its foreign influence efforts.</h2>
<p>On March 6, The U.S. Director of National Intelligence told a Senate Armed Services Committee hearing on worldwide threats that the U.S. government is lacking in any &#8220;coherent strategy&#8221; to defend the against Russian interference in the 2018 midterm elections.</p>
<p>The U.S. intelligence chief added that it is &#8220;highly likely&#8221; that Russia will engage in a efforts to interfere in the upcoming elections just as it did in the 2016 presidential election.</p>
<p>Coats told the Senate Armed Services Committee hearing on worldwide threats that several U.S. agencies are &#8220;well aware&#8221; of the need for the government to guard against Russian election interference in the United States.</p>
<p>When asked why the U.S. was lacking in a strategy to combat interference from Russia, he answered that he didn&#8217;t have an answer to the question. &#8220;We understand it has to be addressed,&#8221; Coats said. &#8220;I don&#8217;t have a specific answer to your question.&#8221;</p>
<p>Coats stated that, as of March 2018, the U.S. has &#8220;not seen evidence of a robust effort yet on the part of Russia, but we know their malign activities continue to exist. It&#8217;s highly likely that they will be doing something. We just don&#8217;t know how much and when and where.&#8221;</p>
<p>Russia has repeatedly denied engaging in any interference in the U.S. election. However, the U.S. intelligence community has assessed with high confidence that the interference campaign was personally ordered by Russian President Vladimir Putin.</p>
<p>The Director of National Intelligence told Senate Armed Services Committee members that intelligence agencies &#8220;assess that Russia is likely to continue to pursue even more aggressive cyber attacks with the intent of degrading our democratic values and weakening our alliances. Persistent and disruptive cyber and influence operations will continue against the United States and European countries and other allies.&#8221; He added that Russia will be &#8220;using elections as opportunities to undermine democracy, sow discord and undermine our values.&#8221;</p>
<p>&#8220;Russia perceives its past efforts as successful and views the 2018 U.S. midterm elections as a potential target. We continue to see Russian activities designed to exacerbate social and political figures in the United States,&#8221; Coats said. &#8220;In the next year, we assess Russia will continue to use propaganda, social media, false flag personas, sympathetic spokesmen and other means of influence to try to build on its wide range of disruptive operations.”</p>
<h3>China is Increasing Its Foreign Influence Spending</h3>
<p>In the same Senate Armed Services Committee hearing, Coats revealed that China is spending “an extraordinary amount of money” to increase its international standing, heightening tensions with its neighbors and threatening U.S. influence around the world.</p>
<p>“A report was recently released, an unclassified version, that China will spend about $8 billion in 68 different nations establishing its geostrategic positioning, not only for economic purposes and trade purposes, but also for use of military facilities,” Coats told the committee.</p>
<p><span style="text-transform: initial">Earlier this month, China unveiled the largest defense spending increase in three years, targeting growth of 8.1 percent this year, in order to fuel an ambitious program to modernize its military.</span></p>
<p>The Trump administration has put forth the largest proposed military budget since 2011, centered on improving U.S. nuclear defenses and countering the growing influence and ambitions of China and Russia.</p>
<p><a href="https://globalsecurityreview.com/u-s-lacks-strategy-to-combat-foreign-interference-in-2018/">U.S. Lacks Strategy to Combat Foreign Interference in 2018</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>U.S. Aircraft Carrier Visits Vietnamese Port for First Time Since Vietnam War</title>
		<link>https://globalsecurityreview.com/u-s-aircraft-carrier-visits-vietnam-first-time-since-vietnam-war/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Tue, 06 Mar 2018 11:00:32 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Vietnam]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=6201</guid>

					<description><![CDATA[<p>A U.S. Navy aircraft carrier has visited a Vietnamese port for the first time since the end of the Vietnam War in 1975. The visit is seen as a sign of both countries&#8217; efforts to contest Chinese expansionism in the South China Sea. The USS Carl Vinson, a nuclear-powered aircraft carrier with a crew of around [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/u-s-aircraft-carrier-visits-vietnam-first-time-since-vietnam-war/">U.S. Aircraft Carrier Visits Vietnamese Port for First Time Since Vietnam War</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>A U.S. Navy aircraft carrier has visited a Vietnamese port for the first time since the end of the Vietnam War in 1975.</h2>
<p>The visit is seen as a sign of both countries&#8217; efforts to contest Chinese expansionism in the South China Sea. The USS Carl Vinson, a nuclear-powered aircraft carrier with a crew of around 5,500 anchored off the central Vietnamese port city of Danang Monday for a five-day visit from March 5-9.</p>
<p>This is the first time a U.S. aircraft carrier has made a port call to Vietnam after the end of the Vietnamese War. Previously, however, smaller U.S. warships like the USS Frank Cable, a submarine tender, and the USS John S. McCain, visited Vietnam as ties between the former enemies have improved.</p>
<h3>The visit sends a message to China.</h3>
<p>The USS Carl Vinson’s visit comes as Vietnam’s northern neighbor China is embarking on a significant military buildup in the Parcel islands, which are claimed by Vietnam.</p>
<p>Furthermore, China has constructed seven artificial islands in the Spratlys territory, a region of the South China Sea that is also claimed by Vietnam.</p>
<p>Vietnamese envoys have reportedly been working to ameliorate Chinese concerns over the carrier visit alongside the prospect of broader military cooperation between Vietnam and the U.S.</p>
<p>The USS Carl Vinson is accompanied by a carrier battle group which includes the guided-missile destroyer, USS Michael Murphy. The group of ships is planning to sail through areas of the South China Sea that are claimed by China later in the month.</p>
<h3>How will China respond?</h3>
<p>In a statement, the U.S. Navy said that the carrier battle group is “promoting freedom of the seas and enhancing regional security.” China is likely to heighten its militarization efforts as a response, by accelerating island development or deploying fighter planes to the region.</p>
<p>China claims approximately 90 percent of the 2.17 million-square-mile (3.5 million square kilometers) South China Sea. These claims are contested by Brunei, Malaysia, the Philippines, Taiwan, and Vietnam.</p>
<p>While the U.S. doesn&#8217;t claim territory in the South China Sea, it conducts regular “freedom of navigation” exercises in the region to ensure shipping lanes remain open and free for commercial use. Under the Trump administration, the U.S. has conducted “freedom of navigation” exercises approximately once every two months.</p>
<p><a href="https://globalsecurityreview.com/u-s-aircraft-carrier-visits-vietnam-first-time-since-vietnam-war/">U.S. Aircraft Carrier Visits Vietnamese Port for First Time Since Vietnam War</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Special Counsel Charges Russian Nationals Involved in U.S. Elections Interference</title>
		<link>https://globalsecurityreview.com/special-counsel-charges-russian-nationals-involved-in-u-s-elections-interference/</link>
		
		<dc:creator><![CDATA[GSR Staff]]></dc:creator>
		<pubDate>Fri, 16 Feb 2018 21:54:42 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=6052</guid>

					<description><![CDATA[<p>The office of Special Counsel Robert Mueller has announced the indictment of 13 Russian nationals for their involvement in influence operations targeting the United States. A federal grand jury investigating Russian meddling in the 2016 election on Friday indicted 13 Russian nationals including 12 employees of a St. Petersburg, Russia-based organization that carries out online [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/special-counsel-charges-russian-nationals-involved-in-u-s-elections-interference/">Special Counsel Charges Russian Nationals Involved in U.S. Elections Interference</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The office of Special Counsel Robert Mueller has announced the indictment of 13 Russian nationals for their involvement in influence operations targeting the United States.</h2>
<p>A federal grand jury investigating Russian meddling in the 2016 election on Friday <a href="https://www.justice.gov/sco">indicted 13 Russian nationals</a> including 12 employees of a St. Petersburg, Russia-based organization that carries out online influence operations on behalf of the Russian government.<br />
<iframe src="https://www.voanews.com/embed/player/0/4258002.html?type=video" width="500" height="" frameborder="0" scrolling="no" align="“center”" allowfullscreen="allowfullscreen"></iframe><br />
The indictment alleges that the Internet Research Agency, a propaganda outlet tied to the Kremlin, engaged “in operations to interfere with elections and political processes” during the 2016 U.S. presidential elections.</p>
<p>The indictment accuses the organization&#8217;s employees of carrying out “interference operations targeting the United States” from 2014 to the present, according to the indictment.</p>
<p>The goal of these information operations was to &#8220;promote discord in the United States to undermine public confidence in democracy,&#8221; said Deputy Attorney General Rod Rosenstein on Friday. &#8220;We must not allow them to succeed.&#8221;</p>
<p>The indictment alleges that the defendants and their co-conspirators began to study and track groups of U.S. citizens on social media sites dedicated to discussion of U.S. politics and other social issues as early as 2014.</p>
<p>To measure the performance of these various social media groups, operatives of the Internet Research Agency tracked certain statistics like the size of a given group, the frequency of content published, and the level of audience engagement with a given piece of content, such as the number of comments, shares, or likes a social media post received.</p>
<h3>What does the special counsel&#8217;s indictment reveal?</h3>
<p>In 2016, the accused allegedly posed as U.S. individuals and made contact with several U.S. political and social activists. The indictement gives an example of how the defendants, in June 2016, communicated with a U.S. citizen affiliated with a grassroots political organization based in Texas. It was in this interchange that the Internet Research Agency operatives learned that they should concentrate their information operations on &#8220;purple states,&#8221; like Florida, Colorado, and Virginia.</p>
<p>The indictment states that it was after this exchange that &#8220;defendants and their co-conspirators commonly referred to targeting &#8216;purple states&#8217; in directing their efforts.</p>
<p>The indictments were announced by the office of Special Counsel Robert Mueller’s.</p>
<p>Mueller’s expansive investigation into Russian election interference has led to the indictments of former Trump campaign chairman Paul Manafort and his associate Rick Gates III.</p>
<p>Former Trump national security adviser Michael Flynn and former campaign foreign policy adviser George Papadopoulos have pleaded guilty to lying to the FBI about their contacts with Russian officials during the campaign and the transition. Both are now acting as cooperating witnesses in the special counsel&#8217;s investigation.</p>
<p><a href="https://globalsecurityreview.com/special-counsel-charges-russian-nationals-involved-in-u-s-elections-interference/">Special Counsel Charges Russian Nationals Involved in U.S. Elections Interference</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Russia Presented an Ultimatum to Kurdish Authorities in Syria Before Turkish Assault</title>
		<link>https://globalsecurityreview.com/russia-issued-ultimatum-to-kurdish-forces-in-syria-before-turkeys-assault/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Thu, 15 Feb 2018 14:00:07 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[Turkey]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=3674</guid>

					<description><![CDATA[<p>Turkish ground offensive into Kurdish-controlled Syrian region of Afrin targets forces backed by the U.S. Turkey&#8217;s military offensive into the northwestern enclave of Afrin launched Saturday, amid anger at a U.S. decision to form a 30,000-strong border security force for Syria. Russia relocated military personnel and military police officers from the Syrian region Afrin where [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/russia-issued-ultimatum-to-kurdish-forces-in-syria-before-turkeys-assault/">Russia Presented an Ultimatum to Kurdish Authorities in Syria Before Turkish Assault</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Turkish ground offensive into Kurdish-controlled Syrian region of Afrin targets forces backed by the U.S.</h2>
<p class="selectionShareable">Turkey&#8217;s military offensive into the northwestern enclave of Afrin launched Saturday, amid anger at a U.S. decision to form a 30,000-strong border security force for Syria.</p>
<p class="selectionShareable">Russia relocated military personnel and military police officers from the Syrian region Afrin where Turkish military operations have initiated against Kurdish forces, according to the Russian Ministry of Defense.</p>
<p class="selectionShareable">A report published by Reuters stated that the Chief of the General Staff of the Russian military, Valery Gerasimov, and his counterpart in the U.S., Chairman of the Joint Chiefs of Staff Joseph Dunford, discussed the situation in Syria via telephone.</p>
<p class="selectionShareable">The report cited Russia&#8217;s Defense Ministry and disclosed no details of the call. The alleged conversation took place after Turkish President Recep Tayyip Erdoğan announced on that the Turkish military had begun an offensive ground operation in Syria&#8217;s Kurdish-controlled Afrin region.</p>
<h3>Turkey&#8217;s actions in Syria come at a low point in the U.S.-Turkey relationship.</h3>
<p class="selectionShareable">The United States backs the Kurdish forces in Syria, which were instrumental in the U.S. campaign against ISIS. Turkey initiated the in the aftermath of a cross-border shelling by artillery units of the Turkish army.</p>
<p class="selectionShareable">The Turkish air force has conducted air raids in support of ground forces in Afrin, while the Free Syrian Army (FSA) has also engaged Kurdish fighters in the region. U.S. support of  Kurdish militia groups in Syria—groups Turkey considers to be terrorists—has contributed to a widening division between the two NATO allies.</p>
<p class="selectionShareable">Turkey, for its part, has accused the U.S. of supporting an attempted military coup against the Turkish government in 2015 and, despite being a NATO member, has moved to align itself closer to Russia by signing defense agreements with the country.</p>
<p class="selectionShareable">Turkey&#8217;s President Erdogan has used the coup in justification of his rapid consolidation of power which has decreased the influence of Turkey&#8217;s democratic and secular institutions. The U.S. uses the Incirlik Air Base in Turkey as a central hub for regional operations, and also stations several adjustable-yield B-61 nuclear bombs there.</p>
<h3>Russian officials issued Kurdish authorities in Afrin with an ultimatum on behalf of Syrian government</h3>
<p>Russian military officials proposed handing over the Kurdish-controlled region in Syria&#8217;s northwest to the Syrian government to avert a Turkish military offensive, according to Kurdish officials cited in a report published by the Associated Press.</p>
<p>Russian officials reportedly suggested to Kurdish leaders that they cede administration and control of Afrin to the Syrian government. The Russians said that in doing so, the Kurds would avoid a military offensive from Turkey.</p>
<p>Ilham Ahmed, a senior Kurdish official who was named in the report, stated that Russia gave Kurdish authorities in Afrin a choice: hand control over to the Syrian government or face a Turkish military offensive.</p>
<p>All Kurdish officials cited in the AP&#8217;s report refused the Russian-initiated proposal, vowing to resist an attack from Turkey. Geographically, Afrin is surrounded by territory controlled by Syrian government forces and militia groups backed by Turkey.</p>
<p><a href="https://globalsecurityreview.com/russia-issued-ultimatum-to-kurdish-forces-in-syria-before-turkeys-assault/">Russia Presented an Ultimatum to Kurdish Authorities in Syria Before Turkish Assault</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Major Israeli Air Strikes Target Iranian and Syrian Military Installations</title>
		<link>https://globalsecurityreview.com/major-israeli-air-strikes-target-iranian-syrian-military-installations/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Sun, 11 Feb 2018 17:27:20 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=4309</guid>

					<description><![CDATA[<p>Israeli air strikes against Iranian and Syrian targets are the most significant since the Syrian civil war began—raising fears of escalation and war. The Israeli military says its air force destroyed 12 Iranian and Syrian positions in Syria, including command centers and missile defense installations. Israeli jets carried out air strikes against Iranian targets in [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/major-israeli-air-strikes-target-iranian-syrian-military-installations/">Major Israeli Air Strikes Target Iranian and Syrian Military Installations</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Israeli air strikes against Iranian and Syrian targets are the most significant since the Syrian civil war began—raising fears of escalation and war.</h2>
<p>The Israeli military says its air force destroyed 12 Iranian and Syrian positions in Syria, including command centers and missile defense installations.</p>
<p>Israeli jets carried out air strikes against Iranian targets in Syria after an Iranian drone was shot down near the Israel-Syria border.</p>
<p>Israeli army officials said that the Iranian drone did not cross into Israel by accident, but have not provided more details on the drone&#8217;s mission or whether it drone was armed.  Iran has denied that it was operating any such drone.</p>
<p>An Israeli F-16 fighter jet was shot down by Syria air defenses during the offensive. The jet crashed in northern Israel after its pilots ejected from the plane. It is believed to be the first time Israel has lost a jet in combat since 2006.</p>
<p>&#8220;Our preliminary understanding is that the plane crashed due to a ground-to-air missile,&#8221; Israeli military spokesperson Lieutenant-Colonel Jonathan Cornicus said on Sunday.</p>
<p>Israel then launched a second wave of airstrikes on both Syrian and Iranian military targets in Syria.</p>
<p>The Israeli military said it had inflicted critical damage on targets in Syria in the &#8220;most significant attack&#8221; of its kind against the country since the 1982 Lebanon war.</p>
<p>Syria&#8217;s state media reported that Syrian air defense opened fire in response to an Israeli attack on a military base, hitting more than one plane.</p>
<p>&nbsp;</p>
<p>Israeli Prime Minister Benjamin Netanyahu warned that Israel&#8217;s policy to defend itself against &#8220;any attempt to harm our sovereignty&#8221; was &#8220;absolutely clear&#8221;.</p>
<h3>The International Response</h3>
<p>The U.S. Defense Department issued a statement saying that Israel maintains the right to protect itself against acts of aggression.</p>
<p>&#8220;Israel is our closest security partner in the region, and we fully support Israel&#8217;s inherent right to defend itself against threats to its territory and its people,&#8221; said Pentagon spokesman Adrian Rankine-Galloway.</p>
<p>The U.S. State Department later released a statement saying, &#8220;The United States is deeply concerned about today&#8217;s escalation of violence over Israel&#8217;s border and strongly supports Israel&#8217;s sovereign right to defend itself.&#8221;</p>
<p>Mr. Netanyahu stated that Israel would continue its policy of harsh retaliation for any violation of its sovereignty and security.</p>
<p>“We have made it unequivocally clear,” he said, Israel “will strike back at every attempt to strike at us,” he said.</p>
<p>The air strikes are Israel&#8217;s most significant air assault within Syria since the beginning of the Syrian civil war, hitting eight Syrian military sites and four targets the Israeli military said were Iranian installations.</p>
<p>Israel&#8217;s actions have raised concerns in Russia, which is supporting the Syrian government along with Iran.</p>
<p>&#8220;The creation of any threat to the lives and safety of Russian military servicemen currently in Syria on the invitation of its lawful government to help fight terrorists is absolutely unacceptable,&#8221; a statement issued by the Russian Foreign Ministry read.</p>
<p>Prime Minister Netanyahu said that he spoke with Russian President Vladimir Putin and reiterated Israel&#8217;s &#8220;right and obligation to defend [itself].&#8221; Netanyahu and Putin have reportedly agreed that military cooperation between Israel and Russia would continue.</p>
<p><a href="https://globalsecurityreview.com/major-israeli-air-strikes-target-iranian-syrian-military-installations/">Major Israeli Air Strikes Target Iranian and Syrian Military Installations</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Geopolitical Hotspots: The World in 2018</title>
		<link>https://globalsecurityreview.com/the-world-in-2018/</link>
		
		<dc:creator><![CDATA[James M. Lindsay]]></dc:creator>
		<pubDate>Sat, 10 Feb 2018 07:00:02 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Venezuela]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=3438</guid>

					<description><![CDATA[<p>Two thousand seventeen had its fair share of big news stories. The same will be true of 2018. Some of those stories undoubtedly will be a surprise. Not many experts were warning a year ago of an impending ethnic cleansing of the Rohingya in Myanmar. Yet it (sadly) became one of the biggest news stories [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-world-in-2018/">Geopolitical Hotspots: The World in 2018</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span class="dropcap dropcap-simple">T</span>wo thousand seventeen had its fair share of <a href="https://www.cfr.org/blog/ten-most-significant-world-events-2017">big news stories</a>. The same will be <a href="https://www.cfr.org/report/preventive-priorities-survey-2018">true of 2018</a>. Some of those stories undoubtedly will be a surprise. Not many experts <a href="https://www.cfr.org/report/preventive-priorities-survey-2017">were warning</a> a year ago of an impending <a href="https://www.cfr.org/backgrounder/rohingya-crisis">ethnic cleansing of the Rohingya in Myanmar</a>. Yet it (sadly) became one of the biggest news stories of 2017. Maybe a year from now everyone will be talking about <a title="Egypt’s insurgency" href="https://www.nytimes.com/2017/11/24/opinion/egypt-mosque-attack-sinai.html?_r=0" rel="noopener">Egypt’s insurgency</a> and a <a title="new financial crisis in the European Union (EU)" href="https://www.nytimes.com/2016/11/20/business/dealbook/italys-banks-are-in-a-slow-motion-crisis-and-europe-may-pay.html?_r=0" rel="noopener">new financial crisis in the European Union (EU)</a>. Or maybe not. As <a title="Yogi Berra" href="https://www.goodreads.com/quotes/261863-it-s-tough-to-make-predictions-especially-about-the-future" rel="noopener">Yogi Berra</a> apparently <a title="didn’t say" href="https://quoteinvestigator.com/2013/10/20/no-predict/" rel="noopener">didn’t say</a>, “It’s hard to make predictions, especially about the future.” But a fair number of significant world events are ones we know are coming—call them the “<a title="known knowns" href="https://www.theatlantic.com/politics/archive/2014/03/rumsfelds-knowns-and-unknowns-the-intellectual-history-of-a-quip/359719/" rel="noopener">known knowns</a>.” Here are seven known stories to follow closely in 2018. Any one of them could turn into the dominant news event of the year—or fade completely away. We’ll know in twelve months which will sizzle and which will fizzle.</p>
<h3>Iran’s Bid for Regional Hegemony.</h3>
<p>Iranian leaders must be pleased with how 2017 played out. Syrian President <a title="Bashar al-Assad" href="https://www.biography.com/people/bashar-al-assad-20878575" rel="noopener">Bashar al-Assad</a> looks to be securely in power in Damascus. Ditto <a title="Hezbollah in Lebanon" href="http://www.bbc.com/news/world-middle-east-10814698" rel="noopener">Hezbollah in Lebanon</a>. The Islamic State <a title="lost much of its territory" href="http://www.businessinsider.com/isis-is-on-the-run-caliphate-land-lost-2017-11" rel="noopener">lost much of its territory</a>. The Iraqi government <a title="retook the oil-rich city of Kirkuk" href="https://www.al-monitor.com/pulse/originals/2017/10/iran-kirkuk-recapture-soleimani-quds-force-eqbalpour.html" rel="noopener">retook the oil-rich city of Kirkuk</a>. Houthi rebels have Saudi Arabia bogged down in a <a title="quagmire in Yemen" href="http://www.middleeasteye.net/columns/salehs-death-has-dealt-blow-saudi-exit-yemen-quagmire-466301294" rel="noopener">quagmire in Yemen</a>. Iranian involvement figures <a title="prominently" href="https://www.al-monitor.com/pulse/originals/2017/08/iran-saudi-arabia-war-yemen-houthis-outflanking.html" rel="noopener">prominently</a> in all of <a title="these developments" href="https://www.nbcnews.com/news/mideast/iranian-general-helped-iraqis-seize-kirkuk-u-s-allies-n811026" rel="noopener">these developments</a>, which has <a title="entrenched Iranian influence" href="https://www.washingtontimes.com/news/2017/dec/5/irans-shiite-crescent-across-middle-east-nearly-bu/" rel="noopener">entrenched Iranian influence</a> across the region. But this success is not Tehran’s doing alone. Saudi Arabia’s <a title="foreign policy missteps" href="http://carnegieendowment.org/2017/11/09/reckoning-in-saudi-arabia-pub-74713" rel="noopener">foreign policy missteps</a> have helped as well. Besides its ill-considered Yemen adventure, Riyadh led the effort to <a title="embargo Qatar" href="http://www.bbc.com/news/world-middle-east-40173757" rel="noopener">embargo Qatar</a> for its alleged pro-Iranian sympathies and support for terrorism.</p>
<p>That has pushed Qatar <a title="closer to Tehran" href="https://www.forbes.com/sites/dominicdudley/2017/11/27/qatar-pushed-into-arms-of-iran-by-saudi/#30219e3f7c4f" rel="noopener">closer to Tehran</a> and created <a title="a diplomatic headache" href="https://www.pbs.org/newshour/world/qatar-gulf-split-means-splitting-headache-u-s" rel="noopener">a diplomatic headache</a> for Washington. (Qatar hosts the <a title="largest U.S. airbase in the Middle East" href="http://www.cnn.com/2017/06/05/middleeast/qatar-us-largest-base-in-mideast/index.html" rel="noopener">largest U.S. airbase in the Middle East</a>.) Still, Saudi Arabia likely <a title="retains President Donald Trump’s ear" href="https://www.nytimes.com/2017/11/05/world/middleeast/saudi-arabia-arrests.html" rel="noopener">retains President Donald Trump’s ear</a>. The new U.S. National Security Strategy <a title="vows" href="https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905-2.pdf" rel="noopener">vows</a> to “neutralize malign Iranian influence.” Contrary to his campaign pledge, <a title="Trump" href="https://www.whitehouse.gov/people/donald-j-trump/" rel="noopener">Trump</a> hasn’t pulled the United States out of the <a href="https://www.cfr.org/backgrounder/impact-iran-nuclear-agreement">Joint Comprehensive Plan of Action</a> (JCPOA). He instead opted to <a title="refuse to certify Iran’s compliance" href="https://www.whitehouse.gov/briefings-statements/remarks-president-trump-iran-strategy/" rel="noopener">refuse to certify Iran’s compliance</a>. That effectively kicked the issue over to Capitol Hill. Congress has now effectively <a href="https://www.cfr.org/blog/iran-deal-saga-continues">kicked it back to him</a>. While the White House wants to <a title="turn up the heat on Tehran" href="https://www.cbsnews.com/news/haley-says-most-damning-report-yet-shows-evidence-iran-is-arming-yemeni-rebels/" rel="noopener">turn up the heat on Tehran</a>, the question remains how far it will be willing to go. After all, Europe <a title="opposes torpedoing" href="http://www.ecfr.eu/publications/summary/why_iran_will_divide_europe_from_the_united_states_7230" rel="noopener">opposes torpedoing</a> the JCPOA, and the White House has its hands full with North Korea. One thing you can be sure of: Iran will press its advantage wherever it can.</p>
<h3>North Korea’s Nuclear Ambitions.</h3>
<p>Something has to give. Trump has vowed to prevent North Korea from gaining the capability to hit the United States with nuclear-armed ballistic missiles. He’s backed that up with angry tweets and threats to unleash “<a title="fire and fury" href="https://www.nytimes.com/2017/08/09/us/politics/trump-north-korea.html?_r=0" rel="noopener">fire and fury</a>.” So far North Korea isn’t blinking. Pyongyang boasted after its <a title="ballistic missile test" href="https://www.washingtonpost.com/news/checkpoint/wp/2017/11/30/why-north-koreas-latest-ballistic-missile-test-is-worrisome/?utm_term=.7ee8f3da1fbf" rel="noopener">ballistic missile test</a> last month that it “<a title="can now reach all of the mainland U.S" href="http://www.nzherald.co.nz/world/news/article.cfm?c_id=2&amp;objectid=11949936" rel="noopener">can now reach all of the mainland U.S</a>.” That’s probably <a title="not true" href="http://www.cnn.com/2017/12/15/politics/mattis-north-korea-icbm/index.html" rel="noopener">not true</a>. However, the trend is not America’s friend. Unfortunately, Washington’s options for compelling Pyongyang to back down aren’t promising. China either <a title="can’t" href="https://twitter.com/realdonaldtrump/status/877234140483121152?lang=en" rel="noopener">can’t</a>—<a title="or won’t" href="https://www.newyorker.com/news/news-desk/why-china-isnt-ready-to-put-pressure-on-north-korea" rel="noopener">or won’t</a>—use its economic leverage to make North Korea cry uncle. Meanwhile, <a title="the cost" href="https://www.theatlantic.com/international/archive/2017/11/north-korea-death-tolls/545231/" rel="noopener">the cost </a>of U.S. military action would likely <a title="be steep" href="https://www.nytimes.com/2017/12/06/opinion/north-korea-united-states-war.html" rel="noopener">be steep</a>—possibly even “<a title="catastrophic" href="http://www.newsweek.com/north-korea-war-us-mattis-616943" rel="noopener">catastrophic</a>.”</p>
<p>A <a title="diplomatic solution" href="https://www.usatoday.com/story/opinion/2017/11/22/north-kore-crisis-diplomatic-solution-needs-table-michael-fuchs-column/886061001/" rel="noopener">diplomatic solution</a> might still be forged. But that would almost certainly require <a title="recognizing North Korea as a nuclear weapons power" href="https://www.salon.com/2017/09/15/the-us-has-to-accept-north-korea-as-a-nuclear-power_partner/" rel="noopener">recognizing North Korea as a nuclear weapons power</a>—at the risk that Pyongyang will pocket any concessions and then <a title="renege on its commitments" href="https://www.armscontrol.org/factsheets/dprkchron" rel="noopener">renege on its commitments</a>. It has <a title="done that before" href="https://www.washingtonpost.com/news/fact-checker/wp/2017/08/09/history-lesson-why-did-bill-clintons-north-korea-deal-fail/?utm_term=.f3057c617cb8" rel="noopener">done that before</a>. Yes, the United States <a title="can rely on deterrence" href="https://cisac.fsi.stanford.edu/news/why-nuclear-deterrence-can-work-north-korea" rel="noopener">can rely on deterrence</a> to keep North Korea at bay. That <a title="strategy worked" href="https://www.washingtonpost.com/opinions/nuclear-weapons-are-the-uss-instruments-of-peace/2013/10/04/6f6969ba-2d14-11e3-b139-029811dbb57f_story.html?utm_term=.6de5b1edfd05" rel="noopener">strategy worked</a> against the far larger Soviet threat. <a title="The danger" href="https://www.nytimes.com/2017/11/29/world/asia/north-korea-nuclear-strategy-deterence.html" rel="noopener">The danger</a> is that <a title="Kim Jong-un" href="http://www.bbc.com/news/world-asia-pacific-11388628" rel="noopener">Kim Jong-un</a> may be <a title="willing to take risks" href="https://www.theatlantic.com/international/archive/2017/09/north-korea-nuclear-deterrence/539205/" rel="noopener">willing to take risks</a> that Soviet leaders weren’t. Of course, an <a title="assassination" href="http://www.bbc.com/news/world-asia-41263242" rel="noopener">assassination</a>, <a title="coup" href="http://www.dw.com/en/can-north-koreas-elites-oust-kim-jong-un/a-39091374" rel="noopener">coup</a>, or <a title="popular uprising" href="http://www.newsweek.com/north-koreas-kim-jong-un-worried-about-uprising-orders-protection-statues-and-694888" rel="noopener">popular uprising</a> could scramble everything—and <a title="not necessarily in a good way" href="http://www.38north.org/2017/08/rsokolskyamiller080217/" rel="noopener">not necessarily in a good way</a>. However the situation plays out, the current <a title="level of tensions" href="https://www.vox.com/world/2017/9/25/16360556/north-korea-trump-ri-yong-ho-b1-bomber-poll" rel="noopener">level of tensions</a> creates <a title="the possibility" href="https://www.vox.com/world/2017/11/15/16657752/north-korea-twitter-trump-silo-b1" rel="noopener">the possibility</a> that war will begin <a title="not through calculation but miscalculation" href="https://www.vox.com/world/2017/9/25/16361264/north-korea-bomber-b1-threat" rel="noopener">not through calculation but miscalculation</a>.</p>
<h3>Crisis in Venezuela.</h3>
<p><a title="Venezuela" href="https://www.cia.gov/library/publications/the-world-factbook/geos/ve.html" rel="noopener">Venezuela</a> should be a prosperous and vibrant country. After all, it has <a title="the largest proven oil reserves" href="http://geab.eu/en/top-10-countries-with-the-worlds-biggest-oil-reserves/" rel="noopener">the largest proven oil reserves</a> in the world. Instead, the country is gripped by a horrific <a title="economic" href="https://www.nytimes.com/interactive/2017/12/17/world/americas/venezuela-children-starving.html?rref=collection/sectioncollection/world" rel="noopener">economic</a> and <a title="political" href="http://www.bbc.com/news/world-latin-america-36319877" rel="noopener">political</a> crisis. The fault lies squarely with President <a title="Nicolás Maduro" href="http://www.cnn.com/2013/04/26/world/americas/nicolas-maduro-fast-facts/index.html" rel="noopener">Nicolás Maduro</a>. He has implemented disastrous economic policies and <a title="run roughshod over the country’s constitution" href="http://www.cnn.com/2017/07/26/americas/venezuela-politics-explained/index.html" rel="noopener">run roughshod over the country’s constitution</a>. Hungry Venezuelans bitterly joke about being on a “<a title="Maduro diet" href="http://americasquarterly.org/content/maduro-diet-photo-essay-venezuela" rel="noopener">Maduro diet</a>,” medicine is in <a title="short supply" href="https://www.hrw.org/report/2016/10/24/venezuelas-humanitarian-crisis/severe-medical-and-food-shortages-inadequate-and" rel="noopener">short supply</a>, and Maduro’s allies have <a title="frustrated efforts" href="https://www.reuters.com/article/us-venezuela-politics-jurists/venezuela-supreme-court-has-staged-effective-coup-jurists-group-idUSKCN1BN14F" rel="noopener">frustrated efforts</a> to change things at the ballot box. As bad as things were in 2017 for Venezuelans, things could be even worse in 2018.</p>
<p>The <a href="https://www.cfr.org/backgrounder/international-monetary-fund">International Monetary Fund</a> projects that inflation will <a title="exceed 2,300 percent" href="https://www.bloomberg.com/news/articles/2017-10-10/imf-sees-venezuelan-inflation-rate-rising-beyond-2-300-in-2018" rel="noopener">exceed 2,300 percent</a> next year. And Maduro has <a title="banned three opposition parties" href="http://www.bbc.com/news/world-latin-america-42304594" rel="noopener">banned three opposition parties</a> from participating in <a title="next December’s" href="https://venezuelanalysis.com/news/13525" rel="noopener">next December’s</a> presidential election. Venezuelans have <a title="taken to the streets" href="http://www.latimes.com/world/mexico-americas/la-fg-venezuela-death-toll-20170524-story.html" rel="noopener">taken to the streets</a> to protest Maduro’s dictatorial ways. More than one hundred protestors <a title="have been killed" href="https://www.telesurtv.net/english/news/Heres-Your-Guide-to-Understanding-Protest-Deaths-in-Venezuela-20170422-0016.html" rel="noopener">have been killed</a>, but nothing has changed. As a result, hundreds of thousands of Venezuelans <a title="have fled" href="http://www.dw.com/en/could-there-be-a-venezuelan-refugee-crisis/a-41384421" rel="noopener">have fled</a> to neighboring countries. Latin American countries <a title="are divided" href="https://www.reuters.com/article/us-venezuela-politics/latin-american-nations-seek-venezuela-crisis-mediation-idUSKCN1BP37B" rel="noopener">are divided</a> over how to respond. The United States has already <a title="imposed sanctions" href="http://money.cnn.com/2017/11/09/news/economy/venezuela-sanctions/index.html" rel="noopener">imposed sanctions</a> on Venezuelan officials and may <a title="impose more" href="https://www.reuters.com/article/us-venezuela-politics-usa/u-s-not-ruling-out-possible-oil-embargo-on-venezuela-haley-idUSKCN1BW2Z1" rel="noopener">impose more</a>. Trump’s <a title="suggestion" href="https://www.nytimes.com/2017/08/12/world/americas/trump-venezuela-military.html?_r=0" rel="noopener">suggestion</a> that U.S. military intervention might be necessary <a title="drew rebukes" href="https://www.reuters.com/article/us-usa-venezuela-military/latin-america-rejects-trumps-military-threat-against-venezuela-idUSKBN1AR2GR" rel="noopener">drew rebukes</a> from across Latin America and probably gave <a title="Maduro a much-needed propaganda victory" href="http://www.slate.com/blogs/the_slatest/2017/08/12/trump_s_threat_to_invade_venezuela_amounts_to_a_big_gift_for_embattled_leader.html" rel="noopener">Maduro a much-needed propaganda victory</a>. In all, Maduro isn’t likely to go unless Venezuelans make him go.</p>
<h3>Trump’s Effort to Transform Trade.</h3>
<p>President Trump has been complaining about America’s “<a title="horrible" href="http://thehill.com/policy/finance/288812-trump-vow-to-overhaul-us-trade-policy" rel="noopener">horrible</a>” trade deals <a title="since the mid-1980s" href="https://www.politico.com/magazine/story/2015/10/donald-trump-ronald-reagan-213288" rel="noopener">since the mid-1980s</a>, and he made it a <a title="central theme" href="https://www.nytimes.com/2016/03/27/us/politics/donald-trump-transcript.html" rel="noopener">central theme</a> of his 2016 presidential campaign. But during his first eleven months in office, he spent more time <a title="barking than biting" href="http://money.cnn.com/2017/11/20/news/economy/trump-trade/index.html" rel="noopener">barking than biting</a> on trade. True, he signed a <a title="presidential memorandum" href="https://drive.google.com/file/d/0B3GSXHR8ZL1HUWh3cFh6NGRFdlE/view" rel="noopener">presidential memorandum</a> pulling the United States out of the <a title="Trans Pacific Partnership" href="https://www.nytimes.com/interactive/2016/business/tpp-explained-what-is-trans-pacific-partnership.html" rel="noopener">Trans-Pacific Partnership</a> (TPP). However, he didn’t impose <a title="tariffs on China" href="https://www.cnbc.com/2017/01/15/just-how-badly-could-trumps-threatened-45-tariff-hurt-china.html" rel="noopener">tariffs on China</a> or withdraw from the <a title="North American Free Trade Agreement" href="https://www.cnbc.com/2017/01/15/just-how-badly-could-trumps-threatened-45-tariff-hurt-china.html" rel="noopener">North American Free Trade Agreement</a> (NAFTA), the <a title="Korea-U.S. Free Trade Agreement" href="https://ustr.gov/trade-agreements/free-trade-agreements/korus-fta" rel="noopener">Korea-U.S. Free Trade Agreement</a>, or the <a title="World Trade Organization" href="https://www.wto.org/" rel="noopener">World Trade Organization</a> (WTO), all steps he either implied or vowed on the campaign trail to take. That may <a title="soon change" href="https://www.washingtonpost.com/news/post-politics/wp/2017/11/10/trump-talks-tough-on-trade-in-vietnam-wont-meet-with-putin/?utm_term=.9c8e6d67f52a" rel="noopener">soon change</a>.</p>
<p>The White House <a title="is moving" href="https://www.upi.com/China-rejects-US-boycott-at-World-Trade-Organization/9041512149240/" rel="noopener">is moving</a> to impose <a title="punitive actions" href="https://www.politico.com/story/2017/11/28/trump-china-trade-investigation-aluminum-193181" rel="noopener">punitive actions</a> on predatory <a title="Chinese trade practices" href="https://www.nytimes.com/2017/11/09/business/donald-trump-china-trade-xi-jinping.html" rel="noopener">Chinese trade practices</a>, its <a title="demands" href="https://www.nytimes.com/2017/08/16/business/economy/nafta-negotiations-canada-mexico.html?mtrref=www.google.com&amp;login=email&amp;mtrref=www.nytimes.com&amp;gwh=D694B691EFFFAEDA73128F0764AF1ADF&amp;gwt=pay" rel="noopener">demands</a> for revamping NAFTA look to be <a title="unacceptable to Canada and Mexico" href="https://www.economist.com/news/finance-and-economics/21730420-american-demands-are-so-extreme-some-suspect-it-not-wanting-deal-all" rel="noopener">unacceptable to Canada and Mexico</a>, and it is waging <a title="a low-level war" href="https://www.washingtonpost.com/news/monkey-cage/wp/2017/09/27/trump-is-fighting-an-open-war-on-trade-his-stealth-war-on-trade-may-be-even-more-important/?utm_term=.abe33d3fb546" rel="noopener">a low-level war </a>against the WTO. Trump’s push to counter what he calls “<a title="economic aggression" href="https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905-2.pdf" rel="noopener">economic aggression</a>” could create considerable <a title="turmoil abroad" href="https://www.politico.com/tipsheets/morning-trade/2017/07/06/eu-could-retaliate-quickly-if-hit-with-us-steel-tariffs-221186https:/www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905-2.pdf" rel="noopener">turmoil abroad</a>—and at home. America’s trading partners are likely <a title="to retaliate" href="https://www.cnbc.com/2017/01/10/three-ways-beijing-could-retaliate-against-trumps-trade-policies.html" rel="noopener">to retaliate</a>. No one knows how far such <a title="tit-for-tat actions" href="https://www.nytimes.com/2016/11/11/business/international/trump-china-us-trade-war.html" rel="noopener">tit-for-tat actions</a> might go. What is known is that some U.S. export sectors <a title="would be hurt" href="https://www.nytimes.com/2017/10/12/business/economy/what-would-happen-if-the-us-withdrew-from-nafta.html" rel="noopener">would be hurt</a>. Meanwhile, Trump’s trade initiatives won’t fix what bothers him: America’s <a title="yawning trade deficit" href="https://www.thebalance.com/u-s-trade-deficit-causes-effects-trade-partners-3306276" rel="noopener">yawning trade deficit</a>. The United States runs a deficit because <a title="Americans consume far more than they save" href="https://www.washingtonpost.com/opinions/everything-you-need-to-know-about-trade-economics-in-70-words/2017/05/05/a2b76a02-2f80-11e7-9dec-764dc781686f_story.html?utm_term=.7dbdecac7867" rel="noopener">Americans consume far more than they save</a>. Tweaking trade deals won’t change that. To make matters worse, the tax bill he has championed will likely <a title="make the trade deficit larger" href="https://www.nytimes.com/2017/11/17/us/politics/tax-cuts-trade-deficit-trump.html" rel="noopener">make the trade deficit larger</a>.</p>
<h3>China’s Ambitions Abroad.</h3>
<p><b> </b><a title="Xi Jinping" href="http://www.bbc.com/news/world-asia-pacific-11551399" rel="noopener">Xi Jinping</a> had a <a title="terrific 2017" href="https://www.economist.com/news/leaders/21730144-do-not-expect-mr-xi-change-china-or-world-better-xi-jinping-has-more-clout" rel="noopener">terrific 2017</a>. He consolidated his hold on power and now ranks as China’s <a title="most powerful leader" href="http://www.bbc.com/news/world-asia-china-41730948" rel="noopener">most powerful leader</a> since <a title="Mao Zedong" href="https://www.biography.com/people/mao-tse-tung-9398142" rel="noopener">Mao Zedong</a>. The question is, how will he use his new status? To judge by his <a title="205-minute speech" href="https://www.nytimes.com/2017/10/18/world/asia/china-xi-jinping-party-congress.html" rel="noopener">205-minute speech </a>to China’s National Party Congress in October, he won’t be sitting on the sidelines; he will be <a title="flexing his muscles" href="https://www.ft.com/content/f8262d56-a6a0-11e7-ab55-27219df83c97" rel="noopener">flexing his muscles</a>. He <a title="used the terms “great power” and “strong power” twenty-six times" href="https://www.nytimes.com/2017/10/18/world/asia/china-xi-jinping-party-congress.html" rel="noopener">used the terms “great power” and “strong power” twenty-six times</a> in his speech. Xi’s assertive foreign policy will likely mix soft and hard power.</p>
<p>He will be offering substantial aid to countries throughout Asia under the banner of the <a title="One Belt One Road initiative" href="https://qz.com/983460/obor-an-extremely-simple-guide-to-understanding-chinas-one-belt-one-road-forum-for-its-new-silk-road/" rel="noopener">One Belt One Road initiative</a>. Most countries will find it <a title="hard to pass up these funds" href="https://www.ft.com/content/f8262d56-a6a0-11e7-ab55-27219df83c97" rel="noopener">hard to pass up these funds</a>, even if they <a title="sometimes come" href="http://www.atimes.com/article/chinas-southeast-asia-investments-come-strings-attached/" rel="noopener">sometimes come</a> with <a title="substantial strings attached" href="https://www.theatlantic.com/international/archive/2017/10/china-investments/543321/" rel="noopener">substantial strings attached</a>. Beijing will also be <a href="https://www.cfr.org/blog/clues-how-address-chinas-growing-political-influence-strategies-look-australia">supporting sympathetic politicians</a> and groups overseas, <a title="a tactic" href="https://www.ned.org/sharp-power-rising-authoritarian-influence-forum-report/" rel="noopener">a tactic</a> that has started to trigger a backlash. The vinegar supplementing the honey will be China’s <a href="https://www.cfr.org/interactives/chinas-maritime-disputes?cid=otr-marketing_use-china_sea_InfoGuide#!/chinas-maritime-disputes?cid=otr-marketing_use-china_sea_InfoGuide">continued effort</a> to turn the <a title="South China Sea" href="http://foreignpolicy.com/2017/11/16/with-trump-focused-on-north-korea-beijing-sails-ahead-in-south-china-sea/" rel="noopener">South China Sea</a> into a <a title="Chinese lake" href="https://www.nytimes.com/2016/12/15/world/asia/china-spratly-islands.html" rel="noopener">Chinese lake</a>. Countries in Southeast Asia <a title="will be watching closely" href="https://www.ussc.edu.au/analysis/the-asian-research-network-survey-on-americas-role-in-the-indo-pacific" rel="noopener">will be watching closely</a> to <a title="see whether" href="http://foreignpolicy.com/2017/05/12/the-united-states-is-losing-asia-to-china/" rel="noopener">see whether</a>, and how, the United States <a title="pushes back" href="https://thediplomat.com/2017/08/south-china-sea-us-navy-conducts-freedom-of-navigation-operation/" rel="noopener">pushes back</a> on China’s effort to make itself <a title="the regional hegemon" href="https://www.economist.com/news/special-report/21720718-countrys-status-among-its-neighbours-not-keeping-up-its-growing-powers-chinas" rel="noopener">the regional hegemon</a>. A world order <a title="may hang in the balance" href="https://www.brookings.edu/research/the-twilight-of-the-liberal-world-order/" rel="noopener">may hang in the balance</a>.</p>
<h3>The Mueller Investigation.</h3>
<p><b> </b>Americans aren’t the only ones watching to see what happens with the investigation Special Counsel <a title="Robert Mueller" href="http://www.cnn.com/2017/05/17/politics/who-is-robert-mueller/index.html" rel="noopener">Robert Mueller</a> is conducting. Foreign capitals are as well. President Trump has called the investigation a “<a title="witch hunt" href="https://www.theguardian.com/us-news/2017/oct/29/donald-trump-robert-mueller-russia-chris-christie" rel="noopener">witch hunt</a>,” and he dismisses allegations that his campaign colluded with Russia as “<a title="fake news" href="http://www.cnn.com/2016/05/26/politics/michael-flynn-donald-trump-vp-search/index.html" rel="noopener">fake news</a>.” Partisans on both sides think they know how the investigation will turn out. We’ll see who is right. What we know for sure is that Trump’s former National Security Advisor <a title="Michael Flynn" href="http://www.cnn.com/2016/05/26/politics/michael-flynn-donald-trump-vp-search/index.html" rel="noopener">Michael Flynn</a> has pled guilty to lying to the FBI, as has former Trump campaign advisor <a title="George Papadopoulos" href="https://www.npr.org/2017/10/31/560835237/first-guilty-plea-in-russia-probe-who-is-george-papadopoulos" rel="noopener">George Papadopoulos</a>. Mueller also has <a title="indicted" href="http://www.cnn.com/2017/10/30/politics/donald-trump-mueller-reaction/index.html" rel="noopener">indicted</a> Trump’s former campaign manager, <a title="Paul Manafort" href="http://www.businessinsider.com/who-is-paul-manafort-and-why-is-he-at-the-center-of-the-trump-russia-probe-2017-3" rel="noopener">Paul Manafort</a> and Manafort’s business partner and senior Trump campaign staffer, <a title="Rick Gates" href="https://www.nytimes.com/2017/06/16/us/politics/rick-gates-russia.htmlhttp:/www.businessinsider.com/who-is-paul-manafort-and-why-is-he-at-the-center-of-the-trump-russia-probe-2017-3" rel="noopener">Rick Gates</a>.</p>
<p>Trump’s lawyers predict that the investigation <a title="will wrap up shortly" href="https://www.theatlantic.com/politics/archive/2017/11/why-is-ty-cobb-so-optimistic-about-the-mueller-probe/546416/" rel="noopener">will wrap up shortly</a>; <a title="history suggests" href="http://www.businessinsider.com/how-long-special-prosecutor-mueller-trump-2017-6" rel="noopener">history suggests</a> it could <a title="drag on for months" href="https://www.washingtonpost.com/politics/trump-teams-meeting-with-muellers-office-poised-to-ratchet-up-tensions/2017/12/18/15dac668-e41d-11e7-a65d-1ac0fd7f097e_story.html?utm_term=.7c8b96a90155" rel="noopener">drag on for months</a>. At a minimum, the investigation <a title="distracts White House attention" href="http://thehill.com/homenews/administration/357946-john-kelly-its-distracting-for-trump-to-be-investigated" rel="noopener">distracts White House attention</a> from policymaking and <a title="raises doubts overseas" href="https://www.theatlantic.com/politics/archive/2017/11/is-the-mueller-probe-handcuffing-trump-overseas/546023/" rel="noopener">raises doubts overseas</a> as to whether Trump has the political capital to carry through on his threats and promises. At the maximum, the investigation could plunge the United States into an <a title="unprecedented constitutional crisis" href="https://www.washingtonpost.com/politics/sen-warner-cautions-trump-against-meddling-in-mueller-probe/2017/12/20/d6109c12-e5d2-11e7-927a-e72eac1e73b6_story.html?utm_term=.d80f46a9d87f" rel="noopener">unprecedented constitutional crisis</a>. Whether we get either extreme or an outcome somewhere in between, America’s democracy is being tested. We’ll see if we live up to the framers’ expectations.</p>
<h3>Democracy Under Stress.</h3>
<p>Democracy is <a title="under siege" href="http://www.economist.com/news/essays/21596796-democracy-was-most-successful-political-idea-20th-century-why-has-it-run-trouble-and-what-can-be-do" rel="noopener">under siege</a>. Just examine the rankings that <a title="Freedom House" href="https://freedomhouse.org/about-us" rel="noopener">Freedom House</a> generates—global freedom has been <a title="declining for over a decade" href="https://freedomhouse.org/report/freedom-world/freedom-world-2017" rel="noopener">declining for over a decade</a>. The problem isn’t just that emerging democracies like <a title="Thailand" href="https://www.bloomberg.com/quicktake/thailands-troubled-democracy" rel="noopener">Thailand</a> and <a title="Turkey" href="https://www.theatlantic.com/international/archive/2016/07/how-erdogan-made-turkey-authoritarian-again/492374/" rel="noopener">Turkey</a> have <a title="slid back into authoritarian rule" href="https://ourworldindata.org/democracy/" rel="noopener">slid back into authoritarian rule</a>, though that’s bad enough. Many Western democracies are struggling as well. The EU is <a title="threatening to strip Poland’s voting rights" href="https://www.theguardian.com/world/2017/dec/20/eu-process-poland-voting-rights" rel="noopener">threatening to strip Poland’s voting rights</a> in EU institutions because <a title="Warsaw has adopted anti-democratic laws" href="http://europa.eu/rapid/press-release_IP-17-5367_en.htm" rel="noopener">Warsaw has adopted anti-democratic laws</a>, while Spain faces a <a title="secessionist movement in Catalonia" href="https://www.nytimes.com/2017/10/27/world/europe/spain-catalonia-puigdemont.html?_r=0" rel="noopener">secessionist movement in Catalonia</a>. Centrist political parties across Europe have been losing vote shares to <a title="parties on the two extremes" href="https://www.investmentbank.barclays.com/our-insights/politics-of-rage.html" rel="noopener">parties on the two extremes</a>. Traditional <a title="center-left" href="https://www.bloomberg.com/view/articles/2017-09-26/socialist-parties-in-europe-keep-losing-for-the-same-reason" rel="noopener">center-left</a> parties <a title="have had the most trouble" href="https://www.economist.com/news/briefing/21695887-centre-left-sharp-decline-across-europe-rose-thou-art-sick" rel="noopener">have had the most trouble</a>, having suffered <a title="humiliating defeats" href="https://www.washingtonpost.com/news/monkey-cage/wp/2016/10/24/europes-traditional-left-is-in-a-death-spiral-even-if-you-dont-like-the-left-this-is-a-problem/" rel="noopener">humiliating defeats</a> in <a title="the Netherlands" href="http://foreignpolicy.com/2017/03/16/3-takeaways-from-the-dutch-election-results/" rel="noopener">the Netherlands</a>, <a title="France" href="https://www.nytimes.com/interactive/2017/05/07/world/europe/france-election-results-maps.html" rel="noopener">France</a>, and <a title="Austria" href="http://www.cnn.com/2017/12/18/europe/austria-government-intl/index.html" rel="noopener">Austria</a> among other places. But center-right parties are struggling as well, as recent elections in <a title="Britain" href="https://www.nytimes.com/2017/06/08/world/europe/theresa-may-britain-election-conservatives-parliament.html" rel="noopener">Britain</a> and <a title="Germany" href="https://www.washingtonpost.com/world/merkel-wins-another-term-in-germany-but-far-right-spoils-her-victory-party/2017/09/25/87e1bb78-9e1c-11e7-b2a7-bc70b6f98089_story.html?utm_term=.efbfc19c4da7" rel="noopener">Germany</a> attest.</p>
<p>The United States still has a robust two-party system, but <a title="its democracy" href="https://www.theatlantic.com/international/archive/2017/06/american-democracy-trump/530454/" rel="noopener">its democracy</a> also <a title="seems far from its glory days" href="https://www.vox.com/2017/10/13/16431502/america-democracy-decline-liberalism" rel="noopener">seems far from its glory days</a>. Congress struggles to carry out is most basic function, <a title="funding the government" href="https://www.reuters.com/article/us-usa-congress-shutdown/congress-faces-tricky-path-to-avoid-government-shutdown-idUSKBN1ED1X9" rel="noopener">funding the government</a>, Trump regularly <a title="violates longstanding democratic norms" href="http://www.slate.com/articles/podcasts/the_good_fight/2017/11/don_t_underestimate_trump_s_threat_to_liberal_democracy.html" rel="noopener">violates longstanding democratic norms</a>, and many Americans <a title="view members of the opposite party unfavorably" href="http://www.people-press.org/2016/06/22/1-feelings-about-partisans-and-the-parties/" rel="noopener">view members of the opposite party unfavorably</a>. It’s not surprising, then, that some now see the United States as a “<a title="flawed democracy" href="https://www.cnbc.com/2017/01/25/us-is-no-longer-a-full-democracy-eiu-warns.html" rel="noopener">flawed democracy</a>.” Authoritarian governments like <a href="https://www.cfr.org/expert-brief/australia-new-zealand-face-chinas-influence">China</a> and <a href="https://www.cfr.org/report/countering-russian-information-operations-age-social-media">Russia</a> are both working, in different ways, to <a title="undermine free and fair elections" href="https://freedomhouse.org/report/freedom-net/freedom-net-2017" rel="noopener">undermine free and fair elections</a> across the globe. Is democracy doomed? No. It remains <a title="popular worldwide" href="http://www.pewglobal.org/2017/10/16/globally-broad-support-for-representative-and-direct-democracy/" rel="noopener">popular worldwide</a>, even if it has <a title="become less so" href="https://www.weforum.org/agenda/2016/12/charts-that-show-young-people-losing-faith-in-democracy/" rel="noopener">become less so</a> among <a title="young people in democratic countries" href="https://qz.com/848031/harvard-research-suggests-that-an-entire-global-generation-has-lost-faith-in-democracy/" rel="noopener">young people in democratic countries</a>. There will be <a href="https://www.cfr.org/blog/ten-elections-watch-2018">important elections in 2018 </a>that could reverse the negative trends, though they might also give us more “<a title="illiberal democracies" href="https://www.huffingtonpost.com/dani-rodrik/illiberal-democracies-on-the-rise_b_7302374.html" rel="noopener">illiberal democracies</a>.” Here’s the thing about democracy: it empowers the people. It’s up to them to use that power wisely.</p>
<hr />
<p><em>Corey Cooper and Benjamin Shaver contributed to the preparation of this post.</em></p>
<p><a href="https://globalsecurityreview.com/the-world-in-2018/">Geopolitical Hotspots: The World in 2018</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Analyzing Russian Information Warfare and Influence Operations</title>
		<link>https://globalsecurityreview.com/cold-war-2-0-russian-information-warfare/</link>
		
