<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Topic:command and control &#8212; Global Security Review %</title>
	<atom:link href="https://globalsecurityreview.com/subject/command-and-control/feed/" rel="self" type="application/rss+xml" />
	<link>https://globalsecurityreview.com/subject/command-and-control/</link>
	<description>A division of the National Institute for Deterrence Studies (NIDS)</description>
	<lastBuildDate>Mon, 29 Dec 2025 13:05:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://globalsecurityreview.com/wp-content/uploads/2023/10/cropped-GSR-Banner-LogoV2-32x32.png</url>
	<title>Topic:command and control &#8212; Global Security Review %</title>
	<link>https://globalsecurityreview.com/subject/command-and-control/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Hacking the Apocalypse: How Cyberattacks Could Trigger Nuclear Escalation</title>
		<link>https://globalsecurityreview.com/hacking-the-apocalypse-how-cyberattacks-could-trigger-nuclear-escalation/</link>
					<comments>https://globalsecurityreview.com/hacking-the-apocalypse-how-cyberattacks-could-trigger-nuclear-escalation/#respond</comments>
		
		<dc:creator><![CDATA[Gilles A. Paché]]></dc:creator>
		<pubDate>Mon, 29 Dec 2025 13:05:26 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[attribution]]></category>
		<category><![CDATA[command and control]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[critical vulnerabilities]]></category>
		<category><![CDATA[cyber deterrence]]></category>
		<category><![CDATA[Cyberattacks]]></category>
		<category><![CDATA[Cyberspace]]></category>
		<category><![CDATA[deconfliction mechanisms]]></category>
		<category><![CDATA[democratic regimes]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[escalation]]></category>
		<category><![CDATA[gray zone]]></category>
		<category><![CDATA[irregular warfare]]></category>
		<category><![CDATA[non-state actors]]></category>
		<category><![CDATA[nuclear doctrine]]></category>
		<category><![CDATA[nuclear escalation]]></category>
		<category><![CDATA[nuclear threshold]]></category>
		<category><![CDATA[offensive cyber capabilities]]></category>
		<category><![CDATA[proportionality]]></category>
		<category><![CDATA[second-strike capability]]></category>
		<category><![CDATA[strategic cyberattacks]]></category>
		<category><![CDATA[strategic stability]]></category>
		<category><![CDATA[strategic threats]]></category>
		<category><![CDATA[vital infrastructure]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32056</guid>

					<description><![CDATA[<p>Many of the world’s strategists still share the same conviction: as Kathryn Bigelow’s film A House of Dynamite (2025) dramatizes, nuclear escalation can only originate from a missile of unknown origin heading straight for Chicago. Yet, this old “Cold War” vision no longer seems entirely relevant. As cyberattacks target critical infrastructure, a long-taboo question arises: [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/hacking-the-apocalypse-how-cyberattacks-could-trigger-nuclear-escalation/">Hacking the Apocalypse: How Cyberattacks Could Trigger Nuclear Escalation</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Many of the world’s strategists still share the same conviction: as Kathryn Bigelow’s film <em>A House of Dynamite</em> (2025) dramatizes, nuclear escalation can only originate from a missile of unknown origin heading straight for Chicago. Yet, this old “Cold War” vision no longer seems entirely relevant. As cyberattacks target critical infrastructure, a long-taboo question arises: how far can we tolerate digital offensives that paralyze a country or manipulate an election before considering a nuclear response? What if the most dangerous attack to unfold in the late 2020s originates not from a silo, but from a single line of code?</p>
<p><strong>Cyber Shockwaves</strong></p>
<p>Imagine a simple piece of computer code shutting down nuclear power plants, paralyzing transportation networks, and disrupting <a href="https://www.armscontrol.org/act/2019-11/features/cyber-battles-nuclear-outcomes-dangerous-new-pathways-escalation">vital military systems</a>. For more than a decade, cyberattacks against critical infrastructure have been more than just intrusions; they can have effects comparable to those of conventional acts of war, and threatening global stability. For nuclear democracies, the question has become crucial: at what point does a digital incident cross the threshold of severity required to trigger deterrence calculations, or even justify a nuclear response?</p>