		<dc:creator><![CDATA[Sophia Porotsky]]></dc:creator>
		<pubDate>Thu, 08 Feb 2018 13:10:52 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=821</guid>

					<description><![CDATA[<p>Social media and the access it provides to voter data give Russian active measures the ability to influence the outcome of an election “Part of the misinformation, disinformation campaign that was launched was launched in three key states, Wisconsin, Michigan, and Pennsylvania, and it was launched…not to reinforce Trump voters to go out but actually [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/cold-war-2-0-russian-information-warfare/">Analyzing Russian Information Warfare and Influence Operations</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Social media and the access it provides to voter data give Russian active measures the ability to influence the outcome of an election</h2>
<blockquote><p><i>“Part of the misinformation, disinformation campaign that was launched was launched in three key states, Wisconsin, Michigan, and Pennsylvania, and it was launched…not to reinforce Trump voters to go out but actually targeted at potential Clinton voters, with misinformation in the last week where they were…suddenly reading, if they got their news from Facebook and Twitter…stories about Clinton being sick and other things…the Russians, they&#8217;re very good at this technology piece, they might not have been so good at being able to target to a precinct level American political turnout. That would mean they might be actually receiving some…information or alliance from some American political expertise to be able to figure out where to focus these efforts.”</i></p>
<p><i>-Senator Mark Warner</i></p></blockquote>
<p>As made clear by Senator Warner during a Senate Intelligence Committee hearing on Russia’s involvement in the 2016 U.S. Presidential Election, social media, the content published on it, and the access it provides to voters can have the power to influence the outcome of an election. In the case of the 2016 elections, both Russia and the Trump campaign relied heavily on social media.</p>
<hr />
<p><em>This is the first instalment examining Russian information warfare, the use of social media, and the US election. </em><em>Part two, </em><a href="http://globalsecurityreview.com/american-security/security-policy/russia-manipulated-u-s-voters-social-media/">Facebook, Compromised: How Russia Manipulated U.S. Voters with Social Media</a> <em>delves deeper into the mechanics of Russian disinformation and misinformation strategies; revealing how they manifest online and influence the electorate.</em></p>
<p><em>Third, </em><a href="http://globalsecurityreview.com/american-security/security-policy/trump-campaigns-exploitation-social-media/">The Trump Campaign&#8217;s Exploitation of Social Media</a>, <em>explains how the campaign benefited from Twitter bots, trolls, and microtargeted Facebook messages. </em></p>
<p><i>Last, </i><a href="http://globalsecurityreview.com/american-security/security-policy/cambridge-analytica-darker-side-big-data/">Cambridge Analytica: the Darker Side of Big Data</a>, <em>investigates the involvement of an ethically dubious &#8220;election management&#8221; firm in the 2016 presidential elections.</em></p>
<hr />
<p>It is necessary to consider Donald Trump’s role, complicit or otherwise, in propagating Russia’s ‘active measures’ on social media. It is also imperative to scrutinise the campaign’s use of the data analysis company, Cambridge Analytica, whose exploitation of social media enables “micro-targeted” political messaging to reach individual voters with unprecedented precision. It’s increasingly clear that both Russia and the Trump campaign harnessed social media to influence public opinion, suppress voter segments, and arguably steer the outcome of an election.</p>
<p>The first instalment in this series will take a closer look at the concept of Information Warfare, how cyber ties into this strategy, and identify the security gap that leaves the United States vulnerable to Russia&#8217;s hostile actions.</p>
<h3><b>What is Information Warfare?</b></h3>
<p>Russian Information Warfare (<i>informatsionaya voyna</i>) is rooted in Soviet thinking, dating back to the beginning of the Cold War <a href="https://www.osw.waw.pl/sites/default/files/the_anatomy_of_russian_information_warfare.pdf">in the form of <em>spetspropaganda</em></a> (special propaganda). <a href="http://www.realcleardefense.com/articles/2017/05/09/russias_approach_to_cyber_warfare_111338.html">Information warfare</a> is a “holistic concept that includes computer network operations, electronic warfare, psychological operations, and information operations.”</p>
<p>The 2010 Military Doctrine of the Russian Federation says that these measures are implemented “to achieve political objectives without the utilization of military force.” In contrast to Soviet propaganda—which the regime went to great lengths to proclaim as the truth—modern Russian information warfare does not prioritize this, <a href="http://www.politico.eu/article/russias-information-warfare/">modern information warfare</a> seeks to plant seeds of doubt and distrust; to confuse, distract, polarize and demoralize.</p>
<p>Accordingly, the creation and dissemination of misinformation, disinformation; what has commonly become known as ‘fake news,’ is a vital component of the Russian information warfare offensive strategy.</p>
<p>This approach is often referred to by the Soviet term, ‘<a href="http://intellit.muskingum.edu/russia_folder/pcw_era/">active measures</a>,’ which “refers to the manipulative use of slogans, arguments, disinformation, and carefully selected accurate information, which the Soviets used to try to influence the attitudes and actions of foreign publics and governments.”</p>
<h3><b>The Cyber Component</b></h3>
<p>There is much disagreement over the definition of ‘cyber.’ For the purpose of this article, ‘cyber’ will be <a href="http://www.stratcomcoe.org/afoxall-putins-cyberwar-russias-statecraft-fifth-domain">defined as</a> “involving the ‘command and control of computers’… cyber attacks can be described as ‘all efforts to disrupt, deny, degrade, distort, the information that they [computers] rely upon, store, process, and generate.’”</p>
<p>A crucial distinction to grasp is that Russia views cyber operations differently than the West. Russia <a href="http://www.realcleardefense.com/articles/2017/05/09/russias_approach_to_cyber_warfare_111338.html">generally does not use the terms</a> ‘cyber’ or ‘cyber warfare’ and instead incorporates cyber into their broader conceptualization of information warfare. In short, ‘cyber’ operations are a means to an end in a greater campaign.</p>
<p>For Russia, the Cold War never really ended, and the distinction between <a href="http://www.realcleardefense.com/articles/2017/05/09/russias_approach_to_cyber_warfare_111338.html">war and peacetime</a> is blurred; “Moscow perceives the struggle within the ‘information space’ to be more or less constant and unending.” This perception runs parallel with the Kremlin’s belief that while matching the conventional military power of the U.S. is out of the question; they can conduct efficient operations in the information domain. In doing so, they can achieve political and military objectives <a href="https://relayto.com/the-henry-jackson-society/YDD2kgI1">using far fewer resources</a>: “As far as the Kremlin is concerned, geeks and hackers now rank alongside soldiers and spies as weapons of the state.”</p>
<p>In sum, Russia views cyber as an essential component of information warfare, which is a vital element of their overarching military strategy. Furthermore, as the Kremlin sees itself as being in an eternal struggle with the West, and desires to increase its sphere of influence, they have been pouring considerable resources into building up their information warfare capabilities.</p>
<h3><b>The Security Gap</b></h3>
<p><b> </b>There is a <a href="http://www.stratcomcoe.org/next-phase-russian-information-warfare-keir-giles">vital discrepancy</a> between the Russian definition of ‘Information War’ – “all-encompassing, and not limited to wartime &#8211; and the Western one &#8211; limited, tactical information operations carried out during hostilities.” The most important elements of the Russian definition are: information warfare is ‘all-encompassing,&#8217; and there is no distinction between war and peacetime, creating a security gap. While the West is on guard to combat information warfare during hostilities, Russia is perpetually mounting an information warfare offensive.</p>
<p>Furthermore, Russia views propaganda and disinformation as “at least as important as the traditional…notion of crippling cyber attacks on critical national infrastructure. By contrast, the <a href="http://www.stratcomcoe.org/next-phase-russian-information-warfare-keir-giles">Western approach to cyber threats</a> has typically focused on technical responses to technical threats, mostly disregarding the interface with information warfare in the broad sense.”</p>
<p>This revelation ties into the 2016 US Presidential election: once the US was alerted to the threat of cyber intrusion from a foreign adversary, they focused their efforts on protecting the hardware: the voting machines, when in fact Russia was <a href="http://www.slate.com/articles/technology/future_tense/2016/12/how_russia_hacked_american_voters.html">focusing its efforts on manipulating the voters</a> (facilitated by social media). The outcome is the manifestation of the diverging understandings of information warfare between Russia and the West.</p>
<hr />
<p><em>This is the first instalment examining Russian information warfare, the use of social media, and the US election. </em><em>Part two, </em><a href="http://globalsecurityreview.com/american-security/security-policy/russia-manipulated-u-s-voters-social-media/">Facebook, Compromised: How Russia Manipulated U.S. Voters with Social Media</a> <em>delves deeper into the mechanics of Russian disinformation and misinformation strategies; revealing how they manifest online and influence the electorate.</em></p>
<p><em>Third, </em><a href="http://globalsecurityreview.com/american-security/security-policy/trump-campaigns-exploitation-social-media/">The Trump Campaign&#8217;s Exploitation of Social Media</a>, <em>explains how the campaign benefited from Twitter bots, trolls, and microtargeted Facebook messages. </em></p>
<p><i>Last, </i><a href="http://globalsecurityreview.com/american-security/security-policy/cambridge-analytica-darker-side-big-data/">Cambridge Analytica: the Darker Side of Big Data</a>, <em>investigates the involvement of an ethically dubious &#8220;election management&#8221; firm in the 2016 presidential elections.</em></p>
<p><a href="https://globalsecurityreview.com/cold-war-2-0-russian-information-warfare/">Analyzing Russian Information Warfare and Influence Operations</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ukraine&#8217;s &#8220;Occupied Territories&#8221; Law is Enacted as Donbas Conflict Persists</title>
		<link>https://globalsecurityreview.com/ukraines-occupied-territories-bill-continued-unrest-donbas-region/</link>
		
		<dc:creator><![CDATA[Gabriella Gricius]]></dc:creator>
		<pubDate>Wed, 31 Jan 2018 11:00:13 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Georgia]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=3779</guid>

					<description><![CDATA[<p>While the world&#8217;s eyes remain fixed on the Korean Peninsula, Ukraine remains embroiled in a nearly four-year-long civil war against Russian-backed separatists. On January 18, 2018, the Ukrainian parliament passed a law that labels names both the Donetsk and Luhansk regions as “temporarily occupied territories,” a moniker shared by the Crimea peninsula. Ukraine continues to [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/ukraines-occupied-territories-bill-continued-unrest-donbas-region/">Ukraine&#8217;s &#8220;Occupied Territories&#8221; Law is Enacted as Donbas Conflict Persists</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>While the world&#8217;s eyes remain fixed on the Korean Peninsula, Ukraine remains embroiled in a nearly four-year-long civil war against Russian-backed separatists.</h2>
<p>On January 18, 2018, the Ukrainian parliament passed a law that labels names both the Donetsk and Luhansk regions as “temporarily occupied territories,” a moniker shared by the Crimea peninsula.</p>
<p>Ukraine continues to deal with the occupation of its Luhansk and Donetsk regions, along with occasional outbreaks of skirmishes along the border separating territory controlled by Russian-backed separatists from areas controlled by the Ukrainian military.</p>
<p>The Chairman of the Russian Parliament’s Foreign Affairs Committee, Konstantin Kosachyov, responded to the passage of the bill by saying, “Kyiv has gone from sabotaging the Minsk agreements to burying them.” <a href="https://www.rferl.org/a/ukraine-donbass-bill-five-issues/28983459.html">The bill outwardly labels Russia as an aggressor</a>. However, it neither claims there is a current state of war nor specifies when said conflict began.</p>
<p>While this might seem like a small oversight on behalf of backers of the bill, which include Ukrainian President Petro Poroshenko, it might cause difficulty later in international criminal proceedings against Russia. <a href="https://www.rferl.org/a/ukrainian-parliament-passes-donbas-reintegration-bill/28982677.html">The law also gives the President more direct power over Ukraine’s armed forces</a> while eliminating the need for the support of the Ukrainian parliament. Lastly, it calls for banning trade and all forms of transport to the regions in question.</p>
<h3>Failures of the Minsk Accords</h3>
<p>The bill fails to address anything concerning the <a href="https://www.economist.com/blogs/economist-explains/2016/09/economist-explains-7">Minsk accords</a>. After the first agreements failed, Minsk II was agreed to in February 2015 but has yet to be fully implemented. Russian President Vladimir Putin, Ukrainian President Petro Poroshenko, French President Francois Hollande, and German Chancellor Angela Merkel spent 16 hours negotiating the Minsk II ceasefire agreement for the Ukrainian region in February of 2015. As comprehensive as the deal is, it relies heavily on a yet-to-be-implemented bilateral ceasefire. The Minsk II agreement called for:</p>
<ul>
<li>An immediate, bilateral ceasefire</li>
<li>Withdrawal of heavy weaponry</li>
<li>OSCE Monitoring and Verification for both the ceasefire and the removal of armaments</li>
<li>Dialogue on holding local elections</li>
<li>Amnesty for all figures involved in the Donetsk and Luhansk conflict</li>
<li>The release all hostages and detained individuals</li>
<li>Access to humanitarian aid</li>
<li>Restoration of economic and social links</li>
<li>Withdrawal of all foreign armed groups from Ukrainian territory</li>
<li>Ukrainian government control through the conflict zone</li>
<li>Constitutional reform in Ukraine with a new constitution to be in place by the end of 2015</li>
</ul>
<p>In other words, beyond a simple ceasefire, <a href="http://www.bbc.com/news/world-europe-31436513">the accords agreed to compelled Ukraine to give autonomy to the separatist-held regions</a>, which they did by passing a law giving “special status” to Donbas and Luhansk in March of 2015.</p>
<h3>Ukrainian Opposition to a Diplomatic Solution</h3>
<p>To complicate matters further, President Poroshenko faces domestic opposition against any diplomatic move giving Russian a foothold in their territory. Despite this and other measures taken by both sides, fighting continues in the conflict zones. Minor skirmishes continue to take place along the border, and U.S. State Department officials have claimed that heavy weaponry continues to flow into both regions from Russia.</p>
<p>There have been various attempts at further ceasefires in the last two years. One attempt in September 2016 lasted for a few days before reports emerged of violations by parties on both sides of the conflict. Heavy fighting restarted in January 2017, with a subsequent ceasefire negotiated in February 2017. In December of 2017, another temporary ceasefire was attempted. With the occasional exception, it was more-or-less observed. 2017 ended with a prisoner exchange. 73 Ukrainian soldiers were exchanged for 200 separatist fighters.</p>
<p>As the conflict nears its fourth year, the conflict joins the ranks of other frozen conflicts in the former Soviet sphere of influence such as the Georgian regions of South Ossetia and Abkhazia. Ukraine’s new parliamentary bill suggests that the government will attempt to escalate the conflict in the upcoming year. The continued failure of ceasefire agreements lends legitimacy to the argument that military escalation is the only solution for Ukraine to regain or maintain control over its eastern regions.</p>
<p><a href="https://globalsecurityreview.com/ukraines-occupied-territories-bill-continued-unrest-donbas-region/">Ukraine&#8217;s &#8220;Occupied Territories&#8221; Law is Enacted as Donbas Conflict Persists</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The U.S. and Vietnam Are Expanding Areas of Military Cooperation</title>
		<link>https://globalsecurityreview.com/u-s-vietnam-expanding-areas-military-cooperation/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Mon, 29 Jan 2018 23:42:27 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Vietnam]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=3750</guid>

					<description><![CDATA[<p>As the U.S. shifts its national security priorities to confront a rising China and an assertive Russia, military cooperation with countries like Vietnam will be critical to deterring aggressive behavior. U.S. Secretary of Defense James Mattis praised the expanding partnership between the United States and Vietnam, and lauded the upcoming visit of a U.S. aircraft [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/u-s-vietnam-expanding-areas-military-cooperation/">The U.S. and Vietnam Are Expanding Areas of Military Cooperation</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>As the U.S. shifts its national security priorities to confront a rising China and an assertive Russia, military cooperation with countries like Vietnam will be critical to deterring aggressive behavior.</h2>
<p>U.S. Secretary of Defense James Mattis praised the expanding partnership between the United States and Vietnam, and lauded the upcoming visit of a U.S. aircraft carrier to Vietnam, during a visit to Hanoi on January 25, 2018.</p>
<p>“We thank you for the increasing partnership, with our carrier coming into Danang here in March,” Mattis told Nguyen Phu Trong, the General-Secretary of the Vietnamese Communist Party.</p>
<p>The visit of a U.S. aircraft carrier will be the first of its kind to a Vietnamese port and signals a growing defense partnership between the two countries. “It’s not final, but it all looked very encouraging,” Mattis told reporters. Pentagon officials have repeatedly stated that Vietnam’s prime minister—the official head of state—has the final sign-off on any visit to Vietnam by a U.S. aircraft carrier.</p>
<p>Secretary Mattis met with Vietnamese Defense Minister Ngo Xuan Lich during his visit to Hanoi.  The two leaders discussed plans to increase the degree military cooperation between their respective countries and agreed to expand defense cooperation between the U.S. and Vietnam over a three-year period. Areas of cooperation include maritime security, humanitarian assistance, disaster relief, and peacekeeping operations.</p>
<p>The U.S. has been increasingly committed to improving relations with Vietnam, notably as Hanoi has emerged as willing to resist China’s expansionist policies in the disputed regions of the South China Sea. Mattis said he believes “it’s in America’s best interest to see a strong and prosperous and independent Vietnam, and we intend to be a partner as we go forward.”</p>
<p>Mattis repeatedly emphasized areas of agreement and cooperation. “We are like-minded partners,” Mattis told Communist Party General-Secretary Nguyen. “So we do not have to search hard for areas of common agreement.”</p>
<h3>Rising Tensions in the South China Sea</h3>
<p>Vietnam maintains a policy of not engaging in formal military alliances. Therefore, U.S. officials are cautious about the pace of improving relations. However, Mattis stated that ties between the U.S. and Vietnam are “close now, and getting closer.”</p>
<p>President Barack Obama lifted a decades-old embargo on U.S. weapons sales to Vietnam in 2016. The U.S. currently has 24 active foreign military sales with Vietnam, valued around $70 million, according to U.S. officials. The U.S. recently transferred a Hamilton-class cutter to Vietnam’s Coast Guard—the largest ship in the country’s coast guard or navy. This was the first U.S. transfer of lethal military equipment to Vietnam.</p>
<p>An expanded relationship with Southeast Asian allies seems to play a significant role in the Pentagon’s new defense strategy, which is attempting to pivot U.S. attention from counterterrorism to managing a geopolitical rivalry with China and Russia.</p>
<p>Support for freedom of navigation and the rule of law in the South China Sea are essential components of U.S. values and foreign policy, according to Mattis. Beijing claims nearly the entirety of the South China Sea, ignoring the territorial claims of Vietnam, the Philippines, Malaysia, and many of its other, smaller neighbors.</p>
<p>Vietnam&#8217;s increasing capability to stand up to China, supported by the U.S., could potentially serve as an effective deterrence to China&#8217;s increasingly aggressive expansionist activity in the South China Sea.</p>
<p><a href="https://globalsecurityreview.com/u-s-vietnam-expanding-areas-military-cooperation/">The U.S. and Vietnam Are Expanding Areas of Military Cooperation</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Russian Hacker Group Cozy Bear Was Hacked By Dutch Intelligence Service</title>
		<link>https://globalsecurityreview.com/russian-hacker-group-cozy-bear-hacked-dutch-intelligence/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Sat, 27 Jan 2018 05:01:52 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Netherlands]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=3736</guid>

					<description><![CDATA[<p>The Netherlands&#8217; AIVD gave the FBI critical evidence of the Russian government&#8217;s involvement in the 2016 hacking of the U.S. Democratic National Committee. The Dutch General Intelligence and Security Service (AIVD)—the domestic security and counterintelligence agency in the Netherlands—successfully hacked into computers that were being used by the members of the Russian government-linked hacking group [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/russian-hacker-group-cozy-bear-hacked-dutch-intelligence/">Russian Hacker Group Cozy Bear Was Hacked By Dutch Intelligence Service</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The Netherlands&#8217; AIVD gave the FBI critical evidence of the Russian government&#8217;s involvement in the 2016 hacking of the U.S. Democratic National Committee.</h2>
<p>The Dutch General Intelligence and Security Service (AIVD)—the domestic security and counterintelligence agency in the Netherlands—successfully hacked into computers that were being used by the members of the Russian government-linked hacking group known as Cozy Bear.</p>
<p>Through this, intelligence services in the Netherlands were able to collect evidence of Russia&#8217;s hacking of the U.S. Democratic National Committee (DNC) in 2016, which was promptly provided to American officials. The news was initially reported in <em>Volkskrant</em>, a daily morning newspaper published in the Netherlands, and on the Dutch television news program <em>Nieuwsuur</em>.</p>
<p>According to the reports, hackers working for the Dutch General Intelligence and Security Service initially gained access to computers used by Cozy Bear in mid-2014. Dutch intelligence agents were then able to monitor the activities of Cozy Bear hackers for at least a year, even managing to watch them from security cameras they had gained access to.</p>
<p>In late-2014, AIVD agents were able to use the information gleaned from their surveillance activities to assist the FBI and NSA in ridding U.S. State Department computer networks of Russian Hackers who were attempting to gain access.</p>
<h3>The 2016 Presidential Election: Russian Hackers Gain Access to DNC Networks and Email Accounts</h3>
<p>AIVD agents watched, in real-time, as Cozy Bear hackers infiltrated the DNC&#8217;s computer networks in 2016. Unbeknownst to the Russians, AIVD hackers observed the Russians gained access to the email accounts of DNC officials and Democratic Party leaders and collected thousands of documents and emails.</p>
<p>Russian operatives would later release many of documents obtained by hackers through Wikileaks, D.C. Leaks, or Guccifer 2.0. Dutch officials provided this critical evidence of Russia’s involvement in the 2016 U.S. presidential elections to counterintelligence officials in the U.S. The evidence was, reportedly, a catalyst for the FBI initiating a counterintelligence investigation into the Russian government&#8217;s interference in the 2016 presidential election.</p>
<p>Cozy Bear is one of two hacking groups affiliated with the Russian government that infiltrated DNC networks in the run-up to the 2016 presidential election; the other is referred to as Fancy Bear. Cozy Bear has been linked to Russia&#8217;s Foreign Intelligence Service (SVR) by AIVD officials. Fancy Bear is widely understood to be connected to Russian military intelligence, GRU. Government officials and private sector cybersecurity experts believe the two groups conducted their activities independently of one another.</p>
<p>The report published by Volkskrant is based on the accounts of six American and Dutch sources familiar with the matter.  Security and intelligence officials in the Netherlands declined to comment on the subject when asked by reporters.</p>
<p>In the Hague, Dutch Interior Minister Kajsa Ollongren stated to reporters that she was &#8220;very happy that we have good security services in the Netherlands that do their work well. I can&#8217;t say anything about this case that has been published.&#8221;</p>
<p><a href="https://globalsecurityreview.com/russian-hacker-group-cozy-bear-hacked-dutch-intelligence/">Russian Hacker Group Cozy Bear Was Hacked By Dutch Intelligence Service</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>U.S. Allies More Likely to Take Unilateral Action in 2018</title>
		<link>https://globalsecurityreview.com/u-s-isolationism-heighten-odds-unilateral-action-allies/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Sat, 27 Jan 2018 02:40:50 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=1297</guid>

					<description><![CDATA[<p>Increased possibility of unilateral action by U.S. allies due to lack of clarity surrounding the Trump Administration&#8217;s foreign policy. Under the administration of Donald Trump, the United States has been attempting to rebalance its priorities, giving the appearance that it is stepping back from its traditional role as guarantor of international security, trade, and diplomacy. [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/u-s-isolationism-heighten-odds-unilateral-action-allies/">U.S. Allies More Likely to Take Unilateral Action in 2018</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Increased possibility of unilateral action by U.S. allies due to lack of clarity surrounding the Trump Administration&#8217;s foreign policy.</h2>
<p>Under the administration of Donald Trump, the United States has been attempting to rebalance its priorities, giving the appearance that it is stepping back from its traditional role as guarantor of international security, trade, and diplomacy. However, the rhetoric from the executive branch is hardly news.</p>
<p>Prior U.S. presidential administrations—recently the Obama and Bush administrations—repeatedly stressed the need for NATO allies in Europe to increase defense spending. U.S. Presidents and politicians from both political parties have long made the argument that, for decades, American taxpayers have underwritten European security and defense.</p>
<h3>U.S. Allies in Europe</h3>
<p>The European Union—and its two largest economies, France and Germany are facing growing uncertainty in their electorates regarding the role of the Union. The bloc remains comprised of vastly contrarian points-of-view, and it remains to be seen how the E.U. will handle Brexit negotiations with the United Kingdom. At present, it is possible the U.K. and E.U. will agree to some degree of security and defense cooperation.</p>
<p>French President Emmanuel Macron and German Chancellor Angela Merkel, as leaders of the two most influential European Union member states, will need to alleviate the concerns of their respective electorates, which are increasingly concerned with issues such as terrorism and mass immigration—both of which pose severe challenges to European security and social cohesion. Additionally, they will need to effectively communicate the purpose and value of the bloc, in economic, security, and social terms.</p>
<p>On the surface, the European Union would seem to be in a better position than China (oft-touted as the successor to U.S. global hegemony) to serve as a guarantor of global security.</p>
<p>However, the capability of any future E.U. military would pale in comparison to those of the United States. While they compare regarding the number of citizens under arms, American military spending and technological capability far outweigh those of the EU, meaning that the United States remains the only country capable of projecting force on a truly global scale.</p>
<p>Germany became acutely aware of the strategic consequences the European Union would face should Marine Le Pen ascend to the French presidency and follow through with her promises to withdraw France from the both European Union and the NATO Joint Military Command Structure. After the U.S. and Russia, France possesses the third largest nuclear arsenal in the world.</p>
<p>German Defense Minister Ursula von der Leyen was notably concerned about the prospect of France withdrawing from the European Union, as such an act would <a href="http://www.reuters.com/article/uk-germany-usa-nuclear-idUSKBN13B1GO?mkt_tok=eyJpIjoiWW1GbU5XSXpORGhsWkdKbCIsInQiOiJEdFpZK2M0dkNONXJQdUtYanJING93c2NHZWdPemV6YkFocHpPSlFnNGdxRzVua2RGSkpcLzA2bERLK3FXa090aFJHK2tTRVJvd25cL2RIdGF1OFFZTHpHTnc2MGF4MVRpWUdpMXZjRmo3YlljPSJ9">leave the E.U. without a nuclear deterrent</a>. In this scenario, Germany would likely become the bloc’s de-facto military and economic leader and would have to consider leading the development of a European Union nuclear weapons program to deter an increasingly aggressive and opportunistic Russia.</p>
<h3>U.S. Allies in the Middle East</h3>
<p>Iran&#8217;s continued military and political involvement in Syria is viewed as a strategic national security threat to Israel, and continued encroachment towards Israeli territory heightens the risk of a large-scale conflict between Iran and Israel, with a remote possibility of Sunni Gulf Monarchies like Saudi Arabia and the United Arab Emirates supporting Israel in an effort to check Iran&#8217;s hegemonic ambitions.</p>
<p>The U.S. seems to have, at the least, tacitly approved of heightened Israeli aggression against Iranian targets in Syria, although it remains to be seen the level of involvement the U.S. will take on following the appointment of noted hawk John Bolton as U.S. National Security Advisor, and the pending Secretary of State nomination of the similarly hawkish Mike Pompeo, both of whom have long argued for preemptive U.S. action against Iran.</p>
<h3>U.S. Allies in Asia</h3>
<p>Key American allies in East Asia, notably Japan, are also reacting to the “America First” Japan’s military capabilities are restricted by its post-World War II constitution. Japan is limited in its ability to deploy troops overseas and is forbidden from developing or possessing aircraft carriers. Japanese Prime Minister Shinzo Abe has advocated for constitutional reforms that would allow for expanded military and defense capabilities.</p>
<p>Japan’s push to increase its military capabilities isn’t a reaction to the rhetoric currently emanating from the White House. Instead, Japan’s decades-long reluctance to demonstrate its “hard power” capabilities is increasingly outweighed by China’s increasing expansionism and North Korea’s nuclear program.</p>
<p>2018 will likely reveal the limits of China’s influence over the “hermit kingdom.” While China recognizes the security threat posed by a nuclear-armed North Korea with increased intercontinental ballistic missile (ICBM) capability, Beijing is more concerned with the prospect of a U.S.-aligned, unified Korea. As such, it likely intends to maintain the status quo on the Korean Peninsula.</p>
<p><a href="https://globalsecurityreview.com/u-s-isolationism-heighten-odds-unilateral-action-allies/">U.S. Allies More Likely to Take Unilateral Action in 2018</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Jared Kushner Warned by U.S. Officials About Wendi Deng Murdoch</title>
		<link>https://globalsecurityreview.com/jared-kushner-warned-counterintelligence-officials-wendi-deng-murdoch/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Fri, 19 Jan 2018 03:21:11 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=3642</guid>

					<description><![CDATA[<p>Counterintelligence officials expressed concern that Wendi Deng Murdoch could be using her friendship with Jared Kushner and Ivanka Trump to further the interests of the Chinese government. According to a report published by the Wall Street Journal, U.S. counterintelligence officials warned Jared Kushner that Chinese-American businesswoman Wendi Deng Murdoch could be utilizing her relationship with [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/jared-kushner-warned-counterintelligence-officials-wendi-deng-murdoch/">Jared Kushner Warned by U.S. Officials About Wendi Deng Murdoch</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Counterintelligence officials expressed concern that Wendi Deng Murdoch could be using her friendship with Jared Kushner and Ivanka Trump to further the interests of the Chinese government.</h2>
<p>According to a <a href="https://www.wsj.com/articles/u-s-warned-jared-kushner-about-wendi-deng-murdoch-1516052072">report</a> published by the Wall Street Journal, U.S. counterintelligence officials warned Jared Kushner that Chinese-American businesswoman Wendi Deng Murdoch could be utilizing her relationship with Kushner and Ivanka Trump, his wife, to further the Chinese government&#8217;s interests. The Journal cited multiple individuals familiar with the matter.</p>
<p>Wendi Deng Murdoch is the former wife of Rupert Murdoch, the executive chairman of News Corp, who filed for divorce from Ms. Murdoch in 2013. According to the report, U.S. counterintelligence officials have been concerned about an assessment which found that Ms. Murdoch was lobbying on behalf of a Chines government-funded construction project in Washington, D.C. that was deemed a national security risk.</p>
<p>The project was projected to be a $100 million Chinese garden located at the National Arboretum. It was deemed a national security threat due to the inclusion of a 70-foot-tall structure which intelligence community officials believed could be used for surveillance and signals intelligence (SIGINT) collection.</p>
<p>Ms. Murdoch initially appeared on the radar of counterintelligence officials after reports surfaced that she had been romantically involved with former British Prime Minister Tony Blair while she was still married to Mr. Murdoch.  British security officials reportedly spoke with their counterparts in the U.S. about whether the alleged relationship might be cause for concern. According to the Journal&#8217;s sources, the FBI decided that there was cause for increased concern about Ms. Murdoch. However, she was not the subject of any formal investigation at the time.</p>
<p>The Chinese government responded to the Journal&#8217;s report, saying that it was &#8220;groundless speculation.&#8221; U.S. counterintelligence officials are increasingly concerned about the Chinese government&#8217;s attempts to utilize individuals with ties to the Trump Administration or with business interests or family in China to influence official policy.</p>
<p>The Chinese garden project at the Arboretum in Northeast Washington was proposed for at least a decade as a sign of goodwill between the two nations, similar to Beijing&#8217;s gift of pandas to the National Zoo in 1972. The 12-acre project was to incorporate a lake along with multiple buildings and gardens which could be employed to host cultural programs. The project was initiated in January 2011, when then-President Hu Jintao traveled to the U.S. A version of the project was presented to him by Vice President Joe Biden and Secretary of State Hillary Clinton.</p>
<p><a href="https://globalsecurityreview.com/jared-kushner-warned-counterintelligence-officials-wendi-deng-murdoch/">Jared Kushner Warned by U.S. Officials About Wendi Deng Murdoch</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Forget about North Korea, Venezuela is the next major national security crisis</title>
		<link>https://globalsecurityreview.com/forget-north-korea-venezuela-hot-spot-u-s-needs-worry/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Fri, 12 Jan 2018 21:30:33 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[Colombia]]></category>
		<category><![CDATA[Cuba]]></category>
		<category><![CDATA[Hezbollah]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Lebanon]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Venezuela]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=3030</guid>

					<description><![CDATA[<p>The country has become a full-blown narco-state, making a negotiated political settlement nearly impossible. Venezuela’s problems will only get worse as President Nicolas Maduro strips Venezuela’s democratic institutions of their authority while consolidating his power. While government and business elites who have access to petrodollars enjoy overwhelmingly favorable exchange rates, the majority of Venezuelans are [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/forget-north-korea-venezuela-hot-spot-u-s-needs-worry/">Forget about North Korea, Venezuela is the next major national security crisis</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The country has become a full-blown narco-state, making a negotiated political settlement nearly impossible.</h2>
<p><span class="dropcap dropcap-circle">V</span>enezuela’s problems will only get worse as President Nicolas Maduro strips Venezuela’s democratic institutions of their authority while consolidating his power. While government and business elites who have access to petrodollars enjoy overwhelmingly favorable exchange rates, the majority of Venezuelans are going hungry.</p>
<p>Further economic mismanagement will increase already-widespread starvation, illness, and insecurity. The result will be a massive overland exodus of refugees from Venezuela to Colombia, Brazil, and Guyana. The Dutch island territories of Aruba, Bonaire, and Curaçao—just 40-80 km off the northern coast of Venezuela—would face a significant number of refugees.</p>
<p class="bs-intro" style="padding-left: 30px;"><mark class="bs-highlight bs-highlight-red">Summary</mark></p>
<ul class="bs-shortcode-list list-style-check">
<li><mark class="bs-highlight bs-highlight-red">Government mismanagement of the oil industry is at the root of Venezuela’s humanitarian crisis, as productivity has rapidly collapsed. </mark></li>
<li><mark class="bs-highlight bs-highlight-red">Hyperinflation has made Venezuelan currency nearly worthless as the prices of essential goods have skyrocketed.</mark></li>
<li><mark class="bs-highlight bs-highlight-red">If the already-dire situation worsens considerably, there will be a massive overland exodus of refugees from Venezuela to Colombia, Brazil, Guyana, and the United States. </mark></li>
<li><mark class="bs-highlight bs-highlight-red">The number of Venezuelans seeking political asylum in the United States has increased by over 160% from 2016.</mark></li>
</ul>
<h3>A massive refugee crisis in the Americas wouldn’t just affect Venezuela’s neighbors.</h3>
<p><span class="dropcap dropcap-simple">A</span>lready, thousands have fled, and the number of Venezuelans seeking political asylum in the United States has increased by over 160% from 2016. As food insecurity worsens for the public and the government steps ups its repression of dissent, there will be a spillover effect regarding migration to the United States from South and Central America.</p>
<p>If the United States is unprepared for such a crisis, the results could have catastrophic implications for American national security. The Venezuelan Vice President, Tareck El Aissami, has been accused of having ties with Iranian and Hezbollah connected individuals and entities. El Aissami has been linked to 173 Venezuelan passports and identity cards that were issued to individuals from the Middle East and Central Asia, including alleged members of Hezbollah.</p>
<p>Holders of Venezuelan passports are afforded visa-free entry to over 130 countries, including 26 European Union member states. While a visa is required to enter the United States, there are likely more lenient standards for accepting applications from holders of Venezuelan passports than for holders of Iranian, Syrian, or Lebanese passports.</p>
<h3>The situation in Venezuela is terrible for everyone</h3>
<p>For Venezuela, the worst case scenario is a complete breakdown of the central government’s control over the state. If the Venezuelan government is unable to contain the flow of refugees and an overwhelming number cross into neighboring Brazil and Colombia, those governments may be forced to act in the interest of their national security interests.</p>
<p>Given the geographic proximity of the United States to Venezuela, democratic governance there along with adherence to the rule-of-law is paramount for American security in the long-term. Otherwise, the U.S. will undoubtedly face a massive influx of immigrants. Such a flow would not be stopped by a wall, like the one proposed by President Trump along the U.S.-Mexico border. Venezuelans seeking refuge from the humanitarian crisis will utilize air or maritime transport routes to reach the U.S.</p>
<p>Already, over 250,000 Venezuelans have migrated into Colombia in search of greater security and access to food and medical care. Colombia is in the process of finalizing a significant peace agreement with the FARC Rebel group, and a continued mass-migration of Venezuelan refugees could threaten Colombia’s internal stability. Absent a political settlement, which seems increasingly impossible due to the criminal nature of the Venezuelan regime, military intervention may be the only solution.</p>
<p>The Colombian government—possibly in cooperation with Brazil and other regional partners—may decide to pre-empt a mass-exodus of Venezuelans into Colombia by launching a military operation with the intent of deposing the government of Nicolas Maduro.</p>
<p>This would be no easy task. Venezuela, in addition to its military resources, has close security ties with Cuba. An attempt at intervention in Venezuela by a coalition of American democracies could rapidly descend into a much more significant conflict, mainly if hardliners in Havana perceive the operation as an American-led proxy war directed against Cuba and Cuba&#8217;s overseas interests.</p>
<p><a href="https://globalsecurityreview.com/forget-north-korea-venezuela-hot-spot-u-s-needs-worry/">Forget about North Korea, Venezuela is the next major national security crisis</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Facebook, Compromised: How Russia Manipulated U.S. Voters</title>
		<link>https://globalsecurityreview.com/russia-manipulated-u-s-voters-social-media/</link>
		
		<dc:creator><![CDATA[Sophia Porotsky]]></dc:creator>
		<pubDate>Thu, 11 Jan 2018 12:20:29 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=1105</guid>

					<description><![CDATA[<p>Information Warfare: Russia&#8217;s &#8220;Active Measures.&#8221; Conceptually, Information warfare is by no means a new concept. However, the broad reach of social media has created an entirely new and highly effective avenue for Russian ‘active measures’ to penetrate into and influence the minds of the American public.  Active measures “employ a three-pronged approach that attempts to [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/russia-manipulated-u-s-voters-social-media/">Facebook, Compromised: How Russia Manipulated U.S. Voters</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Information Warfare: Russia&#8217;s &#8220;Active Measures.&#8221;</h2>
<p>Conceptually, Information warfare is by no means a new concept. However, the broad reach of social media has created an entirely new and highly effective avenue for Russian ‘active measures’ to penetrate into and influence the minds of the American public.  <a href="https://warontherocks.com/2016/11/trolling-for-trump-how-russia-is-trying-to-destroy-our-democracy/">Active measures</a> “employ a three-pronged approach that attempts to shape foreign policy…state-to-people, People-To-People, and state-to-state…The Russian government today uses the state-to-people and people-to-people approaches on social media and the internet.”</p>
<hr>
<p><em>This is the second instalment examining Russian information warfare, the use of social media, and the US election. Part one,</em><a href="http://globalsecurityreview.com/europe-security/cold-war-2-0-russian-information-warfare/">Cold War 2.0: Russian Information Warfare</a>, <em>introduces the information warfare concept and its role in cyberspace.  </em></p>
<p><em>Third, </em><a href="http://globalsecurityreview.com/american-security/security-policy/trump-campaigns-exploitation-social-media/">The Trump Campaign&#8217;s Exploitation of Social Media</a>, <em>explains how the campaign benefited from Twitter bots, trolls, and microtargeted Facebook messages. </em></p>
<p><i>Last, </i><a href="http://globalsecurityreview.com/american-security/security-policy/cambridge-analytica-darker-side-big-data/">Cambridge Analytica: the Darker Side of Big Data</a>, <em>investigates the involvement of an ethically dubious &#8220;election management&#8221; firm in the 2016 presidential elections.</em></p>
<hr>
<p><a href="https://warontherocks.com/2016/11/trolling-for-trump-how-russia-is-trying-to-destroy-our-democracy/">According to researchers</a> who conducted a post-mortem of social media activity during the election using internet analytics tools, Russian Information Warfare content on social media attempts to subvert Western democracies in five ways: undermine public confidence in democratic government, exacerbate internal political divisions, erode trust in government, push the Russian agenda in foreign populations, and create confusion and distrust by blurring fact and fiction. Russian propaganda on social media can be divided into four themes: political messages intended to foster distrust in government (e.g. allegations of voter fraud, corruption), financial propaganda (i.e. create distrust in Western financial institutions), social issues (e.g. ethnic tensions, police brutality), and doomsday-style conspiracy theories.</p>
<p>Information warfare content is generated and disseminated through channels that fall into three attribution categories: white (overt), grey (less-overt), and black (covert) channels. They propagate a blend of authentic, manipulated, and fake stories and they feed off of and reinforce each other.</p>
<p>White or overt channels include state-sponsored pro-Russian news outlets such as Sputnik and RT, the grey less-overt outlets include data dump sites, such as Wikileaks, and more sinister black channels involve covert operations such as hacking. The agents disseminating the information include bots (automated web robots), and real people, often presenting themselves as innocuous news aggregators. These agents form the key engine for distributing misinformation and disinformation.</p>
<p>Black or covert measures—once highly risky and dangerous to carry out—are now easily and efficiently carried out through social media. Russia is now able to remotely coordinate an army of hackers, honeypots (in this instance, social media profiles used to bait other users into giving compromising or embarrassing information), and hecklers or internet trolls (individuals who purposely create discord or provoke).</p>
<h3><b>The Role of Non-State Cyber Hackers: Advanced Persistent Threat Groups</b></h3>
<p>Cyber hacking groups—or advanced persistent threat (APT) groups—are a <a href="https://weaponizednarrative.asu.edu/library/russia%E2%80%99s-approach-cyber-warfare">critical component</a> of the Kremlin’s information operations. The fact that it is challenging to definitively prove ties to the Russian government is what endears them to the Kremlin. However, while there isn’t necessarily a ‘smoking gun,’ evidence gleaned from previous cyber attacks has allowed the top US intelligence agencies to reach conclusions, with a strong degree of confidence, that <a href="https://www.nytimes.com/2017/01/06/us/politics/russian-hack-report.html">the Kremlin was involved</a>.</p>
<p><a href="http://www.slate.com/articles/news_and_politics/war_stories/2016/07/the_dnc_email_leaks_show_that_russia_is_trying_to_influence_the_u_s_election.html">For example</a>,  “the facts that the hackers’ work hours aligned with Moscow’s time zone, operations ceased on Russian holidays, their techniques carried signatures common to other Russian hacks, and their targets were of clear interest to Moscow.” In the social media realm, hackers provide the fodder for the narratives of disinformation/misinformation generated. “<a href="https://warontherocks.com/2016/11/trolling-for-trump-how-russia-is-trying-to-destroy-our-democracy/">The most notorious Russian-linked hacker</a>…Guccifer 2.0, targets current and former U.S. government officials, American security experts, and media personalities by seeking access to their private communications and records,” and whatever information may come to light then presents itself in the propaganda created and disseminated.</p>
<h3><b>Honeypots</b></h3>
<p><a href="https://warontherocks.com/2016/11/trolling-for-trump-how-russia-is-trying-to-destroy-our-democracy/">Honeypots are fake social media profiles</a> which are designed to lure in real people to engage with them online: “today’s honeypots may include a component of sexual appeal or attraction, but they just as often appear to be people who share a target’s political views, obscure personal hobbies, or issues related to family history.”</p>
<p>The objective of the honeypot accounts is to earn the trust of unsuspecting users in order to conduct a range of activities including disseminating content from white and gray propaganda channels, attempting to entrap users with compromising propositions such as offers of sexual exchanges, or trying to persuade targets to click on malicious links or deceive people into downloading malware (software intended to damage a computer).</p>
<p>If the target exposed to a malicious link or malware is a person of interest, such as a politician or public figure, this enables APT groups to access personal information and post it on grey channels such as data dump sites. The information revealed in turn <a href="http://www.bbc.com/news/world-us-canada-39435786">helps construct the narrative of misinformation</a> posted on white channels, such as RT or Sputnik, and eventually trickling down to conservative news sites such as Breitbart, before being picked up by the mainstream media.</p>
<h3>Hecklers: Trolls &amp; Troll Farms</h3>
<p>Hecklers, or trolls, give life to Russia’s influence operations. There have been reports of “troll farms,” <a href="https://weaponizednarrative.asu.edu/library/russia%E2%80%99s-approach-cyber-warfare">employing hundreds of people</a>, formed to actively disseminate pro-Kremlin propaganda. It is important to note, “the information contained in the comments and posts by the trolls ranges from misleading to verifiably fraudulent.” The objective of trolls is not necessarily to defend or validate the pro-Russian propaganda posted, but rather to flood the social media space with such a high volume of misinformation, as to create a state of confusion and calamity.</p>
<p>Senator Mark Warner, the ranking Democrat on the Senate Intelligence Committee, has <a href="http://Army%20of%20Russian%20Trolls%20Reportedly%20Targeted%20Swing%20States%20with%20Anti-Clinton%20Fake%20News">said</a> that “there were upwards of a thousand paid internet trolls working out of a facility in Russia, in effect taking over a series of computers which are then called a botnet, that can then generate news down to specific areas.” The implication here: a sophisticated and coordinated social media disinformation campaign was able to micro-target vulnerable voter populations. The reason they were vulnerable is that they received their news from social media, which had been powerfully harnessed to manipulate voters in the critical weeks leading up to Election Day.</p>
<h3><b>The Ramifications of a Compromised Social Media Space</b></h3>
<p>Social media, a Western innovation, at a glance seems like an ideal manifestation of a free and open society. Social media platforms enable users to share information, freely express opinions, and connect with other individuals. However, these same platforms were harnessed to wage a full-scale coordinated Information warfare offensive. False articles—“fake news” content—that favored Trump were <a href="http://www.newyorker.com/magazine/2017/03/06/trump-putin-and-the-new-cold-war">four times as likely</a> to be shared on social media platforms when compared with false stories favoring Secretary Clinton.</p>
<p>“Fabricated pro-Trump stories were shared four times as often as fabricated pro-Clinton stories…researchers also found that roughly half the readers of a fake news story believed it…automated Twitter accounts, known as “bots,” generated four tweets in favor of Trump for everyone in favor of Clinton…a substantial number of these bots were aligned with individuals and organizations supported, and sometimes funded, by the Kremlin.”</p>
<p>Russia utilized generations’ worth of acquired expertise in the art of Information warfare and adapted it to social media in a way that was agile, penetrating and efficient. There is evidence suggesting there were efforts to suppress voters in key precincts in Pennsylvania, Michigan, and Wisconsin.</p>
<p><a href="http://washingtonmonthly.com/2017/03/30/why-did-russia-hack-the-voter-rolls/">These states, which were crucial</a> in determining the winner of the Presidential election, were flooded with disinformation in the week leading up to the election. While it is difficult to conclusively demonstrate a causal relationship between the election results and Russian active measures targeted at these populations, it is highly likely, given that all three states <a href="https://constitutioncenter.org/blog/voting-history-of-the-15-battleground-states">voted Democrat in the past 5 Presidential elections</a>.</p>
<p>Donald Trump, a fringe candidate with a radical platform, emerging victorious in these historically moderate voting districts, begs the question of what was the variable that impacted the election? The penetration of Russian Information warfare efforts, so effective due to the successful harnessing of social media, increasingly seems to be the culprit. However, the social media-facilitated assault on the democratic process had another devastating angle: the Trump campaign.</p>
<hr>
<p><em>This is the second instalment examining Russian information warfare, the use of social media, and the US election. Part one,</em><a href="http://globalsecurityreview.com/europe-security/cold-war-2-0-russian-information-warfare/">Cold War 2.0: Russian Information Warfare</a>, <em>introduces the information warfare concept and its role in cyberspace.  </em></p>
<p><em>Third, </em><a href="http://globalsecurityreview.com/american-security/security-policy/trump-campaigns-exploitation-social-media/">The Trump Campaign&#8217;s Exploitation of Social Media</a>, <em>explains how the campaign benefited from Twitter bots, trolls, and microtargeted Facebook messages. </em></p>
<p><i>Last, </i><a href="http://globalsecurityreview.com/american-security/security-policy/cambridge-analytica-darker-side-big-data/">Cambridge Analytica: the Darker Side of Big Data</a>, <em>investigates the involvement of an ethically dubious &#8220;election management&#8221; firm in the 2016 presidential elections.</em></p>
<p><a href="https://globalsecurityreview.com/russia-manipulated-u-s-voters-social-media/">Facebook, Compromised: How Russia Manipulated U.S. Voters</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber Deterrence: Cybersecurity&#8217;s Next Phase</title>
		<link>https://globalsecurityreview.com/cyber-deterrence-cybersecuritys-next-phase/</link>
		
		<dc:creator><![CDATA[Dorothy Denning]]></dc:creator>
		<pubDate>Sun, 07 Jan 2018 05:00:57 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=3326</guid>

					<description><![CDATA[<p>Can we reduce the likelihood of digital attacks? Cyber attackers pose many threats to a wide range of targets. Russia, for example, was accused of hacking Democratic Party computers throughout the year, interfering with the U.S. presidential election. Then there was the unknown attacker who, on a single October day, used thousands of Internet-connected devices, [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/cyber-deterrence-cybersecuritys-next-phase/">Cyber Deterrence: Cybersecurity&#8217;s Next Phase</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Can we reduce the likelihood of digital attacks?</h2>
<p>Cyber attackers pose many threats to a wide range of targets. Russia, for example, was <a href="https://www.washingtonpost.com/world/national-security/us-government-officially-accuses-russia-of-hacking-campaign-to-influence-elections/2016/10/07/4e0b9654-8cbf-11e6-875e-2c1bfe943b66_story.html">accused of hacking</a> Democratic Party computers throughout the year, interfering with the U.S. presidential election. Then there was the unknown attacker who, on a single October day, used thousands of Internet-connected devices, such as digital video recorders and cameras compromised by <a href="https://krebsonsecurity.com/2016/10/source-code-for-iot-botnet-mirai-released/">Mirai malware</a>, to <a href="https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet">take down several high-profile websites</a>, including Twitter.</p>
<p>From 2005 to 2015, federal agencies reported a <a href="https://www.washingtonpost.com/news/powerpost/wp/2016/09/22/federal-cyber-incidents-jump-1300-in-10-years/">1,300 percent jump in cybersecurity incidents</a>. Clearly, we need better ways of addressing this broad category of threats. Some of us in the cybersecurity field are asking whether <a href="http://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-77/jfq-77_8-15_Denning.pdf">cyber deterrence</a> might help.</p>
<p>Deterrence focuses on making potential adversaries think twice about attacking, forcing them to consider the costs of doing so, as well as the consequences that might come from a counterattack. There are two main <a href="http://www.nato.int/docu/review/2015/also-in-2015/deterrence-russia-military/EN/index.htm">principles of deterrence</a>. The first, denial, involves convincing would-be attackers that they won’t succeed, at least without enormous effort and cost beyond what they are willing to invest. The second is punishment: Making sure the adversaries know there will be a strong response that might inflict more harm than they are willing to bear.</p>
<p>For decades, deterrence has effectively countered the threat of nuclear weapons. Can we achieve similar results against cyber weapons?</p>
<h2>Why cyber deterrence is hard</h2>
<p>Nuclear deterrence works because few countries have nuclear weapons or the significant resources needed to invest in them. Those that do have them recognize that <a href="http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubid=585">launching a first strike risks a devastating nuclear response</a>. Further, the international community has established institutions, such as the <a href="https://www.iaea.org/">International Atomic Energy Agency</a>, and agreements, such as the <a href="http://disarmament.un.org/treaties/t/npt">Treaty on the Non-Proliferation of Nuclear Weapons</a>, to counter the catastrophic threat nuclear weapons pose.</p>
<p>Cyber weapons are nothing like nuclear ones. They are readily developed and deployed by individuals and small groups as well as states. They are easily replicated and distributed across networks, rendering impossible the hope of anything that might be called “cyber nonproliferation.” Cyber weapons are often deployed under a cloak of anonymity, making it difficult to figure out who is really responsible. And cyber attacks can achieve a broad range of effects, most of which are disruptive and costly, but not catastrophic.</p>
<p>This does not mean cyber deterrence is doomed to failure. The sheer scale of cyber attacks demands that we do better to defend against them.</p>
<p>There are three things we can do to strengthen cyber deterrence: Improve cybersecurity, employ active defenses and establish international norms for cyberspace. The first two of these measures will significantly improve our cyber defenses so that even if an attack is not deterred, it will not succeed.</p>
<h3>Stepping up protection</h3>
<p>Cybersecurity aids deterrence primarily through the principle of denial. It stops attacks before they can achieve their goals. This includes beefing up login security, encrypting data and communications, fighting viruses and other malware, and keeping software updated to patch weaknesses when they’re found.</p>
<p>But even more important is developing products that have few if any security vulnerabilities when they are shipped and installed. The Mirai botnet, capable of <a href="https://krebsonsecurity.com/2016/10/hacked-cameras-dvrs-powered-todays-massive-internet-outage/">generating massive data floods that overload internet servers</a>, takes over devices that have gaping security holes, including <a href="https://krebsonsecurity.com/2016/10/iot-device-maker-vows-product-recall-legal-action-against-western-accusers/">default passwords hardcoded into the firmware</a> that users can’t change. While some companies such as <a href="https://blogs.microsoft.com/microsoftsecure/author/stevelipner/">Microsoft invest heavily in product security</a>, others, including many Internet-of-Things vendors, do not.</p>
<p>Cybersecurity guru <a href="http://www.schneier.com/">Bruce Schneier</a> aptly characterizes the prevalence of insecure Internet-of-Things devices as a <a href="https://www.washingtonpost.com/posteverything/wp/2016/11/03/your-wifi-connected-thermostat-can-take-down-the-whole-internet-we-need-new-regulations/">market failure akin to pollution</a>. Simply put, the market favors cheap insecure devices over ones that are more costly but secure. His solution? Regulation, either by imposing basic security standards on manufacturers or by holding them liable when their products are used in attacks.</p>
<h3>Active Defenses</h3>
<p>When it comes to taking action against attackers, there are many ways to monitor, identify and counter adversary cyberattacks. These active cyber defenses are <a href="http://faculty.nps.edu/dedennin/publications/Active%20Cyber%20Defense%20-%20Cyber%20Analogies.pdf">similar to air defense systems</a> that monitor the sky for hostile aircraft and shoot down incoming missiles. Network monitors that watch for and block (“shoot down”) hostile packets are one example, as are <a href="https://www.sans.org/security-resources/idfaq/what-is-a-honeypot/1/9">honeypots</a> that attract or deflect adversary packets into safe areas. There, they do not harm the targeted network, and can even be studied to reveal attackers’ techniques.</p>
<p>Another set of active defenses involves collecting, analyzing and sharing information about potential threats so that network operators can respond to the latest developments. For example, operators could <a href="https://www.arbornetworks.com/blog/asert/mirai-iot-botnet-description-ddos-attack-mitigation/">regularly scan their systems</a> looking for devices vulnerable to or compromised by the Mirai botnet or other malware. If they found some, they could disconnect the devices from the network and alert the devices’ owners to the danger.</p>
<p>Active cyber defense does more than just deny attackers opportunities. It can often unmask the people behind them, leading to punishment. Nongovernment attackers can be <a href="https://www.scmagazine.com/avalanche-cyber-crime-platform-dismantled-eu-security-forces-praised/article/576573/">shut down, arrested and prosecuted</a>; countries conducting or supporting cyberwarfare can be sanctioned by the international community.</p>
<p>Currently, however, the private sector is <a href="https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/05/18/CSIS%20Roundtable%205-18-15.pdf">reluctant to employ</a> many active defenses because of legal uncertainties. The Center for Cyber and Homeland Security at George Washington University <a href="https://cchs.gwu.edu/sites/cchs.gwu.edu/files/downloads/CCHS-ActiveDefenseReportFINAL.pdf">recommends several actions</a> that the government and the private sector could take to enable the more widespread use of active defenses, including clarifying regulations.</p>
<h3>Setting international norms</h3>
<p>Finally, international norms for cyberspace can aid deterrence if national governments believe they would be named and shamed within the international community for conducting a cyber attack. The U.S. brought charges in 2014 <a href="https://www.justice.gov/opa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor">against five Chinese military hackers</a> for targeting American companies. A year later, the U.S. and China <a href="http://blogs.wsj.com/chinarealtime/2016/06/15/inside-the-slow-workings-of-the-u-s-china-cybersecurity-agreement/">agreed to not steal and exploit each other’s corporate secrets</a> for commercial advantage. In the wake of those events, <a href="https://www.fireeye.com/content/dam/fireeye-www/current-threats/pdfs/rpt-china-espionage.pdf">cyber espionage from China plummeted</a>.</p>
<p>Also in 2015, a U.N. group of experts recommended <a href="http://www.un.org/ga/search/view_doc.asp?symbol=A/70/174">banning cyber attacks against critical infrastructure</a>, including a country’s computer emergency response teams. And later that year, the G20 issued a <a href="http://www.foreign.senate.gov/imo/media/doc/052516_Painter_Testimony.pdf">statement opposing the theft of intellectual property</a> to benefit commercial entities. These norms might deter governments from conducting such attacks.</p>
<p>Cyberspace will never be immune to attack – no more than our streets will be immune to crime. But with stronger cybersecurity, increased use of active cyber defenses, and international cyber norms, we can hope to at least keep a lid on the problem.</p>
<div class="grammarly-disable-indicator"></div>
<p><a href="https://globalsecurityreview.com/cyber-deterrence-cybersecuritys-next-phase/">Cyber Deterrence: Cybersecurity&#8217;s Next Phase</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Sleepwalking into War: The North Korean Quagmire</title>
		<link>https://globalsecurityreview.com/north-korea-war-quagmire/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Tue, 19 Dec 2017 01:07:31 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[South Korea]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=3360</guid>

					<description><![CDATA[<p>The escalating war of words between U.S. President Donald Trump and North Korean Leader Kim Jung-Un has effectively created a situation in which the U.S. Government has three strategic options. The U.S. could agree with the North Korean regime over accepting some degree of the North&#8217;s nuclear capabilities. The U.S. could use military force to decapitate [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/north-korea-war-quagmire/">Sleepwalking into War: The North Korean Quagmire</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The escalating war of words between U.S. President Donald Trump and North Korean Leader Kim Jung-Un has effectively created a situation in which the U.S. Government has three strategic options.</h2>
<ol>
<li>The U.S. could agree with the North Korean regime over accepting some degree of the North&#8217;s nuclear capabilities.</li>
<li>The U.S. could use military force to decapitate the government of North Korea and secure its nuclear weapons.</li>
<li>The U.S. could steadfastly continue on its current (somewhat provocatory) strategy of containment. Through diplomatic efforts, economic sanctions, force posturing, and investment in ballistic missile defense systems innovation, the U.S. would seek to contain the North Korean regime to contain any future escalation.</li>
</ol>
<h3>Accepting a Nuclear North Korea?</h3>
<p>The Trump administration could execute a complete policy reversal and accept North Korea&#8217;s nuclear arsenal in negotiations. This would undermine American foreign policy in that it would be seen as the capitulation of the United States to the rogue state of North Korea.</p>
<p>The North Korean government will, in no way, sign a nuclear weapons agreement with the Trump administration that sees them left without a nuclear arsenal. The concept of nuclear deterrence is fundamental to not only North Korea&#8217;s national security strategy but to the survival of the Kim family itself.</p>
<h3>Military Options for North Korea</h3>
<p>Based on the stated end-goal of &#8220;denuclearization&#8221; on the Korean Peninsula, it is unlikely that the U.S. would submit to demands like talks without preconditions, or agree on a framework for future negotiations. Such an action would look as if the U.S. was weak in upholding a stated national security objective.</p>
<p>[bs-quote quote=&#8221;The president is likely to make this decision (to attack), and we need to be ready.&#8221; style=&#8221;style-1&#8243; align=&#8221;center&#8221; author_name=&#8221;Tammy Duckworth&#8221; author_job=&#8221;U.S. Senator (D, IL)&#8221; author_avatar=&#8221;http://globalsecurityreview.com/wp-content/uploads/2017/12/220px-Tammy_Duckworth_official_portrait_113th_Congress.jpg&#8221;][/bs-quote]</p>
<p>It would also be seen as a sign of weakness by countries like Iran, Russia, and China. The alternative would be to use military force—something that seems increasingly likely to occur.</p>
<p>Senator Tammy Duckworth (D-IL), an Iraq War veteran and Purple Heart recipient, said: “we are far closer to actual conflict over North Korea than the American people realize. Everything we’re doing shows a military that, in my personal opinion, has turned the corner.&#8221; Senator Duckworth added, &#8220;the president is likely to make this decision [to attack], and we need to be ready.”</p>
<h4>Launching a Pre-Emptive Strike on North Korea</h4>
<p>A conflict in North Korea could erupt with an overwhelming pre-emptive strike by the U.S. on North Korean government, nuclear, artillery, and military targets. This would involve strategic planning to ensure all necessary assets are in the region at the right time.</p>
<p>Despite the outdated nature of North Korea&#8217;s military forces, they remain a formidable adversary. North Korea ranks fourth among the world’s largest militaries with more than 1.1 million personnel in the country’s armed forces, accounting for nearly 5 percent of its total population.</p>
<p>Article 86 of the North Korean constitution states “National defense is the <a title="supreme duty" href="http://www.naenara.com.kp/en/politics/?rule+6" rel="noopener">supreme duty</a> and honor of citizens,” and it requires all citizens to serve in the military. The regime spent an average of <a title="$3.5 billion" href="https://www.state.gov/t/avc/rls/rpt/wmeat/2016/index.htm" rel="noopener">$3.5 billion</a> annually on military expenditures between 2004 and 2014, according to a U.S. State Department report.</p>
<p>Although its neighbors and adversaries outspend Pyongyang in dollar-to-dollar comparisons and defense experts, say it operates with aging equipment and technology, the regime’s forward-deployed military position and missiles aimed at Seoul ensure that Pyongyang’s conventional capabilities remain a constant threat to its southern neighbor. U.S. Secretary of Defense Jim Mattis has cautioned that war on the Korean peninsula would be “<a title="catastrophic" href="http://www.cbsnews.com/news/transcript-defense-secretary-james-mattis-on-face-the-nation-may-28-2017/" rel="noopener">catastrophic</a>” and he has described North Korea as “the most <a title="urgent and dangerous threat" href="http://docs.house.gov/meetings/AS/AS00/20170612/106090/HHRG-115-AS00-Bio-MattisJ-20170612.pdf" rel="noopener">urgent and dangerous threat</a>  to peace and security.”</p>
<h4>&#8220;Sleepwalking&#8221; the path to war with North Korea</h4>
<p>The alternate route to war is more subtle than an overwhelming pre-emptive strike. As the U.S. military steps up its air surveillance and show-of-force flights along North Korean borders, the risk of an incident occurring grows by the day. North Korean forces may perceive a show-of-force flight by a U.S. bomber as a critical threat and shoot it down, or they may believe it to be within North Korean airspace (even if it isn&#8217;t) and shoot it down just the same.</p>
<p>If an event such as this were to take place, there is little debate that the U.S. President would order a counterattack. North Korea has a significant number of artillery and short-range missile batteries within range of Seoul. There is little doubt that, in the event of an escalation to conflict, these would be used immediately to inflict as much damage as possible on South Korean and American positions (both military and civilian).</p>
<p>In contrast to Syria, where American destroyers launched Tomahawk cruise missiles at a target within Syrian territory from the safety of the Mediterranean and without much of a risk for a counterattack, U.S. forces engaged in a counterstrike against North Korea in such a scenario would be land, air, and sea forces of overwhelming capability. There would be very limited time to secure critical military assets and positions before they could be used against U.S.-allied forces.</p>
<p>The U.S., South Korean, and (presumably) Japanese forces would need to concentrate initial efforts on disabling North Korea&#8217;s artillery batteries and missile installations that are within range of Seoul, eliminating the regime&#8217;s command-and-control capabilities over their troops, and securing North Korea&#8217;s nuclear arsenal before it can be used.  It would be nearly impossible to execute a pre-emptive strike that minimized civilian and military casualties. Any war, conflict, or use of force on the Korean peninsula will risk a resulting death toll of a size not seen since the last Korean War.</p>
<p>&nbsp;</p>
<div class="grammarly-disable-indicator"></div>
<div class="grammarly-disable-indicator"></div>
<div class="grammarly-disable-indicator"></div>
<div class="grammarly-disable-indicator"></div>
<p><a href="https://globalsecurityreview.com/north-korea-war-quagmire/">Sleepwalking into War: The North Korean Quagmire</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>China Constructing Refugee Camps Along North Korean Border</title>
		<link>https://globalsecurityreview.com/china-constructing-refugee-camps-along-north-korean-border/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Thu, 14 Dec 2017 19:01:20 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Russia]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=3344</guid>

					<description><![CDATA[<p>China is reportedly building multiple refugee camps along the North Korean border. A leaked document published on the Chinese microblogging site Weibo, states that China is constructing numerous refugee camps capable of holding large numbers of asylum seekers fleeing potential disaster on the Korean Peninsula. &#8220;As the situation on the North Korean border intensifies, the Changbai County [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/china-constructing-refugee-camps-along-north-korean-border/">China Constructing Refugee Camps Along North Korean Border</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>China is reportedly building multiple refugee camps along the North Korean border.</h2>
<p>A leaked document published on the Chinese microblogging site Weibo, states that China is constructing numerous refugee camps capable of holding large numbers of asylum seekers fleeing potential disaster on the Korean Peninsula. &#8220;As the situation on the North Korean border intensifies, the Changbai County Government is preparing to build five refugee camps,&#8221; the document states.</p>
<p>The document has since been removed from Weibo. It remains unverified but is linked to the Changbai branch of the China Mobile Group, the largest state-owned telecommunications company in China. Changbai county sits on the Chinese side of the border with North Korea.</p>
<p>[bs-quote quote=&#8221;As the situation on the North Korean border intensifies, the Changbai County Government is preparing to build five refugee camps.&#8221; style=&#8221;default&#8221; align=&#8221;center&#8221;][/bs-quote]</p>
<p>The document states that &#8220;as required by Changbai County Government, the local China Mobile branch will be responsible for ensuring the full functionality of mobile signals and communication networks in the region.&#8221; It adds that Shenhai Fu, the local branch manager is leading the team, and had inspected the alleged construction site earlier this month on December 2 under the instruction of the Changbai County Government.</p>
<p><figure id="attachment_3345" aria-describedby="caption-attachment-3345" style="width: 300px" class="wp-caption alignleft"><img loading="lazy" decoding="async" class=" wp-image-3345" src="http://globalsecurityreview.com/wp-content/uploads/2017/12/9258486-3x4-700x933.jpg" alt="" width="300" height="400" srcset="https://globalsecurityreview.com/wp-content/uploads/2017/12/9258486-3x4-700x933.jpg 700w, https://globalsecurityreview.com/wp-content/uploads/2017/12/9258486-3x4-700x933-225x300.jpg 225w" sizes="(max-width: 300px) 100vw, 300px" /><figcaption id="caption-attachment-3345" class="wp-caption-text">The first page of the leaked document.</figcaption></figure></p>
<p>&#8220;Shenhai Fu has led the team to visit the settlement, and performed communications tests,&#8221; the document continues, adding that signals were still not up to par and weak in specific areas. The document&#8217;s language, as well as the subtitle &#8220;North Korean refugee settlement plans&#8221; imply the telecommunications services and tests were one part of a significant project.</p>
<p>The validity of the original three-page document hasn&#8217;t been independently verified at this time, however, analysts say that the format it was written in, the language used, the level of detail, the mention of Shenhai Fu by name (whose social media accounts are linked to China Mobile), as well as the fact the original document had since been completely culled, have led many experts to conclude the report is genuine.</p>
<h3>Contingency Planning</h3>
<p>&#8220;It&#8217;s a perfectly sensible decision and to be expected that China will be putting contingency plans in place for a potential influx of large numbers of refugees from the Korean Peninsula given the current situation,&#8221; China-Korea expert Dr. Leonid Petrov told the Australian Broadcasting Corporation.</p>
<p>&#8220;I know that Russia — who also shares a small border with North Korea — has been building refugee camps some 15 years ago as part of its contingency plans, in case of an exodus triggered by famine or war or the like.&#8221; Petrov continued by saying &#8220;it&#8217;s only a sensible decision, and from the Chinese perspective, it would be wise to plan [in advance] and prepare the capacity to accept and absorb large groups of people, given that the neighboring provinces are heavily populated by ethnic Koreans.&#8221;</p>
<p>He added that &#8220;pre-empting that situation is, of course, the ideal, which is why Beijing officially maintains its position of denuclearization on the peninsula.&#8221; Dr. Petrov also said the logistics mentioned in the document and language used make &#8220;perfect sense&#8221; given the geography the region along North Korea&#8217;s border with China.</p>
<div class="grammarly-disable-indicator"></div>
<p><a href="https://globalsecurityreview.com/china-constructing-refugee-camps-along-north-korean-border/">China Constructing Refugee Camps Along North Korean Border</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Australia &#038; New Zealand Face China&#8217;s Influence</title>
		<link>https://globalsecurityreview.com/australia-new-zealand-face-chinas-influence/</link>
		
		<dc:creator><![CDATA[Joshua Kurlantzick]]></dc:creator>
		<pubDate>Thu, 14 Dec 2017 12:00:29 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[New Zealand]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=3337</guid>

					<description><![CDATA[<p>Reports that China has stepped up efforts to gain influence in foreign political systems have sparked concern in Australia, New Zealand, and other states amid signs that the campaign may be shaping the debate on regional issues in Asia. Over the past year, both the Australian and New Zealand governments have faced reports that the Chinese government [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/australia-new-zealand-face-chinas-influence/">Australia &#038; New Zealand Face China&#8217;s Influence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 class="subhead">Reports that China has stepped up efforts to gain influence in foreign political systems have sparked concern in Australia, New Zealand, and other states amid signs that the campaign may be shaping the debate on regional issues in Asia.</h2>
<p>Over the past year, both the Australian and New Zealand governments have faced reports that the Chinese government has gained influence in their political systems, universities, and media markets. So far only Canberra has responded firmly. Australia’s domestic intelligence agency, the ASIO, wrote in its annual report to parliament this year that it believed foreign governments are trying to <a title="extend their influence" href="https://www.asio.gov.au/sites/default/files/Annual%20Report%202016-17.pdf" rel="noopener">extend their influence</a> [PDF] in Australian society, posing “a threat to our sovereignty, the ­integrity of our national institutions, and the exercise of our citizens’ rights.”</p>
<p>Specifically, the intelligence service believes businesspeople with strong ties to Beijing and a desire to push pro-China views have been donating millions to the country’s two major political parties. The agency had already <a title="delivered a warning" href="http://www.smh.com.au/federal-politics/political-news/bill-shorten-visited-home-of-chinese-donor-huang-xiangmo-several-months-after-asio-party-warning-20171203-gzxqps.html" rel="noopener">delivered a warning</a> in 2015 to the country’s largest political parties about what <em>Fairfax Media</em> called “Chinese interference in Australian politics via massive cash donations.” Despite the warnings, significant political figures in Australia <a title="continued to take" href="http://www.abc.net.au/news/2017-06-05/asio-warns-political-parties-over-foreign-donations/8590162" rel="noopener">continued to take</a> hundreds of thousands of dollars from these donors. A new analysis by Melbourne Law School’s Dollars and Democracy Database found that, between 2000 and 2016, <a title="about 80 percent" href="https://thenewdaily.com.au/news/national/2017/12/10/chinese-donations-australia/" rel="noopener">about 80 percent</a> of foreign political donations to Australia’s parties came from China.</p>
<p>China’s influence campaign appears to have extended further in Australia. China’s state security forces have <a title="reportedly engaged" href="http://www.abc.net.au/news/2017-06-04/the-chinese-communist-partys-power-and-influence-in-australia/8584270" rel="noopener">reportedly engaged</a> in a battle to monitor Chinese nationals, including many students, there—even warning them not to offer any criticism of Beijing lest their relatives in China be harmed. The ASIO and senior officials around Prime Minister Malcolm Turnbull have begun questioning whether the threat of monitoring students and tactics taken by Chinese officials to scrutinize teaching on China in classrooms has <a title="censored debate about China" href="https://www.nytimes.com/2017/11/15/world/australia/china-students-censorship.html" rel="noopener">censored debate about China</a> within Australian higher education. The intelligence service’s head, Duncan Lewis, <a title="told parliament in October" href="http://www.abc.net.au/news/2017-10-25/government-very-conscious-foreign-interference-australian-unis/9082948" rel="noopener">told parliament in October</a> that Canberra has to be “very conscious of the possibilities of foreign interference in our universities.”</p>
<div class="auxiliary pullquote">
<figure>
<blockquote><p>China’s increasingly bold approach to influence is rattling Australian domestic politics.</p></blockquote>
</figure>
</div>
<p>Chinese state media have created joint ventures in recent years with prominent Australian Chinese-language news outlets, ensuring that they publish stories from Beijing’s state press. Beijing has also established centers for Chinese language and cultural studies, including Confucius Institutes, that some academics have claimed censor criticism of Beijing. The <em>Guardian</em> recently reported that one of these institutes was established within an Australian state government, sparking concern among some intelligence specialists that a Chinese state-linked actor was <a title="working in the Australian government" href="https://www.theguardian.com/world/2017/dec/08/confucious-institute-in-nsw-education-department-unacceptable-analyst" rel="noopener">working in the Australian government</a>.</p>
<p>These reported moves to influence political debate in Australia come at a time when Chinese leader Xi Jinping is overseeing a strategic shift in how Beijing interacts with the world. Unlike his predecessors, Xi is not shy of announcing that Beijing intends to wield global power—power he wants to use to push China’s strategic and economic objectives and to have influence in other states’ domestic politics. China’s increasingly bold approach is rattling Australian politics and leading Canberra to rethink its laws on foreign funds flowing into politics, business, and educational institutions. For its part, China <a title="rejects the claims of interference" href="http://www.globaltimes.cn/content/1079990.shtml" rel="noopener">rejects the claims of interference</a> surfacing in Australia, New Zealand and elsewhere, calling them “disgraceful” and “symptoms of McCarthyism” in an editorial published in the Global Times in December.</p>
<h3>Influence Campaign in New Zealand?</h3>
<p>New Zealand faces a similar challenge. Earlier this year, Anne-Marie Brady, a professor at the University of Canterbury, <a title="released a bombshell report" href="https://www.wilsoncenter.org/sites/default/files/magicweaponsanne-mariebradyseptember162017.pdf" rel="noopener">released a bombshell report</a> documenting numerous ways Beijing has gained influence in New Zealand politics. Brady reported that Beijing has worked to place pro-China individuals in the leadership of ethnic Chinese associations in New Zealand, and has managed donations to the country’s political parties.</p>
<p>Brady believes these strategies have been effective in convincing Wellington to adopt what it calls a “no surprises” China policy of only raising controversial issues in private with Beijing. Meanwhile, the <em>Financial Times</em> and the New Zealand news outlet <em>Newsroom </em>reported this year that Yang Jian, a leading member of parliament from the National Party, had a military intelligence background in China that he failed to disclose when he immigrated to New Zealand and that he has pursued close ties with an organ of the Communist Party in Beijing. Yang has reportedly pushed the National Party—which led New Zealand’s government between 2008 and this year—to <a title="implement closer links with Beijing" href="https://www.ft.com/content/64991ca6-9796-11e7-a652-cde3f882dd7b" rel="noopener">implement closer links with Beijing</a>.</p>
<p>China has significant reasons for launching and expanding political influence campaigns in Australia and New Zealand, two democratic societies that are open to trade, immigration, and foreign cultural influences. The two countries have in recent years become increasingly economically dependent on China. China is Australia’s largest trading partner. In 2008, New Zealand became the first developed nation to sign a free trade deal with China, which is now New Zealand’s biggest goods-trading partner and second-biggest services-trading partner.</p>
<h3>Exporting the ‘China Model’ and Exploiting Open Societies</h3>
<p>In addition to pushing for China to wield more influence in other nations, Xi has also cited Beijing as a model for other countries, a step his predecessors were wary of taking. In October, the <a title="Financial Times reported" href="https://www.ft.com/content/fb2b3934-b004-11e7-beba-5521c713abf4" rel="noopener"><em>Financial Times</em> reported</a> that Xi’s administration had tasked the United Front Work Department, a part of the Communist Party that handles foreign influence duties, which the <em>Times</em> said involved using “Chinese power to charm, co-opt, or attack well-defined groups and individuals” abroad. The U.S. Congressional-Executive Commission on China will <a title="hold a hearing this month" href="https://www.cecc.gov/events/hearings/the-long-arm-of-china-exporting-authoritarianism-with-chinese-characteristics" rel="noopener">hold a hearing this month</a> on Beijing’s attempts to wield influence in the United States.</p>
<p>Under Xi, Chinese embassies around the world have increasingly been tasked with monitoring China-born students who attend foreign universities. Meanwhile, by setting up new influence programs and upgrading its global media, the Chinese government has boosted its resources for influencing journalists, cultural figures, and ethnic Chinese associations abroad. For instance, in 2012, Beijing set up the Chinese Public Diplomacy Association (CPDA), which brings journalists and opinion leaders to China for training.</p>
<div class="auxiliary pullquote">
<figure>
<blockquote><p>Australia and New Zealand have in recent years become increasingly economically dependent on China.</p></blockquote>
</figure>
</div>
<p>Xi’s administration has devoted extensive new resources to globalizing China’s state media outside of the Asia-Pacific. In 2009, Beijing announced it was devoting $6.5 billion to upgrading its state media networks. (The United States, by comparison, spends roughly $700 million annually on state-funded international broadcasting.) Beijing is modernizing its global state television channel, CGTN. The official news agency Xinhua, meanwhile, is adding bureaus around the world, including in the United States, at a time when many major news organizations in developed democracies are shedding staff due to financial pressures.</p>
<h3>Regional Security Overtones</h3>
<p>China’s political influence could have significant strategic and economic ramifications. Australia is one of the United States’ closest allies. Any lasting tilt by Canberra away from Washington would have seismic consequences throughout the Asia-Pacific. Australia and New Zealand are both members of the Five Eyes intelligence-sharing network that also includes Canada, the United Kingdom, and the United States, and any penetration by Beijing of senior levels of government in one Five Eyes member state would worry the others.</p>
<p>Wielding more significant influence in Australia and New Zealand could also allow China to apply pressure on the two nations, which are regional leaders, to stay neutral on disputes in Southeast Asia. In recent years, New Zealand leaders have become reticent about disputes in the South China Sea. Australia has thus far declined to join U.S.-led freedom of navigation operations there and has repeatedly stated that it will not take a side in disputes over the sea. And if more people in Australia, New Zealand, or other countries consume information that derives from Chinese state media, it could reshape narratives about Chinese policies in those nations.</p>
<p>In one notable instance, prominent former Labor Party Senator Sam Dastyari told the Chinese media last year that Australia should not involve itself in China’s activities in the South China Sea—even though Beijing claims nearly the entirety of the sea. After Dastyari made the remark, media outlets revealed that he took this position after a major, pro-China donor who had paid Dastyari’s legal bills in the past had threatened to pull a $400,000 donation to the Labor Party. Amid the controversy, Dastyari quit his post this month, and the <a title="Washington Post reported" href="https://www.washingtonpost.com/world/australian-lawmaker-to-resign-amid-global-allegations-of-chinese-meddling/2017/12/12/29270ca8-df3c-11e7-9eb6-e3c7ecfb4638_story.html?utm_term=.f5a007d684ea" rel="noopener"><em>Washington Post</em> reported</a> that Peter Dutton, the health minister, accused Dastyari of “being a ‘double agent’ of China.” Australia’s ethnic Chinese associations also apply pressure regarding the South China Sea. The <a title="Sydney Morning Herald reported" href="http://www.smh.com.au/world/chinas-patriots-among-us-beijing-pulls-new-lever-of-influence-in-australia-20160412-go4vv0.html" rel="noopener"><em>Sydney Morning Herald</em> reported</a> in 2016 that, before Malcolm Turnbull made his first visit to China as prime minister, “some sixty Chinese community leaders in Australia gathered in Sydney urging him to watch his words when discussing the South China Sea in Beijing.”</p>
<p>Public polling, meanwhile, suggests that China’s efforts in Australia and New Zealand may be working. In a <a title="Pew Research Center study" href="http://www.pewresearch.org/fact-tank/2017/08/23/in-global-popularity-contest-u-s-and-china-not-russia-vie-for-first/" rel="noopener">Pew Research Center study</a> released this year, China was viewed favorably by 64 percent of Australians, up from 57 percent two years ago. And a <a title="poll this year" href="http://www.stuff.co.nz/national/politics/93347474/america-first-yeah-nah-say-kiwis-as-many-look-to-china-for-leadership" rel="noopener">poll this year</a> by Massey University and the New Zealand news website Stuff showed that, if given a choice to build closer bilateral ties with the United States, the United Kingdom, or China, a plurality of New Zealanders would choose China.</p>
<h3>Managing Bilateral Tensions</h3>
<p>While Australia has begun to develop a robust response, it faces the challenge of protecting its strategic interests while being careful not to stigmatize Chinese-Australians. In addition to Australia’s top intelligence agency increasing its investigations into Chinese influence, the Australian Foreign Investment Review Board has begun applying greater due diligence to investments. Australia’s ruling political coalition will pass legislation banning foreign donations to political parties and activist groups in the country, and force anyone representing foreign interests in Australia to register as such, in a manner similar to the U.S. Foreign Agents Registration Act.</p>
<p>New Zealand has been slower to develop a clear response. Prime Minister Jacinda Ardern has reportedly refused to comment on the prospect of the country’s spy agency <a title="launching a probe" href="http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&amp;objectid=11943964" rel="noopener">launching a probe</a> into Chinese political influence in New Zealand. The <em>Financial Times</em> reported in December of this year that briefings provided to Ardern by New Zealand national security chiefs <a title="have raised fresh concerns" href="https://www.ft.com/content/4c23258a-de28-11e7-a8a4-0a1e63a52f9c?conceptId=b2997bc8-d54f-3c4b-870f-130a4b337a51&amp;desktop=true&amp;segmentId=7c8f09b9-9b61-4fbb-9430-9208a9e233c8" rel="noopener">have raised fresh concerns</a> about political interference coming from Beijing.</p>
<p>Even for Australia, reckoning with forms of influence other than funding political parties or individual politicians will be hard. Many soft power efforts are seen by publics as benign, and as having positive cultural benefits.</p>
<p>Still, in Australia, it seems unclear whether China’s efforts will have the long-term effect of actually bolstering bilateral ties, or will instead lead to cooling between Canberra and Beijing. Australia is stepping up its defenses against China—perhaps not what Beijing wanted. As the Turnbull government has spoken out about some of Beijing’s influence efforts, and Canberra has moved to pass laws on foreign donations to politicians, Chinese elites have become increasingly skeptical of and even angry at Australia, as <a title="the Lowy Institute reported" href="https://www.lowyinstitute.org/the-interpreter/mistrust-australia-growing-china" rel="noopener">the Lowy Institute reported</a> last week. This growing mistrust means that China’s influence strategy there could backfire.</p>
<div class="grammarly-disable-indicator"></div>
<p><a href="https://globalsecurityreview.com/australia-new-zealand-face-chinas-influence/">Australia &#038; New Zealand Face China&#8217;s Influence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Following the Developing Iranian Cyber Threat</title>
		<link>https://globalsecurityreview.com/following-developing-iranian-cyber-threat/</link>
		
		<dc:creator><![CDATA[Dorothy Denning]]></dc:creator>
		<pubDate>Wed, 13 Dec 2017 23:54:20 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=3329</guid>

					<description><![CDATA[<p>Iran is one of the leading cyberspace adversaries of the United States. It emerged as a cyber threat a few years later than Russia and China and has so far demonstrated less skill. Nevertheless, it has conducted several highly damaging cyber attacks and become a major threat that will only get worse. Like Russia and [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/following-developing-iranian-cyber-threat/">Following the Developing Iranian Cyber Threat</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Iran is one of the leading cyberspace adversaries of the United States.</h2>
<p>It emerged as a cyber threat a few years later than <a href="https://theconversation.com/tracing-the-sources-of-todays-russian-cyberthreat-81593">Russia</a> and <a href="https://theconversation.com/how-the-chinese-cyberthreat-has-evolved-82469">China</a> and has so far demonstrated less skill. Nevertheless, it has conducted several highly damaging cyber attacks and become a major threat that <a href="https://www.wired.com/story/apt-34-iranian-hackers-critical-infrastructure-companies/">will only get worse</a>.</p>
<p>Like Russia and China, the history of Iran’s cyberspace operations begins with its hackers. But unlike these other countries, Iran openly encourages its hackers to launch cyber attacks against its enemies. The government not only recruits hackers into its cyber forces but supports their independent operations.</p>
<h3>Putting Iranian hackers on the map</h3>
<p>It was clear by the mid-2000s that Iran would become a source of cyber attacks: Its hackers had started taking over websites worldwide and posting their own messages on them, a practice called “defacing.” Often it was just for fun, but some hackers wanted to stand up for their country and Muslims. One prominent group, Iran Hackers Sabotage, launched in 2004 “with the aim of showing the world that Iranian hackers have something to say about the worldwide security.”</p>
<p>The group’s website announced that it provided vulnerability testing and secure hosting services, but it was also known for web defacements. In 2005, the group replaced the <a href="http://www.zone-h.org/mirror/id/2645159">U.S. Naval Station Guantanamo</a> homepage with one defending Muslims and condemning terrorists. Another of its defacements proclaimed “<a href="http://www.zone-h.org/mirror/id/2917409">Atomic energy is our right</a>.” By early 2008, the <a href="http://www.zone-h.org/">Zone-H</a> defacement archive listed 3,763 web defacements for the group. The group has since disbanded.</p>
<p>Another prominent group, Ashiyane Digital Security Team, ran a website that offered free hacking tools and tutorials. The site claimed to have 11,503 members in May 2006. Like Iran Hackers Sabotage, Ashiyane provided security services while using its members’ knowledge and skills to deface websites. Their defacements frequently included a map of Iran with a reminder that “The correct name is the Persian Gulf” for what some <a href="https://en.wikipedia.org/wiki/Persian_Gulf_naming_dispute#Viewpoint_of_Arabs">Arab states have called</a> the “Arabian Gulf.”</p>
<p>Ashiyane defaced 500 websites in 2009 during the Israeli incursion into Gaza and <a href="https://www.memri.org/reports/irans-cyber-war-hackers-service-regime-irgc-claims-iran-can-hack-enemys-advanced-weapons">1,000 sites</a> in the U.S., U.K., and France in 2010 for supporting what the group said were anti-Iranian terrorist groups. By May 2011, Zone-H had recorded 23,532 defacements by the group. Its leader, Behrouz Kamalian, said his group <a href="https://www.memri.org/reports/irans-cyber-war-hackers-service-regime-irgc-claims-iran-can-hack-enemys-advanced-weapons">cooperated with the Iranian military</a> but operated independently and spontaneously.</p>
<p>A third group, the Iranian Cyber Army, launched a few years later. It has been implicated in <a href="https://www.memri.org/reports/irans-cyber-war-hackers-service-regime-irgc-claims-iran-can-hack-enemys-advanced-weapons">several website attacks</a>, including one against Twitter in 2009 that proclaimed support for Iran’s Supreme Leader Ali Khamenei. Other attack targets were <a href="https://arstechnica.com/tech-policy/2011/02/iranian-cyber-army-attacks-voice-of-america-website/">the Voice of America in 2011</a> after the U.S. supported Iran’s Green movement, and regime opposition websites in 2013 just before the presidential election.</p>
<h3>Iran’s cyber military</h3>
<p>The Iranian Cyber Army is <a href="https://web.archive.org/web/20130606084937/https://www.csis.org/blog/iranian-cyber-army">said by some</a> <a href="https://www.reuters.com/article/us-iran-cyber/once-kittens-in-cyber-spy-world-iran-gains-prowess-security-experts-idUSKCN1BV1VA">cybersecurity researchers</a> to operate on behalf of Iran’s <a href="https://en.wikipedia.org/wiki/Islamic_Revolutionary_Guard_Corps">Islamic Revolutionary Guard Corps</a>, a branch of the country’s military. The Revolutionary Guards runs a <a href="http://www.inss.org.il/publication/iran-and-cyberspace-warfare/?offset=50&amp;posts=74&amp;outher=Gabi%20Siboni">cyber warfare program</a> that in 2008 was estimated to employ about 2,400 professionals. In addition, it connects with independent hacker groups such as Ashiyane and the ICA.</p>
<p>The Revolutionary Guards also command Iran’s voluntary paramilitary militia, known as the Basij Resistance Force. In 2010, the Basij established the Basij Cyber Council, but it focuses more on <a href="http://www.inss.org.il/publication/iran-and-cyberspace-warfare/?offset=50&amp;posts=74&amp;outher=Gabi%20Siboni">media and influence operations</a> than on cyber attacks.</p>
<h3>Turning to sabotage</h3>
<p>By 2012, Iranian cyber attacks had gone beyond simple web defacements and hijackings to ones that destroyed data and shut down access to critical websites. The attackers conceal their government connections by hiding behind monikers that resemble those used by independent <a href="https://www.georgetownjournalofinternationalaffairs.org/online-edition/the-rise-of-hacktivism?rq=denning">hacktivists</a> fighting for justice and human rights.</p>
<p>One such group called itself the Cutting Sword of Justice. In 2012, it launched <a href="http://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html?pagewanted=all&amp;_r=1">cyber attacks against the Saudi Aramco oil company</a>, claiming to protest Saudi oppression and corruption financed by oil. The attacks used “wiper” code that overwrote data on hard drives and spread through the company’s network via a virus dubbed Shamoon. <a href="http://money.cnn.com/2015/08/05/technology/aramco-hack/index.html">More than 30,000 computers</a> were rendered inoperable at Saudi Aramco and Qatar’s RasGas, which was also targeted. U.S. intelligence officials <a href="http://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html">blamed Iran</a> for the attacks.</p>
<p>Iran has deployed wiper malware in other acts of sabotage, most notably the 2014 <a href="https://thehackernews.com/2014/12/las-vegas-casino-hacked.html">attack against the Las Vegas Sands Corporation</a>. The attack was thought to be a response to remarks made by Sheldon Adelson, the company’s largest shareholder. Adelson suggested setting off a bomb in an Iranian desert to persuade the country to abandon nuclear weapons. And in 2016, the <a href="https://www.theregister.co.uk/2016/12/02/accused_iranian_disk_wiper_returns_to_destroy_saudi_orgs_agencies/">Shamoon malware resurfaced</a>, wiping data from thousands of computers in Saudi Arabia’s civil aviation agency and other organizations.</p>
<p>Iranian hackers operating on behalf of the government have also conducted massive <a href="https://theconversation.com/attackers-can-make-it-impossible-to-dial-911-67980">distributed denial-of-service attacks</a>, which flood sites with so much traffic that they become inaccessible. From 2012 to 2013, a group calling itself the <a href="https://www.recordedfuture.com/deconstructing-the-al-qassam-cyber-fighters-assault-on-us-banks/">Cyber Fighters of Izz ad-Din al-Qassam</a> launched a series of relentless distributed denial-of-service attacks against major U.S. banks. The attackers claimed the banks were “properties of American-Zionist Capitalists.”</p>
<p>In 2016 the U.S. <a href="https://www.washingtonpost.com/world/national-security/justice-department-to-unseal-indictment-against-hackers-linked-to-iranian-goverment/2016/03/24/9b3797d2-f17b-11e5-a61f-e9c95c06edca_story.html">indicted seven Iranian hackers</a> in absentia for working on behalf of the Revolutionary Guards to conduct those bank attacks, which were said to have caused tens of millions of dollars in losses. The motivation may have been retaliation for economic sanctions that had been imposed on Iran or the <a href="http://www.mdpi.com/1999-5903/4/3/672">Stuxnet</a> cyberattack on Iran’s centrifuges.</p>
<p>One of the seven indictments was of a man who allegedly obtained access to the computer control system for the <a href="http://time.com/4270728/iran-cyber-attack-dam-fbi/">Bowman Avenue Dam</a> in New York state. The access would have allowed the intruder to “operate and manipulate” one of the dam’s gates had it not been offline for maintenance.</p>
<p>Iran also engages in cyberespionage. One group, which cybersecurity research firm FireEye named <a href="https://www.wired.com/story/iran-hackers-apt33/">Advanced Persistent Threat 33</a>, has invaded computers around the world, with targets in the petrochemical, defense and aviation industries. The group uses code linked to Iran’s wiper malware, possibly in preparation for more destructive attacks. Another group, called <a href="https://www.wired.com/story/apt-34-iranian-hackers-critical-infrastructure-companies/">Advanced Persistent Threat 34</a>, has been active since at least 2014, targeting companies in the financial, energy, telecom and chemical industries.</p>
<h3>Foreign assistance</h3>
<p>Iran may be beefing up its cyber warfare capabilities with the help of foreigners.</p>
<p>According to former Congressman Peter Hoekstra, who chaired the House’s Permanent Select Committee on Intelligence, Iran’s rapid emergence as a major cyber threat likely stems from its <a href="http://freebeacon.com/national-security/iran-russia-partnering-to-launch-cyber-attacks/">close ties to Russia</a>. Matthew McInnis, a resident fellow at the American Enterprise Institute, believes Iran turned to Russia to <a href="http://freebeacon.com/national-security/iran-russia-partnering-to-launch-cyber-attacks/">level the cyberwarfare battlefield</a> with the U.S. and the West.</p>
<p>Iran may also be <a href="http://www.inss.org.il/publication/iran-and-cyberspace-warfare/">looking to Mexico</a> for cyber warfare support. According to a <a href="http://dailysignal.com//2011/12/09/univision-confirms-iranian-threat-in-latin-america/">documentary aired on the Univision</a> television network in 2011, a former Iranian ambassador to Mexico accepted a plan from undercover Mexican students to launch crippling cyber attacks against the U.S. The targets included the White House, the CIA, the FBI and nuclear installations. The documentary also shows Venezuelan and Cuban officials in Mexico expressing interest in the plot.</p>
<figure>
<div class="fluidvids"><iframe class="fluidvids-item" src="https://www.youtube.com/embed/RmM5zkMFtME?wmode=transparent&amp;start=0" width="440" height="260" frameborder="0" allowfullscreen="allowfullscreen" data-fluidvids="loaded" data-mce-fragment="1"></iframe></div><figcaption><span class="caption">A Univision documentary sheds light on Iranian cyber attack efforts.</span></figcaption></figure>
<h3>Strengthening its cyber warfare program</h3>
<p>Iran may view cyber warfare as a means of overcoming its military disadvantage compared to the U.S. To that end, it will likely continue to improve its cyber capabilities.</p>
<p>Containing Iran’s cyber warfare program would likely be even more challenging than containing its <a href="https://theconversation.com/iran-nuclear-deal-how-to-ensure-compliance-53485">nuclear program</a>. Computer code is easy to conceal, copy and distribute, making it extremely <a href="http://faculty.nps.edu/dedennin/publications/Berlin.pdf">difficult to enforce controls placed on cyberweapons</a>. That leaves <a href="https://theconversation.com/how-companies-can-stay-ahead-of-the-cybersecurity-curve-74414">cybersecurity</a> and <a href="https://theconversation.com/cybersecuritys-next-phase-cyber-deterrence-67090">cyber deterrence</a> as America’s best options for defending against the Iranian cyber threat.</p>
<div class="grammarly-disable-indicator"></div>
<p><a href="https://globalsecurityreview.com/following-developing-iranian-cyber-threat/">Following the Developing Iranian Cyber Threat</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>China to Deploy Special Forces Units to Syria</title>
		<link>https://globalsecurityreview.com/china-deploy-special-forces-units-syria/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Wed, 06 Dec 2017 21:47:27 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Syria]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=3261</guid>

					<description><![CDATA[<p>China will deploy troops to Syria for the second time since 2015 to assist the Syrian Government. China will send troops to Syria to aid President Bashar Al-Assad’s forces, according to reports in Saudi outlet The New Khaleej. This move comes alongside China&#8217;s increasing concerns regarding the presence of Islamic militants in the region of East [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/china-deploy-special-forces-units-syria/">China to Deploy Special Forces Units to Syria</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>China will deploy troops to Syria for the second time since 2015 to assist the Syrian Government.</h2>
<p>China will send troops to Syria to aid President Bashar Al-Assad’s forces, according to reports in Saudi outlet <em>The</em> <i>New Khaleej</i>. This move comes alongside China&#8217;s increasing concerns regarding the presence of Islamic militants in the region of East Turkestan, who have accused of aiding opposition groups in Syria.</p>
<p>During a meeting with Syrian Presidential Advisor Bouthaina Shaaban, Chinese Foreign Minister Wang Yi praised the regime’s efforts at combating fighters from the Islamic East Turkistan Movement. The Syrian government has also claimed that some 5,000 soldiers of <a href="http://globalsecurityreview.com/threats-legitimacy-power-chinese-communist-party/">Uyghur</a> origin, an ethnic Muslim minority that Chinese authorities regularly accuse of terrorism, have arrived in Syria, illegally passing through Southeast Asia and Turkey.</p>
<h3>The report states that the Chinese Ministry of Defense intends to send two special operations forces units known as the “Siberian Tigers” and the “Night Tigers” to aid Syrian government troops.</h3>
<p>This is not the first time Chinese troops have crossed into Syria; in 2015 the Syrian regime permitted some 5,000 soldiers to operate within its territory in partnership with local forces. They were in the Western region of Latakia. Chinese military advisors were also among the deployment, which included naval and aerial assets.</p>
<p>China is one of the five veto-wielding powers of the UN Security Council and, along with Russia, has used its power on more than one occasion to protect the interests of the Syrian government. Russian support has given the government an upper hand in the six-year-long civil war, especially as the battle against ISIS comes to an end.</p>
<p>More than half a million people are believed to have been killed since 2011, the vast majority by the Assad government and allied forces. The regime has also used chemical weapons against civilians and prevented aid from reaching those affected on the ground. UN officials further estimate that some ten million people have been displaced as a result of the fighting.</p>
<p><a href="https://globalsecurityreview.com/china-deploy-special-forces-units-syria/">China to Deploy Special Forces Units to Syria</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Israeli Warplanes Attacked Syrian Military Base to Convey Message to Iran</title>
		<link>https://globalsecurityreview.com/israeli-warplanes-attacked-syrian-military-base-convey-message-iran/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Wed, 06 Dec 2017 18:49:08 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Lebanon]]></category>
		<category><![CDATA[Syria]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=3246</guid>

					<description><![CDATA[<p>Israel launched air strikes against targets in Syria to warn Iran against establishing a permanent military presence. On December 1, 2017, Israeli warplanes attacked targets in Syria. The raid was intended to convey a political message: that a permanent Iranian military base would never be permitted to be established on Syrian territory. Reports in Yedioth Ahronoth, Israel [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/israeli-warplanes-attacked-syrian-military-base-convey-message-iran/">Israeli Warplanes Attacked Syrian Military Base to Convey Message to Iran</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Israel launched air strikes against targets in Syria to warn Iran against establishing a permanent military presence.</h2>
<p>On December 1, 2017, Israeli warplanes attacked targets in Syria. The raid was intended to convey a political message: that a permanent Iranian military base would never be permitted to be established on Syrian territory.</p>
<p>Reports in <em>Yedioth</em> <em>Ahronoth</em>, <em>Israel</em> <em>Hayom</em>, <em>Maariv</em>, and <em>Haaretz</em>, stated that the raid was preceded by leaked photos of the target (a military base) to the BBC some three weeks earlier.</p>
<p class="selectionShareable">Prime Minister Benjamin Netanyahu, Defence Minister Avigdor Lieberman, and the Chief of General Staff of the Israel Defence Forces, Gadi Eizenkot, have all suggested that an attack might be imminent in recent weeks.</p>
<p>Alex Fishman, a military analyst for <em>Yedioth Ahronoth</em>, said that with this raid “Israel has apparently moved from the verbal stage of threatening and warning the Iranians and the Syrians to the stage of action.”</p>
<p>[bs-quote quote=&#8221;Any military escalation with Israel would not probably be that profitable, but with Iran’s continuous military settlement and the raids attributed to Israel, it is possible to say that both sides are walking on the edge.&#8221; style=&#8221;default&#8221; align=&#8221;center&#8221;][/bs-quote]</p>
<p>The raid, according to Fishman, “is Israel’s way of explaining to all sides that if they do not take Israel’s interests into consideration and allow Iran to settle in Syrian territories as a large military force, they will have to pay the price at a military level. Now all the involved parties in the settlement process in Syria, including the Syrians, Iranians, Russians, Turks, Americans, and Europeans, should deal with Israel as a key entity which has the ability to militarily disrupt any settlement.”</p>
<p>Fishman added, “The military base that was attacked yesterday is located in the surveillance area from the Israeli borders (in occupied Golan).” He pointed out that the timing of the raid was not accidental, as it was carried out while this military base is still empty of soldiers, and that the message Israel has conveyed is “I do this before you launch this military base and raise Iranian flags here.”</p>
<h3>Israel has drawn a &#8220;red line&#8221; when it comes to the Iranian presence in Syria</h3>
<p>Yossi Melman, a military analyst, wrote in <em>Maariv</em> that the raid was “more a stout Israeli attempt to convey a message to Russia than to President Bashar Al-Assad and Iran … The message is that Israel is serious when it says it will not allow the establishment of Iranian military bases in Syria.”</p>
<p>Melman added that Israel is confident that the Syrian regime will not respond to the Israeli aggression. He wrote: “Assad cannot allow himself to respond to Israel’s violation of sovereignty more than launching ineffective rockets from his air defense system because Israel will respond with greater force. Launching a front against Israel is the last thing Assad wants at this stage.”</p>
<p>According to Melman, Israel has expanded its “red lines” imposed on Syria. Melman stated that the Israeli strike would not prevent Iran from continuing to pursue its strategic goals, including a military presence in Syria, and that Iran “would not give up its military achievements in Syria.”</p>
<p>Amos Harel, a military analyst for <em>Haaretz</em>, also stated that he believed that the raid was a message to Iran, the Syrian regime and the super powerful states as well.</p>
<p>Harel added that the most important question at present is how Iran would behave in the long term; and will it increase its efforts to remain in Syria? Harel continued by stating “Iran has a clear strategic goal of activating a link between Iran, Iraq, Syria, and Hezbollah in Lebanon. Any military escalation with Israel would not probably be that profitable, but with Iran’s continuous military settlement and the raids attributed to Israel it is possible to say that both sides are walking on the edge.”</p>
<p><a href="https://globalsecurityreview.com/israeli-warplanes-attacked-syrian-military-base-convey-message-iran/">Israeli Warplanes Attacked Syrian Military Base to Convey Message to Iran</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Non-State Actors: Terrorist Groups and Insurgencies</title>
		<link>https://globalsecurityreview.com/non-state-actors-terrorist-groups-insurgencies/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Wed, 06 Dec 2017 17:00:14 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?post_type=forecast&#038;p=2556</guid>