<p>Cyberspace is now a theater of constant confrontation where adversaries seek to undermine each other’s trust, disrupt economies, and test resilience. This invisible competition weakens traditional deterrence mechanisms, which rely on clear signals. In cyberspace, nothing is clear, with uncertain effects and often unintentional escalation. Yet, the potential damage of a sophisticated cyberattack against an electrical grid or supply chains could <a href="https://www.mdpi.com/1424-8220/23/8/4060">exceed that of a conventional bombing</a>. The problem stems from three major developments.</p>
<p><strong>Critical Weak Spots</strong></p>
<p>The first development is the <em>increasing vulnerability of critical infrastructure</em>, whose technical complexity creates countless points of <a href="https://www.gao.gov/blog/securing-u.s.-electricity-grid-cyberattacks">weakness</a>. Hospitals, refineries, water distribution systems, and railway networks rely on technologies that are sometimes outdated and rarely protected against determined state and non-state actors. A coordinated and simultaneous attack against multiple sectors could severely paralyze a country for weeks to months, causing economic chaos and widespread social disruption.</p>
<p>The second development concerns the <em>strong integration of cyberspace and nuclear power</em>. Command, control, and communication systems have become more digital than ever, and thus more <a href="https://www.ceeol.com/search/article-detail?id=1306879">exposed to cyberattacks</a>. Even a non-destructive intrusion, subtly targeted and difficult to detect, could be interpreted as an attempt to undermine the capacity to retaliate. In such cases, the precise or approximate perception of risk becomes as dangerous as the attack itself, amplifying the potential for misunderstandings and unintentional escalation.</p>
<p>The third development, finally, is the <em>bolder behavior of adversaries of democratic regimes</em>, who use cyberspace as a tool for exerting pressure without incurring significant costs. Who would doubt that Russia, China, North Korea, and Iran regularly demonstrate their ability to disrupt the institutions of democratic regimes? The relative success of their operations encourages them to <a href="https://www.ccdcoe.org/uploads/2025/07/Tkachuk_N_Tallinn_Paper_15_Ukraine-as-the-Frontline-of-European-Cyber-Defence.pdf">push the boundaries even further</a>, as they are aware of the existence of a “gray zone” where traditional deterrence does not fully apply.</p>
<p>These major transformations lead to a fundamental question: should democracies clarify as quickly as possible that certain cyberattacks could cross a threshold triggering a major military response, including nuclear? The objective of a new doctrine would then not be to lower the nuclear threshold, but to re-establish a credible and robust level of deterrence. Because if adversaries believe that cyberattacks are “zero-cost,” they will continue to systematically target vital infrastructure, exploiting critical vulnerabilities with impunity and minimal risk to themselves.</p>
<p><strong>Strategic High Stakes</strong></p>
<p>A first argument for clarifying the doctrine rests on proportionality: a massive cyberattack targeting critical infrastructure could have consequences comparable to a bombing. In this context, it would be consistent to specify that the response is not limited to conventional means. Analysts point out that U.S. nuclear doctrine already considers the possibility of devastating consequences from non-nuclear strategic attacks, and they believe that the nuclear threat is not explicitly excluded, even if the <a href="https://apps.dtic.mil/sti/html/trecms/AD1182360/"><em>no-first-use</em> scenario remains dominant</a>.</p>
<p>A second argument concerns strategic stability. Today, adversaries regularly stress the defenses of democratic regimes in the “gray zone,” without immediate risk of escalation. Clarifying the rules of engagement and explicitly integrating cyberspace into strategic thinking could strengthen deterrence and limit adversarial gambles in this gray zone. The United States, the United Kingdom, and France could thus reduce uncertainty regarding the potential consequences of sophisticated cyberattacks, one form of <a href="https://irregularwarfarecenter.org/wp-content/uploads/20230111_Perspectives_No_2.pdf">irregular warfare</a>, while emphasizing that any major offensive would have significant repercussions.</p>