					<description><![CDATA[<p>Threats from terrorist and insurgent groups will persist and are likely to become more decentralized in their nature. The terrorist threat is likely to increase as the means and the motivations of states, groups, and people to impose harm diversify. Prolonged conflicts and the info age allow terrorists to recruit and operate on a large [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/non-state-actors-terrorist-groups-insurgencies/">Non-State Actors: Terrorist Groups and Insurgencies</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Threats from terrorist and insurgent groups will persist and are likely to become more decentralized in their nature.</h2>
<p>The terrorist threat is likely to increase as the means and the motivations of states, groups, and people to impose harm diversify. Prolonged conflicts and the info age allow terrorists to recruit and operate on a large scale, demonstrating the evolving nature of the threat.</p>
<p>Terrorism kills fewer people globally than crime or disease, but the potential for new capabilities reaching the hands of people bent on apocalyptic destruction is all too real. This ultimate low-probability, high-impact event underscores the imperative of international cooperation and state attention to the issue.</p>
<p>Terrorists will continue to justify their violence by their very own interpretations of religion, but several underlying drivers are also in play. Within nations, the breakdown of state structures in much of the Middle East carries on to create space for extremists.</p>
<h3>The Sunni-Shia Divide Will Fuel Ongoing Sectarianism</h3>
<p>The ongoing proxy war between Iran and Saudi Arabia also is fueling Shia-Sunni sectarianism—with a few militant groups further fracturing over religious differences. Additionally, perceptions of &#8220;Western hegemony&#8221; remains a potent rallying cry for some groups, mobilized around striking the &#8220;far enemy.&#8221;</p>
<p>Even though the location of religiously driven terrorism will fluctuate, the rise of violent religious nationalism and the schism between Shia and Sunni are likely to worsen in the short term and may not abate by 2035.</p>
<p>A combination of ideologies such as Salafi-jihadism (like ISIL&#8217;s or al-Qaeda&#8217;s), in a region undergoing vast and rapid political change—against the backdrop of generations of autocratic government and economic disparities—create an ideological nexus where the likelihood of violence only increases. Militant Christianity and Islam in central Africa, militant Buddhism in Burma, and violent Hindutva in India will all continue to fuel terror and conflict.</p>
<p>Extremists will exploit anger and link perceived injustices with the collective identity of deepening religious affiliation in some areas of the world. Religion will become a more important source of meaning and continuity because of increasing info connectedness, the extent of state weakness in much of the developing world, and the rise of alienation due to the dislocation from traditional work in the industrialized world. Rapid change and conditions of political and economic uncertainty, if not insecurity, will encourage many individuals to embrace ideologies and identities for meaning and continuity.</p>
<p>The vast majority of believers will be peaceful, but those with extreme views will find like-minded followers and vulnerable recruits through info technology. Most world religions—including Christianity, Islam, and Judaism, Buddhism, and Hinduism—have exclusionary aspects of doctrine that may be exploited in this way.</p>
<p>Beyond religion, psychological and social factors will drive individual participation in terrorism, as well as help terrorist groups attract recruits and resources and maintain cohesion. Groups will exploit ethnic and kinship bonds, peer, social or familial networks, as well as a desire for adventure, fame, and belonging, to swell their ranks.</p>
<p>They will also exploit feelings of alienation that are spreading across the world as young people feel increasingly disconnected from the socio-cultural mainstream, that they are unable to take part from the political process, or lacking in certain economic or social advantages.</p>
<p>Advances in information technology—whether with the printing press and Gutenberg Bible in the fifteenth century or with the invention of the World Wide Web in 1989—allow religious content to spread widely, in part because religions are ideas that transcend borders and are usually more influential in daily lives than state authority.</p>
<h3>Technology may be a double-edged sword.</h3>
<p>On the one hand, it is going to facilitate communications, recruitment, logistics, and lethality. On the other hand, it is going to provide governments with strategies to identify and describe threats, if their publics let them. Technology will continue to enable non-state actors to mask their action and identity. The use of cyber tools to get down electric systems, for example, has possible mass disruption effects, a few with deadly consequences.</p>
<p>Communication technology also will be critical to non-state actors capability to recruit new members, fund operations, and disseminate messages. Advancements in technology will lower technological barriers to high impact, low likelihood terrorist WMD situations, and enable the proliferation of deadly, conventional weapons to terrorist groups.</p>
<p>Technology will further decentralize terrorist threats. Centrally controlled and hierarchical organizations like Al Qaeda could shift into widespread jihadist militancy, for example. This tendency will pose barriers to counterterrorism efforts and adjust the nature of future terrorist plots and approaches.</p>
<div class="grammarly-disable-indicator"></div>
<p><a href="https://globalsecurityreview.com/non-state-actors-terrorist-groups-insurgencies/">Non-State Actors: Terrorist Groups and Insurgencies</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Race for Syria after the Islamic State</title>
		<link>https://globalsecurityreview.com/race-syria-islamic-state/</link>
		
		<dc:creator><![CDATA[Udi Dekel]]></dc:creator>
		<pubDate>Wed, 29 Nov 2017 20:56:35 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[ISIS]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Jordan]]></category>
		<category><![CDATA[Lebanon]]></category>
		<category><![CDATA[Qatar]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=3187</guid>

					<description><![CDATA[<p>Increasing signs are pointing to the impending fall of the Islamic State in Syria, which has suffered a series of defeats in recent months. The territory in eastern Syria that will be freed of Islamic State control now constitutes the focus of the struggle between the United States and Iran in Syria, as both are [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/race-syria-islamic-state/">The Race for Syria after the Islamic State</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Increasing signs are pointing to the impending fall of the Islamic State in Syria, which has suffered a series of defeats in recent months.</h2>
<ul class="bs-shortcode-list list-style-check">
<li><mark class="bs-highlight bs-highlight-default">The territory in eastern Syria that will be freed of Islamic State control now constitutes the focus of the struggle between the United States and Iran in Syria, as both are striving to seize the area.</mark></li>
<li><mark class="bs-highlight bs-highlight-default">Early June marked the onset of the final phase of the US-led coalition’s offensive to conquer the city of Raqqa, the capital of the Islamic State in Syria, with a combined Kurdish-Arab (though predominantly Kurdish) ground force – the Syrian Democratic Forces (SDF) – and air support provided by the international coalition, including the United States, other Western countries, and Arab states.</mark></li>
<li><mark class="bs-highlight bs-highlight-default">At the same time, Iran and its proxies have also started intensifying efforts aimed at shaping Syria the day after the fall of the Islamic State.</mark></li>
<li><mark class="bs-highlight bs-highlight-default">Forces of the pro-Assad coalition are currently trying to expand their control in the Deir ez-Zor region and improve their access to Raqqa and the surrounding area, and also seize critical positions along the Syrian-Iraqi border</mark></li>
</ul>
<h3><span style="text-transform: initial;">Geopolitically, Syria Sits in the Middle of Two Axes of Influence</span></h3>
<p><span class="dropcap dropcap-simple">T</span>he race to shape the Syrian arena, which is currently focused on the campaign to conquer Raqqa and defeat the Islamic State, encompasses two main strategic efforts. One, led by Iran, aims at laying the foundation for a Shiite axis land bridge from Iran in the east, via Iraq, to Syria and Lebanon in the west. Its primary mode of operation is the seizure, by Iranian proxies, of significant passage points between Iraq and Syria – with Iraqi Shiite militias (al-Hashd al-Sha&#8217;abi and the People’s Mobilization Forces) on the Iraqi side of the border and forces of the pro-Assad coalition, including the remnants of the Syrian army under the authority of Bashar al-Assad, Hezbollah, and Shiite militias on the Syrian side of the border.</p>
<p>According to Ali Akbar Velayati, an advisor to Iranian Supreme Leader Ali Khamenei, “a relationship has been forged between the popular forces, the forces of the Iraqi government and military, and the allied forces in Syria. In practice, this is a strategic victory for Iran’s allies and for the ring of resistance to Zionism that begins in Tehran and reaches Iraq, Syria, and Lebanon.”</p>
<p>In a rival strategic effort, the US-led coalition has been operating to create a wedge running north-south to sever the Iranian land bridge and cut off Iranian influence in Syria, Lebanon, Jordan, and west of the Persian Gulf. This effort is aimed at creating a buffer zone-security strip controlled by US allies, extending from Turkey in the north, via eastern Syria, southward to Jordan and Saudi Arabia.</p>
<p>Over the past weeks, some attacks have been carried out by US air forces against forces of the pro-Assad coalition along with the southeastern segment of the Syrian-Iraqi border, in the region of the Syrian city of al-Tanf, located near the tripartite border between Jordan-Syria-Iraq.</p>
<p>The United States has declared this area to be a “de-confliction” zone under its influence and will therefore not allow the deployment of forces belonging to Assad or Iranian proxies in the region. On June 18, a Syrian fighter plane was shot down in the Raqqa region of eastern Syria as part of the air cover that the United States is providing to the Syrian Democratic Forces fighting to liberate Raqqa.</p>
<p>Iranian parties have explained that the deployment of forces loyal to Iran along the Iraqi-Syrian-Jordanian border is meant to thwart the US plan to divide Syria. According to the Iranians, the United States seeks to link the northeastern part of Syria that is under Kurdish control to the southeastern section of the country, up to the Jordanian border and has therefore increased its activities and attacks in the Tanf region.</p>
<p>The voices from Iran indicate that their forces aim: (a) to defend Iran’s dominance in Iraq, the survival of the Assad regime, and Iranian strategic depth by means of a land corridor from Tehran to Beirut; (b) to destroy the Islamic State along the Syrian-Iraqi border; (c) to neutralize the US plan to dismantle Syria; and (d) to prevent US-supported forces from establishing control over eastern Syria.</p>
<p>It is, therefore, no coincidence that Iran chose to respond to the Islamic State attack in Tehran by launching six surface-to-surface missiles from Iranian territory at an Islamic State target in the Deir ez-Zor region of eastern Syria. In doing so, it demonstrated its potential in the field of ballistic missiles and leveraged its message that it is at war with the Islamic State and is unafraid of operating in a sector in which the United States is working to establish its influence.</p>
<p>Russia’s position in this context is not entirely clear. On the one hand, both the Assad regime and sources in Moscow report that Russia is a partner in the Assad regime’s efforts in eastern Syria, aided by Iran and Hezbollah, to derail the American plan. On May 8, the Syrian newspaper al-Watan, which has close relations with the regime, reported that “massive reinforcements of Syrian and Russian military forces have arrived in the Syrian desert, in addition to the forces of friends, in preparation for an operation to take control of Deir ez-Zor and the Iraqi border.”</p>
<p>At the same time, there have been reports of coordination efforts in Jordan between US and Russian representatives. There have also been reports that Russia is working to prevent friction between forces of the Syrian regime and its allies and US forces, and strives to reach understandings with the United States and Jordan regarding a de-confliction zone, a de-escalation zone, and mutual attacks in southern Syria.</p>
<p>In response to the intercepting of the Syrian plane in the Deir ez-Zor region, Russia announced that “all aircraft, manned and unmanned, of the international coalition operating west of the Euphrates River, will be identified as targets by Russian air defense systems,” appearing to create a Russian-controlled no-fly zone west of the Euphrates. As part of the struggle for control of southeastern Syria, the United States has deployed two HIMARS multiple launch rocket batteries to the American special forces base near al-Tanf.</p>
<p>In response, the Russian Defense Ministry stated that every entry of a foreign weapon system into Syria requires authorization by the central government in Damascus and that the deployment indicates that the United States is not focused on fighting the Islamic State as its claims to be. The United States was then charged with failing to prevent Islamic State fighters from fleeing Raqqa toward Deir ez-Zor.</p>
<p>The pro-Assad coalition led by Russia and Iran appears to be following the American activity in southern and eastern Syria with great concern. In addition to the establishment of an exclusive security zone north of the Jordanian-Syrian border and attacks on forces supporting the Assad regime, this activity has included use of a training infrastructure for troops of the Syrian opposition, the deployment of US special forces reinforced by artillery support, and an air umbrella provided by the Western coalition.</p>
<p>From an Iranian perspective, and perhaps also from a Russian point of view, this marks a new phase in the US campaign to shape Syria in preparation for the day after the Islamic State, which is aimed at neutralizing the Iranian presence and influence in Syria.</p>
<h3>The Potential for Escalation between the US and Iran in Syria and Iraq</h3>
<p>The Trump administration includes elements that are extremely hostile to Iran and are pushing to expand the war in Syria as an opportunity to clash with Iran on a “comfortable” playing field. These elements have apparently suggested the idea of establishing an American-dominated north-to-south running strip through eastern Syria with the aim of blocking and containing Iran’s regional aspirations.</p>
<p>At the same time, Secretary of State James Mattis and US military leaders oppose the opening of a broad front against Iran and its proxies in Syria and regard it as endangering the capacity for a focused effort to advance the primary goal: the dismantling and defeat of the Islamic State. Therefore, at least at this stage, the US military leadership is seeking to avoid friction with the Iranians and Russians.</p>
<p>In the meantime, Iran is resolutely striving to progress toward its goals – i.e., more than other actors in the Middle East. It is checking the limits of US intervention, without any capacity to estimate the intensity of the United States commitment in the race to achieve control over eastern Syria. As a result, there is currently a potential for US-Iranian escalation in Syria that could spread to Iraq – either intentionally or as a result of miscalculated assessments.</p>
<h3>Conclusion: The current race for control of territory in Syria appears as if it&#8217;s between Iran and the United States</h3>
<p>The current race for control of territory in Syria now seems to be a competition between Iran and the United States, which have established two respective axes –with a vertical American (north-south) effort on the one hand, and a horizontal Iranian (east-west) effort on the other. In practice, this is another stage in the shaping of Syria in preparation for the day after the Islamic State. Thus far, the Syrian arena could be viewed as a game board with multiple squares, with the move of pieces in each square having an impact on the state of affairs in the others.</p>
<p>First, Russia set up its pieces on the board’s central-western sector, between Aleppo and Damascus, including the coastal region. Turkey followed suit, arranging its forces in the board’s northern sector along the Syrian-Turkish border, including an effort to safeguard its interests in the Kurdish region. The United States focused its warfare against the Islamic State primarily in northeastern Syria and is now trying to reorganize its pieces in the southeastern square of the Syria game board.</p>
<p>As a result, the country’s southwestern region, from Daraa to the Golan Heights, remains open for activity and influenced by Israel and Jordan, which must begin taking action before it is too late. Contacts are apparently underway to formulate a joint Israeli-Jordanian-American strategy aimed at preventing Iranian influence and the presence of its proxies, especially Hezbollah and Shiite militias, in the southern square of the Syrian game board. Israel and Jordan must also prepare themselves for the possibility that Islamic State fighters fleeing northeastern Syria could move southward and link up with the Islamic State branch at the border in the Golan Heights.</p>
<p>Moreover, Israel must not forget Russia’s influence in Syria and the need to reach understandings with Moscow, at least on a clandestine level, regarding every move in this direction. Syria may have understood as much, which would explain the increased intensity of the pro-Assad coalition’s attacks in the Daraa region over the past few weeks, primarily from the air. Still, Russia understands that Israel possesses the capacity to cause significant damage in Syria, and therefore prefers to maintain understandings with Israel and take Israel’s concerns seriously.</p>
<p><a href="https://globalsecurityreview.com/race-syria-islamic-state/">The Race for Syria after the Islamic State</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>North Korea Launches ICBM Capable of Reaching Continental U.S.</title>
		<link>https://globalsecurityreview.com/north-korea-launches-icbm-capable-reaching-continental-u-s/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Wed, 29 Nov 2017 20:26:34 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[South Korea]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=3215</guid>

					<description><![CDATA[<p>North Korea has launched an intercontinental ballistic missile that is capable of hitting anywhere in the continental United States. On November 28, 2017, North Korea conducted a test launch of a nuclear-capable intercontinental ballistic missile after over 70 days without any such activity. According to the U.S. Department of Defense, this is the third ICBM test [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/north-korea-launches-icbm-capable-reaching-continental-u-s/">North Korea Launches ICBM Capable of Reaching Continental U.S.</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>North Korea has launched an intercontinental ballistic missile that is capable of hitting anywhere in the continental United States.</h2>
<p>On November 28, 2017, North Korea conducted a test launch of a nuclear-capable intercontinental ballistic missile after over 70 days without any such activity. According to the U.S. Department of Defense, this is the third ICBM test launch of 2017.</p>
<p>U.S. Secretary of Defense James Mattis stated that the missile most recently launched by the North Koreans &#8220;went higher, frankly, than any previous shot they&#8217;ve taken.&#8221;</p>
<p>[bs-quote quote=&#8221;North Korea launched an intercontinental ballistic missile. It went higher, frankly, than any previous shot they&#8217;ve taken.<br />
&#8221; style=&#8221;default&#8221; align=&#8221;center&#8221; author_name=&#8221;James Mattis&#8221; author_job=&#8221;U.S. Secretary of Defense&#8221; author_avatar=&#8221;http://globalsecurityreview.com/wp-content/uploads/2017/11/1200px-James_Mattis_official_photo.jpg&#8221;][/bs-quote]</p>
<p>The ICBM was launched from an area north of Pyongyang in Sain Ni, North Korea. The missile traveled east for about 620 miles (1000 kilometers) before splashing down into the Sea of Japan. The missile landed within Japan&#8217;s Exclusive Economic Zone which extends 200 nautical miles from the Japanese coastline.</p>
<p>This latest test launch by the North Koreans occurred just months after North Korea launched ballistic missiles over the northern Japanese island of Hokkaido on two separate occasions.</p>
<p>The missile was launched in a near-vertical trajectory, meaning that if it were fired for distance in a more horizontal trajectory, it would be capable of reaching Washington D.C. and other cities on the east coast of the United States.</p>
<p>The Pentagon has stated that it is working with its interagency partners in the Intelligence Community, Department of State, Department of Homeland Security, and Department of Energy to develop a more detailed assessment of the launch.</p>
<p>Pentagon spokesman Army Colonel Robert Manning said: &#8220;We [the United States] remain prepared to defend ourselves and our allies from any attack or provocation.&#8221;</p>
<h3>The Response from South Korea</h3>
<p>In response to the North Korean missile launch, the South Korean military demonstrated the capabilities of its precision-targeted missiles by firing a number of them off the coast of South Korea.</p>
<p>The latest provocation from North Korea comes at a time of division in the trilateral relationship between South Korea, Japan, and the United States. While the South Korean government, cautious about provoking hostilities with the North, has encouraged restraint and dialogue, the United States (backed up by Japan) has increased its threats of military intervention against North Korea if it continues to conduct testing to further its nuclear weapons and intercontinental ballistic missile programs.</p>
<p><a href="https://globalsecurityreview.com/north-korea-launches-icbm-capable-reaching-continental-u-s/">North Korea Launches ICBM Capable of Reaching Continental U.S.</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Secretary Mattis: &#8220;We&#8217;ve Lost the Power of Inspiration; We’ve Got the Power of Intimidation.&#8221;</title>
		<link>https://globalsecurityreview.com/secretary-mattis-weve-lost-power-inspiration-weve-got-power-intimidation/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Tue, 21 Nov 2017 22:00:12 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Foreign Policy]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=2023</guid>

					<description><![CDATA[<p>In a candid conversation caught on video, Secretary Mattis urged troops to &#8220;hold the line until our country gets back to respecting each other and showing it.&#8221; A video has emerged on Facebook of Secretary of Defense James Mattis telling a small group of American troops, “You’re a great example of our country right now.” [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/secretary-mattis-weve-lost-power-inspiration-weve-got-power-intimidation/">Secretary Mattis: &#8220;We&#8217;ve Lost the Power of Inspiration; We’ve Got the Power of Intimidation.&#8221;</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>In a candid conversation caught on video, Secretary Mattis urged troops to &#8220;hold the line until our country gets back to respecting each other and showing it.&#8221;</h2>
<p>A video has emerged on Facebook of Secretary of Defense James Mattis telling a small group of American troops, “You’re a great example of our country right now.” He went on, “Our country, right now, it’s got problems that we don’t have in the military. You just hold the line until our country gets back to understanding and respecting each other and showing it.”</p>
<p>Mattis added that the United States has historically had “two powers” in facing the rest of the world: inspiration and intimidation. The U.S. has lost the former, the secretary said before saying, “we’ll get the power of inspiration back. We’ve got the power of intimidation, and that’s you&#8230;If someone wants to screw with our families, our country, and our allies.&#8221;</p>
<p><iframe style="border: none; align: center; overflow: hidden;" src="https://www.facebook.com/plugins/video.php?href=https%3A%2F%2Fwww.facebook.com%2Fusawtfm%2Fvideos%2F10155815797353606%2F&amp;show_text=0&amp;width=266" width="266" height="476" frameborder="0" scrolling="no" allowfullscreen="allowfullscreen"></iframe></p>
<p>“You just hold the line,” Mattis told the troops—hang on to your toughness and your values—until things back home straighten out. The question is how far that line extends and how far he would go to hold it.</p>
<h3>Mattis is using specific words for a specific reason.</h3>
<p>Mattis seemed to stop short of crossing any lines in the president’s authority. He didn’t rebuke Trump directly or even mention him by name or title. It’s worth repeating the preface to Mattis’ “hold the line” imperative: “You’re a great example of our country right now. Our country, right now, it’s got problems that we don’t have in the military.”  Seen as a “Praetorian guard-like” statement by some, another interpretation of the impromptu speech is that Mattis is reiterating that the armed forces are apolitical and that the integrity of the military must remain intact, and continue to do so in the event of further political friction or even violence.</p>
<p>The use of the word &#8220;until&#8221; when Mattis says &#8220;hold the line <span style="text-decoration: underline;">until</span> our country gets back to understanding and respecting each other and showing it&#8221; is worth noting. It could imply that Mattis sees the domestic political situation as being more top-down than grassroots; that it will be solved or at least alleviated to a measurable degree within a reasonable amount of time. Beyond this is speculation, but we do know that Mattis chooses his words mindfully, understanding the extent to which his words matter.</p>
<h3>Is Mattis the &#8220;acting&#8221; Commander-in-Chief?</h3>
<p>In May, NSA Director Mike Rogers <a href="http://globalsecurityreview.com/trump-russia-nsa-investigation-admiral-rogers/">reportedly told agency employees</a> that the agency is in possession of damning SIGINT evidence relating to the Russia investigation. As Defense Secretary—a senior-level cabinet member, and a Principal member of the National Security Council—Secretary Mattis would undoubtedly be aware of any such evidence.</p>
<p>This isn’t quite how democracy is supposed to work in the United States. There’s a reason the Founding Fathers stressed the need for civilian control of the military. The founding documents of the Defense Department—formed 70 years ago—re-iterate that. It’s customary for the armed forces to serve as the bulwark against foreign enemies; they&#8217;re typically not used to do so against the whims and outbursts of the country’s elected commander in chief.</p>
<h3>Historical precedent: the Nixon era</h3>
<p>While unusual, this isn&#8217;t the first time the military has had to deal with an unstable President.  During the final weeks of Richard Nixon&#8217;s presidency, Nixon was so out of touch that he was losing the ability to exercise the powers of his position.</p>
<p>For weeks, the day-to-day operations of the White House — and, really, the Presidency itself — were handled by General Alexander Haig, a four-star Army general and the White House Chief of Staff. Secretary of State and National Security Advisor Henry Kissinger had near-total control and oversight over U.S. foreign policy.</p>
<p>Even early into his presidency, Nixon exhibited instability. Describing events that occurred nearly five years before Nixon&#8217;s resignation, Former CIA analyst George Carver <a href="https://www.theguardian.com/weekend/story/0,3605,362958,00.html">reportedly</a> said that when the North Koreans shot down a US spy plane in 1969, &#8220;Nixon became incensed and ordered a tactical nuclear strike&#8230; The Joint Chiefs were alerted and asked to recommend targets, but [Secretary of State] Henry Kissinger got on the phone to them. They agreed not to do anything until Nixon sobered up in the morning.&#8221;</p>
<blockquote class="bs-pullquote bs-pullquote-left"><p>&#8220;Al Haig is keeping the country together, and I am keeping the world together.&#8221; &#8211; <em>Secretary of State Henry Kissinger in 1974 </em></p></blockquote>
<p>In the weeks immediately preceding Nixon&#8217;s resignation, Secretary of Defense James R. Schlesinger urged General George S. Brown, Chairman of the Joint Chiefs of Staff, not to take military orders directly from the President. In an attempt to save the country from any extra-constitutional power grab by a desperate President, the military chain-of-command took the extra-constitutional step of removing the President from the loop.</p>
<p>Schlesinger also considered options to remove the President from office forcibly. If it were necessary, the Defense Secretary&#8217;s tentative plan was to send the 82nd Airborne from Fort Bragg, North Carolina to Washington, D.C. As it turned out, Nixon resigned, and these contingencies remained just that.</p>
<p>If events spiraled in another direction, and if Brown had obeyed Schlesinger instead of Nixon, that would have amounted to significant insubordination. In another country, similar events would be considered to be a coup. While haven’t reached that point today, one can certainly imagine Secretary Mattis and Chief of Staff Secretary John Kelly thinking what they might do if an increasingly embattled President Trump issued an unusual order of his own.</p>
<p><a href="https://globalsecurityreview.com/secretary-mattis-weve-lost-power-inspiration-weve-got-power-intimidation/">Secretary Mattis: &#8220;We&#8217;ve Lost the Power of Inspiration; We’ve Got the Power of Intimidation.&#8221;</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Poland Will Increase the Size of Its Military by Over 50%</title>
		<link>https://globalsecurityreview.com/poland-will-increase-size-military-50/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Thu, 16 Nov 2017 23:00:33 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Estonia]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[Greece]]></category>
		<category><![CDATA[Latvia]]></category>
		<category><![CDATA[Lithuania]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Poland]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=2971</guid>

					<description><![CDATA[<p>Over 50,000 troops will join the ranks of the Polish Armed Forces.  This comes alongside news that the Polish military will create a 50,000-strong volunteer militia as fears grow of a resurgent Russia under President Vladimir Putin. Poland shares a border with Russia. Since Moscow has annexed Crimea from Ukraine and supported the insurgency in [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/poland-will-increase-size-military-50/">Poland Will Increase the Size of Its Military by Over 50%</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><span style="text-transform: initial;">Over 50,000 troops will join the ranks of the Polish Armed Forces. </span></h2>
<p><span style="color: #4a4a4a; font-family: Lato, sans-serif; font-size: 15px; text-transform: initial;">This comes alongside news that the Polish military will create a 50,000-strong volunteer militia as fears grow of a resurgent Russia under President Vladimir Putin. Poland shares a border with Russia. Since Moscow has annexed Crimea from Ukraine and supported the insurgency in the east of the nation, Russia&#8217;s neighbors have warily observed its military expansion.</span></p>
<p>Polish President Andrzej Duda signed off a statement which will increase defense spending and increase the strength of the military by 50,000 troops from the current 100,000 troops. The bill will also include provisions for a volunteer militia force, numbering around 50,000, according to reports from state broadcaster Polskie Radio.</p>
<h3>Increased Defense Spending is Policy Everyone Can Agree On</h3>
<p>The bill—a rare piece of cross-partisan legislation—envisions defense spending increasing to up to 2.5 percent of Poland&#8217;s gross domestic product by 2030. Most NATO members have yet to meet their pledges to increase defense spending to, at least, 2 percent of their respective GDPs.</p>
<p>Of the 28 NATO members, only the U.S., the U.K., Greece, Poland, and Estonia currently meet the 2 percent threshold that all members have pledged to meet. “The Polish army will, within ten years, gain the capability of stopping every opponent,&#8221; said the Polish Defence Minister Antoni Macierewicz.</p>
<p>Poland is one of just five NATO allies that share a border with Russia, along with all 3 Baltic countries, Lithuania, Latvia and Estonia. NATO&#8217;s ongoing reinforcements in Eastern Europe has leaned towards alleviating the anxieties of Poland and the Baltic states (Latvia, Lithuania, and Estonia), where multinational NATO battalions are based.</p>
<h3>Deterrence or Expansion?</h3>
<p>Russia has consistently argued that NATO expansion in the former Soviet sphere of influence is part of a strategic encirclement of Russian territory, rather than providing protection for European states that would be otherwise vulnerable to Moscow. Russian Foreign Minister Sergei Lavrov has vowed that his nation would never strike a NATO ally and risk a conflict.</p>
<p>Nevertheless, confidence in Russian foreign policy among Western governments is at a post-Cold War low. The Kremlin has made a string of spurious claims about the character of its campaign in Syria, in which it&#8217;s denied all reports of infringing and bombing civilians. Russia&#8217;s official policy is to refuse any military backing for insurgents in east Ukraine. However, the insurgents themselves have claimed to have thousands of Russian troops in their ranks.</p>
<div class="grammarly-disable-indicator"></div>
<p><a href="https://globalsecurityreview.com/poland-will-increase-size-military-50/">Poland Will Increase the Size of Its Military by Over 50%</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Donald Trump Jr&#8217;s Secret Communications with Wikileaks</title>
		<link>https://globalsecurityreview.com/donald-trump-jr-s-secret-communications-with-wikileaks/</link>
		
		<dc:creator><![CDATA[GSR Staff]]></dc:creator>
		<pubDate>Thu, 16 Nov 2017 22:55:32 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Wikileaks]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=3094</guid>

					<description><![CDATA[<p>Newly discovered communications between Donald Trump Jr. and Wikileaks during the 2016 campaign reveal a coordinated effort to distribute information damaging to the Clinton Campaign. Wikileaks is considered to be a non-state intelligence agency with hostile intentions to the United States and ties to Russian military and foreign intelligence agencies. Wikileaks asked Donald Trump Jr. [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/donald-trump-jr-s-secret-communications-with-wikileaks/">Donald Trump Jr&#8217;s Secret Communications with Wikileaks</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Newly discovered communications between Donald Trump Jr. and Wikileaks during the 2016 campaign reveal a coordinated effort to distribute information damaging to the Clinton Campaign.</h2>
<ul class="bs-shortcode-list list-style-check">
<li class="bs-intro"><mark class="bs-highlight bs-highlight-red">Wikileaks is considered to be a non-state intelligence agency with hostile intentions to the United States and ties to Russian military and foreign intelligence agencies.</mark></li>
<li class="bs-intro"><mark class="bs-highlight bs-highlight-red">Wikileaks asked Donald Trump Jr. for his cooperation in coordinating the distribution of political messages, in contesting the results of the election, and in sending “the right signals” to U.S. allies like Australia and the U.K.</mark></li>
<li class="bs-intro"><mark class="bs-highlight bs-highlight-red">These revelations indicate some form of coordination between a Kremlin actor and the Trump campaign.</mark></li>
<li class="bs-intro"><mark class="bs-highlight bs-highlight-red">At the strategic level, these communications centered on building a sustainable narrative that would be mutually beneficial for the Trump Campaign, Wikileaks, and their respective backers.</mark></li>
<li class="bs-intro"><mark class="bs-highlight bs-highlight-red">Steve Bannon, Kellyanne Conway, Brad Parscale, Hope Hicks, and Jared Kushner were informed of these communications during the campaign. </mark></li>
<li class="bs-intro"><mark class="bs-highlight bs-highlight-red">Wikileak’s suspected involvement with Russian military and security intelligence services was public knowledge at the time.</mark></li>
</ul>
<p><span class="dropcap dropcap-circle">T</span>he Atlantic Magazine published a <a href="https://www.theatlantic.com/politics/archive/2017/11/the-secret-correspondence-between-donald-trump-jr-and-wikileaks/545738/">set of private communications</a> between Donald Trump Jr. and Wikileaks. These messages were sent prior the election and discussed how best to disseminate the trove of DNC emails obtained by Wikileaks through a Russian Intelligence hacking operation.</p>
<p>[bs-quote quote=&#8221;Wikileaks asked Donald Trump Jr. for his cooperation in coordinating the distribution of political messages, in contesting the results of the election, and in sending “the right signals” to U.S. allies like Australia and the U.K., “to start following the law and stop bending it to ingratiate themselves with the Clinton’s.”&#8221; style=&#8221;style-16&#8243; align=&#8221;left&#8221;][/bs-quote]</p>
<p>The messages reveal a lengthy and often one-sided correspondence between Wikileaks and Donald Trump Jr. that continued until sometime July 2017, at least. The U.S. intelligence community believes that Wikileaks was either playing a complicit or ignorant role in disseminating information obtained by Russian intelligence services. The CIA Director, Mike Pompeo, labeled Wikileaks as a “hostile non-state intelligence agency” at his first public remarks as CIA Director at the Center for International and Strategic Studies.</p>
<p>In the messages, Wikileaks asked Donald Trump Jr. for his cooperation in coordinating the distribution of political messages, in contesting the results of the election, and in sending “the right signals” to U.S. allies like Australia and the U.K., “to start following the law and stop bending it to ingratiate themselves with the Clinton’s.”</p>
<p>These revelations indicate some form of coordination between a Kremlin-linked actor and the Trump campaign, mainly as the email conversations between Trump Jr. and Wikileaks were taking place during campaign events and refer to references to Wikileaks. Furthermore, it seems as if the Wikileaks team perceived themselves as working in the capacity a  partner of—or even a department within—the Trump Campaign. The view within Wikileaks mostly seemed to be that the two organizations were working in tandem.</p>
<h3>The messages allege media strategy coordination by Trump Jr. and Wikileaks.</h3>
<p>Julia Ioffe, the author of the Atlantic&#8217;s piece centers on a specific exchange between Trump Jr. and Wikileaks. On October 3, 2016, WikiLeaks wrote: &#8220;Hiya, it’d be great if you guys could comment on/push this story,&#8221; WikiLeaks suggested, attaching a quote from then-Democratic nominee Hillary Clinton about wanting to “just drone” WikiLeaks founder, Julian Assange.</p>
<p>&#8220;Already did that earlier today,&#8221; Trump Jr. responded an hour-and-a-half later. &#8220;It’s amazing what she can get away with.&#8221; Trump Jr. wrote again two minutes later, asking, &#8220;What’s behind this Wednesday leak I keep reading about?&#8221;</p>
<p>[bs-quote quote=&#8221;Hiya, it’d be great if you guys could comment on/push this story.&#8221; style=&#8221;style-8&#8243; align=&#8221;center&#8221; author_name=&#8221;Wikileaks&#8221; author_job=&#8221;to Donald Trump Jr. on October 3, 2016&#8243; author_avatar=&#8221;http://globalsecurityreview.com/wp-content/uploads/2017/11/WL_Helping_Hand.jpg&#8221;][/bs-quote]</p>
<p>[bs-quote quote=&#8221;Already did that earlier today, what&#8217;s behind this Wednesday leak I keep reading about?&#8221; style=&#8221;style-8&#8243; align=&#8221;center&#8221; author_name=&#8221;Donald Trump Jr.&#8221; author_job=&#8221;to Wikileaks on October 3, 2016&#8243; author_avatar=&#8221;http://globalsecurityreview.com/wp-content/uploads/2017/11/30309613870_787846f5fc_b.jpg&#8221;][/bs-quote]</p>
<p>The day before, Roger Stone, an informal advisor to Donald Trump during the campaign, tweeted: &#8220;Wednesday @HillaryClinton is done. #WikiLeaks.&#8221; WikiLeaks didn’t respond to Trump Jr.&#8217;s question, but on October 12, 2016, the account again messaged Trump Jr: “Hey Donald, great to see you and your dad talking about our publications,” WikiLeaks wrote.</p>
<p>&#8220;Strongly suggest your dad tweets this link if he mentions us,” WikiLeaks went on, pointing Trump Jr. to the link <em>wlsearch.tk</em>, which it said would help Trump’s followers dig through the trove of stolen documents and find relevant stories.</p>
<p>[bs-quote quote=&#8221;Hey Donald, great to see you and your dad talking about our publications. Strongly suggest your dad tweets this link if he mentions us. There’s many great stories the press are missing and we’re sure some of your follows will find it. &#8221; style=&#8221;style-8&#8243; align=&#8221;center&#8221; author_name=&#8221;Wikileaks&#8221; author_job=&#8221;to Donald Trump Jr. on October 12, 2016&#8243; author_avatar=&#8221;http://globalsecurityreview.com/wp-content/uploads/2017/11/WL_Helping_Hand.jpg&#8221;][/bs-quote]</p>
<p>“There’s many great stories the press are missing and we’re sure some of your follows [sic] will find it,” WikiLeaks went on. “Btw we just released Podesta Emails Part 4.&#8221;</p>
<p>[bs-quote quote=&#8221;Btw we just released Podesta Emails Part 4.&#8221; style=&#8221;style-8&#8243; align=&#8221;center&#8221; author_name=&#8221;Wikileaks&#8221; author_job=&#8221;to Donald Trump Jr. on October 12, 2016&#8243; author_avatar=&#8221;http://globalsecurityreview.com/wp-content/uploads/2017/11/WL_Helping_Hand.jpg&#8221;][/bs-quote]</p>
<h3>Wikileaks Attempted to Communicate with Trump Jr. As Recently as July 2017</h3>
<p>The communications didn&#8217;t end with the election. In July 2017, in the wake of Donald Trump Jr.’s congressional testimony, Wikileaks reached out to Trump Jr. again.  “Hi Don. Sorry to hear about your problems, We have an idea that may help a little. We are VERY interested in confidentially obtaining and publishing a copy of the email(s) cited in the New York Times today.” The message was referencing a Times&#8217; report on emails Trump Jr had exchanged with Rob Goldstone, a publicist who had helped set up the now-infamous June 2016 Trump Tower meeting with Russian lawyer Natalia Veselnitskaya.</p>
<p>&#8220;We think this is strongly in your interest,&#8221; WikiLeaks went on. It then reprised many of the same arguments it made in trying to convince Trump Jr. to turn over his father’s tax returns, including the argument that Trump’s enemies in the press were using the emails to spin an unfavorable narrative of the meeting. &#8216;Us publishing not only deprives them of this ability but is beautifully confounding.'&#8221;</p>
<p>[bs-quote quote=&#8221;Hi Don. Sorry to hear about your problems, We have an idea that may help a little. We are VERY interested in confidentially obtaining and publishing a copy of the email(s) cited in the New York Times today. We think this is strongly in your interest&#8230;Us publishing not only deprives them of this ability but is beautifully confounding.&#8221; style=&#8221;style-8&#8243; align=&#8221;center&#8221; author_name=&#8221;Wikileaks&#8221; author_job=&#8221;to Donald Trump Jr. in July, 2017&#8243; author_avatar=&#8221;http://globalsecurityreview.com/wp-content/uploads/2017/11/WL_Helping_Hand.jpg&#8221;][/bs-quote]</p>
<p>In short, Wikileaks offered to publish Donald Trump Jr’s (already released) emails to WikiLeaks in an attempt to show that Wikileaks is objective concerning the targets of their “leaks.” Secondly, this would benefit Trump Jr. as he could use Wikileak’s reputation as a hostile non-state intelligence service to his advantage, by claiming that the emails were doctored or otherwise misrepresented. Unfortunately for Wikileaks, Trump Jr. proceeded by posting the <a href="https://twitter.com/DonaldJTrumpJr/status/884789418455953413">emails to his own twitter account</a>.</p>
<h3>Analysis: while mostly one-sided, the communications imply coordination between the Trump Campaign and Wikileaks</h3>
<p>The conversations centered on how surrogates or the candidate was referring to specific keywords or hashtags in social media postings. At a technical level, this would indicate coordinated action by the trump campaign with Wikileaks. Beyond these emails, the extent of coordination that has taken place is unclear at this point. At the strategic level, these communications centered on building a sustainable narrative that would be mutually beneficial for the Trump Campaign, Wikileaks, and their respective backers.</p>
<p>While the communications between Trump Jr. and Wikileaks are not necessarily a legal offense (Trump Jr. was a private citizen at the time), if he failed to provide information or documents to the special counsel or congressional investigators, he may be liable for obstruction of justice.</p>
<h3>Who Knew What, and When?</h3>
<p>What’s important to draw from these exchanges is that while Donald Trump Jr. in large part ignored emails from Wikileaks,  he did act on some of their requests. According to Ioffe, the same day that Donald Trump Jr. received the first email that was sent by Wikileaks, he informed senior Trump Campaign officials.  Specifically, Steve Bannon, Kellyanne Conway, Brad Parscale, Hope Hicks, and Jared Kushner all became aware of Trump Jr.&#8217;s contacts with Wikileaks.</p>
<p>Donald Trump Jr. did not rebuff Wikileaks at any time during his correspondence with the organization. Wikileak’s suspected involvement with Russian military and security intelligence services was public knowledge at the time.</p>
<div class="grammarly-disable-indicator"></div>
<p><a href="https://globalsecurityreview.com/donald-trump-jr-s-secret-communications-with-wikileaks/">Donald Trump Jr&#8217;s Secret Communications with Wikileaks</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>U.S. Nuclear Weapons Modernization</title>
		<link>https://globalsecurityreview.com/u-s-nuclear-weapons-modernization/</link>
		
		<dc:creator><![CDATA[Ankit Panda]]></dc:creator>
		<pubDate>Mon, 13 Nov 2017 22:00:09 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[Military Strategy]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=2901</guid>

					<description><![CDATA[<p>U.S. strategic and tactical nuclear weapons on land, in the air, and at sea, will undergo costly and extensive modernization in the coming years. U.S. nuclear forces, operated by the Air Force and Navy, have entered a years-long period that will see the modernization of warheads, bombs, and delivery systems. Many of these land-, air-, [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/u-s-nuclear-weapons-modernization/">U.S. Nuclear Weapons Modernization</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 class="article-header__description">U.S. strategic and tactical nuclear weapons on land, in the air, and at sea, will undergo costly and extensive modernization in the coming years.</h2>
<p>U.S. nuclear forces, operated by the Air Force and Navy, have entered a years-long period that will see the modernization of warheads, bombs, and delivery systems. Many of these land-, air-, and sea-based systems, which constitute the so-called nuclear triad, entered service during the Cold War and will reach the end of their life cycles in the coming decades.</p>
<p>The ballistic missiles, submarines, bombers, fighters, and air-launched cruise missiles in operation today will be gradually phased out for newer systems. The United States will also develop new nuclear warheads and upgrade facilities that produce and maintain nuclear weapons. However, while some modernization efforts are already underway, debate persists in Washington over their direction and extent, especially given the massive investments they will require. The <a title="Congressional Budget Office estimates" href="https://www.cbo.gov/sites/default/files/115th-congress-2017-2018/reports/52401-nuclearcosts.pdf" rel="noopener">Congressional Budget Office estimates</a> [PDF] that maintaining and modernizing U.S. nuclear forces will cost $400 billion between 2017 and 2026.</p>
<h3 id="chapter-title-0-1">How did the nuclear triad emerge?</h3>
<p>The triad emerged and evolved, more by accident than design, over the four decades of the Cold War as the United States and the Soviet Union responded to each other’s advances. “No one set out to create the triad,” says <a title="Stephen Schwartz" href="http://www.miis.edu/academics/faculty/sschwartz" rel="noopener">Stephen Schwartz</a>, editor and co-author of <em>Atomic Audit: The Costs and Consequences of U.S. Nuclear Weapons Since 1940</em>. “It arose out of interservice rivalry, pork barrel congressional politics, competition between defense contractors, fear of the Soviet Union, and highly redundant nuclear targeting.”</p>
<div id="pullquote-28875" class="pullquote embedded_small">
<figure class="pullquote__container">
<blockquote class="pullquote__quote"><p>Each leg of the triad reinforces the U.S. strategic nuclear deterrent.</p></blockquote>
</figure>
<p>Each leg of the triad reinforces the U.S. strategic nuclear deterrent, which has been the bedrock of national defense since the 1950s. In the early stages of their development, nuclear weapons were so large they could only be delivered by bomber aircraft. They were used for the first and only time against Imperial Japan, in 1945. The first intercontinental-range ballistic missiles were incorporated into the U.S. nuclear arsenal by the late 1950s. The first ballistic missile submarine for strategic deterrence began operations in the early 1960s.</p>
</div>
<h3 id="chapter-title-0-2">What are the legs of the U.S. nuclear triad?</h3>
<p><em>Ground. </em>The ground-based leg of the U.S. nuclear triad, managed by the U.S. Air Force, is the largest of the three regarding the number of delivery platforms. It comprises four hundred Minuteman III intercontinental-range ballistic missiles (ICBMs), which were first deployed in 1970. ICBMs are missiles capable of striking targets more than 5,500 kilometers away. Each Minuteman III can deliver one warhead, though the missile originally designed to carry three to multiple targets. The United States keeps ICBMs on nearly constant alert. They are in underground silos spread out across thousands of acres of farmland in Colorado, Montana, Nebraska, North Dakota, and Wyoming.</p>
<p><em>Sea. </em>The sea-based leg of the U.S. nuclear triad, by far the largest in terms of total deployed warheads, <a title="comprises more than two hundred" href="https://2009-2017.state.gov/t/avc/rls/2016/266384.htm" rel="noopener">comprises more than two hundred</a> Trident II submarine-launched ballistic missiles (SLBMs), which can be launched from fourteen<em> Ohio</em>-class nuclear-powered submarines (SSBNs) based in Washington State, on the west coast, and Georgia, on the east coast. Twelve of the fourteen SSBNs are at sea at all times, with five each in the Pacific and Atlantic Oceans always on “hard alert” in designated patrol areas, ready to launch their missiles within minutes of receiving an order from the president. Each Trident II SLBM can deliver four to five independently targetable nuclear warheads, although the missile is capable of carrying up to eight warheads.</p>
<p><em>Air. </em>The air-based leg of the U.S. nuclear triad comprises two types of heavy bombers, which are based in Louisiana, Missouri, and North Dakota: forty-four B-52H Stratofortresses and sixteen stealth B-2A Spirits. The B-52H, which has been modified extensively over its fifty years of service, carries nuclear-tipped, air-launched cruise missiles. The B-2A, which became operational in 1997, can be armed with three different nuclear bombs. The Air Force used another aircraft, the B-1B Lancer, for nuclear missions until 1997, but has since modified it to carry only conventional weapons.</p>
<figure id="image-28878" class="image-embed embedded_large">
<div class="image-embed__picture">
<div class="field--image">
<p><figure style="width: 520px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" src="https://www.cfr.org/sites/default/files/styles/large_s/public/image/2017/10/OhioClassSubmarine.jpg?itok=36L1JJz0" alt="The Ohio-class ballistic-missile submarine USS Tennessee (SSBN 734) transits on the surface during a routine strategic deterrent patrol in the Atlantic Ocean." width="520" height="293" /><figcaption class="wp-caption-text">An Ohio-class ballistic-missile submarine transits on the surface during a strategic deterrent patrol in the Atlantic Ocean. U.S. Navy/Lt. Joe Painter</figcaption></figure></p>
</div>
</div><figcaption class="image-embed__caption">
<div class="share-kit share-kit--collapsed share-kit--icon-color-coral share-kit--bg-color-white" data-share-anchor="image-28878" data-share-query="" data-share-name="" data-share-description="::PageTitle::" data-share-caption="" data-share-picture="https://www.cfr.org/sites/default/files/styles/full_width_xl/public/image/2017/10/OhioClassSubmarine.jpg?itok=n_ZjGa8t" data-share-type=""></div>
</figcaption></figure>
<h3>What other nuclear weapons does the U.S. have?</h3>
<p>The United States also has approximately five hundred nuclear bombs adapted for tactical use with various fighter aircraft. About 150 of these are located at bases in five NATO ally states, but modernization plans may include reducing the total number of deployed tactical nuclear weapons. Though they have <a title="no fixed definition" href="https://fas.org/_docs/Non_Strategic_Nuclear_Weapons.pdf" rel="noopener">no fixed definition</a> [PDF], tactical nuclear weapons are generally distinguished from strategic ones by their shorter delivery ranges, and they are designed for battlefield scenarios in which conventional weapons might otherwise be used. (Tactical nuclear weapons have never been used in battle.)</p>
<h3 id="chapter-title-0-4">What modernization is planned for each leg of the triad?</h3>
<p><em>Ground. </em>The planned replacement for the Minuteman III ICBM, known for now as the Ground-Based Strategic Deterrent (GBSD), is still in the design phase. In the meantime, the Air Force is continuing to upgrade the Minuteman III.</p>
<p><em>Sea. </em>First deployed in 1981, <em>Ohio</em>-class submarines will be replaced beginning in the early 2030s with <em>Columbia</em>-class submarines, which are expected to operate through the 2080s. Assuming current requirements and cost projections hold, the Navy will likely operate <a title="between ten and twelve Columbia-class SSBNs" href="http://www.public.navy.mil/subfor/hq/Documents/Columbia%20Trifold%2006FEB17.pdf" rel="noopener">between ten and twelve </a><a title="between ten and twelve Columbia-class SSBNs" href="http://www.public.navy.mil/subfor/hq/Documents/Columbia%20Trifold%2006FEB17.pdf" rel="noopener"><em>Columbia</em></a><a title="between ten and twelve Columbia-class SSBNs" href="http://www.public.navy.mil/subfor/hq/Documents/Columbia%20Trifold%2006FEB17.pdf" rel="noopener">-class SSBNs</a>, which will feature sixteen missile launch tubes, four fewer than the <em>Ohio</em>-class SSBNs have. The submarine-launched Trident II is undergoing improvements to <a title="extend its service life" href="http://www.ssp.navy.mil/documents/trident_life_extension.pdf" rel="noopener">extend its service life</a> through the early 2040s. The Navy will likely reduce the number of deployed SLBM warheads as well.</p>
<p><em>Air.</em> The U.S. Air Force is developing a new stealth bomber, the B-21 Raider, which will be capable of delivering both nuclear and conventional payloads. Meanwhile, the Air Force is expected to upgrade and keep the B-2A Spirit in service <a title="through 2058" href="https://fas.org/sgp/crs/weapons/R43049.pdf" rel="noopener">through 2058</a>[PDF] and the nuclear-capable <a title="B-52H through 2040" href="https://www.airforcetimes.com/news/your-air-force/2016/02/22/air-force-prolongs-the-life-of-the-venerable-b-52/" rel="noopener">B-52H through 2040</a>.</p>
<p>The Air Force has put out contracts to develop a new weapons system, known as the Long-Range Standoff (LRSO) cruise missile, which may be capable of delivering both conventional and nuclear warheads and be interoperable across the U.S. nuclear bomber force. It is not <a title="expected to be operational until 2030" href="https://www.flightglobal.com/news/articles/usaf39s-lrso-missile-may-reach-ioc-around-2030-394622/" rel="noopener">expected to be operational until 2030</a>.</p>
<h3 id="chapter-title-0-5">What arms control agreements cap the U.S. nuclear arsenal?</h3>
<p>Russia is the only other nuclear weapon state with an arsenal comparable to that of the United States. The <a title="New START Treaty" href="http://www.nti.org/media/pdfs/aptnewstart.pdf?_=1316550811" rel="noopener">New START Treaty</a> [PDF] entered into force in February 2011 and limits U.S.- and Russian-deployed warheads to 1,550 and deployed delivery vehicles—individual ICBMs, SLBMs, and heavy bombers—to 700. The United States and Russia report their strategic warhead and delivery vehicle counts to each other on a biannual basis.</p>
<div id="pullquote-28876" class="pullquote embedded_small">
<figure class="pullquote__container">
<blockquote class="pullquote__quote"><p>Both the United States and Russia report their strategic warhead and delivery vehicle counts on a biannual basis.</p></blockquote>
</figure>
<p>The United States entered another bilateral treaty, <a title="the Intermediate-Range Nuclear Forces (INF) Treaty" href="https://www.state.gov/t/avc/trty/102360.htm#text" rel="noopener">the Intermediate-Range Nuclear Forces (INF) Treaty</a> [PDF], with the Soviet Union in 1988; it remains in place with Russia. To comply with the INF Treaty, both countries destroyed their ground-launched, ballistic, and cruise missile systems—both nuclear-capable and conventional—with ranges between five hundred and five thousand kilometers. However, the Obama administration said in 2014 that Russia’s testing of <a title="certain missile systems" href="https://fas.org/sgp/crs/nuke/R43832.pdf" rel="noopener">certain missile systems</a> [PDF] violated the agreement. Russia has reportedly deployed these banned systems, although <a title="Moscow denies" href="http://tass.com/politics/967480" rel="noopener">Moscow denies</a> that it has violated the treaty.­­</p>
</div>
<h3 id="chapter-title-0-6">Why is nuclear modernization debated?</h3>
<p>Shortly into his tenure, President Obama <a title="declared" href="https://www.theguardian.com/world/2009/apr/05/nuclear-weapons-barack-obama" rel="noopener">declared</a> “America’s commitment to seek the peace and security of a world without nuclear weapons.” Despite this, most of the ongoing triad modernization began under his administration, and fewer U.S. nuclear weapons were eliminated under him than under any other post–Cold War president. President Donald J. Trump declared shortly after his election in 2017 that <a title="he would seek" href="https://twitter.com/realdonaldtrump/status/811977223326625792?lang=en" rel="noopener">he would seek</a> to “greatly strengthen and expand [U.S.] nuclear capability,” and he ordered the Department of Defense to conduct a review of the U.S. nuclear posture, which is expected to be completed by early 2018.</p>
<p>Some aspects of nuclear modernization face political opposition, with critics noting that the triad itself is an artifact of Cold War-era strategic thinking. In 2017, a group of Democratic senators <a title="sought to slow" href="https://www.defensenews.com/space/2017/03/08/democrats-renew-attack-on-new-nuclear-cruise-missile/" rel="noopener">sought to slow</a> development of the LRSO, citing strategic concerns and high costs. Others, including former Defense Secretary William J. Perry, have <a title="recommended abolishing the ICBM force" href="https://www.nytimes.com/2016/09/30/opinion/why-its-safe-to-scrap-americas-icbms.html?_r=0" rel="noopener">recommended abolishing the ICBM force</a>, arguing that the other two legs of the triad would be sufficient for deterrence.</p>
<p><a href="https://globalsecurityreview.com/u-s-nuclear-weapons-modernization/">U.S. Nuclear Weapons Modernization</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Disaster in South Asia: Nuclear Deployments &#038; Violent Extremism</title>
		<link>https://globalsecurityreview.com/recipe-disaster-south-asia-nuclear-deployments-violent-extremism/</link>
		
		<dc:creator><![CDATA[GSR Staff]]></dc:creator>
		<pubDate>Sun, 05 Nov 2017 23:00:13 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Pakistan]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=2838</guid>