<p>A third argument concerns the protection of nuclear command. Even a limited attack on control systems could be interpreted as an attempt to neutralize the second-strike capability, creating an extreme risk of miscalculation, especially with the <a href="https://www.europeanleadershipnetwork.org/wp-content/uploads/2023/11/AVC-Final-Report_online-version.pdf">increasing use of artificial intelligence</a>. By clearly announcing that such an intrusion would be considered a serious and unacceptable act, democratic regimes would strengthen their strategic stability, discouraging any hostile action and reducing the risk of unintentional escalation during times of international crisis.</p>
<p><strong>Perilous Lines</strong></p>
<p>This doctrinal shift, however, carries significant risks, notably the unintentional lowering of the nuclear threshold. Even if the clarification primarily aims to strengthen deterrence, it could be perceived as an excessive threat by non-democratic States, prompting them to rapidly modernize their nuclear arsenals or develop sophisticated offensive cyber capabilities. The proliferation of <a href="https://www.army.mil/article/288840/the_role_of_cyber_conflict_in_nuclear_deterrence">cyber threats</a> with potentially physical effects creates a low-profile but ultimately strategic space for competition, paradoxically exacerbating tensions and instability.</p>
<p>Responding to a cyberattack with a nuclear strike requires absolute certainty as to its true perpetrator. Yet, operations in cyberspace often involve <a href="https://apps.dtic.mil/sti/html/tr/ADA602150/">proxies, opaque international relays, and technical masking of the source</a>. An attribution error could have profound consequences. Additionally, a cyber intrusion seen as preparation for a major attack might provoke an overreaction during a crisis. Any doctrine that includes the possibility of a nuclear response must therefore incorporate rigorous <em>deconfliction mechanisms</em>, otherwise the worst will happen.</p>
<p>However, these risks should not obscure a strategic reality: current doctrine dates to a time when cyberattacks could not paralyze a country in minutes. This is no longer the case. Adversaries of democratic regimes have understood that cyberspace offers them a means of inflicting considerable damage while remaining below the threshold for a nuclear response. Doing nothing would amount to accepting a structural vulnerability, especially since middle ground is emerging. This involves explicitly defining two categories of cyberattacks likely to trigger an appropriate military response:</p>
<ol>
<li>Attacks causing massive impacts on the civilian population or critical infrastructure (hospitals and emergency services, water distribution networks, etc.).</li>
<li>Intrusions targeting the command systems of the armed forces, even without destructive effects, with the aim of degrading a country’s decision-making capacity.</li>
</ol>
<p>Though it would not directly reference nuclear weapons, this clarification would connect strategic cyberattacks to potential responses, giving decision-makers flexibility while clearly warning adversaries. A more explicit doctrine should reduce the risks of accidental escalation and limit the audacity of State and non-State actors willing to test the nerves of democratic regimes, in line with <a href="https://globalsecurityreview.com/arming-for-deterrence-a-nuclear-posture-for-the-next-decade/">recent analyses</a> on the evolution of the U.S. nuclear posture in the face of new strategic threats that the war in Ukraine has only exacerbated.</p>
<p><strong>About the Author</strong></p>
<p><em>Gilles A. Paché is a Professor of Marketing and Supply Chain Management at Aix-Marseille University, France, and a member of the CERGAM Lab. His research focuses on logistics strategy, distribution channel management, and military studies. On these topics, he has authored over 700 scholarly publications, including articles, book chapters, and conference papers, as well as 24 academic books. Views expressed in this article are the author’s own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/12/Hacking-the-Apocalypse-How-Cyberattacks-Could-Trigger-Nuclear-Escalation.pdf"><img decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="176" height="49" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 176px) 100vw, 176px" /></a></p>
<p><a href="https://globalsecurityreview.com/hacking-the-apocalypse-how-cyberattacks-could-trigger-nuclear-escalation/">Hacking the Apocalypse: How Cyberattacks Could Trigger Nuclear Escalation</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/hacking-the-apocalypse-how-cyberattacks-could-trigger-nuclear-escalation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Signals of a New Revolution: Maven Smart System and the AI-RMA Horizon</title>