					<description><![CDATA[<p>Nuclear proliferation is dangerous for long-term Indian national security any way you look at it. At-sea deployments of nuclear weapons by India, Pakistan, and perhaps China, would increasingly nuclearize the Indian Ocean throughout the next two decades. The presence of multiple nuclear powers in the Indian ocean operating nuclear-armed vessels increases the potential risk of miscalculation [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/recipe-disaster-south-asia-nuclear-deployments-violent-extremism/">Disaster in South Asia: Nuclear Deployments &#038; Violent Extremism</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 style="padding-left: 30px;"><a href="http://globalsecurityreview.com/forecast/south-asia-india-pakistan/">Nuclear proliferation is dangerous for long-term Indian national security any way you look at it.</a></h2>
<ul class="bs-shortcode-list list-style-asterisk">
<li>At-sea deployments of nuclear weapons by India, Pakistan, and perhaps China, would increasingly nuclearize the Indian Ocean throughout the next two decades.</li>
<li><span style="text-transform: initial;">The presence of multiple nuclear powers in the Indian ocean operating nuclear-armed vessels increases the potential risk of miscalculation and inadvertent escalation.</span></li>
</ul>
<p style="text-transform: initial;"><span style="text-transform: initial;"><a href="http://globalsecurityreview.com/forecast/south-asia-india-pakistan/">Nuclear deployment requirements for naval-based delivery vehicles remove a safety valve that, until now, has kept atomic weapons stored separately from missiles in South Asia</a>.</span></p>
<p>Pakistan will feel compelled to address India’s economic and conventional military capabilities through asymmetric means. Pakistan will seek to enhance its nuclear deterrent against India by expanding its nuclear arsenal and delivery means, including pursuing battlefield nuclear weapons and sea-based options.</p>
<p>India will focus its attention on both Islamabad and Beijing—seeking military partnerships with Europe, Japan, the US, and others—to boost its conventional capabilities while striving for escalation dominance vis-a-vis Pakistan.</p>
<p>India will continue to offer smaller South Asian nations a stake in India’s financial growth through development assistance and increased connectivity to India’s economy. This strategy will contribute to India’s broader effort to assert its role as the predominant regional power. <span style="text-transform: initial;">At the same time, violent extremism and extreme ideology-based terrorism continue to spread throughout South Asia.</span></p>
<h3>Violent extremism, terrorism, and instability will continue to hang over nuclear-armed Pakistan.</h3>
<p>The threat of terrorism, from Lashkar-e-Tayyiba (LET), Tehrik-i-Taliban Pakistan (TTP), and al-Qaeda and its affiliates as well as ISIL’s expansion and sympathy for associated ideology—will remain prominent in the area.</p>
<p>Competition for jobs, coupled with discrimination against minorities, might contribute to the radicalization of the region’s youth, especially given abnormal sex ratios favoring males in several nations.</p>
<p>In increasingly volatile Pakistan, which neighbors India, there is a significant concern at the regional and global levels that a non-state actor could obtain a nuclear weapon in Pakistan. This scenario would be particularly challenging to manage, as conventional deterrence practices don&#8217;t deter a non-state actor like a trans-national terrorist group, creating a significant threat for neighboring India.</p>
<div id="wtr-content" data-bg="#FFFFFF" data-fg="#202D54" data-width="5" data-mute="" data-fgopacity="0.5" data-mutedopacity="0.5" data-placement="top" data-placement-offset="0" data-placement-touch="top" data-placement-offset-touch="0" data-transparent="" data-touch="1" data-comments="" data-commentsbg="#ffcece" data-location="page" data-mutedfg="#202D54"></div>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/recipe-disaster-south-asia-nuclear-deployments-violent-extremism/">Disaster in South Asia: Nuclear Deployments &#038; Violent Extremism</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Acheiving Sustainable Economic Growth in the E7</title>
		<link>https://globalsecurityreview.com/acheiving-sustainable-economic-growth-e7/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Fri, 03 Nov 2017 21:00:03 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Colombia]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Indonesia]]></category>
		<category><![CDATA[Mexico]]></category>
		<category><![CDATA[Turkey]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=3005</guid>

					<description><![CDATA[<p>The gap between the developed world and the developing world is closing—fast. India&#8217;s GDP trajectory over the next 34 years is distinctly separate from its GDP per capita progression, demonstrating that while strong population growth can be an integral driver of Gross domestic product growth, it may also make it more challenging to boost income [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/acheiving-sustainable-economic-growth-e7/">Acheiving Sustainable Economic Growth in the E7</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The gap between the developed world and the developing world is closing—fast.</h2>
<p>India&#8217;s GDP trajectory over the next 34 years is distinctly separate from its GDP per capita progression, demonstrating that while strong population growth can be an integral driver of Gross domestic product growth, it may also make it more challenging to boost income levels.</p>
<p>Nevertheless, this gap is closing. U.S. Gross domestic product per capita is presently around four times the size of China and almost nine times that of India. By 2050, these openings are projected to reduce to about double China and approximately three times India&#8217;s, demonstrating long-term income convergence.</p>
<p>The global economy will slow down with time, with a marked moderation in growth rates following the year 2020. Annual worldwide financial growth will average around 3.5% until 2020, slowing down to 2.7% for 2021-2030, 2.5% for the decade following that, and then to 2.4% for 2041-2050.</p>
<p>This will happen because many advanced economies are experiencing and will experience a marked decline in their working-age population. At the same time, emerging economy growth rates will average out as these economies grow.</p>
<h3>Challenges for policymakers in achieving a long-term, sustainable expansion</h3>
<p>To realize their full economic potential, emerging market governments must implement structural reforms to improve their macroeconomic stability, infrastructure and institutions, evaluations show the high possibility that emerging economies must grow and thrive in the coming decades.</p>
<p>But to realize this opportunity in total, they must undertake sustained and adequate investments in education, infrastructure, and technology. Worldwide demand growth and falling oil price over latest years have highlighted the significance of savings for long-term sustainable growth. Underlying all this is the requirement to develop political, economic, legal and social institutions to create incentives for innovation and entrepreneurship, making economies wherein to do business.</p>
<p>Looking forward, the global economics faces many challenges to profitable economic growth. Structural developments, like aging populations and climate change, require forward-thinking policies that equip the workforce to be able to make societal contributions later in life while promoting sustainable development.</p>
<p>Falling international trade growth, rising inequality, and increasing economic uncertainties will intensify the need to achieve economies which generate opportunities for everybody in a broad selection of industries. Businesses will need to adopt flexible and proactive approaches to navigate fast-changing and aging markets.</p>
<h3>Market developments will create opportunities for business.</h3>
<p>These will appear as these economies advance to new industries, to engage with world markets as well as their populations—which will be more youthful on average than in advanced countries—get more affluent.</p>
<p>As these emerging nations develop their institutions, fostering social stability and strengthening their macroeconomics principles, they&#8217;ll become more attractive places to conduct business and live, bring talent and investment. These economies are often volatile and quickly evolving, however, so companies will need operating strategies to succeed in them. Businesses should be ready to adjust their brand and market positions to match and preferences.</p>
<p>An in-depth understanding of the local marketplace, policy agendas, and consumer priorities will be crucial. Frequent collaboration with local partners will be essential. One key recommendation is that international companies along with other investors will be patient enough to ride out the short-term economic and political downs and ups which will unavoidably occur every once in a while in markets as they head toward adulthood. However, failure to interact with these markets means missing out on the bulk of the expected global economic development between now and 2050.</p>
<p><a href="https://globalsecurityreview.com/acheiving-sustainable-economic-growth-e7/">Acheiving Sustainable Economic Growth in the E7</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>U.S. Deploys Three Carrier Strike Groups to Korean Peninsula</title>
		<link>https://globalsecurityreview.com/u-s-deploys-three-carrier-strike-groups-korean-peninsula/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Tue, 31 Oct 2017 19:06:12 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[South Korea]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=2997</guid>

					<description><![CDATA[<p>By deploying three carrier strike groups in the region, the U.S. will enhance its force projection capabilities in and around North Korea. North Korea remains committed to obtaining a credible and effective nuclear deterrent. The closer it gets to its end-goal, there is less time for the United States and its allies to put a stop [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/u-s-deploys-three-carrier-strike-groups-korean-peninsula/">U.S. Deploys Three Carrier Strike Groups to Korean Peninsula</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>By deploying three carrier strike groups in the region, the U.S. will enhance its force projection capabilities in and around North Korea.</h2>
<p>North Korea remains committed to obtaining a credible and effective nuclear deterrent. The closer it gets to its end-goal, there is less time for the United States and its allies to put a stop to Pyongyang&#8217;s ambitions.</p>
<p>Based on factors like the capabilities of the U.S. Intelligence Community, the advancement of North Korean missile and nuclear technology, and the degree of risk that Washington and its allies are prepared to tolerate, the U.S. might have already missed its opportunity for preventative military action.</p>
<p>Estimates show that, at most, Washington would have 18 months before the window closing, after which, the United States and its allies would have no choice but to adopt some form of deterrence policy toward North Korea. Most indications that a pre-emptive attack on North Korea by the United States is in the works have yet to materialize, implying that military action is not likely this year. Others, however, have already appeared.</p>
<h3>These deployments do not necessarily mean the U.S. is preparing for war. They do, however, elevate the risk of conflict in East Asia.</h3>
<p>The U.S. is enhancing its forward position in and around North Korea. Three U.S. aircraft carrier strike groups are en route to the Western Pacific, where they&#8217;ll conduct a combined exercise in middle November. Such a concentration of force is rare. The last time three U.S. carrier strike groups convened for a combined deployment was in 2007. This forward deployment will give the U.S. force projection capabilities within striking distance of North Korea.</p>
<p>The U.S. Air Force, meanwhile, has declared that, for the very first time, it is going to send a squadron of a dozen F-35A stealth fighter jets to Kadena Air Base in Japan in early November for a six month deployment. Stealth fighters would be prominent fixtures in any U.S. attack on North Korea.</p>
<p>The US has also dispatched nuclear-powered submarines to the waters around the Korean peninsula. It is likely that at least one submarine is carrying nuclear-armed cruise missiles. Furthermore, the U.S. Military recently increased its stockpile of munitions in Guam by approximately 10 percent between late August and late September.</p>
<h3>Analysis: the U.S. is keeping its options open with regards to North Korea</h3>
<p>Analyzed together, these developments imply that the US is currently preparing for a confrontation. However, this does not necessarily mean that Washington is gearing up to start a war with Pyongyang. The US and it allies are in a standoff with North Korea. In a standoff, it is necessary to make preparations for conflict, even if one does not intend for a conflict to arise.</p>
<p>Military deployments, exercises, and preparations—such as the ones underway in the vicinity of the Korean Peninsula—may just be part of the US attempt to keep its options open with regards to dealing with North Korea. Nevertheless, these developments give some indication of what a military campaign would look like—while raising the risk of conflict in the region.</p>
<p>North Korea, after all, will be watching out for these types of military deployments and preparations by the United States. If North Korea concludes that a strike is imminent, Pyongyang will be more prone to attempt some form of pre-emptive action of their own. Furthermore, even if both parties manage to avoid war, large-scale build-ups and military exercises intended to contain and discourage North Korea might be the new normal.</p>
<p><a href="https://globalsecurityreview.com/u-s-deploys-three-carrier-strike-groups-korean-peninsula/">U.S. Deploys Three Carrier Strike Groups to Korean Peninsula</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What to Watch For in Post-ISIS Iraq and Syria</title>
		<link>https://globalsecurityreview.com/watch-post-isis-iraq-syria/</link>
		
		<dc:creator><![CDATA[Zachary Laub]]></dc:creator>
		<pubDate>Tue, 24 Oct 2017 16:00:03 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Iraq]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[Turkey]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=2887</guid>

					<description><![CDATA[<p>As the campaigns to wrest the Islamic State from the territory it held in Iraq and Syria near completion, new conflicts may arise if old political arrangements prevail. The self-proclaimed Islamic State, once estimated to have occupied a third of Iraqi and Syrian territory, has been reduced to a handful of enclaves, bringing a complicated [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/watch-post-isis-iraq-syria/">What to Watch For in Post-ISIS Iraq and Syria</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 class="subhead">As the campaigns to wrest the Islamic State from the territory it held in Iraq and Syria near completion, new conflicts may arise if old political arrangements prevail.</h2>
<p><span class="dropcap dropcap-simple">T</span>he self-proclaimed Islamic State, once estimated to have occupied a third of Iraqi and Syrian territory, has been reduced to a handful of enclaves, bringing a complicated endgame into focus. In July 2017, Prime Minister Haider al-Abadi <a title="declared victory" href="http://www.npr.org/sections/thetwo-way/2017/07/09/536307429/mosul-has-been-liberated-from-isis-control-iraqs-prime-minister-says" rel="noopener">declared victory</a> in Mosul, as his troops, with U.S. backing, recaptured Iraq’s second city.</p>
<p>In Syria, the Kurdish-led Syrian Democratic Forces (SDF) recaptured the Islamic State’s self-styled capital of Raqqa in October, and the SDF and forces loyal to President Bashar al-Assad are both closing in on the Islamic State in its final eastern redoubt.</p>
<h3>Introduction</h3>
<p>The rapidly receding footprint of the Islamic State has raised the risks for new confrontations as various armed groups in Iraq and Syria, and in some cases, their foreign backers, vie for influence in the newly liberated areas. Meanwhile, experts warn that if the victors in both countries fail to make political arrangements that accommodate civilians and facilitate the return of refugees, the hard-fought military campaigns may only lay the groundwork for future cycles of insurgency and counterinsurgency. The following is a sketch of security, displacement, and reconstruction concerns in both countries.</p>
<h3>Iraq</h3>
<p><strong><em>Security</em>.</strong> Iraqi forces’ entry into Hawija in October marked the Islamic State’s loss of the last remaining city under its control. Three major armed groups remain in territory formerly held by the Islamic State: the Iraqi military, mostly Shia quasi-state militias, and the Kurdish peshmerga. They are cooperating with each other in some instances and competing in others.</p>
<p>The Islamic State’s sweep through Iraq in 2014 highlighted how the Iraqi military had been <a title="hollowed out by corruption" href="https://www.nytimes.com/2014/11/24/world/middleeast/graft-hobbles-iraqs-military-in-fighting-isis.html" rel="noopener">hollowed out by corruption</a>, but recent advances showed how the force had been reconstituted; it is now regarded by many Iraqis as a <a title="professional force" href="https://www.foreignaffairs.com/articles/iraq/2017-04-10/land-grabs-iraq" rel="noopener">professional force</a>. Even so, the counterterrorism forces have been exhausted by the pace of the campaign for Mosul and other major cities, and both Iraqi forces and predominantly Shia militias have faced accusations of abuses, including <a title="extrajudicial executions" href="https://www.buzzfeed.com/nancyyoussef/us-troops-arent-reporting-iraqi-human-rights-abuses" rel="noopener">extrajudicial executions</a> of people suspected of collaborating with the Islamic State and collective punishment of their families.</p>
<p>A U.S.-led international coalition has backed Iraqi forces, primarily through air power. Most U.S. forces are advising the Iraqi military, though special forces have served on the front lines. The White House has set a <a title="cap on U.S. troops in Iraq" href="http://al-monitor.com/pulse/originals/2017/08/us-troop-numbers-iraq-syria-surge-afghanistan-pentagon.html" rel="noopener">cap on U.S. troops in Iraq</a> of 5,262, but the number actually deployed at any particular time may be higher.</p>
<div class="auxiliary pullquote">
<figure>
<blockquote><p>Various armed groups are jockeying to control territory abandoned by the Islamic State.</p></blockquote>
</figure>
</div>
<p>Also on the battlefield are Kurdish peshmerga, whose ranks may <a title="exceed 150,000" href="http://www.rudaw.net/english/kurdistan/03042017" rel="noopener">exceed 150,000</a>, and Popular Mobilization Fronts (PMFs), predominantly Shia, numbering <a title="more than sixty thousand" href="http://carnegie-mec.org/2017/04/28/popular-mobilization-forces-and-iraq-s-future-pub-68810" rel="noopener">more than sixty thousand</a>. Many are loyal to Iran, while others are loyal to the Iraqi clerics <a href="https://www.cfr.org/interview/why-sadr-returning-iraqs-limelight">Moqtada al-Sadr</a> or Grand Ayatollah Ali al-Sistani. A significant challenge for the state will be incorporating them into the conventional security apparatus. Another will be accommodating local armed Sunni Arab tribal groups. These various armed groups are jockeying to control territory abandoned by the Islamic State.</p>
<p>Iraqi Kurds are contesting oil-rich, ethnically mixed territories adjacent to the Kurdistan Regional Government’s three provinces, where they have had autonomy since 1991. But these territorial claims have highlighted tensions between Kurdish factions, as well as between the Kurds and others. At the center of the dispute is Kirkuk, a city occupied by Kurds since their initial advance against the Islamic State in 2014. Iraqi forces raised the national flag there once again in October 2017, apparently welcomed by the local ruling Kurdish party, the Patriotic Union of Kurdistan (PUK). The PUK has been uneasy with the <a title="drive for independence" href="https://www.theatlantic.com/international/archive/2017/09/kurds-iraq-barzani-isis-referendum/541260/" rel="noopener">drive for independence</a> led by the rival Kurdistan Democratic Party (KDP), which rules from the Iraqi Kurdish capital of Erbil.</p>
<p>The Islamic State’s last Iraqi enclave lies in western Anbar Governorate, along the Syrian border. Having lost the vast majority of its territories, analysts expect Islamic State militants who have fled the Iraqi military and militias to shift to guerrilla tactics.</p>
<p><strong><em>Displacement.</em> </strong>More than three million Iraqis are internally displaced. A <a title="third of them" href="https://reliefweb.int/sites/reliefweb.int/files/resources/Round78_Report_English_2017_August_30_IOM_DTM.pdf" rel="noopener">third of them</a> [PDF] are displaced within Nineveh Governorate, of which Mosul is the capital; some eight hundred thousand people are <a title="displaced from the city" href="https://www.iom.int/news/un-migration-agency-over-830000-remain-displaced-outside-mosul" rel="noopener">displaced from the city</a>. Another fifth are in the Kurdish provinces of Erbil and Dohuk, In areas where there was little destruction, such as Mosul’s eastern half or Tal Afar, the displaced have been quick to return home, but elsewhere housing stock and infrastructure have been destroyed, and public services remain minimal, and many residents remain in makeshift camps. Tribal leaders in some cases have blocked the family members of suspected militants from returning home.</p>
<p><strong><em>Reconstruction</em>.</strong> Much of Mosul, particularly the western Old City, was destroyed, mostly by air strikes carried out by the U.S.-led coalition against entrenched Islamic State fighters. The United Nations estimates <a title="a third of the housing stock" href="http://reliefweb.int/report/iraq/iraq-multi-sector-damage-assessment-8-july-2017" rel="noopener">a third of the housing stock</a> there has been destroyed; so too has much of the public infrastructure, including roads, bridges, and water and electrical supply. Islamic State militants blew up the landmark al-Nuri Mosque and left behind mines and booby traps that have killed hundreds and could take <a title="more than a decade" href="https://www.reuters.com/article/us-mideast-crisis-iraq-explosives/booby-traps-plague-north-iraq-as-islamic-state-targets-returning-civilians-idUSKBN1AB0TS" rel="noopener">more than a decade</a> to clear. Also in urgent need of repair is the <a title="Mosul Dam" href="https://www.newyorker.com/magazine/2017/01/02/a-bigger-problem-than-isis" rel="noopener">Mosul Dam</a>, whose failure could jeopardize the livelihoods of millions of Iraqis.</p>
<p>Repairing basic infrastructure in Mosul alone could <a title="cost more than $1 billion" href="http://www.reuters.com/article/us-mideast-crisis-iraq-aid-idUSKBN19Q28F" rel="noopener">cost more than $1 billion</a>, according to a UN official, and altogether, the Iraqi government has estimated that rebuilding the country will cost in the realm of $100 billion. Particularly given the decline in oil prices, which has left the state <a title="running a deficit" href="http://www.reuters.com/article/iraq-budget-idUSL5N1E23WU" rel="noopener">running a deficit</a>, Iraq will depend on foreign assistance. But <a title="corruption is endemic" href="https://www.transparency.org/files/content/corruptionqas/Country_profile_Iraq_2015.pdf" rel="noopener">corruption is endemic</a> [PDF], so countries and multilateral institutions may be reluctant to extend funding. The United Nations’ 2017 appeal for humanitarian funding was just shy of 50 percent met as of August.</p>
<h3>Syria</h3>
<p><strong><em>Security.</em></strong> The Islamic State’s remaining presence is more substantial in Syria than Iraq, but with U.S.-backed, Kurdish-led forces declaring victory in Raqqa, territory in Deir ez-Zour Province remains its last stronghold. Islamic State fighters there are under fire from both Bashar al-Assad&#8217;s forces, backed by Russian air power, and Kurdish-led ones supported by the U.S.-led coalition.</p>
<p>U.S. officials are in northern Syria laying groundwork for the administration of Raqqa. The SDF backs civilian <a title="governance structures" href="http://www.aljazeera.com/indepth/features/2017/10/sdf-captures-syria-raqqa-city-isil-171013110014050.html" rel="noopener">governance structures</a> there, and U.S. forces are <a title="training a militia" href="http://foreignpolicy.com/2017/06/29/seven-days-a-gun-and-a-prayer-the-pentagons-plan-to-pacify-raqqa/" rel="noopener">training a militia</a> to police the city. It is unclear how much control the Democratic Union Party (PYD), the Syrian Kurdish political party, will have in these areas; in other Arab-majority areas the SDF liberated from the Islamic State, such as Manbij, PYD cadres are the <a title="ultimate authorities" href="https://warontherocks.com/2017/07/the-post-caliphate-gauntlet-in-eastern-syria/" rel="noopener">ultimate authorities</a>, and some suspect that Kurdish fighters will claim the territories they liberate for their de facto autonomous region known as Rojava.</p>
<div class="auxiliary pullquote">
<figure>
<blockquote><p>While Syria is likely to remain divided . . . Assad’s continued rule from Damascus appears assured.</p></blockquote>
</figure>
</div>
<p>Circumstances will grow even more complicated in Deir ez-Zour Province. New tensions might arise if the Sunni Arab majority there sees Kurds administering their territory as occupiers. Meanwhile, other nearby armed groups may enter the melee as their foreign backers—primarily Iran and Turkey—vie to secure influence in territories that are unlikely to return to Damascus’s centralized control. Among those groups are Iran-backed PMFs crossing over from Iraq and <a title="Sunni Arab rebel forces" href="http://www.al-monitor.com/pulse/originals/2017/08/syria-deir-ez-zor-factions-fight-isis-regime.html" rel="noopener">Sunni Arab rebel forces</a>that had been backed by Jordan and the United States. Some observers believe Syrian Kurds are grabbing up territory in the oil-rich province as leverage to <a title="press for autonomy" href="https://www.wsj.com/article_email/as-isis-falters-u-s-allies-and-syrian-regime-maneuver-for-advantage-1505727000-lMyQjAxMTE3NjE1ODAxNDg1Wj/" rel="noopener">press for autonomy</a> under a future settlement. The U.S. military has outposts across this region, and as the Islamic State’s footprint is diminished, clashes between these various forces will grow more likely, analysts say.</p>
<p><em><strong>Displacement.</strong> </em>With both the campaign against the Islamic State and the broader civil war winding down, some internally displaced Syrians are returning home. The International Organization for Migration reports that <a title="more than six hundred thousand" href="https://www.iom.int/news/over-600000-displaced-syrians-returned-home-first-7-months-2017" rel="noopener">more than six hundred thousand</a> did so in the first seven months of 2017, out of more than six million in all, though it cautions that not all returns were voluntary.</p>
<p>An additional five million Syrians are refugees in countries bordering Syria, and about a million have applied for asylum in the European Union. As war wanes, countries hosting refugees may face popular pressure to declare Syria safe for refugees’ return, as <a title="some have for Afghanistan" href="https://www.nytimes.com/2017/10/05/world/asia/afghan-refugees-deported.html" rel="noopener">some have for Afghanistan</a>. (Jordan has reportedly already <a title="deported registered refugees" href="https://www.hrw.org/news/2017/10/02/jordan-syrian-refugees-being-summarily-deported" rel="noopener">deported registered refugees</a>.) But while Syria is likely to remain divided among various spheres of influence, Assad’s continued rule from Damascus appears assured, and would-be returnees fear <a title="conscription or arrest" href="https://www.washingtonpost.com/world/middle_east/syrias-war-created-millions-of-refugees-some-might-be-forced-to-return-home/2017/08/27/3efac6a8-7dff-11e7-b2b1-aeba62854dfa_story.html?utm_term=.529a1193a8d5" rel="noopener">conscription or arrest</a>, if not open fighting.</p>
<p><strong><em>Reconstruction.</em></strong> The campaign against the Islamic State, as well as the broader civil war, has ravaged Syria. Some 7 percent of its housing stock has been destroyed, and another 20 percent damaged, the World Bank found. Likewise its educational and health-care systems have been largely destroyed, as well as much of its physical infrastructure. Rebuilding the destroyed physical capital could cost between $100 and $200 billion, <a title="according to an IMF study" href="https://www.imf.org/external/pubs/ft/wp/2016/wp16123.pdf" rel="noopener">according to an IMF study</a> [PDF], but the damage to intangibles—destroyed institutions and networks that facilitate economic activity—may have exacted an even higher cost, according to a <a title="World Bank study" href="http://www.worldbank.org/en/country/syria/publication/the-toll-of-war-the-economic-and-social-consequences-of-the-conflict-in-syria" rel="noopener">World Bank study</a>.</p>
<p>The scale of the destruction is so great that reconstruction could not be done without a massive infusion of international aid and loans, but analysts warn that any such funds would likely end up in the coffers of <a title="Assad’s cronies" href="https://www.bloomberg.com/news/articles/2017-08-01/what-sanctions-assad-allies-got-18-million-in-un-syria-payouts" rel="noopener">Assad’s cronies</a> or local power brokers loyal to him, and be used to <a title="reward loyal communities" href="http://carnegieendowment.org/sada/72998" rel="noopener">reward loyal communities</a> at the expense of others.</p>
<p>An April conference in Brussels sought to muster international support for reconstruction, but concluded that it could not successfully be done without a “<a title="genuine and inclusive transition" href="http://www.consilium.europa.eu/en/press/press-releases/2017/04/05-syria-conference-co-chairs-declaration/" rel="noopener">genuine and inclusive transition</a> that benefits all the Syrians.” The participants intended the prospect of international financing to incentivize the warring parties to return to what has been a fruitless UN-sponsored peace process years in the making. Assad, however, appears <a title="disinclined to compromise" href="https://www.foreignaffairs.com/articles/syria/2017-10-04/dont-fund-syrias-reconstruction" rel="noopener">disinclined to compromise</a> his authority, and he could instead turn to China, Iran, and Russia for financing.</p>
<p><a href="https://globalsecurityreview.com/watch-post-isis-iraq-syria/">What to Watch For in Post-ISIS Iraq and Syria</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Converging Economic and Demographic Trends Threaten Security in the Middle East and North Africa</title>
		<link>https://globalsecurityreview.com/converging-economic-and-demographic-trends-threaten-security-in-the-middle-east-and-north-africa/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Sat, 21 Oct 2017 04:32:19 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Energy]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[Foreign Policy]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[International Security]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Iraq]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Lebanon]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[Northern Africa]]></category>
		<category><![CDATA[Oil]]></category>
		<category><![CDATA[OPEC]]></category>
		<category><![CDATA[Qatar]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[United Arab Emirates]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=2774</guid>

					<description><![CDATA[<p>With oil prices unlikely to recover to levels of the petroleum boom governments may have to limit cash payments and subsidies. In the meantime, social networks have provided new tools for citizens to vent their political frustrations.  Conservative religious groups—including Brotherhood affiliates and movements—and ethnically-based organizations like those based on Kurdish identity are poised to [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/converging-economic-and-demographic-trends-threaten-security-in-the-middle-east-and-north-africa/">Converging Economic and Demographic Trends Threaten Security in the Middle East and North Africa</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>With oil prices unlikely to recover to levels of the petroleum boom governments may have to limit cash payments and subsidies.</h2>
<p>In the meantime, social networks have provided new tools for citizens to vent their political frustrations.  Conservative religious groups—including Brotherhood affiliates and movements—and ethnically-based organizations like those based on Kurdish identity are poised to be superior alternatives to weak governments in the region.</p>
<p>Such groups typically supply social services better than the nation and their politics resonate with publics who’re usually more conservative and religious than the region’s political and economic elites.</p>
<h3><a href="http://globalsecurityreview.com/forecast/africa-middle-east/">If left unchecked, current trends will further fragment the region.  </a></h3>
<p>The effect of Islamist groups is very likely to expand, reducing the tolerance for and presence of minorities, setting the stage for additional migration flows.  Hazards of uncertainty in Arab countries like Egypt, and possibly Saudi Arabia, could induce rulers to impose control via force–an impulse at odds with countertrends like the technological empowerment of human data flows, and poverty reduction.</p>
<p>Additionally, a transition to democracy could offer an attractive model, if it delivers better stability and inclusive wealth.  Progress on poverty reduction, education, and girls’ empowerment in individual portions of the region provides momentum for tapping into the growing number of young people which will be coming of working age.</p>
<h3>Deepening crises undermine the credibility of international peace building and security institutions.</h3>
<p>Geopolitically, developing humanitarian crises and regional conflict in the Middle East and North Africa will threaten to further undermine the credibility of international dispute resolution and human rights standards.  Perceptions in the area’s capitals which Washington is undependable have invited competition from Russia, and possibly China, and hedging by nations regarding US obligations.</p>
<p>These perceptions stem from unenforced red lines in Syria, withheld support for Mubarak along with other Arab incumbents in 2011, an alleged tilt toward Iran and away from traditional Sunni allies and Israel, and a sense of neglect due to the US rebalance to Asia.</p>
<h3>Iran, Israel, and Turkey are most likely to rise in power and regional influence</h3>
<p>In the meantime, Iran, Israel, and perhaps Turkey are likely to rise in power and influence relative to other nations in the area but will remain at odds with one another.</p>
<p>Iran’s growing influence, nuclear capabilities, and aggressive behavior will continue to be a concern for Gulf and Israel Arab nations.  The sectarian nature of Iranian and Saudi regional competition, which promotes inflammatory rhetoric and allegations of heresy throughout the region, heightens these concerns.</p>
<p><a href="https://globalsecurityreview.com/converging-economic-and-demographic-trends-threaten-security-in-the-middle-east-and-north-africa/">Converging Economic and Demographic Trends Threaten Security in the Middle East and North Africa</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>South Asia: India and Pakistan</title>
		<link>https://globalsecurityreview.com/south-asia-india-pakistan/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Fri, 20 Oct 2017 19:59:20 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Bangladesh]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?post_type=forecast&#038;p=2545</guid>

					<description><![CDATA[<p>Nuclear deployment requirements for naval-based delivery vehicles remove a safety valve that, until now, has kept atomic weapons stored separately from missiles in South Asia. At-sea deployments of nuclear weapons by India, Pakistan, and perhaps China, would increasingly nuclearize the Indian Ocean throughout the next two decades. The presence of multiple nuclear powers in the [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/south-asia-india-pakistan/">South Asia: India and Pakistan</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Nuclear deployment requirements for naval-based delivery vehicles remove a safety valve that, until now, has kept atomic weapons stored separately from missiles in South Asia.</h2>
<ul class="bs-shortcode-list list-style-asterisk">
<li><span style="color: #4a4a4a; font-family: Lato, sans-serif; font-size: 15px; text-transform: initial;">At-sea deployments of nuclear weapons by India, Pakistan, and perhaps China, would increasingly nuclearize the Indian Ocean throughout the next two decades.</span></li>
<li></li>
<li>The presence of multiple nuclear powers in the Indian ocean operating nuclear-armed vessels increases the potential risk of miscalculation and inadvertent escalation.</li>
</ul>
<h3>India will be the world&#8217;s fastest-growing economies throughout the next five years</h3>
<p>India will be the world&#8217;s fastest-growing economies throughout the next five years as China&#8217;s economy cools and growth elsewhere sputters, but internal tensions over inequality and religion will complicate its expansion.</p>
<p>New Delhi, however, will continue to offer smaller South Asian nations a stake in India&#8217;s financial growth through development assistance and increased connectivity to India&#8217;s economy, contributing to India&#8217;s broader effort to assert its role as the predominant regional power. The quality of India&#8217;s development depends on addressing general poor public health, sanitation, and infrastructure conditions.</p>
<p>The rate of malnourished kids, for instance, is higher in India than in Sub-Saharan Africa. Populism and sectarianism will intensify if Bangladesh, India, and Pakistan fail to provide employment and education for growing urban populations and officials continue to govern principally through identity politics.</p>
<p>Human health, food security, infrastructure, and livelihoods will deteriorate from pollution, earthquakes and the effects of climate change, including shifting monsoon patterns and increasing glacier melt.</p>
<p>South Asia&#8217;s openness to the private sector, community groups, and non-governmental organizations, however, should position it well for an era of empowered individuals, mainly if governments curb their support for chauvinistic groups that divide societies.</p>
<p>India will focus its attention on both Islamabad and Beijing—seeking military partnerships with Europe, Japan, the US, and others—to boost its conventional capabilities while striving for escalation dominance vis-a-vis Pakistan.</p>
<p>India will continue to offer smaller South Asian nations a stake in India’s financial growth through development assistance and increased connectivity to India’s economy. This strategy will contribute to India’s broader effort to assert its role as the predominant regional power.</p>
<h3>Violent extremism, terrorism, and instability will continue to hang over nuclear-armed Pakistan.</h3>
<p>The threat of terrorism, from Lashkar-e-Tayyiba (LET), Tehrik-i-Taliban Pakistan (TTP), and al-Qaeda and its affiliates as well as ISIL’s expansion and sympathy for associated ideology—will remain prominent in the area.</p>
<p>Competition for jobs, coupled with discrimination against minorities, might contribute to the radicalization of the region’s youth, especially given abnormal sex ratios favoring males in several nations.</p>
<p>In increasingly volatile Pakistan, which neighbors India, there is a significant concern at the regional and global levels that a non-state actor could obtain a nuclear weapon in Pakistan. This scenario would be particularly challenging to manage, as conventional deterrence practices don&#8217;t deter a non-state actor like a trans-national terrorist group, creating a significant threat for neighboring India.</p>
<div id="wtr-content" data-bg="#FFFFFF" data-fg="#202D54" data-width="5" data-mute="" data-fgopacity="0.5" data-mutedopacity="0.5" data-placement="top" data-placement-offset="0" data-placement-touch="top" data-placement-offset-touch="0" data-transparent="" data-touch="1" data-comments="" data-commentsbg="#ffcece" data-location="page" data-mutedfg="#202D54"></div>
<p>Pakistan will feel compelled to address India&#8217;s economic and conventional military capabilities through asymmetric means. Pakistan will seek to enhance its nuclear deterrent against India by expanding its nuclear arsenal and delivery means, including pursuing battlefield nuclear weapons and sea-based options.</p>
<p>India, by contrast, will focus its attention on both Islamabad and Beijing—seeking military partnerships with Europe, Japan, the US, and others—to boost its conventional capabilities while striving for escalation dominance vis-a-vis Pakistan.</p>
<p><a href="https://globalsecurityreview.com/south-asia-india-pakistan/">South Asia: India and Pakistan</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>India-China Dispute on the Doklam Plateau</title>
		<link>https://globalsecurityreview.com/india-china-dispute-doklam-plateau/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Fri, 20 Oct 2017 07:45:02 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Bhutan]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[India]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=1868</guid>

					<description><![CDATA[<p>The border dispute between China, India, and Bhutan on the Doklam Plateau carries on to be unresolved and seems to be escalating. India has ignored China&#8217;s August 19 deadline for withdrawing Indian troops from the Doklam Plateau. Despite Chinese threats of &#8216;annihilation,&#8217; the deadline has come and gone, raising questions about how this dispute will [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/india-china-dispute-doklam-plateau/">India-China Dispute on the Doklam Plateau</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The border dispute between China, India, and Bhutan on the Doklam Plateau carries on to be unresolved and seems to be escalating.</h2>
<p>India has ignored China&#8217;s August 19 deadline for withdrawing Indian troops from the Doklam Plateau. Despite Chinese threats of &#8216;annihilation,&#8217; the deadline has come and gone, raising questions about how this dispute will be resolved—or further escalate. Both parties, at the time of this briefing, have agreed to stand down their respective troops deployed along the Line of Actual Control. However, India and China have both made it clear that they are not relinquishing their respective claims, leaving the door open for heightened tensions down the road as this dispute continues to develop.</p>
<p><figure id="attachment_1778" aria-describedby="caption-attachment-1778" style="width: 630px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-1778" src="http://globalsecurityreview.com/wp-content/uploads/2017/08/Doklam_Map_China_India_30-June-2017-630x378-1498809371.jpg" alt="" width="630" height="378" srcset="https://globalsecurityreview.com/wp-content/uploads/2017/08/Doklam_Map_China_India_30-June-2017-630x378-1498809371.jpg 630w, https://globalsecurityreview.com/wp-content/uploads/2017/08/Doklam_Map_China_India_30-June-2017-630x378-1498809371-300x180.jpg 300w" sizes="(max-width: 630px) 100vw, 630px" /><figcaption id="caption-attachment-1778" class="wp-caption-text">The location of the Doklam Plateau within the greater Himalayan region.</figcaption></figure></p>
<p>For nearly two months, China and India have been engaged in a tense standoff on the Doklam Plateau. Indian and Chinese troops are positioned just meters apart along the Line of Actual Control. The dispute began on June 16 when Indian forces physically prevented Chinese soldiers and construction workers from constructing a roadway through the Doka La mountain pass. India justified its actions by stating that Bhutan had requested Indian assistance, under the terms of a Bhutan-India treaty agreement. Bhutan claims the pass is within its internationally recognized territory on the tri-junction border it shares with China and India.</p>
<h3>While India ignores the August deadline, China has warned citizens against traveling to India.</h3>
<p>China&#8217;s August 19 deadline for Indian withdrawal from the plateau was a rarity. In issuing such a deadline, China has backed itself into a corner, a potentially embarrassing scenario for Chinese President Xi Jinping. It can either find a way to save face (domestically and internationally) by ending the dispute with India on mutually beneficial terms, or it can escalate the situation further.</p>
<p>The former option would be risky in that China risks looking weak, like a &#8220;paper tiger.&#8221; Conversely, the latter option would hurt China&#8217;s image abroad but would give China&#8217;s leaders the ability to play upon growing domestic nationalist sentiments. However, conflict is highly risky in that China would also risk economic disruption which would hinder its&#8217; strategic political and economic interests.</p>
<p>The Chinese government claims that the tri-junction is actually several miles south of Doka La, therefore placing the pass within Chinese territory.  China&#8217;s actions in the area are seen as a threat by India due to close proximity of Chinese troops and development projects to the Siliguri corridor, which narrowly connects India&#8217;s remote north-western territory to the Indian mainland. Maintaining sovereignty over the Siliguri corridor is a geostrategic priority for India; an incursion would cut off any connection between India proper and the Indian northwest.</p>
<h3>Chinese Propaganda and Disinformation Tactics</h3>
<p>On August 9, the Chinese government claimed that Bhutan&#8217;s government told Beijing through diplomatic channels that Bhutan doesn&#8217;t regard the Doklam standoff as being within Bhutanese territory. However, Bhutan refutes the Chinese claim and reiterated that the Bhutanese position is that Chinese actions violate existing agreements.</p>
<p>In an effort to craft an alternative narrative where Bhutan recognizes the Doklam Plateau as belonging to China, not Bhutan, Chinese state media has routinely insisted that Bhutan and China have no dispute. China also reportedly has been using disinformation campaigns and psychological warfare tactics against Indian targets to intimidate troops and manipulate public opinion.</p>
<h3>Troop Deployments and Military Exercises on the Doklam Plateau</h3>
<p>China has about 300 troops deployed on the Doklam Plateau.  Another 800 Chinese troops (not quite battalion-strength) are stationed in the nearby area. India has around 350 troops deployed facing Chinese troops, with three additional brigades stationed in nearby areas.</p>
<p>India&#8217;s armed forces do not plan for additional troop deployments to the plateau, as their intent is to deter China while avoiding an escalation in tensions. However, India&#8217;s military command has moved its forces into a state of &#8220;No war, no peace,&#8221; a state of alert where soldiers take up pre-determined positions in the event of a conflict.</p>
<p>The Indian Army also conducted its planned Operational Alert training exercise early. Originally planned for later in September or October, the Operational Alert exercise began in early August. It was designed to acclimate troops to operating high altitude, while showcasing the battle readiness and deployment of Indian troops, without provoking Chinese soldiers stationed just meters across the border.</p>
<h3>Analysis: probability of conflict increases if China&#8217;s actions are influenced by Xi&#8217;s domestic political standing</h3>
<p>The Doklam standoff could have domestic political consequences, particularly in China.  The Communist Party&#8217;s 19th Congress will convene in November. President Xi Jinping expected to further consolidate his power during the Congress.</p>
<p>But, if Xi&#8217;s political credibility is damaged due to perceived weakness, his political future will be in jeopardy, as would the legitimacy of the communist party he has structured around him. Alternatively, Chinese political discourse may alter in the aftermath of the conference, allowing the Chinese military to withdraw troops without running afoul of the more disruptive, nationalist voices within the country.</p>
<p><a href="https://globalsecurityreview.com/india-china-dispute-doklam-plateau/">India-China Dispute on the Doklam Plateau</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Assertions of Rising and Declining World Powers</title>
		<link>https://globalsecurityreview.com/assertions-rising-declining-world-powers/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Tue, 17 Oct 2017 00:00:30 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[South Africa]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?post_type=forecast&#038;p=2536</guid>

					<description><![CDATA[<p>Expect increasing assertiveness from Beijing and Moscow as both governments seek to lock in competitive advantages. Beijing and Moscow will seek to lock in competitive advantages and also to right what they bill are historical wrongs before economic and demographics headwinds further slow their material progress and the West regains its foundation. Both China and [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/assertions-rising-declining-world-powers/">The Assertions of Rising and Declining World Powers</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Expect increasing assertiveness from Beijing and Moscow as both governments seek to lock in competitive advantages.</h2>
<p>Beijing and Moscow will seek to lock in competitive advantages and also to right what they bill are historical wrongs before economic and demographics headwinds further slow their material progress and the West regains its foundation.</p>
<p>Both China and Russia maintain worldviews where they&#8217;re rightfully dominant in their regions and able to form regional politics and economics to match their security and material interests.</p>
<p>Both have moved aggressively in latest years to exert more considerable influence in their regions, to contest the US geopolitically, and also to force Washington to accept exclusionary regional spheres of influence—a situation that the US has historically opposed.</p>
<h3>National Security and Energy Interests of Rising and Declining Powers</h3>
<p>For instance, China views the continuing presence of the US Navy in the Western Pacific, the centrality of US alliances in the region, and US protection of Taiwan as obsolete and representative of the continuation of China’s “one hundred years of humiliation.” Recent cooperation has been tactical and is likely to come back to competition if Beijing jeopardizes China’s dramatic growth has highlighted greater gaps between poor and rich.</p>
<p>Russian interests in Central Asia and as Beijing enjoys options for inexpensive energy supply beyond Russia. Furthermore, it isn&#8217;t clear whether there&#8217;s a mutually acceptable boundary between what Russia and China consider their natural spheres of influence.</p>
<h3>India navigates its path</h3>
<p>In the meantime, India’s growing economic power and profile in the region will further complicate these calculations, as New Delhi navigates relations with Beijing, Moscow, and Washington to shield its own expanding interests. Russian assertiveness will harden viewpoints in the Baltics along with other portions of Europe, escalating the potential risk of conflict.</p>
<p>Russia will seek, and sometimes feign, international cooperation, although openly challenging norms and rules it perceives as a counter to its interests and providing support for leaders of fellow “handled democracies” which promote resistance to American policies and personal tastes.</p>
<p>Moscow has little stake in the rules of the international economics and may be counted on to take actions that weaken the United States&#8217; and European Union&#8217;s institutional advantages. Moscow will test NATO and resolve, seeking to undermine Western authenticity; it will attempt to exploit splits between Europe’s both north and south and east and west, and also to drive a wedge between the US and the EU.</p>
<p>Likewise, Moscow will become more active in the Middle East and these areas of the world wherein it believes it can check US influence. Lastly, Russia will Stay dedicated to atomic weapons as a deterrent and as a counter to stronger conventional military forces, as well as it&#8217;s ticket to superpower status.</p>
<p>Russian military doctrine allegedly includes the limited use of nuclear weapons in a situation where Russia’s vital interests are at stake to “de-escalate” a conflict by demonstrating that continued conventional conflict risks escalating the emergency to a large-scale nuclear exchange.</p>
<p><a href="https://globalsecurityreview.com/assertions-rising-declining-world-powers/">The Assertions of Rising and Declining World Powers</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Increased Sectarian Tensions in the Middle East as the Saudi-Iran Proxy War Heats Up</title>
		<link>https://globalsecurityreview.com/iran-saudi-proxy-war-increasing-sectarian-tensions/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Sat, 14 Oct 2017 00:55:27 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Egypt]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Kuwait]]></category>
		<category><![CDATA[Qatar]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[United Arab Emirates]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=2695</guid>

					<description><![CDATA[<p>Security concerns in Saudi Arabia are on the rise. Tensions are increasing between the Shia-minority and the Kingdom&#8217;s Sunni ruling class in the aftermath of the execution of Shiite cleric Nimr al Nimr. Regional jihadists are attempting to foment sectarian conflict in the kingdom by exploiting the unrest post-execution. In hopes of diluting attention focused [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/iran-saudi-proxy-war-increasing-sectarian-tensions/">Increased Sectarian Tensions in the Middle East as the Saudi-Iran Proxy War Heats Up</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Security concerns in Saudi Arabia are on the rise.</h2>
<p>Tensions are increasing between the Shia-minority and the Kingdom&#8217;s Sunni ruling class in the aftermath of the execution of Shiite cleric Nimr al Nimr. Regional jihadists are attempting to foment sectarian conflict in the kingdom by exploiting the unrest post-execution. In hopes of diluting attention focused on al Nimr, Saudi Arabia decided he&#8217;d be executed alongside 46 others, the majority of which were Sunnis accused of having links with Al Qaeda.</p>
<p>Per sentencing protocols, Saudi authorities would not have to give prior notice of the execution.  Security forces were able to suppress low-level actions by activists, but a worrying concern has been the rising number of jihadist suicide strikes taking place not just in the Sunni portions of the country, but in Shiite populated areas.</p>
<h3>Shiite extremists are bombing Shiite mosques</h3>
<p>Suicide bombings targeting Shiite mosques are designed to goad Shiites into retaliating, creating an even more significant security issue for elites, especially Crown Prince Mohammed bin Salman, who has assumed a leadership role in Saudi counterterrorism and defense efforts.</p>
<p>Jihadist exploitation of the al Nimr execution would involve strikes on religious targets and security forces, given the difficulties in targeting and disrupting petroleum infrastructure with such attacks. The killing of al Nimr will complicate negotiations for a political settlement in Syria.</p>
<p>Saudi Arabia and Iran have agreed to sit down in December when the region&#8217;s foreign ministers meet to negotiate on Syria. The two sides disagree over the groups that should be party to a post-Al Assad political solution, assuming all parties can even create the necessary battlefield conditions to engage in a political transition in Syria.</p>
<p>The proxy conflict in Syria between Iran and Saudi Arabia is ongoing in Lebanon, where a political agreement on the presidency is contingent on improved Iran-Saudi dialogue.</p>
<h3>Saudi Arabia is Fostering a Sunni Coalition</h3>
<p>Saudi Arabia isn&#8217;t the only Sunni power experiencing tensions with Tehran. As Turkey grows more assertive in the area, Iraqi Kurdistan and Syria will be crucial arenas for competition between the old opponents.</p>
<p>Saudi Arabia&#8217;s severing of diplomatic relations with Tehran is a test for the Sunni regional coalition that Riyadh has painstakingly tried to gather in the past few years.</p>
<p>Thus far, the states that have followed Riyadh&#8217;s lead to Iran protests are Bahrain, the United Arab Emirates, and Sudan. Bahrain, at the heart of the Saudi camp, has already reminded his ambassador from Iran and expelled the Iranian charge d&#8217;affaires in October.</p>
<p>Saudi Arabia has been attempting to foster a tighter relationship with Cairo to underpin its Arab coalition and will be signing grants and loans worth $3 billion for Egypt on Jan. 5 to make apparent the priority Saudi Arabia is giving the relationship.</p>
<p>Egypt will gladly accept the monetary support, but Cairo can be expected to maintain a more balanced approach with regards to contentious cultural disputes in the region. The execution of Al Nimr is a piece of a much more significant regional game.</p>
<p>The United Arab Emirates, which was in close military coordination with Saudi Arabia in Yemen, Libya and Syria, downgraded its diplomatic ties with Iran by recalling its ambassador and ordered a reduction in the number of Iranian diplomats stationed at the Emirates. Sudan that has seen its alliance with Riyadh reinforced while distancing itself from Iran—expelling the Iranian ambassador—has received increased Saudi monetary assistance.</p>
<p>Kuwait, conscious of its Shiite minority, condemned Iran after the attack on the Saudis Embassy but stopped short of severing diplomatic relations. Egypt chose to be more cautious, condemning Iran and avoiding any mention of Mohamed Fathi Abdel Ati, an Egyptian national who had been one of the Sunnis executed in the same group as al Nimr.</p>
<h3>Analysis: Saudi Arabia will look abroad for support after lackluster support from Sunni neighbors</h3>
<p>Saudi Arabia will focus on securing its oil facilities while dealing with sporadic bouts of unrest and jihadist attacks. While managing these domestic concerns, Saudi Arabia will look overseas for allies at the time of need.</p>
<p>The response will be mixed from its Sunni neighbors, based on how much they rely on security and assistance. The United States and others in the West will meanwhile do their best to maintain their distance from the proxy conflicts which are part and parcel of the changing regional balance of power between Iran and its adversaries.</p>
<p><a href="https://globalsecurityreview.com/iran-saudi-proxy-war-increasing-sectarian-tensions/">Increased Sectarian Tensions in the Middle East as the Saudi-Iran Proxy War Heats Up</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Subtext of Secretary Mattis&#8217; Mysterious Memo</title>
		<link>https://globalsecurityreview.com/subtext-secretary-mattis-mysterious-memo/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Wed, 11 Oct 2017 17:06:42 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Foreign Policy]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=2020</guid>

					<description><![CDATA[<p>After a cryptic department-wide memo some are asking if Secretary James Mattis is trying to send a message. Early in August and without pretext, Secretary of Defense James Mattis circulated a memorandum to Defense Department staff stressing the importance of ethics, saying he expects all staff, uniformed and civilian, “to play the ethical midfield.” The [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/subtext-secretary-mattis-mysterious-memo/">The Subtext of Secretary Mattis&#8217; Mysterious Memo</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>After a cryptic department-wide memo some are asking if Secretary James Mattis is trying to send a message.</h2>
<p>Early in August and without pretext, Secretary of Defense James Mattis circulated a memorandum to Defense Department staff stressing the importance of ethics, saying he expects all staff, uniformed and civilian, “to play the ethical midfield.”</p>
<p>The Department did not provide any further specificity regarding Secretary Mattis’ motives in sending the memorandum. The memo, dated August 4, 2017, reads as follows:</p>
<blockquote><p><strong>MEMORANDUM FOR ALL DEPARTMENT OF DEFENSE EMPLOYEES</strong></p>
<p><strong>SUBJECT: Ethical Standards for All Hands</strong></p></blockquote>
<blockquote>
<p style="text-align: left;">Those entrusted by our nation with carrying out violence, those entrusted with the lives of our troops, and those entrusted with enormous sums of taxpayer money must set an honorable example in all we do.</p>
<p style="text-align: left;">I expect every member of the Department to play the ethical midfield. I need you to be aggressive and show initiative without running the ethical sidelines, where even one misstep will have you out of bounds. I want our focus to be on the essence of ethical conduct: doing what is right at all times, regardless of the circumstances or whether anyone is watching.</p>
<p style="text-align: left;">To ensure each of us is ready to do what is right, without hesitation, when ethical dilemmas arise, we must train and prepare ourselves and our subordinates. Our prior rejection and our choice to live by an ethical code will reinforce what we stand for. so we remain morally strong especially in the face of adversity.</p>
<p style="text-align: left;">Through our example and through coaching of all hands, we will ensure ethical standards are maintained. Never forget, our willingness to take the Oath of Office and to accept the associated responsibilities means that even citizens who have never met us trust us to do the right thing, never abusing our position nor looking the other way when we see something wrong. I am proud to serve alongside you.</p>
<p style="text-align: left;">James N. Mattis</p>
<p style="text-align: left;">cc:<br />
Deputy Secretary of Defense</p>
</blockquote>
<h3>What prompted Mattis’ memo?</h3>
<p>Mattis&#8217; framing of the idea of training as mindfully engaging in ethical conduct—at all times—could be interpreted as a subtle nod towards potentially trying events to come. Events, where the Department of Defense, must maintain its integrity and ethical responsibility at all costs.</p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2017/09/DOD_MEMO_from_mattis.jpg" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignleft wp-image-2029" src="http://globalsecurityreview.com/wp-content/uploads/2017/09/DOD_MEMO_from_mattis.jpg" alt="" width="380" height="498" srcset="https://globalsecurityreview.com/wp-content/uploads/2017/09/DOD_MEMO_from_mattis.jpg 882w, https://globalsecurityreview.com/wp-content/uploads/2017/09/DOD_MEMO_from_mattis-229x300.jpg 229w, https://globalsecurityreview.com/wp-content/uploads/2017/09/DOD_MEMO_from_mattis-768x1005.jpg 768w, https://globalsecurityreview.com/wp-content/uploads/2017/09/DOD_MEMO_from_mattis-783x1024.jpg 783w" sizes="(max-width: 380px) 100vw, 380px" /></a>Also worthy of recognition is Mattis’ point about upholding the trust that others place in the organization. The trust Mattis speaks of is far more valuable and significant than the trust an employee has in an employer. He speaks of the faith the American people have in their armed forces in their ability to protect them and the national security of the United States. The legitimacy of the U.S. is partially guaranteed by its supposedly civilian-controlled military, and Mattis (while a retired 4-star general) knows that trust and legitimacy must be maintained at all costs.</p>
<h3>Why was the memo distributed?</h3>
<p>One assessment is that Mattis could be telegraphing a message that staff should still respect and work with transgender employees. Other military leaders have already begun dismissing the president’s directive.</p>
<p>Another read of the memo is that Mattis is warning DoD employees against obeying any illegal orders that Trump might soon issue, on Twitter or otherwise. One can’t dismiss that idea either, especially since Congress just departed for August recess. If Trump wanted to try something crazy (firing attorney general Jeff Sessions and special counsel Robert Mueller, for example), now would be a natural time for him to do so.</p>
<p>Mueller has convened a grand jury to keep pressing the investigation into possible collusion between the Trump campaign and the Russian government. Subpoenas are flying. Document requests have been sent. One target of the investigation seems to be erstwhile national security adviser <a href="http://globalsecurityreview.com/gen-flynn-may-traveled-europe-meet-russian-operatives/">Michael Flynn</a>, who served in the Army for 33 years until he was forced out in 2014. Then he began his second career shilling for Russia and Turkey.</p>
<p>Department employees or serving members of the armed forces may have documents in their files that Mueller wants to read. Mattis may be reminding them that, even in these bizarre and difficult times, they are duty-bound to do the right thing.</p>
<p><a href="https://globalsecurityreview.com/subtext-secretary-mattis-mysterious-memo/">The Subtext of Secretary Mattis&#8217; Mysterious Memo</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Likely is a Civil War in Venezuela?</title>
		<link>https://globalsecurityreview.com/is-venezuela-becoming-a-failed-state/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Sun, 08 Oct 2017 23:10:40 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Americas]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Colombia]]></category>
		<category><![CDATA[Hezbollah]]></category>
		<category><![CDATA[International Security]]></category>
		<category><![CDATA[Lebanon]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[Venezuela]]></category>
		<guid isPermaLink="false">https://global-security-brief.com/?p=460</guid>

					<description><![CDATA[<p>The worst-case scenario for Venezuela: Prolonged economic crisis and food shortages, coupled with rapidly escalating violence and unchecked arms proliferation could lead to a civil war If there isn’t any meaningful resolution of the crisis or an abatement of public anger, Dr. Jennifer McCoy, Distinguished University Professor of Political Science at Georgia State University, says [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/is-venezuela-becoming-a-failed-state/">How Likely is a Civil War in Venezuela?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3>The worst-case scenario for Venezuela: Prolonged economic crisis and food shortages, coupled with rapidly escalating violence and unchecked arms proliferation could lead to a civil war</h3>
<p dir="auto">If there isn’t any meaningful resolution of the crisis or an abatement of public anger, Dr. Jennifer McCoy, Distinguished University Professor of Political Science at Georgia State University, says a significant escalation in tensions and armed conflict is possible, from what is currently mainly peaceful protests with low levels of violence.</p>
<p dir="auto">Harsh repression has been widely propagated by the government or by government-armed militias and gangs. However, the risk of escalation increases due to the large number of young Venezuelans that are coming out and setting up barricades in the streets, mainly in the evenings after protests have ended, and engage in fights with police, the National Guard, and the government-armed gangs.</p>
<p dir="auto">Dr. McCoy notes that the youths coming out in opposition aren’t using firearms. Rather, they’re using Molotov cocktails, sticks, and are setting fires in the streets. The danger here is if this low-level of violence escalates and spirals out of control with increasing levels of chaos and violence between civilian protesters, the political opposition, government-armed militias and street gangs, and government police and military forces.</p>
<h3>Is Venezuela the Next Syria?</h3>
<p dir="auto">In some ways, it is possible Venezuela’s situation could escalate to the level currently observed in the Syrian civil war. That would be the absolute worst-case scenario, according to Dr. McCoy, with some key differences. Both crises arose from food and resource shortages, but ethnic and religious factions—like those engaged in the Syrian civil war—don’t exist in Venezuela.</p>
<p dir="auto">In Syria, the military has supported Assad partly because of the ethnic and religious alignments in the region and—to some degree—the belief that the armed forces best chances of survival lay with Assad. In Venezuela, the socialist Chavez movement arose from the military. It was when it incorporated some civilian leftist intellectuals that it became a hybrid civic-military coalition movement.</p>
<p dir="auto">The Venezuelan military, however, has a long professional history, and members of the armed forces have been very reluctant to fire on their citizens, and have been pushing for the military to maintain the legitimacy and professionalism of the institution of the armed forces. Still unclear, however, is the degree to which the military has been politicized in Venezuela.</p>
<p dir="auto">Since Chavez and his supporters came to power 15 years ago, they’ve made political promotions within the military, but it is unclear how far lower-ranking troops, who are also suffering from low salaries and food and medicine shortages, will support their superiors if they are called on to repress their fellow citizens.</p>
<h3>Regional Geopolitics and the Venezuelan Crisis</h3>
<p dir="auto">Geopolitically speaking, the situation in Venezuela is much different than the conflict in Syria. Venezuela’s neighbors are democratic. The Maduro government is also very conscious of legitimacy; it doesn’t want to be seen as an authoritarian regime—and a military takeover would carry the stigma associated with an authoritarian ruler. In this day and age, military coups aren’t as accepted in the Western hemisphere.</p>
<p dir="auto">While the worst case scenario is Venezuela devolving into civil war, Dr. McCoy believes that point is still some ways off. Venezuela’s democratic neighbors—Columbia, or Brazil, for instance—would likely exert tremendous pressure on the government and security services in Venezuela to negotiate an end to hostilities before it escalates into a full-blown civil war.</p>
<p dir="auto">If the worst is to occur, with continued failures of the state to govern effectively, if the country enters a state of general lawlessness, then there will be repercussions for the entire hemisphere, as well as Europe, Dr. McCoy says. While Venezuela doesn’t produce drugs, it’s a major transport hub for drugs going to Europe and even to Africa before making their way to Europe.</p>
<p dir="auto">Drug trafficking increases under lawlessness, as we saw in Honduras after 2009. There was a coup, and for a while, the country was run by a very weak government, and lawlessness increased dramatically. Now, Honduras has one of the highest homicide rates in the world. Countries like the United States are seeing a significant increase in the number of people arriving from countries like Honduras that are plagued with violence. An actual collapse of the state in Venezuela would likely mean large numbers of economic migrants and refugees fleeing the violence.</p>
<p dir="auto">Particularly, the Venezuelan border with Colombia would be most fragile. For a while, Venezuela closed the border with Colombia as thousands of people would try to cross the Amazon into Colombia just to try and get food or medicine.</p>
<p dir="auto">If the security situation in Venezuela worsens, the Colombian border would be the main point where people would cross. Internally, Colombia is just starting to get its peace agreement in place, so further destabilization in Venezuela could have significant ramifications for Colombia.</p>
<hr />
<p><em><strong>Source:</strong> Jennifer McCoy, Ph.D., Distinguished University Professor of Political Science at Georgia State University. Dr. McCoy served as Founding Director of the Global Studies Institute at GSU (2015-16), and as Director of the Carter Center’s Americas program (1998-2015) where she led projects strengthening democratic institutions, provided mediation and encouraged dialogue and hemispheric cooperation. Her latest book is </em><a href="https://www.amazon.com/gp/product/1601270682/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=1601270682&amp;linkCode=as2&amp;tag=globalsecur08-20&amp;linkId=6048537beac754ed7f2c29c55b01b3ed" target="_blank" rel="noopener noreferrer">International Mediation in Venezuela</a><img loading="lazy" decoding="async" style="border: none !important; margin: 0px !important;" src="//ir-na.amazon-adsystem.com/e/ir?t=globalsecur08-20&amp;l=am2&amp;o=1&amp;a=1601270682" alt="" width="1" height="1" border="0" /><em> (co-authored with Francisco Diez, 2011).</em></p>
<p><a href="https://globalsecurityreview.com/is-venezuela-becoming-a-failed-state/">How Likely is a Civil War in Venezuela?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Africa and the Middle East</title>
		<link>https://globalsecurityreview.com/africa-middle-east/</link>
		
		<dc:creator><![CDATA[GSR Staff]]></dc:creator>
		<pubDate>Sat, 07 Oct 2017 20:08:21 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Africa]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[Northern Africa]]></category>
		<category><![CDATA[Sub-Saharan Africa]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?post_type=forecast&#038;p=2550</guid>

					<description><![CDATA[<p>Virtually all of the region&#8217;s tendencies are going in the wrong direction. Continuing conflict and lack of political and economic reform threaten poverty reduction, the area&#8217;s one last bright spot.  Resource dependence and foreign assistance have propped up elites even as it fostered widespread reliance on the nation by inhibiting markets, employment, and human capital. [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/africa-middle-east/">Africa and the Middle East</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Virtually all of the region&#8217;s tendencies are going in the wrong direction.</h2>
<p>Continuing conflict and lack of political and economic reform threaten poverty reduction, the area&#8217;s one last bright spot.  Resource dependence and foreign assistance have propped up elites even as it fostered widespread reliance on the nation by inhibiting markets, employment, and human capital.</p>
<h3>MENA: The Middle East and Northern Africa</h3>
<p>With oil prices unlikely to recover to levels of the petroleum boom governments may have to limit cash payments and subsidies.  At the meantime, social networks have provided new tools for citizens to vent their political frustrations.  Conservative religious groups—including Brotherhood affiliates and movements—and ethnically-based organizations like those based on Kurdish identity are poised to be superior alternatives to weak governments in the region.</p>
<p>Such groups typically supply social services better than the nation and their politics resonate with publics who&#8217;re usually more conservative and religious than the region&#8217;s political and economic elites.</p>
<p>If left unchecked, current trends will further fragment the region.  The effect of Islamist groups is very likely to expand, reducing the tolerance for and presence of minorities, setting the stage for additional migration flows.  Hazards of uncertainty in Arab countries like Egypt, and possibly Saudi Arabia, could induce rulers to impose control via force&#8211;an impulse at odds with countertrends like the technological empowerment of human data flows, and poverty reduction.</p>
<p>Additionally, a transition to democracy could offer an attractive model, if it delivers better stability and inclusive wealth.  Progress on poverty reduction, education, and girls’ empowerment in individual portions of the region provides momentum for tapping into the growing number of young people which will be coming of working age.</p>
<p>Geopolitically, developing humanitarian crises and regional conflict in the Middle East and North Africa will threaten to further undermine the credibility of international dispute resolution and human rights standards.  Perceptions in the area’s capitals which Washington is undependable have invited competition from Russia, and possibly China, and hedging by nations regarding US obligations.</p>
<p>These perceptions stem from unenforced red lines in Syria, withheld support for Mubarak along with other Arab incumbents in 2011, an alleged tilt toward Iran and away from traditional Sunni allies and Israel, and a sense of neglect due to the US rebalance to Asia.</p>
<p>At the meantime, Iran, Israel, and perhaps Turkey are likely to rise in power and influence relative to other nations in the area but will remain at odds with one another.  Iran’s growing influence, nuclear capabilities, and aggressive behavior will continue to be a concern for Gulf and Israel Arab nations.  The sectarian nature of Iranian and Saudi regional competition, which promotes inflammatory rhetoric and allegations of heresy throughout the region, heightens these concerns.</p>
<h3>Sub-Saharan Africa</h3>
<p>Practices have changed, civil society groups have proliferated, and citizens across the region demand better and more just governance.  However, many nations continue to struggle with authoritarian rule, patronage politics, and favoritism.  Many leaders remain focused on political survival as opposed to reform&#8211;with a few term limitations.</p>
<p>Global economic headwinds also threaten improvement by keeping commodity prices low and investment weak.  Some nations who&#8217;ve made progress toward democracy remain fragile and predisposed towards violence corresponding elections.  Tensions between Muslim and Christian groups can escalate into conflict.</p>
<h3>Analysis: Demographic, Education, and Development Trends Will Converge</h3>
<p>During the next five decades, growing African populations will become more youthful, urban, mobile, and networked, and better educated&#8211;and more demanding of a voice.  Rapid urbanization will stress infrastructure and increase the visibility of elite corruption—fueling public frustration with opportunities or services.</p>
<p>Some 75 to 250 million Africans will experience acute water stress, probably leading to mass migration.  Nevertheless, Africa will remain a zone of experimentation from governments, corporations, non-governmental organizations and people seeking to advance development.  The progress of the past two decades&#8211;including an expanded middle class, increasingly vibrant civil society, and the spread of democratic institutions&#8211;indicates potential.</p>
<p><a href="https://globalsecurityreview.com/africa-middle-east/">Africa and the Middle East</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Central and South America</title>
		<link>https://globalsecurityreview.com/central-south-america/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Sat, 07 Oct 2017 19:08:43 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[Central America]]></category>
		<category><![CDATA[Colombia]]></category>
		<category><![CDATA[Mexico]]></category>
		<category><![CDATA[Peru]]></category>
		<category><![CDATA[South America]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Venezuela]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?post_type=forecast&#038;p=2533</guid>

					<description><![CDATA[<p>Populism and dissent spread across Latin America. Leftist governments have been kicked out in Argentina, Peru, and Guatemala. Venezuela’s left-wing populist government is stripping the country of its democratic institutions in a sharp slide towards authoritarianism, leading to a sharp increase in lawlessness across the country. Furthermore, while Venezuela doesn’t produce drugs, it’s become a [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/central-south-america/">Central and South America</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Populism and dissent spread across Latin America.</h2>
<p>Leftist governments have been kicked out in Argentina, Peru, and Guatemala. Venezuela’s left-wing populist government is stripping the country of its democratic institutions in a sharp slide towards authoritarianism, leading to a sharp increase in lawlessness across the country.</p>
<p>Furthermore, while Venezuela doesn’t produce drugs, it’s become a major transport hub for drugs going to Europe or  Africa before being routed to Europe. Drug trafficking increases under as the rule of law decreases. After a 2009 coup in Honduras, the country was run by a fragile government—lawlessness increased dramatically.</p>
<p>Honduras now has one of the highest homicide rates in the world. Countries like the United States are seeing a significant increase in the number of people arriving from countries like Honduras that are plagued with violence.</p>
<h3>Unrest in Venezuela and Regional Security in the Americas</h3>
<p>An actual collapse of the state in Venezuela would likely mean large numbers of economic migrants and refugees fleeing the violence. The United States, Mexico, Brazil, and Colombia would all see massive amounts of refugees fleeing the conflict.</p>
<p>The Venezuelan border with Colombia, in particular, would be the most fragile. Venezuela closed the border with Colombia for a time as thousands of people attempted to cross the Amazon into Colombia to get food and medicine.</p>
<p>If the security situation in Venezuela becomes increasingly destabilized, the Colombian border would be the main point where people would cross. Colombia is in the process of implementing a domestic peace agreement, so a mass-migration from Venezuela could create a humanitarian crisis with significant political and security ramifications for bordering countries like Brazil and Colombia—and more developed countries in the region like Canada and the United States.</p>
<p><a href="https://globalsecurityreview.com/central-south-america/">Central and South America</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>U.S. Intelligence: Expect More Overseas Chinese Military Bases</title>
		<link>https://globalsecurityreview.com/u-s-intelligence-foresees-more-overseas-chinese-military-bases/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Fri, 06 Oct 2017 15:52:21 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=2480</guid>

					<description><![CDATA[<p>China has world’s fastest-modernizing military after the United States. China&#8217;s first overseas army base in a small Africans nation of Djibouti is most likely the first of many that China intends to construct around the globe, which could bring its interests into conflict with those of the United States. China has the fastest modernizing army [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/u-s-intelligence-foresees-more-overseas-chinese-military-bases/">U.S. Intelligence: Expect More Overseas Chinese Military Bases</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>China has world’s fastest-modernizing military after the United States.</h2>
<p>China&#8217;s first overseas army base in a small Africans nation of Djibouti is most likely the first of many that China intends to construct around the globe, which could bring its interests into conflict with those of the United States. China has the fastest modernizing army in the world after the United States, according to insights shared with Bloomberg News by U.S. intelligence officials.</p>
<h3>China Envisions Itself as a Global Power</h3>
<p>This will have implications for the China-United States competitive relationship and could underscore the conflicting security interests of China and the United States around the globe, according to officials.</p>
<p>As part of China&#8217;s expanding military and economic clout, the country is taking a stronger and more aggressive position in staking its territorial claims in the South China Sea, cross-straight relations with Taiwan, and in promoting its One Belt, One Road, trade initiative.</p>
<p>The People&#8217;s Liberation Army announced the opening of a <a href="http://globalsecurityreview.com/what-the-djibouti-military-base-tells-us-about-chinas-growing-role-in-africa/">logistics support base in Djibouti</a> in July, stating it&#8217;d back up China&#8217;s military escort, peacekeeping and humanitarian missions in Africa and western Asia in addition to exercises and emergency evacuation.</p>
<h3>China is attempting to undermine U.S. influence around the globe.</h3>
<p>Where Chinese interests conflict with those of U.S., Beijing is actively seeking to undermine U.S. influence, intelligence officials say. This report on how U.S. intelligence agencies view China&#8217;s global aspirations come as Chinese President Xi Jinping seeks to consolidate his power during October&#8217;s Communist Party Congress.</p>
<p>U.S. President Donald Trump plans to visit China in November and, although the two nations have discovered regions of cooperation, such as over United Nations sanctions against North Korea, they&#8217;ve increasingly disagreed over trade, Beijing&#8217;s territorial claims in the South China Sea, and Syria&#8217;s civil war.</p>
<h3>As Xi Consolidates Power, He Must Deal with China&#8217;s Systemic Economic Problems</h3>
<p>Ahead of the Communist Party Congress, officials in Beijing have doubled-down in their repression of internal dissent. The world&#8217;s second-largest economy is on course to achieve its 6.5 percent annual growth target, according to the Party.</p>
<p>China is fueling this growth, in part, by seeking more in-depth technology cooperation with corporations based in the United States. In the long-term, <a href="http://globalsecurityreview.com/perfect-storm-chinese-economic-instability/">China must overcome systemic corruption</a>, rampant speculation, and sub-prime lending, to maintain its growth targets. Failure to do so could lead to internal disorder and unrest, and potentially deal a devastating blow to the legitimacy of the governing Chinese Communist Party.</p>
<p><a href="https://globalsecurityreview.com/u-s-intelligence-foresees-more-overseas-chinese-military-bases/">U.S. Intelligence: Expect More Overseas Chinese Military Bases</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>North Korea Crisis Reveals Fractures in the China-Russia Strategic Partnership</title>
		<link>https://globalsecurityreview.com/north-korea-crisis-reveals-fractures-china-russia-strategic-partnership/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Wed, 04 Oct 2017 20:34:47 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Belarus]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[South Korea]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Zapad-2017]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=2439</guid>

					<description><![CDATA[<p>In recent months, the Chinese government has been repeatedly criticized by North Korean state media. Particularly surprising to Beijing was a reference to China as the “Chinese mainland,” in differentiating it from Taiwan. China&#8217;s interests lie in maintaining the status quo. Russia&#8217;s interests lie in disrupting it. For China, Pyongyang&#8217;s behavior recalled memories of 1994, when Beijing sent [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/north-korea-crisis-reveals-fractures-china-russia-strategic-partnership/">North Korea Crisis Reveals Fractures in the China-Russia Strategic Partnership</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In recent months, the Chinese government has been repeatedly criticized by North Korean state media. Particularly surprising to Beijing was a reference to China as the “Chinese mainland,” in differentiating it from Taiwan.</p>
<blockquote class="bs-pullquote bs-pullquote-left"><p>China&#8217;s interests lie in maintaining the status quo. Russia&#8217;s interests lie in disrupting it.</p></blockquote>
<p>For China, Pyongyang&#8217;s behavior recalled memories of 1994, when Beijing sent a delegation to Pyongyang to notify the then-Kim Il Sung (the grandfather of current leader Kim Jong-Un), that China would be initiating official diplomatic relations with South Korea.</p>
<p>A furious Kim Il Sung threatened Chinese officials that North Korea would develop diplomatic ties of their own with the Republic of China—Taiwan—in retaliation. Nevertheless, Pyongyang neglected to carry out that threat, and China continued in its plans to normalize relations with South Korea.</p>
<h3>Where China Withdraws—Russia Steps In.</h3>
<p>Many in China are wondering why North Korea thinks it can get away with criticizing China in such a public manner. The answer, it seems, lies with China&#8217;s &#8220;strategic partner,&#8221; Russia.</p>
<p>In January 2017, the Chinese authorities found that Pyongyang had shipped out its first wishes for a happy New Year in Moscow, not Beijing. As China has stepped up economic pressure on North Korea by cutting off coal exports and implementing restrictions on doing business with North Korea, Russia has stepped in to exploit the situation and to fill the gap. Russia is now Pyongyang&#8217;s top coal provider.</p>
<p>Furthermore, North Korea has been importing crude oil from Russia to reduce its energy dependence on China. Early this year, Russian authorities representatives visited Pyongyang to talk about railroad transportation cooperation.</p>
<h3>Is North Korea Getting Help on its Missile Program?</h3>
<p>In the summer of 2017, in the wake of one of North Korea&#8217;s ballistic missile test launches, Ukraine was cited as a source of North Korean missile technology.</p>
<p>However, the Ukrainian government vehemently denied the allegations. Objectively, Ukraine would have little to gain from providing North Korea with weapons technology, as it would significantly hinder their efforts to increase U.S. support for their fight against Russian-backed separatists.</p>
<h3>Analysis: Chinese-Russian Divide Over North Korea Reveals Greater Tensions to Come</h3>
<p>China&#8217;s interests lie in maintaining the status quo while Russia&#8217;s interests lie in disrupting it. China desperately wishes to avoid a military confrontation on the Korean peninsula. It fears a U.S.-allied and unified Korea, on its border, and would inevitably have to manage a massive humanitarian crisis on its doorstep.</p>
<p>Russia, however, sees opportunities in stoking tensions on the Korean peninsula. Increased international and U.S. attention on North Korea means less focus on Russia&#8217;s military engagements in Ukraine and Eastern Europe.</p>
<p>Moscow could very well be encouraging further North Korean belligerence to divert attention away from a large-scale military operation in <a href="http://globalsecurityreview.com/justify-invasion-russias-fsb-accused-false-flag-terrorist-attacks-ukraine/">Ukraine</a> or <a href="http://globalsecurityreview.com/zapad-2017-russia-belarus-military-exercises/">Belarus</a> in the wake of its <a href="http://globalsecurityreview.com/zapad-2017-analyzing-troop-numbers-economic-factors/">Zapad-2017</a> war games, which reportedly saw the deployment of over 100,000 Russian, Belarussian, and CIS troops across Russia&#8217;s and Belarus&#8217; eastern borders.</p>
<p>The divide over North Korea reveals that the China-Russia &#8220;strategic partnership&#8221; is flawed. In the coming decade, it is likely that the two countries will find themselves at odds over their respective national interests.</p>
<p><a href="https://globalsecurityreview.com/north-korea-crisis-reveals-fractures-china-russia-strategic-partnership/">North Korea Crisis Reveals Fractures in the China-Russia Strategic Partnership</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Justify an Invasion: Russia&#8217;s FSB Accused of False-Flag Terrorist Attacks in Ukraine</title>
		<link>https://globalsecurityreview.com/justify-invasion-russias-fsb-accused-false-flag-terrorist-attacks-ukraine/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Wed, 04 Oct 2017 17:28:08 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Belarus]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=2431</guid>

					<description><![CDATA[<p>The Head of Ukraine&#8217;s SBU Security Service accused Russia&#8217;s FSB of committing false-flag terrorist attacks to justify a full-scale invasion of Ukraine. In a rare televised interview on September 3rd, 2017, Vasyl Hrytsak, the head of Ukraine&#8217;s Security Service (SBU) accused the Russian Federal Security Service (FSB) of carrying out terrorist attacks in Ukraine. Hrytsak [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/justify-invasion-russias-fsb-accused-false-flag-terrorist-attacks-ukraine/">How to Justify an Invasion: Russia&#8217;s FSB Accused of False-Flag Terrorist Attacks in Ukraine</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The Head of Ukraine&#8217;s SBU Security Service accused Russia&#8217;s FSB of committing false-flag terrorist attacks to justify a full-scale invasion of Ukraine.</h2>
<p>In a rare televised interview on September 3rd, 2017, Vasyl Hrytsak, the head of Ukraine&#8217;s Security Service (SBU) accused the Russian Federal Security Service (FSB) of carrying out terrorist attacks in Ukraine.</p>
<p>Hrytsak proceeded to allege that these attacks were designed to destabilize the situation in Ukraine further, to give the pretext for a full-scale invasion by the Russian military. Directly addressing Aleksandr Bortnikov, the director of Russia&#8217;s FSB, Hrytsak accused the FSB of violating the fundamental rules of war by carrying out terrorist attacks designed to strike fear into the populations of Russian-majority regions of eastern Ukraine.</p>
<p>&#8220;I appeal to you as an officer,&#8221; Hrytsak said in the interview on Ukraine&#8217;s Priamy television network. &#8220;There are rules even in a war which should not be broken by secret service agents. You have transgressed all of these rules.&#8221; Hrytsak continued:</p>
<blockquote><p>&#8220;You and I both know Russian secret service agents were involved in terrorist attacks committed in Odessa, Kharkiv, Kherson, and other cities. Dozens of people died as a result. But this time you have broken all of the rules and are prepared to destabilize the situation in Russia in order to justify invading Ukraine in a massive military campaign&#8230;You were ready to blow up your own Russian citizens in order to destabilize the situation in Russia and give grounds for invading Ukraine, to launch a full-scale invasion.&#8221;</p></blockquote>
<h3>The FSB has a history of executing false-flag &#8220;terror&#8221; attacks.</h3>
<p>The &#8220;terrorist attacks&#8221; that Hrytsak referenced were riots and violence in Odessa that killed 48 in May of 2014, a February 2015 bombing in Kharkiv that resulted in four deaths, and a Kherson car bombing in April 2016 that killed one. The SBU believes all—alongside U.S. intelligence officials—to be the handiwork of the Russian FSB. John Schindler, a former NSA analyst, <a href="http://observer.com/2017/09/ukraine-russia-vasyl-hrytsak-terrorism/">quotes a senior U.S. intelligence official</a> as saying that there is &#8220;absolutely no doubt&#8221; the FSB was behind these specific attacks inside Ukraine.</p>
<p>This wouldn&#8217;t be the first time Russian security forces executed a false-flag terrorist attack to create the pretext for broader military action. In 1999, four apartment buildings in Russia were bombed, killing nearly 300 civilians. Moscow accused Chechen terrorists of carrying out the deadly attacks and was given the green-light of renewing its bloody campaign against Chechen separatists. However, little evidence supported the Kremlin&#8217;s claims, while there was considerable evidence that pointed to the FSB as being behind the attacks.</p>
<h3>Analysis: Heightened Risk for Escalations in Russia-Ukraine Conflict</h3>
<p>These accusations, if true, point to a doubling-down of Russian efforts to justify further engagement in Ukraine. <a href="http://globalsecurityreview.com/timeline-leaked-kremlin-ukraine-plot-coincides-2016-u-s-election/">Leaked emails</a> that were hacked from a top Kremlin official detail a secret plan to decrease the influence of pro-Western Ukrainian politicians in Kiev and simultaneously create conditions that would justify further interference by Russia.</p>
<h3><img loading="lazy" decoding="async" class="wp-image-2433 alignleft" src="http://globalsecurityreview.com/wp-content/uploads/2017/10/Eastern_Ukraine_COnflicT_Map.jpg" alt="" width="394" height="212" srcset="https://globalsecurityreview.com/wp-content/uploads/2017/10/Eastern_Ukraine_COnflicT_Map.jpg 594w, https://globalsecurityreview.com/wp-content/uploads/2017/10/Eastern_Ukraine_COnflicT_Map-300x162.jpg 300w" sizes="(max-width: 394px) 100vw, 394px" /></h3>
<p>The SBU head&#8217;s statement was delivered just as Russia was gearing up for its massive <a href="http://globalsecurityreview.com/zapad-2017-analyzing-troop-numbers-economic-factors/">Zapad 2017</a> military exercises with neighboring Belarus, directly on Ukraine&#8217;s northern frontier. In the short-term, there is a high possibility of increased hostilities in Eastern Ukraine. Of particular concern is the in the region separating the Crimean peninsula from the Russian mainland.</p>
<p><a href="https://globalsecurityreview.com/justify-invasion-russias-fsb-accused-false-flag-terrorist-attacks-ukraine/">How to Justify an Invasion: Russia&#8217;s FSB Accused of False-Flag Terrorist Attacks in Ukraine</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Asian Hegemony: Ongoing Tensions Between China and India</title>
		<link>https://globalsecurityreview.com/asian-hegemony-ongoing-tensions-china-india/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Tue, 03 Oct 2017 21:09:33 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Bhutan]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Doklam Plateau]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[Nepal]]></category>
		<category><![CDATA[North Korea]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=2424</guid>

					<description><![CDATA[<p>The border standoff between China and India has ended, but the rising Asian powers remain locked in a long-term rivalry for regional hegemony. There seems to have been a de-escalation between India and China in the border dispute over the Doklam Plateau, but the dormant battle across the Himalayas continues. The Himalayas form a powerful barrier. [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/asian-hegemony-ongoing-tensions-china-india/">Asian Hegemony: Ongoing Tensions Between China and India</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The border standoff between China and India has ended, but the rising Asian powers remain locked in a long-term rivalry for regional hegemony.</h2>
<p>There seems to have been a de-escalation between India and China in the border dispute over the <a href="http://globalsecurityreview.com/india-china-dispute-doklam-plateau/">Doklam Plateau</a>, but the dormant battle across the Himalayas continues.</p>
<p>The Himalayas form a powerful barrier. But, there are areas where the boundary is contested, producing constant tension. The long frontier between India and China is disrupted by two nations south of the Himalayas primary variety and open to India&#8217;s heartland: Bhutan and Nepal.</p>
<h3>As Bhutan and Nepal are strategically vital to India&#8217;s interests, New Delhi yields considerable influence on them, and can, at times, overstep.</h3>
<p>India has exercised influence on their internal policies, including by enforcing trade restrictions. The Himalayas are still an efficient line of defense for India against potential Chinese aggression, since traversing them is very difficult. However stronger Chinese influence on Bhutan and Nepal might be strategically lethal for India.</p>
<p>India and China are both emerging world powers with ambitions of regional hegemony. India has numerous concerns aside from its Himalayan border. China became a close commercial and strategic partner of its longtime adversary, Pakistan. Furthermore, the Chinese navy is increasing its presence in the Indian Ocean as part of its One Belt, One Road initiative.</p>
<h3>China&#8217;s Growing Influence in the Southern Hemisphere</h3>
<p>Chinese influence is climbing in Africa, on the other side of the Indian Ocean, and its influence is growing in neighboring Burma, Bangladesh and Sri Lanka. And on the other hand, India firmly supports Vietnam, that has repeating disputes with China over the South China Sea and works in close cooperation with the United States.</p>
<p>In the 1950s, China annexed Tibet, which is poorly populated because of its elevation and climate. It is located just north of the primary section of the Himalayas. It isn&#8217;t just strategically significant, but it&#8217;s a source of water to vast portions of South Asia, Southeast Asia, and China.</p>
<p>China has brought infrastructure such as improved railroads to Tibet. It&#8217;s now working on similar projects to connect China to neighboring states in the Himalayas. China has been improving access to the region with contemporary railroads and highways. It&#8217;s also increasing its presence in the area with major road and railway projects through the Himalayas, connecting it with Pakistan, and plans to construct comparable links to Nepal.</p>
<p>Improved rail infrastructure in the Himalayas would connect these states to China&#8217;s entire transportation network, which continues to be further developed and modernized. Additionally, China might use its control over the region&#8217;s water as a means of exerting influence.</p>
<h3>Analysis: China is Unprepared for a Conflict with India</h3>
<p class="article_top_content">A big issue for China is the 19th Congress of the Chinese Communist Party Central Committee, which is scheduled for October 19. A blunder in Doklam could, in the worst case, cause a power struggle that forces Chinese President Xi Jinping to step down. Xi might still face criticism in the Congress for having to back down in Doklam, but not as far as in other situations. China&#8217;s expansionist policies in the South China Sea and elsewhere have won praise throughout China.</p>
<p class="article_top_content">Xi&#8217;s expansionist policies leave analysts with many questions about where he is leading China. Relations between China and neighboring states like Japan, Vietnam, and the Philippines, are tense.</p>
<p class="article_top_content">Lastly, it is becoming more and more clear that there is a decreasing chance of a peaceful reunification with Taiwan. More pressingly, the ongoing North Korea nuclear weapons crisis presents extreme risks to China in the short term.</p>
<p><a href="https://globalsecurityreview.com/asian-hegemony-ongoing-tensions-china-india/">Asian Hegemony: Ongoing Tensions Between China and India</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Could Russia Attempt a Crimea-Style Operation Against Belarus?</title>
		<link>https://globalsecurityreview.com/zapad-2017-russia-belarus-military-exercises/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Sat, 30 Sep 2017 20:00:11 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Belarus]]></category>
		<category><![CDATA[Estonia]]></category>
		<category><![CDATA[Latvia]]></category>
		<category><![CDATA[Lithuania]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Poland]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Sweden]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=2012</guid>

					<description><![CDATA[<p>As tensions mount in Moscow&#8217;s standoff with the West, the upcoming Zapad military exercises likely will be larger and more important than ever before. Russia&#8217;s annual strategic &#8220;Zapad&#8221; (запад; Russian for west) military training exercises—held in Russia&#8217;s Western Military District and regions of Belarus—began on September 14. Troops from neighboring ally Belarus joined alongside Russian [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/zapad-2017-russia-belarus-military-exercises/">Could Russia Attempt a Crimea-Style Operation Against Belarus?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>As tensions mount in Moscow&#8217;s standoff with the West, the upcoming Zapad military exercises likely will be larger and more important than ever before.</h2>
<p>Russia&#8217;s annual strategic &#8220;Zapad&#8221; (запад; Russian for west) military training exercises—held in Russia&#8217;s Western Military District and regions of Belarus—began on September 14. Troops from neighboring ally Belarus joined alongside Russian forces in the week-long demonstration of military force.</p>
<p>Historically, Russia (and the Soviet Union before it) has maintained a habit of conducting offensive operations under the guise of training exercises. The drills will reveal the Russian military&#8217;s tactical capabilities and provide indicators on the threats it is focused on.</p>
<h3>How Moscow could use the exercises to its advantage</h3>
<p>Moscow could use the exercises to boost its presence in states along the front line with North Atlantic Treaty Organization forces and to increase its military assets in Belarus.</p>
<p>The two nations have partnered in the drills ever since 2009. Within their 1st year as a collaborative endeavor, the drills had been the biggest joint exercises Russia had conducted in the post-Soviet era. Official statements announced that 12,500 military personnel Participated In the 2009 exercises, which included 100 combat, tanks, armored vehicles, artillery airplane and 20 warships.</p>
<p>These drills took place in the crucial Area surrounding the Baltic area and mimicked not only the invasion of Poland but a strategic nuclear strike on Warsaw, increasing concern among NATO member countries.</p>
<blockquote class="bs-pullquote bs-pullquote-left"><p>Russia has conducted several large-scale snap exercises along NATO&#8217;s eastern flank with little to no notice and in a non-transparent manner.</p></blockquote>
<p>Russia and Belarus held the next Zapad exercises in September 2013. Expanded to include all branches of Russia&#8217;s army As well as rapid response Units of the Collective Security Treaty Organization, the drills likely were considerably bigger than the previous exercises, even though the exact numbers are up for debate.</p>
<p>The exercises simulated an assault by Baltic terrorists on Belarus which resulted in a mixed air, naval forces, and urban warfare response. And as had become custom by that time, they ended with a mock atomic attack, this time against Sweden. More important, Russia employed a number of the same approaches it tried in the 2013 Zapad exercises, including the use of unmanned aerial vehicles, when it got involved with battles In Ukraine and Syria during the following two years.</p>
<h3>Moscow isn&#8217;t happy with Minsk.</h3>
<p>Belarus and Russia entered into a formal &#8220;Union State&#8221; in 1999 to promote trade and other policies, but the goal of a single currency was never realized. Some experts suggest Putin could use the financial component of the &#8220;Union State&#8221; arrangement as his legal justification in annexing Belarus.</p>
<p>Putin has been growing uneasy with the West warming to President Lukashenko of Belarus since 1994. The U.S. has sought to get closer to Belarus by lifting some sanctions it imposed to encourage political forums. Last year, The European Union also lifted its five-year sanctions on Belarus, a country with about 10 million people.</p>
<p>Moscow also isn&#8217;t happy that Belarus continues to depend on Russian subsidies because the collapse in oil prices has made Moscow cut back on spending. Moreover, Lukashenko&#8217;s ties with Moscow worsened when he positioned himself as a neutral mediator for the Ukraine peace talks.</p>
<p>At the same time, there&#8217;s a chance Belarusian&#8217;s officers might side with Russia in a military conflict. Some of the officers were trained in Russian military schools and are paid less than their peers in Russia. Belarusian troops realize that if Belarus gets annexed by Russia, they&#8217;ll be better paid—with the bonus of serving in the armed forces of a nuclear-armed power.</p>
<p>Russia, meanwhile, beefed up its own forces along the borderlands and boosted its security support to regional allies and breakaway territories. Now that Washington has expanded its sanctions against Moscow — and the Kremlin has promised an &#8220;asymmetrical&#8221; response — Russia is looking to use this year&#8217;s military drills to send a message to the West.</p>
<h3>Heightened Tensions between Russia and the West</h3>
<p>The United States and NATO built up their forces along the European borderlands after Russia annexed Crimea and began backing Ukrainian separatist forces in 2014. The West deployed continuous battalion rotations of 1,000 troops to the Baltic states and Poland and increased its presence in the Black Sea.</p>
<p>Held along the Europe&#8217;s borders with Belarus and Russia, Zapad-2017 has emerged as an item of skepticism for governments and media outlets in Europe and the United States.</p>
<p><figure id="attachment_2007" aria-describedby="caption-attachment-2007" style="width: 586px" class="wp-caption aligncenter"><a href="http://globalsecurityreview.com/zapad-2017-analyzing-troop-numbers-economic-factors"><img loading="lazy" decoding="async" class="wp-image-2007 " src="http://globalsecurityreview.com/wp-content/uploads/2017/09/chart_russia_troop_numbers_zapad_military_exercises_nato.jpg" alt="" width="586" height="280" srcset="https://globalsecurityreview.com/wp-content/uploads/2017/09/chart_russia_troop_numbers_zapad_military_exercises_nato.jpg 1274w, https://globalsecurityreview.com/wp-content/uploads/2017/09/chart_russia_troop_numbers_zapad_military_exercises_nato-300x143.jpg 300w, https://globalsecurityreview.com/wp-content/uploads/2017/09/chart_russia_troop_numbers_zapad_military_exercises_nato-768x367.jpg 768w, https://globalsecurityreview.com/wp-content/uploads/2017/09/chart_russia_troop_numbers_zapad_military_exercises_nato-1024x489.jpg 1024w" sizes="(max-width: 586px) 100vw, 586px" /></a><figcaption id="caption-attachment-2007" class="wp-caption-text">Trend Analysis: Russian Troop Deployments and GDP</figcaption></figure></p>
<p>Ukrainian Defense Minister Valeriy Heletey commented that the 2017 Zapad exercises could be a prelude to an assault on any &#8220;country of Europe that shares a border with Russia.&#8221; This concern is well-founded, given that troop deployment disguised as military training have preceded Russia&#8217;s three most recent foreign military engagements.</p>
<p>This concern is well-founded, given that troop deployment disguised as military training have preceded Russia&#8217;s three most recent foreign military engagements. Those skeptical about Russia&#8217;s intentions will point out that Russian partners can be underreporting numbers since the Organization for Security and Cooperation in Europe&#8217;s so called Vienna Accord require OSCE nations to permit in observers for particular activities between 13,000 troops or more.</p>
<h3>Analysis: Biggest risk comes from non-transparency and Russia&#8217;s displeasure with Belarus</h3>
<p>The 2017 Zapad exercises are drawing attention because Russia can avoid the need for official outside observer nations by claiming it will have less than 13,000 soldiers in the drills. However, several smaller exercises will be conducted simultaneously, allowing Moscow to avoid the conditions put forth in the Vienna Accord.</p>
<p>Western intelligence and military agencies believe that over 100,000 troops could be deployed. According to statements from the U.S. Department of Defense, Russia has conducted several large-scale snap exercises along NATO&#8217;s eastern flank with little to no notice and in a non-transparent manner.</p>
<p>The biggest risks stemming from the Zapad drills are possible errors, including stray shots, local attempts to test response  through other measures, escalations in existing conflict zones (such as in Ukraine, Abkhazia, or South Ossetia), or attempts to use <a href="http://globalsecurityreview.com/hybrid-and-non-linear-warfare-systematically-erases-the-divide-between-war-peace/">nonlinear/hybrid warfare</a> tactics, or asymmetric tactics,  in order to further consolidate the Russia-Belarus &#8220;Union State.&#8221;</p>
<p><a href="https://globalsecurityreview.com/zapad-2017-russia-belarus-military-exercises/">Could Russia Attempt a Crimea-Style Operation Against Belarus?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>In Central Europe, Militarized Societies are on the March</title>
		<link>https://globalsecurityreview.com/central-europe-militarized-societies-march/</link>
		
		<dc:creator><![CDATA[Weronika Grzebalska]]></dc:creator>
		<pubDate>Fri, 29 Sep 2017 19:27:49 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Belarus]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[Poland]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Ukraine]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=2343</guid>

					<description><![CDATA[<p>Russia recently held one of the largest “war games” since the Cold War, on its Western borders. The drill exercised combat scenarios recently used in Ukraine and tested the compatibility of the Belarusian army with Russian forces. Politicians from Poland, Ukraine and Baltic states viewed the exercise as aggressive as they mistrust the Kremlin and [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/central-europe-militarized-societies-march/">In Central Europe, Militarized Societies are on the March</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Russia recently held one of the largest “<a href="https://www.nytimes.com/2017/09/13/world/europe/russia-baltics-belarus.html">war games</a>” since the Cold War, on its Western borders.</h2>
<p>The drill exercised combat scenarios recently used in Ukraine and tested the compatibility of the Belarusian army with Russian forces.</p>
<p>Politicians from Poland, Ukraine and Baltic states viewed the exercise as aggressive as they mistrust the Kremlin and fear possible security threats in the region. They used the drill to justify the <a href="http://neweasterneurope.eu/articles-and-commentary/1862-the-rise-of-paramilitary-groups-in-central-and-eastern-europe">ongoing “social militarisation”</a> of their respective countries.</p>
<p>This is primarily a rise of state support or enthusiasm for voluntary defence organisations which are sometimes armed, committed to “national causes” and often have roots in right-wing political groups.</p>
<p>Is the “Russian threat” the sole reason why right-wing politicians in the region want to militarise their societies?</p>
<h3>Training for war</h3>
<p>With the post-1989 transition to liberal democracy and NATO accession, Central Europe began a gradual process of social demilitarisation towards a Western model of civilian states. Slowly but steadily armies were reduced in size and professionalised.</p>
<p>In recent years, however, this model of statehood and citizenship has been seriously challenged in Central Europe.</p>
<p>The region has experienced a significant rise in the number and visibility of grassroots paramilitary actors ranging from <a href="http://www.bbc.com/news/magazine-35919068">anti-refugee vigilantes in Bulgaria and Hungary</a> through pro-Kremlin militias <a href="http://www.stopfake.org/en/is-pro-russian-propaganda-fueling-czech-and-slovak-paramilitary-groups/">in Slovakia and the Czech Republic</a> to a civilian component cooperating with the armed forces in the Baltics and Poland. By 2019, Poland expects to have trained 53,000 people for its <a href="http://www.dw.com/en/poland-to-build-territorial-defense-force-by-2019/a-36386036">Territorial Defence Forces</a>, a new volunteer segment of the army built entirely of local citizens – many of them members of already existing paramilitary groups.</p>
<h3>Military picnics</h3>
<p>Normalisation of the paramilitary sector goes hand in hand with a diffusion of military values and practices to everyday life. For example, in Poland, the teaching of history is increasingly centred around military events. WW2-themed clothing and <a href="http://wroclawuncut.com/2016/07/22/controversy-new-cursed-soldiers-energy-drink/">accessories</a> are growing popular too, and families can be seen attending military-themed <a href="https://www.ft.com/content/a0dd41e0-615b-11e7-91a7-502f7ee26895">picnics</a> featuring shooting ranges and weapons displays. The visibility of military uniforms in the public sphere has become too. In Estonia, meanwhile, people are signing up for <a href="https://www.japantimes.co.jp/news/2017/01/18/world/estonians-join-paramilitary-forces-face-russia-fears/">weekend training</a> sessions with volunteer paramilitary groups.</p>
<p>This ideological shift became evident when the Polish minister of defence Antoni Macierewicz made an appearance on a morning <a href="http://wiadomosci.gazeta.pl/wiadomosci/7,114883,21455432,wreszcie-jest-teleranek-z-macierewiczem-szef-mon-niczym-dobry.html">television programme</a> for children. Sitting among a group of youngsters over bowls of army-style pea stew, he talked to the children about the importance of fighting for sovereignty.</p>
<p>Children are also being courted by the Hungarian governing party FIDESZ. Its officials are currently implementing a broad patriotic and national defence <a href="http://www.dw.com/en/hungary-pm-viktor-orban-aims-to-militarize-the-school-system/a-40088250">programme</a> beginning in kindergarten. They are contemplating including shooting classes and military training in schools. Following the path of his Estonian and Polish counterparts, the Hungarian minister of defence, István Simicskó, has praised volunteer territorial defence forces. He is also endorsing the idea to build state-owned <a href="https://budapestbeacon.com/hungary-to-invest-92-million-building-firing-ranges-with-clubhouses/">shooting ranges</a> in each county to popularise military skills.</p>
<h3>Towards militarised governance</h3>
<p>Central European leaders <a>claim</a> their societies need to be prepared to face challenges brought about by the refugee, terrorist and Ukrainian crises. Wide-scale societal militarisation has stirred concern among both military officials and civil society.</p>
<p>Many see it as part of the <a href="http://www.publicseminar.org/2016/09/thoughts-on-the-hungarian-and-polish-new-right-in-power/#.WcTot9FpGM8">illiberal political transformation</a> which is underway in the region and aims to popularise an alternative model of governance which combines democratic procedures such as multi-party system and general elections with a disregard for human rights and constitutional limits to power.</p>
<p>In Poland and Hungary, civil society activists <a href="http://www.hfhr.pl/en/polka-nie-podlegla-poster-case-trial-commences/">are portrayed as enemies</a> and national traitors. There are also extraordinary measures against perceived threats, such as activists and journalists increasingly <a href="https://www.amnesty.org/en/documents/eur37/6567/2017/en/">face financial penalties</a> and even <a href="https://www.liberties.eu/en/news/reporter-working-in-bialowieza-forest-area-attacked">direct violence</a>.</p>
<h3>‘Remasculinisation’</h3>
<p>Right-wing ideologues also wish to regenerate the society that they consider broken and morally corrupt. In their <a href="http://www.huffingtonpost.com/valerie-sperling/putin-female-fans-shirtless_b_6664240.html">narrative</a>, the journey towards liberal democracy and global governance is told as a story of emasculation of men and loss of their agency over their lives and their countries.</p>
<p>As argued by panellists of the <a href="http://dzienzycia.pl/kongres-rodziny/#panele">National Congress of Families</a> held in Warsaw in 2017, militarisation is the solution to a crisis of masculinity in Poland.</p>
<p><a href="http://prawy.pl/4201-marian-pilka-narod-wojownikow/">In the words</a> of former MP of the ruling Law and Justice party Marian Piłka – the militarised “New Man” has character traits which are needed to advance the country’s international standing as well as forge a “new form of Polishness” capable of overcoming “post-communist mediocrity”.</p>
<p>Members of Territorial Defence Forces are to receive <a href="http://www.thenews.pl/1/9/Artykul/278447,Poland-wants-to-introduce-new-Territorial-Defence-forces-next-year">€125 monthly</a> along with additional financial rewards for completing all training. They also enjoy the special protection of labour contracts preventing employers from firing them while in service.</p>
<p>Families benefiting from such programmes could contribute to the emergence of a substantial new patriotic middle class.</p>
<h3>Can the civilian state be saved?</h3>
<p>In 2012, hopes were raised of a future without military violence when the European Union received the Nobel Peace Prize for the <a href="https://www.nobelprize.org/nobel_prizes/peace/laureates/2012/press.html">“advancement of peace and reconciliation”</a> on the continent. Today in Central Europe, the civilian state is trembling.</p>
<p>Objective security challenges such as the terrorist threat or the Kremlin’s superpower ambitions certainly play a role in boosting nationalist militarism. But the public attractiveness of the militarised model of governance and citizenship has as much to do with severe social costs and unfulfilled promises of the post-1989 transition.</p>
<p>Therefore, to save European civilian states, advocates will need to take the underlying causes seriously fuelling militaristic sentiments. One of them is the unfulfilled need of individuals for security, well-being and upward mobility. Another is a sense of being left out and <a href="https://www.bloomberg.com/view/articles/2017-09-12/how-western-capital-colonized-eastern-europe">deprived of control over their economic future</a>. If these genuine issues are not addressed progressively, nationalist militarism will continue to seem like a legitimate answer.<img loading="lazy" decoding="async" src="https://counter.theconversation.com/content/84164/count.gif" alt="The Conversation" width="1" height="1" /></p>
<p>&#8220;<a href="http://theconversation.com/in-central-europe-militarised-societies-are-on-the-march-84164" rel="noopener">In Central Europe, militarised societies are on the march</a>&#8221; was originally published on <em>The Conversation. </em></p>
<p><a href="https://globalsecurityreview.com/central-europe-militarized-societies-march/">In Central Europe, Militarized Societies are on the March</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Russian FSB Official Linked to DNC Hack Charged with Treason for &#8220;Aiding CIA&#8221;</title>
		<link>https://globalsecurityreview.com/russian-fsb-official-linked-to-dnc-hack-charged-with-treason-aiding-cia/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Fri, 29 Sep 2017 15:30:35 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=819</guid>

					<description><![CDATA[<p>Senior FSB agents accused of treason after Kremlin insiders dismissed the Steele dossier as &#8220;gossip.&#8221; Seven days after Trump’s inauguration, a stream of reporting emerged from independent Russian media outlets. On January 27, 2017, Novaya Gazeta reported that Sergei Mikhailov, the Deputy Chief of the cyber unit in the successor agency to the KGB—officially the [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/russian-fsb-official-linked-to-dnc-hack-charged-with-treason-aiding-cia/">Russian FSB Official Linked to DNC Hack Charged with Treason for &#8220;Aiding CIA&#8221;</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Senior FSB agents accused of treason after Kremlin insiders dismissed the Steele dossier as &#8220;gossip.&#8221;</h2>
<p>Seven days after Trump’s inauguration, a stream of reporting emerged from independent Russian media outlets. On January 27, 2017, <a href="https://www.novayagazeta.ru/articles/2017/01/26/71296-troyanskiy-kod">Novaya Gazeta</a> reported that Sergei Mikhailov, the Deputy Chief of the cyber unit in the successor agency to the KGB—officially the Information Security Department of the FSB—was in attendance at a meeting of high-level FSB staff during the first week of December. In that meeting, security personnel suddenly entered and grabbed Mikhailov, placed a light-proof bag over his head, and dragged him from the room.</p>
<p>Mikhailov hasn&#8217;t been seen since, and Interfax, the independent Russian newswire, has corroborated the story, which quotes an anonymous FSB official saying that Mikhailov and his deputy Dmitry Dokuchaev, were accused of “breaking their oath and working with the CIA.”</p>
<p>However, it was reported sometime later that two sources indicated that he may have been an asset for a foreign intelligence agency inside the FSB. On February 1, <a href="https://en.crimerussia.com/gromkie-dela/arrest-of-fsb-officers-accused-of-treason-was-prolonged/?sphrase_id=14048">charges of high treason</a> on behalf of the United States were brought to them. Again—in this case citing investigators—Dokuchaev and Mikhailov were thought to have cooperated with the CIA.⁠</p>
<p>The men are <a href="https://en.crimerussia.com/gromkie-dela/cultivation-of-hackers-traitors-from-fsb-was-conducted-by-elite-division-of-counter-intelligence/?sphrase_id=14048">alleged to have</a> “transferred confidential data to the American company Verisign and to other commercial organizations which in turn transferred these data to intelligence agencies of the USA”. Representatives from VeriSign did confirm that data was received by the company, although stated that it was not confidential in nature.</p>
<p>According to <em>Novaya Gazeta</em>, Mikhailov specifically passed along information about Vladimir Fomenko, owner of Kings Servers, to U.S. intelligence officials. This information was regarding Fomenko&#8217;s involvement in the cyberattacks on the electoral systems of Arizona and Illinois. At the same time, Interfax news agency <a href="https://www.rbth.com/politics_and_society/2017/02/02/fsb-officers-charged-with-treason-media-claim-cia-ties_693641">reported</a> that an additional 8 people had been identified by the FSB as accomplices.</p>
<h3>The Mystery of the Seven Dead Russian Diplomats</h3>
<p>Since election day in November 2016, seven Russian diplomats—including Russian ambassador to the United Nations Vitaly Churkin, and ex-KGB head Oleg Erovinkin—have been killed or found dead in increasingly questionable circumstances. Churkin’s death is under investigation by the New York City medical examiner, while Erovinkin—who is believed to have assisted Christopher Steele with compiling the now-infamous <em>kompromat </em>dossier—was found dead in the back of his Lexus.</p>
<p>The goal of Russian interference in the American election was to foment disillusionment with democratic institutions—to <a href="http://www.newsweek.com/trump-putin-russia-interfered-presidential-election-541302">delegitimize Western political systems</a>. Within the Kremlin, officials originally believed that Hillary Clinton would win the United States&#8217; 2016 presidential election. Russia’s interference strategy was intended to shape a political climate so rife with mistrust and division that a Clinton administration would be forced to concentrate on ensuring domestic policy and stability, at the expense of American foreign policy interests.</p>
<p>The lack of planning in the event of a Trump victory created, rather than solved, a new problem for the Kremlin. The U.S. federal government’s executive branch has become increasingly unpredictable, a stark departure from the decades of more-or-less predictable U.S. foreign policy to which the Kremlin has become accustomed. As President, Trump is not the authoritarian that Putin is able to be. Military power is largely in the hands of Secretary of Defense Mattis, having been given a near-unprecedented degree of autonomy in directing military operations by Trump.</p>
<p>Furthermore, the Kremlin seems ill-prepared for an operation of this magnitude, ostensibly having failed to understand the strategic (long-term) implications for sponsored institutional disruption in a state (the U.S.) with bureaucratic and democratic institutions designed to impede would-be authoritarians. In Russia, <a href="https://www.wsj.com/articles/hackers-are-rattling-russia-too-1494322205">such leaks do occur</a>, albeit with greater consequences.</p>
<h3>Strategic Analysis: Growing internal friction and high profile moles within Russia&#8217;s security services diminishes their ability to maintain order—and power.</h3>
<p>As Russia&#8217;s economy declined after having enjoyed a hot streak during the early 2000s, thanks to skyrocketing commodity prices, Putin&#8217;s foreign policy devolved into a projection of Russian hard power, with the intent of rebuilding national pride in a resurging global power.</p>
<p>As the 2018 presidential election approaches, protests and dissent are growing throughout Russia. Typically, Moscow&#8217;s and Saint Petersburg&#8217;s middle class and opposition elites are the typical protesters; they have greater access to the West and it&#8217;s social networking and media, and are more exposed to democratic ideas.</p>
<p>The majority of Russians, however, receive news and information through state-managed channels, and many are dependant on state institutions for employment or pensions. Living in the &#8220;Regions&#8221; (industrial, non-cosmopolitan cities, towns, and villages, excluding the two main cities), most Russians have experienced a sharp decline in their standard of living.</p>
<p>Russia&#8217;s Gross Domestic Product (GDP), per capita, has dropped over 41% from its 2013 height of $15,543. For a country having suffered through a corrupt transition from the Soviet control economy in the early 1990s, followed by a complete economic collapse in 1997, an ongoing major decline, overseen by a kleptocratic elite would likely result in a large degree of public unrest and resistance.</p>
<p>Historically, the Kremlin manages internal unrest by harnassing Russian nationalism and engaging in conflict abroad, under the guise of protecting Russian security interests, or restoring Russia as a global &#8220;great power.&#8221; The key for the Kremlin, and ultimately, Putin, is to make sure that these campaigns generate tangible rewards for the Russian electorate.</p>
<p><a href="https://globalsecurityreview.com/russian-fsb-official-linked-to-dnc-hack-charged-with-treason-aiding-cia/">Russian FSB Official Linked to DNC Hack Charged with Treason for &#8220;Aiding CIA&#8221;</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Crisis in Venezuela: Economic Collapse, Violent Unrest, and Human Survival</title>
		<link>https://globalsecurityreview.com/crisis-in-venezuela-economic-collapse-violent-unrest-and-human-survival/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Fri, 29 Sep 2017 13:45:14 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Americas]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Colombia]]></category>
		<category><![CDATA[International Security]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Venezuela]]></category>
		<guid isPermaLink="false">https://global-security-brief.com/?p=438</guid>

					<description><![CDATA[<p>Venezuela is in the throes of a political and economic crisis. By no means a newfound concept for Venezuelans, this time is different. As the conflicts in Ukraine and the Middle East, and the threat of escalations on the Korean Peninsula continue to draw the majority of international media attention, Venezuela’s deepening political and economic [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/crisis-in-venezuela-economic-collapse-violent-unrest-and-human-survival/">Crisis in Venezuela: Economic Collapse, Violent Unrest, and Human Survival</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Venezuela is in the throes of a political and economic crisis. By no means a newfound concept for Venezuelans, this time is different.</h2>
<p dir="auto">As the conflicts in Ukraine and the Middle East, and the threat of escalations on the Korean Peninsula continue to draw the majority of international media attention, Venezuela’s deepening political and economic crisis rapidly grows regarding significance for security in the Americas.</p>
<p dir="auto">To understand the complexities the perfect storm of food and economic insecurity, political repression, and violence stemming from the absence of any form of law and order, we spoke to Jennifer McCoy, Ph.D., distinguished University Professor of Political Science at Georgia State University. Dr. McCoy served as Founding Director of the Global Studies Institute at GSU (2015-16), and Director of the Carter Center’s Americas program (1998-2015) where she led projects strengthening democratic institutions, provided mediation and encouraged dialogue and hemispheric cooperation. Her latest book is <em><a href="https://www.amazon.com/gp/product/1601270682/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=1601270682&amp;linkCode=as2&amp;tag=globalsecur08-20&amp;linkId=6048537beac754ed7f2c29c55b01b3ed" target="_blank" rel="noopener noreferrer">International Mediation in Venezuela</a><img loading="lazy" decoding="async" style="border: none !important; margin: 0px !important;" src="//ir-na.amazon-adsystem.com/e/ir?t=globalsecur08-20&amp;l=am2&amp;o=1&amp;a=1601270682" alt="" width="1" height="1" border="0" /></em> (co-authored with Francisco Diez, 2011).</p>
<p dir="auto">Dr. McCoy directed the Carter Center’s projects on Mediation and Monitoring in Venezuela (2002-2004), the Ecuador-Colombia Dialogue Group (2008-2010), and the U.S.-Andean Dialogue Group (2010-2011), and led over a dozen election monitoring and observation missions.</p>
<h3>The Current Situation: Repression, Resource Insecurity, and the Risk of Escalation</h3>
<p dir="auto">According to Dr. McCoy, three main scenarios could potentially play out. One of these is the current situation; people willing to publicly protest led by a unified opposition with specific demands are being met by the government with repression. If no concessions are made by the government, the unrest could potentially peter out if no change occurs.</p>
<blockquote>
<p dir="auto">The Maduro government has been hanging on&#8230; waiting for oil prices to rise&#8230; trying desperately to make its bond payments&#8230;</p>
</blockquote>
<p dir="auto">This has happened twice before in the past three years. Venezuelan’s went out into the streets, drawing international attention, and resulting in dialogues that were sponsored by the international community. Each time, an exchange was sponsored and then protests died down, but nothing was changed as a consequence of the inter-party dialogues. The government and its economic policies continued, the social situation deteriorated, and the stage was effectively set for another crisis like the one we see now.</p>
<p dir="auto">But what makes this round of protests really different and more sustained is the lack of elections as an alternative means to resolve differences. The cancellation of all election options, as well as the Supreme Court&#8217;s undermining the authority of the legislature (the only institution controlled by the opposition), means the people are losing hope of peaceful means of changing the situation.</p>
<p dir="auto">Russia and China have provided the Venezuelan government with financial support as it tries to hang on. The government is counting on the situation to improve—i.e. for oil prices to rise—before the presidential elections scheduled for late-2018. They’ve already delayed or all-out suspended local, regional, and governor elections and successfully halted an effort by the opposition to have a recall referendum that would cut short the president’s term.</p>
<hr />
<p dir="auto"><em><strong>Source: </strong>Jennifer McCoy, Ph.D., Distinguished University Professor of Political Science at Georgia State University. Dr. McCoy served as Founding Director of the Global Studies Institute at GSU (2015-16), and as Director of the Carter Center’s Americas program (1998-2015) where she led projects strengthening democratic institutions, provided mediation and encouraged dialogue and hemispheric cooperation. Her latest book is </em><a href="https://www.amazon.com/gp/product/1601270682/ref=as_li_tl?ie=UTF8&amp;camp=1789&amp;creative=9325&amp;creativeASIN=1601270682&amp;linkCode=as2&amp;tag=globalsecur08-20&amp;linkId=6048537beac754ed7f2c29c55b01b3ed" target="_blank" rel="noopener noreferrer">International Mediation in Venezuela</a><img loading="lazy" decoding="async" style="border: none !important; margin: 0px !important;" src="//ir-na.amazon-adsystem.com/e/ir?t=globalsecur08-20&amp;l=am2&amp;o=1&amp;a=1601270682" alt="" width="1" height="1" border="0" /><em> (co-authored with Francisco Diez, 2011).</em></p>
<p><a href="https://globalsecurityreview.com/crisis-in-venezuela-economic-collapse-violent-unrest-and-human-survival/">Crisis in Venezuela: Economic Collapse, Violent Unrest, and Human Survival</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cambridge Analytica: The Darker Side of Big Data</title>
		<link>https://globalsecurityreview.com/cambridge-analytica-darker-side-big-data/</link>
		
		<dc:creator><![CDATA[Sophia Porotsky]]></dc:creator>
		<pubDate>Fri, 29 Sep 2017 09:15:44 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=1132</guid>

					<description><![CDATA[<p>The &#8220;election management&#8221; company uses big data and psychometric profiling in operations designed to suppress voter segments. Before closer scrutiny of the implications of the Trump campaign’s use of Cambridge Analytica’s services, it is imperative to grasp the methodology behind Cambridge Analytica&#8217;s services fully. The two fundamental concepts underlying the ‘election management’ company is Big [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/cambridge-analytica-darker-side-big-data/">Cambridge Analytica: The Darker Side of Big Data</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The &#8220;election management&#8221; company uses big data and psychometric profiling in operations designed to suppress voter segments.</h2>
<p>Before closer scrutiny of the implications of the Trump campaign’s use of Cambridge Analytica’s services, it is imperative to grasp the methodology behind Cambridge Analytica&#8217;s services fully. The <a href="https://motherboard.vice.com/en_us/article/mg9vvn/how-our-likes-helped-trump-win">two fundamental concepts</a> underlying the ‘election management’ company is <i>Big Data </i>and <i>psychometrics</i>: “Big Data means, in essence, that everything we do, both on and offline, leave digital traces…every movement we make…every &#8220;like&#8221; is stored.” While psychometrics “focuses on measuring psychological traits, such as personality.”</p>
<p>How these two concepts intertwine is crucial to an understanding of what Cambridge Analytica claims to do. Using the OCEAN model, an acronym for personality traits considered the “‘Big Five’…openness (how open you are to new experiences?), conscientiousness (how much of a perfectionist are you?), extroversion (how sociable are you?), agreeableness (how considerate and cooperative you are?) and neuroticism (are you easily upset?),” relatively accurate assessments can be made about a person. The Big Data facet came into play with the work of Cambridge Ph.D. student Michal Kosinski.</p>
<p>According to reports, Kosinski helped build an app called MyPersonality, which was designed to create “personality profiles” for users filling out psychometric questionnaires. Millions of people participated in the survey and had the option to share their Facebook profile data with the researchers.</p>
<p>Kosinski and his partner were reportedly in possession of “<span id="selectionBoundary_1499515393059_49997672222003775" class="rangySelectionBoundary" style="line-height: 0; display: none;"></span>the largest dataset combining psychometric scores with Facebook profiles ever to be collected…Kosinski proved that by an average of 68 Facebook ‘likes’ by a user, it was possible to predict their skin color (with 95 percent accuracy), their sexual orientation (88 percent accuracy), and their affiliation with the Democratic or Republican party (85 percent).”</p>
<p>Not only does the data create a psychological profile, but the methodology can also be used as a ‘people search engine,’ or mechanism for microtargeting: narrowing down results based on desired personality characteristics.</p>
<p>Kosinski’s findings supposedly paved the way for the technology that is currently a significant selling point for Cambridge Analytica, and this was not a coincidence. Aleksandr Kogan, a lecturer at Cambridge University, <a href="https://theintercept.com/2017/03/30/facebook-failed-to-protect-30-million-users-from-having-their-data-harvested-by-trump-campaign-affiliate/">approached Kosinski in early 2014</a>. Kogan, who was contracted by Cambridge Analytica’s parent company SCL, took an interest in Kasinski’s work and as reported by The Guardian, introduced SCL to Kasinski’s methodology. While Kasinski refused to do business with SCL, it appears that Kogan mimicked his methods:</p>
<p>“Kogan had arranged for more than 100,000 people to complete the Facebook survey and download an app… obtained data from 185,000 survey participants as well as their Facebook friends… and that it yielded 30 million available profiles… No one in this larger group of 30 million knew that “likes” and demographic data from their Facebook profiles were being harvested by political operatives hired to influence American voters.”</p>
<p>SCL—and Cambridge Analytica, by extension—were given an immense amount of usable personal data, obtained without the knowledge or consent of the vast majority of harvested user profiles. According to political communications expert <a href="https://www.washingtonpost.com/politics/after-working-for-trumps-campaign-british-data-firm-eyes-new-us-government-contracts/2017/02/17/a6dee3c6-f40c-11e6-8d72-263470bf0401_story.html">Emma Briant</a>, this ethically dubious behavior is an exploitation of users’ dependence on social media and can be used to manipulate the public. Currently, Cambridge Analytica claims to have “a database of 230 million American adults, with up to 5,000 pieces of demographic, consumer and lifestyle information about each.” The company markets its services based on claims of being able to influence voter behavior with “microtargeting.”</p>
<p>The Trump campaign paid Cambridge Analytica millions of dollars during the election process, and interestingly, Stephen K. Bannon, Trump’s Chief Strategist and former head of Breitbart News (which was mentioned earlier as an active participant in spreading Russian-generated misinformation/disinformation), used to sit on Cambridge Analytica’s board.</p>
<h3><b>The Implications of “Microtargeting”</b></h3>
<p>According to a recent scientific analysis by Kosinski, individually tailored Facebook advertising based on personality targeting can attract up to 63 percent more clicks and up to 1,400 more conversions. These statistics reveal the implications of any campaigning politician possessing social media microtargeting capabilities. Social media enabled the delivery of strategic information, without knowledge or consent, to a company whose objective is to exploit users’ data to influence voter behavior.</p>
<p>Crucially as well, social media provided the access Cambridge Analytica needed for their microtargeting campaigns to reach the intended audience. In the words of Professor and data scientist <a href="https://scout.ai/story/the-rise-of-the-weaponized-ai-propaganda-machine">Jonathan Albright</a>, “This is a propaganda machine. It’s targeting people individually to recruit them to an idea. It’s a level of social engineering that I’ve never seen before. They’re capturing people and then keeping them on an emotional leash.”</p>
<p>The way in which Cambridge Analytica operates is insidious and often invisible, “leveraging automated emotional manipulation alongside swarms of bots, Facebook dark posts [a tool for tailoring sponsored Facebook posts to specific audiences], A/B testing, and fake news networks.”</p>
<p>Senator Mark Warner’s <a href="http://globalsecurityreview.com/american-security/security-policy/russia-manipulated-u-s-voters-social-media/">statement once again comes to mind</a>: reports presented to the Senate Intelligence Committee alleged that <a href="http://washingtonmonthly.com/2017/03/30/why-did-russia-hack-the-voter-rolls/">voter suppression campaigns</a> on social media were targeted with precision down to the precinct level in crucial battleground states. Aiding in voter suppression efforts is nothing new for SCL (Cambridge Analytica’s parent company), which reportedly provided its services to support a <a href="https://www.buzzfeed.com/kendalltaggart/the-truth-about-the-trump-data-team-that-people-are-freaking">voter suppression campaign in Nigeria</a>.</p>
<p>The ramifications of these revelations are highly significant. Social media and Big Data analytics are changing the way in which political candidates conduct their campaigns. The personal information and preferences shared on social media leave voters vulnerable to influence, and Big Data allows politicians to know <i>exactly </i>which buttons to push.</p>
<h3><b>The West&#8217;s Critical Vulnerabilities to Information Warfare Operations</b></h3>
<p>While it is beyond the scope of this work to definitively prove intentional collusion between the Russian government and the Trump campaign (although evidence continues to emerge at the time of publication), there is ample information to substantiate that there were unsavory influence campaigns conducted on both sides. To better understand the Russian angle, this analysis outlined the <a href="http://globalsecurityreview.com/cold-war-2-0-russian-information-warfare/">concept of Russian Information Warfare</a> and elucidated the critical difference in its conceptualization between Russia and the West.</p>
<p>It emerges that this contrast has led to a security gap in Western cyber strategy: there has been too much of a focus on the technical aspects of cyber threats. While the US was trying to protect voting machines from getting hacked, the actual voters were the ones left most vulnerable. It becomes evident that social media not only made activities for generating disinformation/misinformation easier, but it facilitated its dissemination with penetrating precision and efficacy.</p>
<p>The second part of this work examined how the Trump campaign harnessed social media in two ways. Firstly, Trump exploited his status and power to legitimize Russian active measures; social media was vital in providing an avenue of communication with a direct audience of over 46 million.</p>
<p>Secondly, the Trump campaign used Big Data ‘election management’ company Cambridge Analytica, which uses a database of stolen personal details to micro-target voters, and has a history of running voter suppression campaigns. If the insinuation in Senator Warner’s quote (from the beginning of this paper) is true, according to the panel of experts he asked at the hearing, it is absolutely possible that Russian-hacked voter database rolls could have been used in coordination with.</p>
<p>Social media personal data gives context to the voter registration database information, and microtargeting tools such as Facebook dark posts allow voter suppression campaigns to be executed with razor precision down to the voting precinct. Cambridge Analytica is only one of a number of similar companies that are emerging. Social media and Big Data analytics are changing the way political campaigns are run, and the sinister side of it is: they know how to pull the right emotional strings to elicit the exact desired response. This is a perversion of the democratic process, especially if fake news, generated by a foreign adversary with the explicit purpose of subverting Western institutions, is used as a tool to influence public opinion.</p>
<p>It should be noted that these implications don’t apply to the US alone. Cambridge Analytica has <a href="http://www.tabletmag.com/jewish-news-and-politics/211152/trump-data-analytics-russian-access">provided its services</a> to the Leave.eu (Brexit) campaign, two US Presidential election candidates, countries in Africa and the Caribbean, and their client list is only growing in light of their runaway success. In parallel to these revelations, Russia has also poured resources into Brexit, the US election, as well as <a href="https://www.americanprogress.org/issues/security/reports/2017/03/15/428074/russias-5th-column/">French, Dutch, German, and Austrian</a> far-right political parties.</p>
<p>Russia is aggressively pursuing a political agenda, and their expertise in the cyber domain is just a facet of a sophisticated grand political and military strategy—a demonstrable threat to liberal democracy. The West needs to adapt to the changing cyber landscape and begin to perceive threats differently. Cyber is much more than just the technical or the hardware. The exploitation of social media in the 2016 US Presidential election proved to be the perfect example of how information can be weaponized to swing an outcome and achieve a desired strategic objective.</p>
<p><a href="https://globalsecurityreview.com/cambridge-analytica-darker-side-big-data/">Cambridge Analytica: The Darker Side of Big Data</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Solving the Economic &#038; Security Crisis in Venezuela</title>
		<link>https://globalsecurityreview.com/solving-the-economic-security-crisis-in-venezuela/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Thu, 28 Sep 2017 16:15:12 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Americas]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Colombia]]></category>
		<category><![CDATA[Hezbollah]]></category>
		<category><![CDATA[International Security]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Lebanon]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[Venezuela]]></category>
		<guid isPermaLink="false">https://global-security-brief.com/?p=462</guid>

					<description><![CDATA[<p>The best-case scenario for ending Venezuelan political and economic upheaval is through a negotiated settlement Dr. Jennifer McCoy, Distinguished University Professor of Political Science at Georgia State University, discussed a third potential outcome for the situation in Venezuela: a negotiated solution. A negotiated settlement means addressing the food and medical shortage and ensuring people’s basic [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/solving-the-economic-security-crisis-in-venezuela/">Solving the Economic &#038; Security Crisis in Venezuela</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The best-case scenario for ending Venezuelan political and economic upheaval is through a negotiated settlement</h2>
<p dir="auto">Dr. Jennifer McCoy, Distinguished University Professor of Political Science at Georgia State University, discussed a third potential outcome for the situation in Venezuela: a negotiated solution. A negotiated settlement means addressing the food and medical shortage and ensuring people’s basic survival needs are met while providing international economic support on the condition that certain political and institutional reforms are implemented.</p>
<p>Years ago, Venezuela cut itself off from the Inter-American Development Bank, the IMF, and the World Bank. Since then, it has been relying on loans from Russia and China in exchange for oil as collateral, but that’s increasingly becoming an unsustainable source of funding for the Venezuelan government.</p>
<p>China and Russia are becoming more leery about continuing to loan new money because of depressed oil prices, instability, and their internal problems. As a result, Venezuela’s financial options are thinning out. However, Dr. McCoy notes that negotiations could resolve this issue in this third scenario, which is the most optimal.</p>
<p>In exchange for international aid, Venezuela’s government would agree to implement changes in monetary and fiscal policy and agree to reinvest revenues, particularly in the nationalized oil sector. The national oil company has lost its capacity to produce efficiently and in the required volume. Venezuela’s commodity-based economy requires an efficient oil industry to generate sufficient revenue to reinvest in other sectors so as to promote a more diversified economy.</p>
<p>Additionally, the government needs to agree to political negotiations, as well. The independence of Venezuela’s democratic institutions has been critically undermined, so there needs to be a major effort to restore the independence of the judiciary, the legislative branch, the security forces, and the media, in addition to setting in place a timetable for elections.</p>
<p>The problem, Dr. McCoy says, is that the government is reluctant to hold elections because if they perceive it as an all-or-nothing situation if they (the Maduro government) falls out of power. If the Chavez movement loses control of the Venezuelan government, they fear recrimination and are afraid of losing all the gains they’ve made—in their eyes—for the Venezuelan people through what Chavez called his “Bolivarian revolution.” There is significant corruption that permeates the government and armed forces, and reported criminal activity, as well. Therefore, many officials will be reluctant to risk giving up power if they think they will be tried and punished, or if they expect a witch-hunt without due process.</p>
<p>Also looming over members of government is the possibility of extradition to the United States. This threat is particularly worrisome for those who’ve already been indicted in the U.S., or who have had sanctions imposed upon them by the U.S. in response to corruption, drug trafficking, or human rights abuses.</p>
<h3>Applying transitional justice in Venezuela</h3>
<p>Transitional justice is usually implemented after countries have emerged from a civil war with a peace agreement, or after a transition from a military dictatorship or authoritarian regime to a democratic system. In the past, it’s granted pure amnesty to everybody.</p>
<p>Now, Dr. McCoy says, it typically provides reduced sentences for human rights abusers, and potentially for corrupt officials, conditioned on their agreeing to provide compensation to the victims or the country, acknowledge responsibility and tell the truth, and guarantees not to repeat the criminal activity. Some form of negotiation must include elements transitional justice to ensure a peaceful transition of power, and more importantly, to even have the ability to hold elections where it’s possible that the government could be ousted.</p>
<h3>What’s at stake for American interests?</h3>
<p>A failure to reach a solution in Venezuela would have considerable implications for American interests, both economic and national security. A failure would result in a marked increase in the number of Venezuelan’s fleeing the country, either seeking better economic opportunity or fleeing political violence and oppression.</p>
<p>This risk involves the point that if there is a state collapse, oil production will likely cease in Venezuela and worldwide prices escalate. an interruption in oil exports to the U.S. from Venezuela would be the first time that has happened, despite political tensions and lack of ambassadors in each country.</p>
<p>The criminal and extremist activity would increase in the absence of order. There have been allegations that Venezuela has sold visas to Hezbollah in Iran, Dr. McCoy says, noting that these haven’t necessarily been concretely proven, but provide a window into the range of threats that could emerge from Venezuela if it became a failed state.</p>
<hr />
<p><em><strong>Source: </strong>Jennifer McCoy, Ph.D., Distinguished University Professor of Political Science at Georgia State University. Dr. McCoy served as Founding Director of the Global Studies Institute at GSU (2015-16), and as Director of the Carter Center’s Americas program (1998-2015) where she led projects strengthening democratic institutions, provided mediation and encouraged dialogue and hemispheric cooperation. Her latest book is </em><a target="_blank" href="https://www.amazon.com/gp/product/1601270682/ref=as_li_tl?ie=UTF8&#038;camp=1789&#038;creative=9325&#038;creativeASIN=1601270682&#038;linkCode=as2&#038;tag=globalsecur08-20&#038;linkId=6048537beac754ed7f2c29c55b01b3ed" rel="noopener noreferrer">International Mediation in Venezuela</a><img loading="lazy" decoding="async" src="//ir-na.amazon-adsystem.com/e/ir?t=globalsecur08-20&#038;l=am2&#038;o=1&#038;a=1601270682" width="1" height="1" border="0" alt="" style="border:none !important; margin:0px !important;" /><em> (co-authored with Francisco Diez, 2011).</em></p>
<p><a href="https://globalsecurityreview.com/solving-the-economic-security-crisis-in-venezuela/">Solving the Economic &#038; Security Crisis in Venezuela</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>U.S. issues &#8220;red line&#8221; on North Korea, but leaves room for interpretation.</title>
		<link>https://globalsecurityreview.com/u-s-outlines-scope-military-action-north-korea/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Thu, 28 Sep 2017 13:19:18 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[South Korea]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=2076</guid>

					<description><![CDATA[<p>Analysis: Will—or When will—the U.S. Strike? Following this past week&#8217;s second firing of a North Korean ballistic missile over Japanese territory, remarks were made in a joint press conference held by U.S. Permanent Representative to the U.N. Nikki Haley, and National Security Advisor Lt. General H.R. McMaster. Ambassador Haley said that she&#8217;d &#8220;hand over&#8221; the [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/u-s-outlines-scope-military-action-north-korea/">U.S. issues &#8220;red line&#8221; on North Korea, but leaves room for interpretation.</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Analysis: Will—or When will—the U.S. Strike?</h2>
<p>Following this past week&#8217;s second firing of a North Korean ballistic missile over Japanese territory, remarks were made in a joint press conference held by U.S. Permanent Representative to the U.N. Nikki Haley, and National Security Advisor Lt. General H.R. McMaster.</p>
<p><img decoding="async" src="http://globalsecurityreview.com/wp-content/uploads/2017/09/img_0196-1.jpg" />Ambassador Haley said that she&#8217;d &#8220;hand over&#8221; the North Korean issue to Secretary of Defense Jim Mattis for him to solve—if diplomatic efforts continued to fail. The Ambassador&#8217;s delivery indicated some exasperation with the lack of diplomatic progress.</p>
<p>China will resist any effort to further intervene until, at least, the conclusion of this year&#8217;s Communist Party Conference, where President Xi Jinping is expected to further consolidate his power. China has been promoting itself as an official &#8220;global power.&#8221; Resolving such a crisis as the North Korean nuclear threat, particularly as the Kim regime is a growing thorn in Beijing&#8217;s side, would lend credibility to that claim.</p>
<p>Furthermore, proactive engagement by China could mitigate some of the Government&#8217;s concerns, such as a U.S. aligned, unified Korean Peninsula, or a mass-exodus of North Korean refugees across the Chinese border.</p>
<p>If this most recent provocation by North Korea against Japan does not cross the line issued by Secretary Mattis, it will be clear as North Korea will continue to test the limits of the U.S., Japan, and South Korea with increasingly aggressive ballistic missile provocations.</p>
<h3>U.S. Defense Secretary Outlines Scope of Any Military Action in North Korea</h3>
<p>In a statement released outside of the White House following a meeting with U.S. President Donald Trump, Secretary of Defense James Mattis sent a clear warning to North Korea:</p>
<p>“Any threat to the United States or its territories including Guam or our allies will be met with a massive military response, a response both effective and overwhelming.” The Secretary continued, saying, “Kim Jong Un should heed the United Nations Security Council’s unified voice. All members unanimously agreed on the threat North Korea poses. And they remain unanimous in their commitment to the denuclearization of the Korean peninsula. Because we are not looking to the total annihilation of a country, namely, North Korea.”</p>
<blockquote class="bs-pullquote bs-pullquote-right"><p>U.S. military action would be a sudden and massive attack on North Korean nuclear and military assets, for which no prior warning would be given.</p></blockquote>
<p>Mattis issued his statement while flanked by Marine General Joseph Dunford, Chairman of the Joint Chiefs of Staff. In contrast to the off-the-cuff “fire-and-fury” rhetoric employed by Trump on August 8, Mattis read from a prepared statement and avoided using opaque language, with one exception.</p>
<h3>What Constitutes a Threat?</h3>
<p>After stating “Any threat to the United States or its territories including Guam or our allies,&#8221; Mattis did not provide context for his use of the words “any threat.&#8221;   Accordingly, it leaves both the White House and the military wiggle room for interpretation.</p>
<p>Mattis&#8217; language could have been intended to justify for the U.S. to use force as a means of self-defense under Article 51 of the U.N. Charter. Action taken under Article 51 requires there be an imminent threat of “armed attack” if the assault has not yet begun, but does not require prior authorization by the U.N. Security Council.</p>
<h3>Conditions for Military Action</h3>
<p>Mattis’ use of “will be” in setting the conditions for military action against North Korea is critical. He did not say “might” or “would.” In contrast, on August 8, Trump stated that threats “to the United States” would trigger a military response. It was after this that North Korea threatened to target the area surrounding Guam with ballistic missiles.</p>
<p>By including U.S. allies (South Korea and Japan), U.S. territories (like Guam), and the continental United States in his statement, Mattis provided a clear definition as to what would merit a military strike by the U.S.</p>
<h3>What Would a U.S. Military Strike on North Korea Look Like?</h3>
<p>The Defense Secretary also described what military action by the U.S. against North Korea would look like. In stating that “we [the U.S.] are not looking to the total annihilation of a country, namely, North Korea,” Mattis implied that any military action by the U.S. would likely not be a massive invasion. U.S. military action, rather, would be a sudden and massive attack on North Korean nuclear and military assets, for which no prior warning would be given.</p>
<p>In ending his statement referencing the “unified voice” of the U.N. Security Council, Mattis implied his preference for resolving the situation peacefully. Primarily, Mattis views a diplomatic solution as preferable but has made sure that the United States is ready to use force if necessary.</p>
<p><a href="https://globalsecurityreview.com/u-s-outlines-scope-military-action-north-korea/">U.S. issues &#8220;red line&#8221; on North Korea, but leaves room for interpretation.</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is U.S. Foreign Policy Under the Trump Administration?</title>
		<link>https://globalsecurityreview.com/u-s-foreign-policy-trump-administration/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Sat, 23 Sep 2017 09:00:00 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Deterrence & Foreign Policy]]></category>
		<category><![CDATA[Americas]]></category>
		<category><![CDATA[Foreign Policy]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Syria]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=583</guid>

					<description><![CDATA[<p>The Trump Doctrine: America First Means More Military As a candidate, Donald Trump structured his narrative around the idea that the U.S. had overextended itself—that allies were taking advantage of American military and economic support.  Trump contextualized the North Atlantic Treat Organization (NATO)—a bulwark of the post-World War II international order—as outdated while falsely stating [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/u-s-foreign-policy-trump-administration/">What is U.S. Foreign Policy Under the Trump Administration?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The Trump Doctrine: America First Means More Military</h2>
<p>As a candidate, Donald Trump structured his narrative around the idea that the U.S. had overextended itself—that allies were taking advantage of American military and economic support.  Trump contextualized the North Atlantic Treat Organization (NATO)—a bulwark of the post-World War II international order—as outdated while falsely stating the idea that some of America’s oldest allies owed the United States a financial debt for the American presence in Europe.</p>
<p>Trump pledged to usher in a new age of American isolationism. Throughout the campaign, he distanced himself from Secretary Clinton’s tough stance on Russia; he refused to pledge his steadfast support to NATO—characterizing the alliance as “obsolete”—arguing that the United States was overextended abroad and needed to concentrate on domestic affairs.</p>
<p>Simultaneously, Trump pledged to increase defense spending to “rebuild” the American military. After his inauguration, now-President Trump proposed a $54 billion dollar boost in defense spending in his first budget, with Congress authorizing an additional $15 billion to finance ongoing operations in Syria, Afghanistan, Iraq, and other areas around the globe until a full budget is approved.</p>
<h3>Trump’s foreign policy: tweet loudly and carry a nuke.</h3>
<p>Pundits and technocrats across the media spectrum proclaimed the president-elect as a sheep in wolf’s clothing, with some arguing that Clinton represented a greater threat to world peace. Incidentally, this argument was also put forth by Russian state media outlets (RT, Sputnik), by Wikileaks, and outlets like Breitbart, Zero Hedge, and InfoWars.</p>
<p>Before the election, one economist in <i>The Hill </i>stated that Trump would be “<a href="http://thehill.com/blogs/pundits-blog/presidential-campaign/289338-attacking-trump-for-the-few-sensible-things-he-says">less aggressively militaristic</a>.” Theodore Roosevelt’s mantra, “Speak softly and carry a big stick” could be easily adapted for Trump: “Tweet loudly and carry a nuke.” The Trump administration isn’t offering a retreat from American intervention; he’s offering a 21st-century version of imperialism while openly endorsing authoritarian regimes.</p>
<p>More crucially, President Trump seems to be a bigger proponent of American military force projection and <i>realpolitik </i>than any president since Richard Nixon. Since taking office, Trump has shown that he is not, in fact, “less aggressively militaristic.”</p>
<h3>Impulsivity &amp; International Security: The Consequences of Failing to Think Strategically</h3>
<p>After reports had emerged that Syrian President Bashar Al-Assad again used chemical weapons against civilians, the U.S. responded by launching a barrage of Tomahawk cruise missiles at the Syrian Air Force base from which the chemical weapon strikes originated. This missile attack was seemingly conducted as a one-off operation in the absence of a broader strategy to de-escalate the Syrian civil war.</p>
<p>The one-off strike had little effect on the Syrian air force&#8217;s ability to operate. Moreover, it reveals a high degree of impulsivity and a failure to think strategically, increasing the risk of an unexpected global crisis. Such a crisis could be brought about by a miscalculation in judgment, or by impulsively ordering military action without considering a situation in its’ entirety. In a region like the <a href="http://globalsecurityreview.com/asia-security/escalation-korean-peninsula/">Korean peninsula</a>, for instance, the consequences of such a blunder would be dire.</p>
<p><a href="https://globalsecurityreview.com/u-s-foreign-policy-trump-administration/">What is U.S. Foreign Policy Under the Trump Administration?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>China&#8217;s Response to Trump&#8217;s Threat to &#8220;Totally Destroy&#8221; North Korea</title>
		<link>https://globalsecurityreview.com/chinas-response-trumps-threat-totally-destroy-north-korea/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Thu, 21 Sep 2017 22:07:00 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[South Korea]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=2244</guid>

					<description><![CDATA[<p>&#8220;The United States has great strength and patience, but if it is forced to defend itself or its allies, we will have no choice but to totally destroy North Korea.” U.S. President Donald Trump&#8217;s September 19th statement at the U.N. General Assembly in New York has attracted a virulent reaction from China. &#8220;These are not [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/chinas-response-trumps-threat-totally-destroy-north-korea/">China&#8217;s Response to Trump&#8217;s Threat to &#8220;Totally Destroy&#8221; North Korea</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<blockquote><p>&#8220;The United States has great strength and patience, but if it is forced to defend itself or its allies, we will have no choice but to totally destroy North Korea.”</p></blockquote>
<h2>U.S. President Donald Trump&#8217;s September 19th statement at the U.N. General Assembly in New York has attracted a virulent reaction from China.</h2>
<p>&#8220;These are not the words the world is waiting for from a president of the United States,&#8221; were the words used in a September 20th editorial published by the Huanqiu Shibao.</p>
<p>&#8220;Pyongyang said it had sufficiently developed its nuclear ballistic missile technology to reach the United States. It is certainly a provocation to Washington, but America must not engage in such rhetorical jousting with threats,&#8221; warns an editorial in the China Daily, in line with the language used in a September 19th statement issued by the Chinese Ministry of Foreign Affairs, which called for restraint and dialogue. The China Daily editorial went on to say that even if Beijing approved the recent UN sanctions, &#8220;unfortunately, experience proves that, confronted only with pressure, Pyongyang does not bend.&#8221;</p>
<h3>The consequences of a nuclear conflict on the Korean peninsula would be catastrophic for China</h3>
<p>The Chinese strongly oppose the outbreak of an armed conflict on the Korean peninsula. &#8216;Destroying North Korea&#8217; would lead to an ecological disaster for Northeast Asia. Nuclear pollution would swallow northeast China, the Shandong Peninsula, and South Korea.</p>
<p>Even if a conflict were to remain under the nuclear threshold, that is a conventional war, China fears the outbreak of an overwhelming and potentially destabilizing refugee crisis on its border with North Korea.</p>
<p>Strategically, China&#8217;s ideal scenario is maintaining the status quo; China sees a unified Korean peninsula under the Republic of Korea flag as a threat and views North Korea as a buffer between itself and Western-aligned South Korea.</p>
<h3>A return to the negotiating table</h3>
<p>The key to resolving the issue &#8220;is in the hands of the United States and North Korea,&#8221; analyzes Yao Lu, a professor of international relations at the Institute of Public Administration at Jilin University, columns of the Anglophone daily China Daily.</p>
<p>Yao added, &#8220;for the good and long-term stability of the international community, both sides should take their responsibilities and come to the negotiating table to resolve their conflicts.&#8221;</p>
<p><a href="https://globalsecurityreview.com/chinas-response-trumps-threat-totally-destroy-north-korea/">China&#8217;s Response to Trump&#8217;s Threat to &#8220;Totally Destroy&#8221; North Korea</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Japan installs anti-missile systems in north of country due to North Korean threat</title>
		<link>https://globalsecurityreview.com/japan-installs-anti-missile-systems-north-country-due-north-korean-threat/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Tue, 19 Sep 2017 21:39:59 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[South Korea]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=2181</guid>

					<description><![CDATA[<p>Japan will install a new PAC-3 missile interceptor on the northern island of Hokkaido. This is a direct response to the two  missiles launched by North Korea that have flown over the north of the country, according to the Japanese Ministry of Defense. The installation of the Patriot Advanced Capability 3 (PAC-3) anti-missile system at [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/japan-installs-anti-missile-systems-north-country-due-north-korean-threat/">Japan installs anti-missile systems in north of country due to North Korean threat</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Japan will install a new PAC-3 missile interceptor on the northern island of Hokkaido.</h2>
<p>This is a direct response to the two  missiles launched by North Korea that have flown over the north of the country, according to the Japanese Ministry of Defense.</p>
<div><iframe src="https://www.youtube.com/embed/dfskKsBqrgs?rel=0&amp;showinfo=0&amp;start=11" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe>The installation of the Patriot Advanced Capability 3 (PAC-3) anti-missile system at a military base in Hakodate city comes four days after Kim Jong-un&#8217;s regime launches its latest mid-range projectile that landed in the Pacific Ocean after flying over this area of Japan.</div>
<p>North Korea, which recently threatened Japan by saying it would &#8220;sink its territory&#8221; with a nuclear bomb, for its support of US-sponsored sanctions, also launched another missile that flew over northern Japan on August 29.</p>
<p>The defense spokesman said today that &#8220;the country watches over North Korea&#8217;s movements&#8221; for a possible new launch.</p>
<h3>Japan&#8217;s anti-missile operations use Navy Aegis destroyers to shoot down airborne missiles and PAC-3 to resist projectiles.</h3>
<p>Tokyo, which does not confirm the number of launchers installed in the country due to security concerns, has already extended its anti-missile system in several prefectures in the west of the country in mid-August after the North Korean government threatened to launch four missiles around the area surrounding the American island-territory of Guam.</p>
<p>The North Korean regime launched the most recent ballistic missile towards Japan on September 19, raising alarms across Japan and drawing criticism from the international community over its persistent weapons tests.</p>
<p><a href="https://globalsecurityreview.com/japan-installs-anti-missile-systems-north-country-due-north-korean-threat/">Japan installs anti-missile systems in north of country due to North Korean threat</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Trump tells UN: North Korea &#8220;Will be Destroyed&#8221; if Threats Persist</title>
		<link>https://globalsecurityreview.com/trump-tells-un-north-korea-will-destroyed-threats-persist/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Tue, 19 Sep 2017 21:32:48 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[South Korea]]></category>
		<category><![CDATA[United Nations]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=2178</guid>

					<description><![CDATA[<p>Trump Maintains Hostile-Yet-Vague Rhetoric while Addressing the U.N. General Assembly On August 19, 2017, President Donald Trump gave his first speech to the UN General Assembly. In his speech, he stated that if the Pyongyang regime does not give up its nuclear program, the United States will have no choice but to &#8220;destroy North Korea. We [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/trump-tells-un-north-korea-will-destroyed-threats-persist/">Trump tells UN: North Korea &#8220;Will be Destroyed&#8221; if Threats Persist</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Trump Maintains Hostile-Yet-Vague Rhetoric while Addressing the U.N. General Assembly</h2>
<p>On August 19, 2017, President Donald Trump gave his first speech to the UN General Assembly. In his speech, he stated that if the Pyongyang regime does not give up its nuclear program, the United States will have no choice but to &#8220;destroy North Korea. We have patience, but we have another option.&#8221;</p>
<p>Trump called the regime of Kim Jong-Un &#8220;depraved and responsible for the death, oppression, torture, and imprisonment of many citizens of the country.&#8221; He said North Korea&#8217;s pursuit of nuclear weapons is irresponsible and threatens the entire world with an &#8220;unthinkable loss of human life.&#8221; He said the North Korean leader is on a suicide mission for himself and his regime.</p>
<div class="know_more">
<p>&#8220;We are willing and prepared to take military action, but we hope this is not necessary,&#8221; said Trump, closely watched by the North Korean representative, who followed the speech in the front row, because of the draw of seats organized by the organization. discussions. Trump also called on the United Nations to pressure countries that finance North Korea to stop funding that is fueling the country&#8217;s nuclear program.</p>
</div>
<div class="know_more">
<h3>Ballistic Provocations</h3>
</div>
<div class="know_more">
<p>&#8220;If the many righteous do not confront the evil few, then evil will triumph,&#8221; Trump said. He thanked China and Russia for voting in favor of sanctions against North Korea on the UN Security Council. The country was twice sanctioned in August and last week by the council, unanimously, because of the continuity of its nuclear tests and the launching of medium-range missiles to threaten Japan.</p>
<p>Since the Republican magnate came to power eight months ago, tensions between the United States and North Korea have increased and Kim Jong Un and Trump have shifted threats in an increasingly aggressive tone.</p>
<p>Last month, the US leader threatened to unleash a &#8220;fire and fury like the world has never seen&#8221; if North Korea did not stop threatening the country, which, far from intimidating, seems to have served as fuel for Kim Jong Un: At least four missile tests were carried out, one of them with a hydrogen bomb in early September, considered the most powerful test so far by the North Korean regime.</p>
</div>
<p><a href="https://globalsecurityreview.com/trump-tells-un-north-korea-will-destroyed-threats-persist/">Trump tells UN: North Korea &#8220;Will be Destroyed&#8221; if Threats Persist</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Zapad-2017: Analyzing Troop Numbers &#038; Economic Factors</title>
		<link>https://globalsecurityreview.com/zapad-2017-analyzing-troop-numbers-economic-factors/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Thu, 14 Sep 2017 22:56:59 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Belarus]]></category>
		<category><![CDATA[Crimea]]></category>
		<category><![CDATA[Estonia]]></category>
		<category><![CDATA[Georgia]]></category>
		<category><![CDATA[Latvia]]></category>
		<category><![CDATA[Lithuania]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Poland]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Zapad-2017]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=1992</guid>

					<description><![CDATA[<p>The Kremlin must be sure of Russia&#8217;s ability to prevail in any forceful confrontation, or at least ensure a stalemate. While eastern European leaders are certainly justified in their concern, it is the job of military leaders all over the world to ensure that their forces are prepared to deal with worst-case scenarios. Zapad and [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/zapad-2017-analyzing-troop-numbers-economic-factors/">Zapad-2017: Analyzing Troop Numbers &#038; Economic Factors</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The Kremlin must be sure of Russia&#8217;s ability to prevail in any forceful confrontation, or at least ensure a stalemate.</h2>
<p>While eastern European leaders are certainly justified in their concern, it is the job of military leaders all over the world to ensure that their forces are prepared to deal with worst-case scenarios. Zapad and other large-scale war games are intended to test the readiness of military forces to deal with such situations.</p>
<p>History, and Russia&#8217;s military doctrine, tells us that for the Kremlin to legitimately consider the use of force against a sovereign state—under the guise of aiding Russian-speaking separatists, military drills, or otherwise, the Russian military and political leadership must perceive a legitimate threat to Russia&#8217;s national interest—largely the interests of its ruling oligarchic elite.</p>
<p>Additionally, the Kremlin must be sure of its ability to prevail in any forceful confrontation or to, a minimum, ensure a stalemate. Neither condition seems present.</p>
<p>Since last year&#8217;s strategic Caucasus-2016 exercise, no Russian allies or client states are under greater threat than they were last year. A few, like Bashar al Assad of Syria, have seen threats to their rule decrease in the past year.</p>
<h3>How Likely is it that Russia Will Attempt a Crimea-Style Operation Against the Baltics?</h3>
<blockquote class="bs-pullquote bs-pullquote-left"><p>NATO is now keeping a much closer eye on the Russian military techniques, particularly since the  Zapad-2013 exercises featured simulations of a pre-emptive nuclear strike against Sweden.</p></blockquote>
<p>Western countries were caught unaware as Russia employed hybrid tactics to hide its deployment of forces to Crimea.</p>
<p>NATO has beefed up its presence in its Baltic and Eastern-European Union member countries, further reducing the already slim chances that Russia will want to attempt an incursion in Baltic or E.U. states.</p>
<p>NATO is now keeping a much closer eye on the Russian military techniques, particularly since the  Zapad-2013 exercises featured simulations of a pre-emptive nuclear strike against Sweden.</p>
<h3>Preparing for a conflict doesn&#8217;t mean the Kremlin is planning to commence one.</h3>
<p>The Russian military has been holding large scale strategic exercises each year of the twenty-first century, as the Russian economics has rebounded from the lows of the early 1990s. Preparing for such a conflict doesn&#8217;t mean the Kremlin is planning to commence one.</p>
<p>It is also worth noting a correlation between Russia&#8217;s economic state and its military spending and training. This would imply that the Russian Armed Forces have a tendency to train as far because they can afford to.</p>
<p>Until 2015, Russia&#8217;s military expenditures and the number of war games it conducted, both large- and small-scale, had been increasing at a faster rate than the rate of economic growth.</p>
<h3>Russian Troop Deployments in Military Training Exercises</h3>
<p><figure id="attachment_2007" aria-describedby="caption-attachment-2007" style="width: 1274px" class="wp-caption aligncenter"><a href="http://globalsecurityreview.com/wp-content/uploads/2017/09/chart_russia_troop_numbers_zapad_military_exercises_nato.jpg"><img loading="lazy" decoding="async" class="wp-image-2007 size-full" src="http://globalsecurityreview.com/wp-content/uploads/2017/09/chart_russia_troop_numbers_zapad_military_exercises_nato.jpg" alt="Chart of Russian Troop Numbers in Training Exercises Compared with Russia GDP Growth Rate" width="1274" height="609" srcset="https://globalsecurityreview.com/wp-content/uploads/2017/09/chart_russia_troop_numbers_zapad_military_exercises_nato.jpg 1274w, https://globalsecurityreview.com/wp-content/uploads/2017/09/chart_russia_troop_numbers_zapad_military_exercises_nato-300x143.jpg 300w, https://globalsecurityreview.com/wp-content/uploads/2017/09/chart_russia_troop_numbers_zapad_military_exercises_nato-768x367.jpg 768w, https://globalsecurityreview.com/wp-content/uploads/2017/09/chart_russia_troop_numbers_zapad_military_exercises_nato-1024x489.jpg 1024w" sizes="(max-width: 1274px) 100vw, 1274px" /></a><figcaption id="caption-attachment-2007" class="wp-caption-text">Number of Troops Participating Training Exercises and Russian GDP Growth (2008-2017; NATO figures included for comparison)</figcaption></figure></p>
<p>&nbsp;</p>
<h4>Russian GDP figures, Military Exercise Data, and Troop Numbers</h4>
<div id="supsystic-table-1_97511" class="supsystic-tables-wrap " style=" " ><table id="supsystic-table-1" class="supsystic-table compact border stripe lightboxImg cell-border" data-id="1" data-view-id="1_97511" data-title="Russian Military Exercises and GDP Growth/Decline" data-currency-format="$1,000.00" data-percent-format="10.00%" data-date-format="DD.MM.YYYY" data-time-format="HH:mm" data-features="[&quot;after_table_loaded_script&quot;,&quot;auto_width&quot;]" data-search-value="" data-lightbox-img="" data-head-rows-count="1" data-pagination-length="50,100,All" data-auto-index="off" data-searching-settings="{&quot;columnSearchPosition&quot;:&quot;bottom&quot;,&quot;minChars&quot;:&quot;0&quot;}" data-lang="default" data-override="{&quot;emptyTable&quot;:&quot;&quot;,&quot;info&quot;:&quot;&quot;,&quot;infoEmpty&quot;:&quot;&quot;,&quot;infoFiltered&quot;:&quot;&quot;,&quot;lengthMenu&quot;:&quot;&quot;,&quot;search&quot;:&quot;&quot;,&quot;zeroRecords&quot;:&quot;&quot;,&quot;exportLabel&quot;:&quot;&quot;,&quot;file&quot;:&quot;default&quot;}" data-merged="[]" data-responsive-mode="2" data-from-history="0" ><thead><tr><th class="" style="width:; padding: 0 !important;"></th><th class="" style="width:; padding: 0 !important;"></th><th class="" style="width:; padding: 0 !important;"></th><th class="" style="width:; padding: 0 !important;"></th><th class="" style="width:; padding: 0 !important;"></th><th class="" style="width:; padding: 0 !important;"></th><th class="" style="width:; padding: 0 !important;"></th><th class="" style="width:; padding: 0 !important;"></th><th class="" style="width:; padding: 0 !important;"></th></tr></thead><tbody><tr style="height:px" ><td data-cell-id="A1" data-x="0" data-y="1" data-db-index="1" class="" data-cell-type="text" data-original-value="" data-order="" ></td><td data-cell-id="B1" data-x="1" data-y="1" data-db-index="1" class="italic" data-cell-type="text" data-original-value="Exercise" data-order="Exercise" >Exercise </td><td data-cell-id="C1" data-x="2" data-y="1" data-db-index="1" class="italic" data-cell-type="text" data-original-value="Russian Troops (Official)" data-order="Russian Troops (Official)" >Russian Troops (Official) </td><td data-cell-id="D1" data-x="3" data-y="1" data-db-index="1" class="italic" data-cell-type="text" data-original-value="Russian Troops (Western Est.)" data-order="Russian Troops (Western Est.)" >Russian Troops (Western Est.) </td><td data-cell-id="E1" data-x="4" data-y="1" data-db-index="1" class="italic" data-cell-type="text" data-original-value=" Western Troops" data-order=" Western Troops" > Western Troops </td><td data-cell-id="F1" data-x="5" data-y="1" data-db-index="1" class="italic" data-cell-type="text" data-original-value="Russian Exercises Held" data-order="Russian Exercises Held" >Russian Exercises Held </td><td data-cell-id="G1" data-x="6" data-y="1" data-db-index="1" class="italic" data-cell-type="text" data-original-value="GDP (growth %)" data-order="GDP (growth %)" >GDP (growth %) </td><td data-cell-id="H1" data-x="7" data-y="1" data-db-index="1" class="italic" data-cell-type="text" data-original-value="GDP (total)" data-order="GDP (total)" >GDP (total) </td><td data-cell-id="I1" data-x="8" data-y="1" data-db-index="1" class="italic" data-cell-type="text" data-original-value="GDP (per capita)" data-order="GDP (per capita)" >GDP (per capita) </td></tr><tr style="height:px" ><td data-cell-id="A2" data-x="0" data-y="2" data-db-index="2" class="italic" data-cell-type="text" data-cell-format-type="number" data-original-value="2008" data-order="2008" >2008 </td><td data-cell-id="B2" data-x="1" data-y="2" data-db-index="2" class="" data-cell-type="text" data-original-value="Tsentr (Center)" data-order="Tsentr (Center)" >Tsentr (Center) </td><td data-cell-id="C2" data-x="2" data-y="2" data-db-index="2" class="" data-cell-type="text" data-original-value="40,000" data-order="40,000" >40,000 </td><td data-cell-id="D2" data-x="3" data-y="2" data-db-index="2" class="" data-cell-type="text" data-original-value="40,000" data-order="40,000" >40,000 </td><td data-cell-id="E2" data-x="4" data-y="2" data-db-index="2" class="" data-cell-type="text" data-original-value="-" data-order="-" >- </td><td data-cell-id="F2" data-x="5" data-y="2" data-db-index="2" class="" data-cell-type="text" data-original-value="-" data-order="-" >- </td><td data-cell-id="G2" data-x="6" data-y="2" data-db-index="2" class="" data-cell-type="text" data-original-value="5.25%" data-order="5.25%" >5.25% </td><td data-cell-id="H2" data-x="7" data-y="2" data-db-index="2" class="" data-cell-type="text" data-original-value="$1,660,840,000,000" data-order="$1,660,840,000,000" >$1,660,840,000,000 </td><td data-cell-id="I2" data-x="8" data-y="2" data-db-index="2" class="" data-cell-type="text" data-original-value="$11,635" data-order="$11,635" >$11,635 </td></tr><tr style="height:px" ><td data-cell-id="A3" data-x="0" data-y="3" data-db-index="3" class="italic" data-cell-type="text" data-cell-format-type="number" data-original-value="2009" data-order="2009" >2009 </td><td data-cell-id="B3" data-x="1" data-y="3" data-db-index="3" class="" data-cell-type="text" data-original-value="Zapad (West)" data-order="Zapad (West)" >Zapad (West) </td><td data-cell-id="C3" data-x="2" data-y="3" data-db-index="3" class="" data-cell-type="text" data-original-value="12,500" data-order="12,500" >12,500 </td><td data-cell-id="D3" data-x="3" data-y="3" data-db-index="3" class="" data-cell-type="text" data-original-value="12,500" data-order="12,500" >12,500 </td><td data-cell-id="E3" data-x="4" data-y="3" data-db-index="3" class="" data-cell-type="text" data-original-value="12,500" data-order="12,500" >12,500 </td><td data-cell-id="F3" data-x="5" data-y="3" data-db-index="3" class="" data-cell-type="text" data-original-value="1,400" data-order="1,400" >1,400 </td><td data-cell-id="G3" data-x="6" data-y="3" data-db-index="3" class="" data-cell-type="text" data-original-value="-7.82%" data-order="-7.82%" >-7.82% </td><td data-cell-id="H3" data-x="7" data-y="3" data-db-index="3" class="" data-cell-type="text" data-original-value="1,222,640,000,000" data-order="1,222,640,000,000" >1,222,640,000,000 </td><td data-cell-id="I3" data-x="8" data-y="3" data-db-index="3" class="" data-cell-type="text" data-original-value="8,563" data-order="8,563" >8,563 </td></tr><tr style="height:px" ><td data-cell-id="A4" data-x="0" data-y="4" data-db-index="4" class="italic" data-cell-type="text" data-cell-format-type="number" data-original-value="2010" data-order="2010" >2010 </td><td data-cell-id="B4" data-x="1" data-y="4" data-db-index="4" class="" data-cell-type="text" data-original-value="Vostok (East)" data-order="Vostok (East)" >Vostok (East) </td><td data-cell-id="C4" data-x="2" data-y="4" data-db-index="4" class="" data-cell-type="text" data-original-value="26,000" data-order="26,000" >26,000 </td><td data-cell-id="D4" data-x="3" data-y="4" data-db-index="4" class="" data-cell-type="text" data-original-value="26,000" data-order="26,000" >26,000 </td><td data-cell-id="E4" data-x="4" data-y="4" data-db-index="4" class="" data-cell-type="text" data-original-value="20,000" data-order="20,000" >20,000 </td><td data-cell-id="F4" data-x="5" data-y="4" data-db-index="4" class="" data-cell-type="text" data-original-value="2,000" data-order="2,000" >2,000 </td><td data-cell-id="G4" data-x="6" data-y="4" data-db-index="4" class="" data-cell-type="text" data-original-value="4.50%" data-order="4.50%" >4.50% </td><td data-cell-id="H4" data-x="7" data-y="4" data-db-index="4" class="" data-cell-type="text" data-original-value="1,524,920,000,000" data-order="1,524,920,000,000" >1,524,920,000,000 </td><td data-cell-id="I4" data-x="8" data-y="4" data-db-index="4" class="" data-cell-type="text" data-original-value="10,675" data-order="10,675" >10,675 </td></tr><tr style="height:px" ><td data-cell-id="A5" data-x="0" data-y="5" data-db-index="5" class="italic" data-cell-type="text" data-cell-format-type="number" data-original-value="2011" data-order="2011" >2011 </td><td data-cell-id="B5" data-x="1" data-y="5" data-db-index="5" class="" data-cell-type="text" data-original-value="Tsentr (Center)" data-order="Tsentr (Center)" >Tsentr (Center) </td><td data-cell-id="C5" data-x="2" data-y="5" data-db-index="5" class="" data-cell-type="text" data-original-value="12,000" data-order="12,000" >12,000 </td><td data-cell-id="D5" data-x="3" data-y="5" data-db-index="5" class="" data-cell-type="text" data-original-value="12,000" data-order="12,000" >12,000 </td><td data-cell-id="E5" data-x="4" data-y="5" data-db-index="5" class="" data-cell-type="text" data-original-value="12,000" data-order="12,000" >12,000 </td><td data-cell-id="F5" data-x="5" data-y="5" data-db-index="5" class="" data-cell-type="text" data-original-value="3,000" data-order="3,000" >3,000 </td><td data-cell-id="G5" data-x="6" data-y="5" data-db-index="5" class="" data-cell-type="text" data-original-value="4.05%" data-order="4.05%" >4.05% </td><td data-cell-id="H5" data-x="7" data-y="5" data-db-index="5" class="" data-cell-type="text" data-original-value="2,031,770,000,000" data-order="2,031,770,000,000" >2,031,770,000,000 </td><td data-cell-id="I5" data-x="8" data-y="5" data-db-index="5" class="" data-cell-type="text" data-original-value="14,212" data-order="14,212" >14,212 </td></tr><tr style="height:px" ><td data-cell-id="A6" data-x="0" data-y="6" data-db-index="6" class="italic" data-cell-type="text" data-cell-format-type="number" data-original-value="2012" data-order="2012" >2012 </td><td data-cell-id="B6" data-x="1" data-y="6" data-db-index="6" class="" data-cell-type="text" data-original-value="Kavkaz (Caucasus)" data-order="Kavkaz (Caucasus)" >Kavkaz (Caucasus) </td><td data-cell-id="C6" data-x="2" data-y="6" data-db-index="6" class="" data-cell-type="text" data-original-value="8,000" data-order="8,000" >8,000 </td><td data-cell-id="D6" data-x="3" data-y="6" data-db-index="6" class="" data-cell-type="text" data-original-value="8,000" data-order="8,000" >8,000 </td><td data-cell-id="E6" data-x="4" data-y="6" data-db-index="6" class="" data-cell-type="text" data-original-value="8,000" data-order="8,000" >8,000 </td><td data-cell-id="F6" data-x="5" data-y="6" data-db-index="6" class="" data-cell-type="text" data-original-value="1,200" data-order="1,200" >1,200 </td><td data-cell-id="G6" data-x="6" data-y="6" data-db-index="6" class="" data-cell-type="text" data-original-value="3.52%" data-order="3.52%" >3.52% </td><td data-cell-id="H6" data-x="7" data-y="6" data-db-index="6" class="" data-cell-type="text" data-original-value="2,170,140,000,000" data-order="2,170,140,000,000" >2,170,140,000,000 </td><td data-cell-id="I6" data-x="8" data-y="6" data-db-index="6" class="" data-cell-type="text" data-original-value="15,154" data-order="15,154" >15,154 </td></tr><tr style="height:px" ><td data-cell-id="A7" data-x="0" data-y="7" data-db-index="7" class="italic" data-cell-type="text" data-cell-format-type="number" data-original-value="2013" data-order="2013" >2013 </td><td data-cell-id="B7" data-x="1" data-y="7" data-db-index="7" class="" data-cell-type="text" data-original-value="Zapad (West)" data-order="Zapad (West)" >Zapad (West) </td><td data-cell-id="C7" data-x="2" data-y="7" data-db-index="7" class="" data-cell-type="text" data-original-value="13,000" data-order="13,000" >13,000 </td><td data-cell-id="D7" data-x="3" data-y="7" data-db-index="7" class="" data-cell-type="text" data-original-value="13,000" data-order="13,000" >13,000 </td><td data-cell-id="E7" data-x="4" data-y="7" data-db-index="7" class="" data-cell-type="text" data-original-value="13,000" data-order="13,000" >13,000 </td><td data-cell-id="F7" data-x="5" data-y="7" data-db-index="7" class="" data-cell-type="text" data-original-value="3,000" data-order="3,000" >3,000 </td><td data-cell-id="G7" data-x="6" data-y="7" data-db-index="7" class="" data-cell-type="text" data-original-value="1.28%" data-order="1.28%" >1.28% </td><td data-cell-id="H7" data-x="7" data-y="7" data-db-index="7" class="" data-cell-type="text" data-original-value="$2,230,630,000,000" data-order="$2,230,630,000,000" >$2,230,630,000,000 </td><td data-cell-id="I7" data-x="8" data-y="7" data-db-index="7" class="" data-cell-type="text" data-original-value="$15,544" data-order="$15,544" >$15,544 </td></tr><tr style="height:px" ><td data-cell-id="A8" data-x="0" data-y="8" data-db-index="8" class="italic" data-cell-type="text" data-cell-format-type="number" data-original-value="2014" data-order="2014" >2014 </td><td data-cell-id="B8" data-x="1" data-y="8" data-db-index="8" class="" data-cell-type="text" data-original-value="Vostok (East)" data-order="Vostok (East)" >Vostok (East) </td><td data-cell-id="C8" data-x="2" data-y="8" data-db-index="8" class="" data-cell-type="text" data-original-value="100,000" data-order="100,000" >100,000 </td><td data-cell-id="D8" data-x="3" data-y="8" data-db-index="8" class="" data-cell-type="text" data-cell-format-type="text" data-original-value="100,000" data-order="100,000" >100,000 </td><td data-cell-id="E8" data-x="4" data-y="8" data-db-index="8" class="" data-cell-type="text" data-cell-format-type="text" data-original-value="155,000" data-order="155,000" >155,000 </td><td data-cell-id="F8" data-x="5" data-y="8" data-db-index="8" class="" data-cell-type="text" data-cell-format-type="text" data-original-value="3,000" data-order="3,000" >3,000 </td><td data-cell-id="G8" data-x="6" data-y="8" data-db-index="8" class="" data-cell-type="text" data-original-value="0.72%" data-order="0.72%" >0.72% </td><td data-cell-id="H8" data-x="7" data-y="8" data-db-index="8" class="" data-cell-type="text" data-original-value="$2,063,660,000,000" data-order="$2,063,660,000,000" >$2,063,660,000,000 </td><td data-cell-id="I8" data-x="8" data-y="8" data-db-index="8" class="" data-cell-type="text" data-original-value="$14,126" data-order="$14,126" >$14,126 </td></tr><tr style="height:px" ><td data-cell-id="A9" data-x="0" data-y="9" data-db-index="9" class="italic" data-cell-type="text" data-cell-format-type="number" data-original-value="2015" data-order="2015" >2015 </td><td data-cell-id="B9" data-x="1" data-y="9" data-db-index="9" class="" data-cell-type="text" data-original-value="Tsentr (Center)" data-order="Tsentr (Center)" >Tsentr (Center) </td><td data-cell-id="C9" data-x="2" data-y="9" data-db-index="9" class="" data-cell-type="text" data-original-value="95,000" data-order="95,000" >95,000 </td><td data-cell-id="D9" data-x="3" data-y="9" data-db-index="9" class="" data-cell-type="text" data-original-value="95,000" data-order="95,000" >95,000 </td><td data-cell-id="E9" data-x="4" data-y="9" data-db-index="9" class="" data-cell-type="text" data-original-value="95,000" data-order="95,000" >95,000 </td><td data-cell-id="F9" data-x="5" data-y="9" data-db-index="9" class="" data-cell-type="text" data-original-value="5,000" data-order="5,000" >5,000 </td><td data-cell-id="G9" data-x="6" data-y="9" data-db-index="9" class="" data-cell-type="text" data-original-value="-2.84%" data-order="-2.84%" >-2.84% </td><td data-cell-id="H9" data-x="7" data-y="9" data-db-index="9" class="" data-cell-type="text" data-original-value="$1,365,870,000,000" data-order="$1,365,870,000,000" >$1,365,870,000,000 </td><td data-cell-id="I9" data-x="8" data-y="9" data-db-index="9" class="" data-cell-type="text" data-original-value="$9,329" data-order="$9,329" >$9,329 </td></tr><tr style="height:px" ><td data-cell-id="A10" data-x="0" data-y="10" data-db-index="10" class="italic" data-cell-type="text" data-cell-format-type="number" data-original-value="2016" data-order="2016" >2016 </td><td data-cell-id="B10" data-x="1" data-y="10" data-db-index="10" class="" data-cell-type="text" data-original-value="Kavkaz (Caucasus)" data-order="Kavkaz (Caucasus)" >Kavkaz (Caucasus) </td><td data-cell-id="C10" data-x="2" data-y="10" data-db-index="10" class="" data-cell-type="text" data-original-value="120,000" data-order="120,000" >120,000 </td><td data-cell-id="D10" data-x="3" data-y="10" data-db-index="10" class="" data-cell-type="text" data-original-value="120,000" data-order="120,000" >120,000 </td><td data-cell-id="E10" data-x="4" data-y="10" data-db-index="10" class="" data-cell-type="text" data-original-value="120,000" data-order="120,000" >120,000 </td><td data-cell-id="F10" data-x="5" data-y="10" data-db-index="10" class="" data-cell-type="text" data-original-value="3,600" data-order="3,600" >3,600 </td><td data-cell-id="G10" data-x="6" data-y="10" data-db-index="10" class="" data-cell-type="text" data-original-value="-0.25%" data-order="-0.25%" >-0.25% </td><td data-cell-id="H10" data-x="7" data-y="10" data-db-index="10" class="" data-cell-type="text" data-original-value="$1,283,160,000,000" data-order="$1,283,160,000,000" >$1,283,160,000,000 </td><td data-cell-id="I10" data-x="8" data-y="10" data-db-index="10" class="" data-cell-type="text" data-original-value="$8,748" data-order="$8,748" >$8,748 </td></tr><tr style="height:px" ><td data-cell-id="A11" data-x="0" data-y="11" data-db-index="11" class="italic" data-cell-type="text" data-cell-format-type="number" data-original-value="2017" data-order="2017" >2017 </td><td data-cell-id="B11" data-x="1" data-y="11" data-db-index="11" class="" data-cell-type="text" data-original-value="Zapad (West)" data-order="Zapad (West)" >Zapad (West) </td><td data-cell-id="C11" data-x="2" data-y="11" data-db-index="11" class="" data-cell-type="text" data-original-value="12,700" data-order="12,700" >12,700 </td><td data-cell-id="D11" data-x="3" data-y="11" data-db-index="11" class="" data-cell-type="text" data-original-value="100,000" data-order="100,000" >100,000 </td><td data-cell-id="E11" data-x="4" data-y="11" data-db-index="11" class="" data-cell-type="text" data-original-value="100,000" data-order="100,000" >100,000 </td><td data-cell-id="F11" data-x="5" data-y="11" data-db-index="11" class="" data-cell-type="text" data-original-value="2,800" data-order="2,800" >2,800 </td><td data-cell-id="G11" data-x="6" data-y="11" data-db-index="11" class="" data-cell-type="text" data-original-value="1.33%" data-order="1.33%" >1.33% </td><td data-cell-id="H11" data-x="7" data-y="11" data-db-index="11" class="" data-cell-type="text" data-original-value="$1,700,000,000,000" data-order="$1,700,000,000,000" >$1,700,000,000,000 </td><td data-cell-id="I11" data-x="8" data-y="11" data-db-index="11" class="" data-cell-type="text" data-original-value="$11,000" data-order="$11,000" >$11,000 </td></tr></tbody></table><!-- /#supsystic-table-1.supsystic-table --></div><!-- /.supsystic-tables-wrap --><!-- Tables Generator by Supsystic --><!-- Version:1.11.1 --><!-- http://supsystic.com/ --><a title="WP Data Tables" style="display:none;" href="https://supsystic.com/plugins/wordpress-data-table-plugin/?utm_medium=love_link" target="_blank">WP Data Tables</a></p>
<p>Given the degree of attention focused on Russia&#8217;s military deployments, it&#8217;s highly unlikely that that Zapad-2017 will escalate into a full-scale or partial military conflict with NATO.</p>
<p>Even though Russia&#8217;s Gross domestic product grew to 2014, its costs grew by 300 percent at the exact same period and the number of war games increased by 157 percent from 2008 to 2014.</p>
<p>It should be noted that this precludes any so-called &#8220;black money&#8221; that would not appear on a publicly available balance sheet.</p>
<h3>Security Analysis: Although Possible; War with NATO is Unlikely.</h3>
<p>The biggest risks stemming from the Zapad drills are possible errors, including stray shots, local attempts to test responses through other measures, moderate or temporary escalation in existing conflict zones (such as in Ukraine, Abkhazia, or South Ossetia).</p>
<p>Additionally, due to regional geopolitical developments in the Russia-Belarus relationship, Russia may attempt to use &#8220;nonlinear&#8221; warfare tactics (asymmetric tactics) in order to further consolidate the Russia-Belarus &#8220;Union State.&#8221;</p>
<p><a href="https://globalsecurityreview.com/zapad-2017-analyzing-troop-numbers-economic-factors/">Zapad-2017: Analyzing Troop Numbers &#038; Economic Factors</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>North Korea Fires Intermediate-Range Ballistic Missile Over Japan</title>
		<link>https://globalsecurityreview.com/north-korea-fires-missile-japan/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Tue, 29 Aug 2017 18:01:43 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[South Korea]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=1874</guid>

					<description><![CDATA[<p>Termed a &#8220;grave threat&#8221; by the Japanese Prime Minister, the newly-unpredictable nature of U.S. policy makes this situation exponentially more dangerous. North Korea has fired a ballistic missile that flew over Japan before plunging into the northern Pacific Ocean, termed a &#8220;grave threat&#8221; by the Japanese prime minister. The South Korean military stated that the missile was [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/north-korea-fires-missile-japan/">North Korea Fires Intermediate-Range Ballistic Missile Over Japan</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Termed a &#8220;grave threat&#8221; by the Japanese Prime Minister, the newly-unpredictable nature of U.S. policy makes this situation exponentially more dangerous.</h2>
<p>North Korea has fired a ballistic missile that flew over Japan before plunging into the northern Pacific Ocean, termed a &#8220;grave threat&#8221; by the Japanese prime minister. The South Korean military stated that the missile was launched just before 6 am local time on Tuesday from the Sunan region of North Korea, near the capital of Pyongyang.  The missile traveled about 2,700 kilometers (1,1677 miles), reaching a max height of 550km, according to a statement issued by South Korea&#8217;s Joint Chiefs of Staff.<br />
[geo_mashup_map]<br />
Experts believe that North Korea used the recently tested Hwasong-12 intermediate-range ballistic missile, the same variant that North Korea has threatened to fire towards the US territory of Guam. Japanese public broadcaster NHK reported that the missile flew across the northern Japanese island of Hokkaido and broke into three pieces before landing in in waters 1,180 kilometers (approximately 733 miles) off the coast of Hokkaido&#8217;s Cape Erimo.</p>
<h3>A Threat to Regional Stability and Security</h3>
<p>The Japanese government&#8217;s J Alert warning system advised individuals In northern Japan to take precautions.  NHK reports that there have been no instances of property damage as the missile fell in the waters over 700 miles from the Hokkaido coast. In a public statement shortly after the launch was reported, the visibly agitated Japanese prime minister Shinzo Abe said the act an unprecedented, severe, and grave threat to the security of Japan, and to overall regional stability.</p>
<p>In a 40-minute phone call between Abe and US President Donald Trump, the two leaders agreed to increase pressure on North Korea further.  Although there have been several recent missile launches by North Korea, a missile passing through the Japanese mainland will be seen as a larger provocation. This will be looked at by Japan, the United States, and South Korea as underscoring the seriousness of the threat posed by North Korea, Abe said.</p>
<h3>Escalating Tensions and Fiery Rhetoric</h3>
<p>Before the launch, tensions have been running higher than usual following an escalation in rhetoric from Mr. Trump towards North Korea, and North Korea&#8217;s statements that it was prepared to firing several missiles towards targets surrounding the US island territory of Guam.</p>
<p>What makes this recent development significant is that this is the first major North Korean test of Donald Trump&#8217;s rhetoric following the speech in which he threatened North Korea with &#8220;fire and fury.&#8221;  Of most concern is the Trump administration&#8217;s response,  as its&#8217; foreign and defense policies are unpredictable, in comparison to previous administrations.  Four South Korean jets bombed a South Korean military training ground on Tuesday in a show of forceful readiness.</p>
<p><a href="https://globalsecurityreview.com/north-korea-fires-missile-japan/">North Korea Fires Intermediate-Range Ballistic Missile Over Japan</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>China, the United States, and the Thucydides Trap</title>
		<link>https://globalsecurityreview.com/china-united-states-thucydides-trap/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Mon, 19 Jun 2017 13:10:27 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Americas]]></category>
		<category><![CDATA[Asia]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[International Security]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=606</guid>

					<description><![CDATA[<p>An Analysis of Great Power Relations in the 21st Century China is a rising power. It is agreed that China has the capabilities to eventually significantly surpass the United States regarding global economic and political power. Chinese posturing in the South China Sea is an attempt to gauge and establish its sphere of influence in [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/china-united-states-thucydides-trap/">China, the United States, and the Thucydides Trap</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>An Analysis of Great Power Relations in the 21st Century</h2>
<p>China is a rising power. It is agreed that China has the capabilities to eventually significantly surpass the United States regarding global economic and political power. Chinese posturing in the South China Sea is an attempt to gauge and establish its sphere of influence in a region that has been long dominated by the United States.</p>
<p>Relations with the U.S. were tested particularly after Trump’s pre-inauguration phone call with the Taiwanese President Tsai Ing-Wen, which flew in the face of 40 years of diplomatic convention.</p>
<p>Trump’s anti-China stance when it comes to trade is questionable. His businesses have partnered with Chinese investors and banks, and his projects have been built using Chinese steel. It’s unlikely that he would risk jeopardizing his children’s—and his own–long-term business interests.</p>
<p>Some argue that the U.S. and China are on the verge of inevitable conflict. This “Thucydides Trap” says that as one power rises, the other declines and the two are destined for inevitable conflict. Statistically, this isn’t a far-fetched concept; only <a href="http://www.theatlantic.com/international/archive/2015/09/united-states-china-war-thucydides-trap/406756/">4 out of 16 prior great-power transitions have not resulted in war</a>.</p>
<h3>Is the Thucydides Trap Inevitable? Not Necessarily.</h3>
<p>In this realist view, China is an irresistable force approaching an immovable object—the United States. The U.S.’s commitment<br />
to the Bretton Woods institutions, alliances, and political structures which have supported its global hegemony, it is argued, is proof of the inevitability of this conflict.</p>
<p>The 45th President of the United States, however, may not be so steadfast in those commitments. Nixon’s overtures to China and its subsequent admission to the U.N. marked an unprecedented shift in U.S. foreign policy. Anti-Communism was rampant, but the interests of capitalism took precedence over political ideology.</p>
<p>In return for access to Chinese markets, the U.S. recognized the People’s Republic of China as the sovereign authority over China, and supported the PRC’s entry into the United Nations, at Taiwan’s expense.</p>
<p>This rapid departure from the status quo served as a jumping-off point for bilateral U.S.-Soviet negotiations. All the while, Nixon utilized his public abhorrence of communism to distract from his use of realpolitik in a way that sharply contrasted with American ideology.</p>
<p>Trump’s continued self-contradiction and erraticism could serve a similar purpose, however unintentionally. The rhetoric on Chinese economic policy, on the surface, made Trump look tough against China during the election. However, following his taking office, Trump and his advisors have been leaning on China for assistance in dealing with North Korea.</p>
<h3>Triangular Diplomacy: a New World Order?</h3>
<p>Many have begun to draw comparison’s between the Trump administration’s foreign policy and Nixon’s model of triangular diplomacy. To incentivize Putin, the U.S. would endorse a consolidation of Russian power in Eastern Europe, the Caucasus and parts of central Asia, recognizing a Russian sphere of influence, and support productive bilateral oil partnerships.</p>
<p>A similar strategy would be deployed with regards to China, with the impetus for them being the arrangements created between Trump and Putin. In this scenario, President Trump utilizes American commitments and the existing global power structure as commodities to transact.</p>
<p>Yes, this is a retreat from the current status quo, but it is not isolationism—it is a restructuring of the global order to accommodate a shift in world power—a crude re-establishment of the triangular diplomacy model employed by Nixon and Kissinger with China and Russia.</p>
<p>At present, the United States seems to be in its last days as the leader of a unipolar international order. Rapid technological advancement is contributing to global economic uncertainty, and international security is increasingly threatened. Global influence is becoming increasingly multipolar. Some degree of flexibility and willingness to adapt in the face of changing norms is obligatory.</p>
<p>Trump may recognize this. He may not. Is he a <a href="http://globalsecurityreview.com/security-policy/madman-theory-2-0-trump-administration-foreign-policy/">madman theorist</a>, or is he just mad? A comparison to Nixon may not be entirely appropriate, as Nixon was a prolific student of political theory and often read up diplomatic history.</p>
<p>However, madman theory dictates that one’s opponent must be entirely convinced of his opponent’s irrationality. President Trump has even managed to convince long-standing American allies of that. Danish foreign minister Kristian Jensen, <a href="http://www.politico.eu/article/danish-minister-donald-trump-changes-opinions-like-others-change-underwear/">when asked about the future of relations with the United States</a>, responded by saying “Donald Trump changes opinions like others change underwear.”</p>
<p><a href="https://globalsecurityreview.com/china-united-states-thucydides-trap/">China, the United States, and the Thucydides Trap</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Escalation on the Korean Peninsula</title>
		<link>https://globalsecurityreview.com/escalation-korean-peninsula/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Mon, 05 Jun 2017 19:20:10 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Americas]]></category>
		<category><![CDATA[Asia]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[International Security]]></category>
		<category><![CDATA[North Korea]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=588</guid>

					<description><![CDATA[<p>Heightened Tensions with North Korea as US Navy Deploys a Third Carrier Strike Group to the Region. Under Trump’s direction, the Department of Defense led by Secretary James Mattis has been given a significant degree of autonomy to operate within. Following a series of missile and nuclear bomb tests in North Korea, Secretary of State [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/escalation-korean-peninsula/">Escalation on the Korean Peninsula</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Heightened Tensions with North Korea as US Navy Deploys a Third Carrier Strike Group to the Region.</h2>
<p>Under Trump’s direction, the Department of Defense led by Secretary James Mattis has been given a significant degree of autonomy to operate within. Following a series of missile and nuclear bomb tests in North Korea, Secretary of State Rex Tillerson stated that the “era of strategic patience is over,” referencing the U.S. North Korea policy under prior administrations.</p>
<p>In April and May of 2017, the U.S. Navy began increasing its forward-deployed military presence in the region, in a show of force to the North. Concurrently, in attempts to call the United States’ “bluff” regarding a pre-emptive strike, North Korea has taken steps to escalate tensions with aggressive anti-American rhetoric and threats of nuclear war and continued weapons tests in defiance of the UN Security Council.</p>
<p>By May, the U.S. Navy had deployed two aircraft carrier strike groups (formerly referred to as battle groups) to the Korean Peninsula—the U.S.S. Ronald Reagan carrier strike group and the U.S.S. Carl Vinson carrier strike group.</p>
<p>By June, the Navy confirmed that a third carrier battle group, led by the U.S.S. Nimitz, was en route to the region. Upon its arrival, the United States’ will have three of its aircraft carrier-led battle groups operating in the vicinity of North Korea, almost 30% of the U.S. carrier fleet.</p>
<h3>How would war involving the U.S. and North Korea play out?</h3>
<p>According to senior Defense Department officials, a conflict on the Korean peninsula would be one of the most violent and devastating combat operations in over a generation. Despite that, allied forces led by the U.S. would be victorious. The high levels of projected casualties stem from the proximity of the South Korean capital of Seoul to the North Korean border.</p>
<p>Seoul is one of the most densely populated metropolitan areas in the world. It lies just over 30 miles from the North Korean border and is well in the range of the hundreds of artillery and missile batteries that the North has stationed just north of the demilitarized zone.</p>
<p>South Korea has approximately 625,000 active-duty troops and another 3.1 million troops on reserve. While North Korea has roughly twice those numbers, their equipment is highly outdated, albeit augmented by an asymmetric nuclear capability.</p>
<h3>What are the risks and consequences of a pre-emptive strike on the North?</h3>
<p>Minor equipment or troop movements on the South Korean border can spark aggression from the North. Therefore, American, South Korean, and Japanese forces preparing to launch a pre-emptive strike would need to do so clandestinely, to catch North Korean forces off-guard.</p>
<p>In this scenario, major military, nuclear research, bunkers, and weapons depots would be targeted, with marines and special forces being deployed from carriers and amphibious assault ships off the North Korean coast. Such an operation would need to be executed swiftly, and with overwhelming force.</p>
<p>Otherwise, risk larger numbers of civilian casualties that would result from an attack—conventional or nuclear—on the Seoul metropolitan area should the North maintain the capability to launch such offense after a pre-emptive strike.</p>
<h3>The China Option: Regime Change or Diplomacy</h3>
<p>Trump’s attraction to authoritarian heads-of-state could very well lead to a negotiated settlement, or at the very least, some form of detente. China publicly favors a diplomatic solution to the crisis. Alternatively, Chinese political and military leaders may decide that it’s in China’s strategic interest to support or execute a regime change in North Korea.</p>
<p>Economically, the West has much more to offer China than North Korea does. However, China remains wary of uncontrolled destabilization in North Korea as it would likely lead to an unprecedented humanitarian crisis, with high numbers of refugees flooding into China.</p>
<p><a href="https://globalsecurityreview.com/escalation-korean-peninsula/">Escalation on the Korean Peninsula</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Is Russia Preparing for War with NATO and the West?</title>
		<link>https://globalsecurityreview.com/russia-preparing-war-nato-west/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Sat, 13 May 2017 22:45:00 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Estonia]]></category>
		<category><![CDATA[Latvia]]></category>
		<category><![CDATA[Lithuania]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">https://global-security-brief.com/?p=423</guid>

					<description><![CDATA[<p>Analyzing Discourse, Russian Military Exercises and Troop Movements Domestically and in Russia&#8217;s &#8220;Near-Abroad&#8221; A question facing foreign policy experts the world over is whether or not the Russian Federation is preparing for war. The query involves a consideration of how the movement of Russian troops, currently and historically, may lend insights into the intentions of [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/russia-preparing-war-nato-west/">Is Russia Preparing for War with NATO and the West?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Analyzing Discourse, Russian Military Exercises and Troop Movements Domestically and in Russia&#8217;s &#8220;Near-Abroad&#8221;</h2>
<p>A question facing foreign policy experts the world over is whether or not the Russian Federation is <a href="http://nationalinterest.org/blog/the-buzz/russia-preparing-war-17716">preparing for war</a>. The query involves a consideration of how the movement of Russian troops, currently and historically, may lend insights into the intentions of Moscow when it comes to the question of military action in or against other nations.</p>
<h3>Is the Crimean Annexation a Harbinger for Further Russian Aggression?</h3>
<p>The Russian Federation and its predecessors have long been involved in military action involving Crimea. The first major military operation occurred in the last century of the Russian Empire and was aptly named the <a href="http://www.bbc.co.uk/history/british/victorians/crimea_01.shtml">Crimean War</a>, lasting from 1853 to 1856. The rationale Czar Nicolas I utilized in trying to militarily seize Crimean territory in the middle of the 19th century was quite like the argument advanced by Russian Federation President Putin in the 21st century. Both leaders contended individuals of Russian descent living in the Crimean Peninsula needed to be protected.</p>
<p>Since the Crimean War, the <a href="http://www.history.com/topics/british-history/crimean-war">peninsula has been in and out of Russian control</a>, including being fully engulfed into the now-defunct Soviet Union. The Crimean people gained independence from the Soviet with the liberation of Ukraine from the USSR with the Declaration of State Sovereignty on July 16, 1990, by the newly constituted Ukrainian Parliament.</p>
<p>Full Crimean integration with Ukrainian State following the declaration of independence from the USSR lasted about 15 years. On February 23, 2014, Russian President Putin initiated steps to annex the Crimean Peninsula, using the Russian military. In contemplating whether the events in the Crimean Peninsula serve as a harbinger of what may occur in the not too distant future, a look at Russian military troop movements after February 23, 2014, is illustrative.</p>
<p><figure id="attachment_138" aria-describedby="caption-attachment-138" style="width: 1024px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-large wp-image-138" src="https://global-security-brief.com/wp-content/uploads/2017/04/crimea-945778-1-1024x461.jpg" alt="2 Russian special operatives in crimea" width="1024" height="461" srcset="https://globalsecurityreview.com/wp-content/uploads/2017/04/crimea-945778-1-1024x461.jpg 1024w, https://globalsecurityreview.com/wp-content/uploads/2017/04/crimea-945778-1-300x135.jpg 300w, https://globalsecurityreview.com/wp-content/uploads/2017/04/crimea-945778-1-768x346.jpg 768w, https://globalsecurityreview.com/wp-content/uploads/2017/04/crimea-945778-1-1536x692.jpg 1536w, https://globalsecurityreview.com/wp-content/uploads/2017/04/crimea-945778-1-2048x922.jpg 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption id="caption-attachment-138" class="wp-caption-text"><em>Russian special forces in Crimea. Sometimes called &#8220;little green men,&#8221; they were one of the offensive &#8220;columns&#8221; that resulted in their annexation of Crimea from Ukraine.</em></figcaption></figure></p>
<p>The first step President Putin took to <a href="https://ironline.american.edu/russias-annexation-crimea/">annex the Crimean Peninsula</a> was the movement of Russian maritime forces from the naval base at Sevastopol to what international observers considered provocative positions in the Black Sea, which surrounds much of the peninsula. The second step of President Putin in the annexation process was to infiltrate not only the Crimean Peninsula but other Ukrainian territories as well with unmarked Russian ground and special forces, in addition to a number of intelligence officers from GRU (Russian military intelligence) and the FSB/FIS (the domestic and foreign intelligence services that succeeded the Soviet KGB).</p>
<p>Within a matter of a couple of weeks of the Russian Army advancing notoriously into the Crimean Peninsula, a hastily called <a href="https://ironline.american.edu/russias-annexation-crimea/">referendum was called among the Crimean population</a>. On March 16, 2014, an announcement was made that a fully 97 percent of voters in the Crimean Peninsula voted to join the Russian Federation. A so-called treaty of accession was executed bringing the Crimean Peninsula into the Russian Federation over the objectives of the Ukrainian government and the United Nations, NATO, and a multitude of individual nations.</p>
<h3>The Baltics in the Aftermath of the Crimean Annexation Into the Russian Federation</h3>
<p>In the immediate aftermath of the Crimean annexation into the Russian Federation, the <a href="http://www.atlanticcouncil.org/blogs/natosource/polish-and-baltic-leaders-concerned-about-upcoming-russian-war-games">trio of leaders of the Baltic nations sounded alarmed</a>. The leaders of Lithuania, Latvia, and Estonia, all stated without equivocation that they anticipated the Russian Federation making military moves into their territories in the future. The leaders of Baltic republics were united in announcing they, in fact, believed Russian military aggression in Ukrainian and Crimean territory was, in fact, a <a href="https://www.washingtonpost.com/world/europe/near-russias-border-with-the-baltics-soldiers-on-both-sides-are-practicing-for-war/2016/07/01/5a1ea29c-2775-11e6-98ad-1e25d68f2760_story.html?utm_term=.6641b60fbd7a">harbinger of war to come throughout the Baltics</a>.</p>
<h3>The Russian Federation and Former Warsaw Pact Nations</h3>
<p>Following Russian military action on the Crimean Peninsula, some leaders of former Warsaw Pact nations expressed alarm that they believed that their countries were to be <a href="http://www.telegraph.co.uk/news/worldnews/1560604/Putin-praises-strength-of-Warsaw-Pact-2.html">targeted by the Russian Federation</a>, and its leader, President Putin. The government of Poland was particularly strident in voicing its concerns about the potential for Russian military action against its frontiers.</p>
<p>Many analysts attribute the alarms that sounded in some former Warsaw Pact national capitals to the removal by the United of defensive armament systems out of nations like Poland and the Czech Republic by order of the Obama Administration. The fact that many Warsaw Pact countries had actual experience with Soviet tanks rolling across their borders during the Cold War added to the heightened sense of apprehension across much of Eastern Europe.</p>
<p>As will be discussed more fully later in this analysis, the so-called <a href="http://foreignpolicy.com/2016/12/09/the-russian-reset-that-never-was-putin-obama-medvedev-libya-mikhail-zygar-all-the-kremlin-men/">Russian Reset</a> of the Obama Administration, coupled with the theory of &#8220;<a href="http://www.newyorker.com/news/news-desk/leading-from-behind">lead from behind</a>,&#8221; left Eastern European leaders feeling more vulnerable to Russian military excursions, or even widespread war, than at any time since leaving the Soviet orbit.</p>
<p>In fact, Russian military exercises did not focus with any great specificity on any former Warsaw Pact nation. On the other hand, the rhetoric of President Putin about reintegrating former Soviet Republics back into the Russian sphere started to extend further to encompass the idea of restoring Warsaw Pact nations into a Moscow lead alliance.</p>
<p>The tensions involving Eastern European, or former Warsaw Pact, nations eased a bit when the Obama Administration took steps to replace defensive weapons systems back in some of these countries during the latter years of President Obama&#8217;s second term. In addition, the seemingly more hardline approach to military excursions by different nations of U.S. President Donald Trump seems to have calmed nerves in Eastern European capitals, at least for the time being.</p>
<h3>The Russian Federation and Syria</h3>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-387 size-large" src="https://global-security-brief.com/wp-content/uploads/2017/05/syria-1034467_1920-e1494713818740-1024x481.jpg" alt="" width="1024" height="481" srcset="https://globalsecurityreview.com/wp-content/uploads/2017/05/syria-1034467_1920-e1494713818740-1024x481.jpg 1024w, https://globalsecurityreview.com/wp-content/uploads/2017/05/syria-1034467_1920-e1494713818740-300x141.jpg 300w, https://globalsecurityreview.com/wp-content/uploads/2017/05/syria-1034467_1920-e1494713818740-768x361.jpg 768w, https://globalsecurityreview.com/wp-content/uploads/2017/05/syria-1034467_1920-e1494713818740.jpg 1603w" sizes="(max-width: 1024px) 100vw, 1024px" />The actions of the Russian Federation in regard to the civil war in Syria and terrorist infiltration in that Middle Eastern country does provide clues on whether Moscow is preparing for war. Overall,<a href="http://www.cnn.com/2015/09/30/politics/russia-syria-airstrikes-isis/index.html"> Moscow has ignored admonitions regarding its involvement in Syria</a>, including the manner in which it is using its own military and intelligence forces to support the Syrian regime.</p>
<p>Some analysts have concluded that the Russian presence in Syria is designed in part to bring that nation into its sphere of influence or even control. However, many of these same analysts also contend that Syria is serving as something of a proving ground in which Moscow is <a href="https://www.theguardian.com/world/2017/apr/08/russia-sends-warship-syrian-coast">testing the extent to which it can act militarily</a> in another nation without a counter-push from other nations, specifically the United States.</p>
<p>On some level, this is a reexamination of the Soviet foray into Afghanistan in the 1980s. Initially, the Soviets acted with little response from the United States, or any other nation, in Afghanistan. In the end, surreptitious U.S. involvement in Afghanistan, through groups like the Mujahedeen and nations like the Kingdom of Saudi Arabia, resulted in the withdrawal of the Soviet Union from Afghanistan.</p>
<h3>The Russian Federation and Iran</h3>
<p>A similar proving ground for the Russian Federation is also in place in Iran, some analysts would argue. The Russian Federation was highly influential in forcing the conclusion of the <a href="https://www.forbes.com/sites/realspin/2016/10/05/iran-russia-relations-post-nuclear-deal/">multi-state nuclear agreement</a>.</p>
<p>In point of fact, the content of that agreement, to which the United States via the Obama Administration, became a signatory party. The Russian Federation is now positioned to use that same agreement, and Iran more generally, as means of testing U.S. resolve in light of the new presidential administration.</p>
<h3>The Russian Federation and the United States</h3>
<p>In the current geopolitical climate, the posture of the United States vis-à-vis the Russian Federation remains the primary blockade to further Russian military aggression. The Russian Federation has been engaged in measures designed to test the resolve of the United States regarding desired military adventurism, or regional war, on the part of Moscow.</p>
<p>The reality is that many foreign policy experts expressed surprise that Moscow did not <a href="https://ironline.american.edu/russias-annexation-crimea/">push further into Ukrainian territory</a>, and perhaps even move into the Baltic States, while Barack Obama was in office. The Russian Federation overall faced little meaningful opposition from the United States when it claimed the Crimean Peninsula, acted in Syria militarily and engaged in extensive machinations in regard to the Iranian nuclear deal.</p>
<p>With the accession of the <a href="https://www.theguardian.com/us-news/trump-administration">Trump Administration</a> in the United States, the Russian Federation is forced to test the boundaries again of what it can and cannot do with impunity when it comes to military action and blowback from the United States. Presently, it is the perceived unpredictability of the Trump Administration that may be giving the Russian Federation pause when it comes to military adventures in limited theaters.</p>
<p>As an aside, Moscow appears to be testing these boundaries through the use of both its Navy and Air Force. Moscow has engaged in somewhat provocative encounters with U.S. military forces with Air Force flybys and naval exercises.</p>
<h3>Russian Snap Military Exercises: The Dangers of <a href="http://nationalinterest.org/blog/the-buzz/russia-preparing-war-17716">Whole Government Drills</a></h3>
<p>The actions of the Russian Federation concerning the Crimean Peninsula are not seen as the only signs that Moscow may be laying the foundation for a broader war. Contributing to this concept that Moscow may be preparing for war is also found in the ever-increasing number and size of <a href="http://www.newsweek.com/russian-snap-military-drill-could-turn-quick-assault-baltic-capital-308752">Russian snap military exercises</a>. Snap military exercises are those that are called without any sort of real warning.</p>
<p>What is most troubling about Russian snap military exercises since the Crimean annexation is not just the increase in their frequency nor the ever-enlarged number of troops of all types being involved in these exercises. The major red flag regarding Russian military intentions is the fact that these snap exercises have become whole government exercises. In other words, these snap &#8220;military&#8221; exercises have become something far more intensive and all-encompassing. They have become designed to place the entirety of the Russian military and government on a war footing for the purposes of these drills.</p>
<p>Historically, this level of military focuses, war focused, exercises that involve a nation&#8217;s government more fully tend to be indicative of a regime intent on mounting an offensive attack in the not too distant. Historically, <a href="http://nationalinterest.org/blog/the-buzz/russia-preparing-war-17716">whole government military</a> exercises were seen with increasing regularity on the eves of the First and Second World Wars.</p>
<p>As an aside, few foreign affairs analysts believe that even if the Russian Federation is moving towards even more of a war footing that the regime headed by President Putin intends anything like a globalized conflict. Rather, most analysts conclude that the Russian Federation under President Putin has its sights on the Baltic states, Ukraine, and perhaps some other former Soviet Republics.</p>
<h3>Why Moscow Would Launch a Military Strike</h3>
<p>President Putin has made it clear that he supports the proposition that the <a href="http://time.com/4276525/vladimir-putin-nato/">Russian Federation expand</a> and incorporate former Soviet Republics into a sphere of control under the heels of Moscow. The Russian Federation President has made this clear both in his rhetoric and in his military forays, particularly in the Ukrainian theater and on the Crimean Peninsula.</p>
<p>In the final analysis, Moscow may strike militarily if two conditions are met. First, the target of military action must be in the sights of the Russian Federation President himself. Second, there must be some assurance in Moscow that other nations, and particularly the NATO alliance and the United States, lack the resolve to take on the Russian Federation militarily in <a href="http://nationalinterest.org/blog/the-buzz/russia-preparing-war-17716">limited theater military conflicts</a>.</p>
<h3>How Moscow May Strike</h3>
<p>Moscow is not likely to wage a widespread battle of any sort. Rather, if the country moves forward with military action, it will be sharply focused on specific theaters. These theaters are likely to be Ukrainian territory, the Baltic States, and perhaps in the Middle East.</p>
<h3>What to Reasonably Expect in Regard to Russian Military Action in the More Immediate Future</h3>
<p>Russia garners significant military advantages through the warm water ports of the Crimean Peninsula and the Ukrainian Republic. Similarly, the Russian Federation collects definite strategic advantages if it were to take direct control over the Baltic States.</p>
<p>Should Moscow elect to seize political control of the sovereign baltic states, the result would be significant international instability. For example, the movement of the Russian Federation into the Baltic States would—theoretically—trigger a response from the NATO Alliance as required by article five (5) of the North Atlantic Treaty; an attack on one member of NATO is an attack on all members. The same treaty obligation does not exist in regard to Ukrainian territories because that nation is not part of NATO.</p>
<p>When it comes to the likelihood of the Russian Federation going to war, the likelihood of further military action by Moscow in <a href="http://nationalinterest.org/blog/the-buzz/russia-preparing-war-17716">Ukrainian territory</a> is likely. In fact, some well-regarded foreign policy analysts actually express some level of surprise that President Putin has not made further, more blatant military moves within Ukrainian territory.</p>
<p>The <a href="https://www.nytimes.com/2017/01/01/us/politics/us-baltic-russia.html?_r=0">Baltic States</a> present a bit of a different story when it comes to evaluating whether, when, and where the Russian Federation may elect to go to war or engage in more overt military action. The potential for NATO response has already been noted. In addition to that, the newly-elected U.S. President presents the Russian President and military leaders with something of an unknown.</p>
<p>Despite social media being ablaze with allegations of <a href="https://www.theguardian.com/us-news/2017/mar/20/fbi-director-comey-confirms-investigation-trump-russia">collusion between Trump advisors and Russia</a>, actual facts supporting much of anything in that regard is largely circumstantial, at least thus far. In any case, it is clear that the Russian government really cannot know what to expect from President Trump when it comes to any campaign to incorporate the Baltic States into a larger Russian Federation.</p>
<p>The early days of the Administration of U.S. President Richard Nixon are illustrative concerning the Russian Federation, military action, and the Baltic States. Not long after President Nixon took office, his then-National Security Advisor Henry Kissinger met with him in the Oval Office. Kissinger advised President Nixon that many world leaders, including the leadership of the Soviet Union, thought <a href="http://nsarchive.gwu.edu/nukevault/ebb517-Nixon-Kissinger-and-the-Madman-Strategy-during-Vietnam-War/">President Nixon was unpredictable, if not crazy</a>.</p>
<p>President Nixon is said to have smiled at his National Security Advisor, and responded &#8220;good.&#8221; President Nixon believed that foes of the United States who were uncertain about how the new President would respond to military aggression because he was considered unpredictable, actually played in favor of the United States and overall world peace.</p>
<p>The same sense of uncertainty is in the air when it comes to President Trump and many world leaders, including President Putin. There simply is no clarity on how President Trump might respond to even some type of limited offensive movement of Russian troops. This may serve as a sort of military aggression breakwater, at least for the time being.</p>
<h3>Moscow&#8217;s Pursuit of Limited Theater War</h3>
<p>In the final analysis, Moscow likely is preparing for <a href="http://www.realclearpolitics.com/articles/2007/08/limited_war_vs_total_war.html">limited theater war</a>. This includes planning for further military action in the <a href="http://nationalinterest.org/blog/the-buzz/russia-preparing-war-17716">Ukrainian theater</a>. Such action in the Ukrainian theater might include a direct more by Moscow on the so-called Donetsk People&#8217;s Republic, which is the greater Ukrainian theater. It might also include a similar Russian military movement into Donbas, which is also part of Ukrainian theater. The Russian Federation could engulf these areas in much the same way it took the Crimean Peninsula, slowly eating away at Ukrainian sovereignty.</p>
<p>Moscow&#8217;s thirst for limited theater war also includes planning to move on Latvia, Lithuanian, and Estonia. Finally, but less certainly, is the potential for more active military action by the Russian Federation in the Middle East. NATO, the United States, and European powers are <a href="https://global-security-brief.com/russia/russias-plausible-deniability-in-the-hybrid-war-in-ukraine/">not legally obligated to intervene</a> as elements of the military, criminal, and security services of the Russian Federation violate the sovereignty of Ukraine. However, any attempted Russian military offensive on one or all of the three Baltic states would likely lead to the invoking of Article 5. As such, an appropriate and overwhelming response by NATO, the EU, and the United States is essential. It is necessary to demonstrate the integrity and resolve of the NATO alliance, the European Union, and the United States.</p>
<p><a href="https://globalsecurityreview.com/russia-preparing-war-nato-west/">Is Russia Preparing for War with NATO and the West?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Russia&#8217;s Justification for the Annexation of Crimea</title>
		<link>https://globalsecurityreview.com/russias-legal-plausible-justification-for-the-annexation-of-crimea/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Fri, 07 Apr 2017 23:47:52 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Crimea]]></category>
		<category><![CDATA[Military Strategy]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Ukraine]]></category>
		<guid isPermaLink="false">http://globalsecuritybrief.com/?p=118</guid>

					<description><![CDATA[<p>Failure to act by NATO, UN, or Western powers made Russia&#8217;s non-linear invasion and subsequent annexation of Crimea legal. Russian-propagated disinformation campaigns, psychological manipulation efforts, cyber attacks on critical infrastructure, financial and military aid to paramilitary groups, and the deployment of unmarked special forces by Russia in Crimea and later in Eastern Ukraine exemplifies the concept of contemporary non-linear conflict. [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/russias-legal-plausible-justification-for-the-annexation-of-crimea/">Russia&#8217;s Justification for the Annexation of Crimea</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Failure to act by NATO, UN, or Western powers made Russia&#8217;s non-linear invasion and subsequent annexation of Crimea legal.</h2>
<p>Russian-propagated disinformation campaigns, psychological manipulation efforts, cyber attacks on critical infrastructure, financial and military aid to paramilitary groups, and the deployment of unmarked special forces by Russia in Crimea and later in Eastern Ukraine exemplifies the concept of contemporary non-linear conflict. Rather than proceeding in strategic, iterative steps, the various elements of the Russian strategy worked in tandem to complement one another.</p>
<p>Russia’s annexation of Crimea and subsequent incursion into eastern Ukraine was launched on the pretext of protecting ethnic Russians and Russian speakers in the region. Russian media outlets and pro-Russian media in Ukraine began broadcasting continuous reports of anti-Russian violent demonstrations in Ukraine and that the security of the ethnic Russian population in Ukraine was in jeopardy.</p>
<p>The manner with which the Kremlin created the “conditions” for intervention is not dissimilar to those utilized by the Bush Administration prior to the 2003 invasion of Iraq. As the public would eventually learn, the administration had misled the congress and military about the possession of WMDs by Iraqi dictator Saddam Hussein. This mistruth was the impetus for over a decade of bloody conflict that the administration was ill-prepared for.</p>
<p>The invasion was accomplished with great efficiency, but the Bush administration had failed to conceive a viable exit strategy. The occupation forces purged the entire bureaucratic state of the previously ruling Ba’ath party.</p>
<p>This purge created post-occupation conditions rife for corruption, disorder, and insurgency as a result of the critical shortage of experienced politicians and bureaucrats. The dismantling of the administrative and political structures that existed prior to the invasion left the country almost entirely bereft of adequate internal security measures.</p>
<p>By contrast, the Crimean annexation was masterfully executed by Russia; in no small part due to the Kremlin’s plan for integrating Crimea with greater-Russia. As the first wave of the “assault” was underway, the Russian legislature (the Duma) passed legislation that would make federal districts out of the territory of Crimea and city of Sevastopol (the location of Russia’s long-held Black Sea naval base).</p>
<p><figure id="attachment_138" aria-describedby="caption-attachment-138" style="width: 3008px" class="wp-caption alignleft"><img loading="lazy" decoding="async" class="wp-image-138 size-full" src="http://globalsecurityreview.com/wp-content/uploads/2017/04/crimea-945778-1.jpg" alt="2 Russian special operatives in crimea" width="3008" height="1355" srcset="https://globalsecurityreview.com/wp-content/uploads/2017/04/crimea-945778-1.jpg 3000w, https://globalsecurityreview.com/wp-content/uploads/2017/04/crimea-945778-1-300x135.jpg 300w, https://globalsecurityreview.com/wp-content/uploads/2017/04/crimea-945778-1-768x346.jpg 768w, https://globalsecurityreview.com/wp-content/uploads/2017/04/crimea-945778-1-1024x461.jpg 1024w, https://globalsecurityreview.com/wp-content/uploads/2017/04/crimea-945778-1-1536x692.jpg 1536w, https://globalsecurityreview.com/wp-content/uploads/2017/04/crimea-945778-1-2048x922.jpg 2048w" sizes="(max-width: 3008px) 100vw, 3008px" /><figcaption id="caption-attachment-138" class="wp-caption-text">Russian special forces in Crimea. Sometimes called &#8220;little green men,&#8221; they were one of the offensive &#8220;columns&#8221; that resulted in their annexation of Crimea from Ukraine.</figcaption></figure></p>
<p>In addition to their non-traditional “invasion,” the Russian forces made considerable and effective use of information warfare, cyber warfare, local militia, and protestors, combined with unmarked elite special forces units to foment a political coup within the autonomous territory. The new government then passed a seemingly “democratic” referendum in the Crimean parliament to formally request to join the Russian Federation. Coincidentally, the Parliament was surrounded by Russian “little green men;” special forces in unmarked uniforms.</p>
<hr />
<pre class="snippet"><code>Photo credit: <a href="https://www.flickr.com/photos/hinkelstone/15242883216/">quapan</a> via <a href="https://visualhunt.com/re/c8c227">VisualHunt</a> / <a href="http://creativecommons.org/licenses/by/2.0/">CC BY</a></code></pre>
<p><a href="https://globalsecurityreview.com/russias-legal-plausible-justification-for-the-annexation-of-crimea/">Russia&#8217;s Justification for the Annexation of Crimea</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