		<link>https://globalsecurityreview.com/signals-of-a-new-revolution-maven-smart-system-and-the-ai-rma-horizon/</link>
					<comments>https://globalsecurityreview.com/signals-of-a-new-revolution-maven-smart-system-and-the-ai-rma-horizon/#respond</comments>
		
		<dc:creator><![CDATA[Matthew J. Fecteau]]></dc:creator>
		<pubDate>Thu, 09 Oct 2025 13:47:00 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[AI-driven command]]></category>
		<category><![CDATA[AI/ML]]></category>
		<category><![CDATA[algorithmic warfare]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[battlefield intelligence]]></category>
		<category><![CDATA[C2]]></category>
		<category><![CDATA[Chief Digital and Artificial Intelligence Office]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[command and control]]></category>
		<category><![CDATA[communication revolution]]></category>
		<category><![CDATA[data fusion]]></category>
		<category><![CDATA[decision-making]]></category>
		<category><![CDATA[Department of War]]></category>
		<category><![CDATA[doctrinal evolution]]></category>
		<category><![CDATA[edge computing]]></category>
		<category><![CDATA[human-machine teaming]]></category>
		<category><![CDATA[industrial revolution]]></category>
		<category><![CDATA[information environment]]></category>
		<category><![CDATA[Information Warfare]]></category>
		<category><![CDATA[ISR fusion]]></category>
		<category><![CDATA[Joint AI Center]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[Maven Smart System]]></category>
		<category><![CDATA[mosaic warfare]]></category>
		<category><![CDATA[multi-domain operations]]></category>
		<category><![CDATA[operational adaptation]]></category>
		<category><![CDATA[Project Maven]]></category>
		<category><![CDATA[real-time targeting]]></category>
		<category><![CDATA[Revolution in Military Affairs]]></category>
		<category><![CDATA[RMA]]></category>
		<category><![CDATA[situational awareness]]></category>
		<category><![CDATA[technological innovation]]></category>
		<category><![CDATA[telegraph]]></category>
		<category><![CDATA[warfare transformation]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31658</guid>

					<description><![CDATA[<p>The Department of War’s (DoW) Maven Smart System (MSS) may not yet constitute a revolution in military affairs (RMA), but it strongly signals one. The MSS is a relatively new system designed as the DoW’s answer to the challenges posed by the transition to multi-domain operations and artificial intelligence (AI) integration. It seeks to enhance [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/signals-of-a-new-revolution-maven-smart-system-and-the-ai-rma-horizon/">Signals of a New Revolution: Maven Smart System and the AI-RMA Horizon</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Department of War’s (DoW) Maven Smart System (MSS) may not yet constitute a revolution in military affairs (RMA), but it strongly signals one. The MSS is a relatively new system designed as the DoW’s answer to the challenges posed by the transition to multi-domain operations and artificial intelligence (AI) integration. It seeks to enhance the common operating picture through artificial intelligence/machine learning (AI/ML) capabilities—now critical given the complexity and volume of today’s information environment.</p>
<p>Whether the MSS is indicative of an unfolding RMA remains a subject of debate. At a minimum, it represents a significant leap in how modern militaries sense, decide, and act in combat. From a scholarly perspective, RMAs are not defined by single technological breakthroughs but by clusters of innovations that fundamentally transform the conduct of warfare.</p>
<p>They typically involve shifts in doctrine, tactics, organization, culture, and technology. Unlike broader military revolutions, which reshape societies and political systems, RMAs are confined to the military sphere—and they often unfold quietly, only recognized in hindsight.</p>
<p>Several RMAs were identified in the past, providing a framework to anticipate future ones. In <a href="https://www.amazon.com/Dynamics-Military-Revolution-1300-2050/dp/052180079X/ref=sr_1_1?crid=5HYVA6NEEJ2N&amp;dib=eyJ2IjoiMSJ9.PWOVLU4sDyK-RCtubJVIvrJNqIzJG8HrY_8OsnwdKG0whYkhz7hPCaPxNoXZ-Eif6sXfjvwBA3XW82i7b1XrSOcSWvkDuCMxJiAToNDVx64umh_keykfO3919R6E94YVdDu67oCaYGKOCf90uvA9KzR9rYYN0lQJxb9o3szGvVkdIglughNbOe5Rb-QRyXP81q5NnLl3yvG73Xjm9JyRBfUu1J0V8Oit2GmnCMZOp0M.WEIrVM0xs7djc0-t3ELjygZepVFHBMazo0XNOAQWANQ&amp;dib_tag=se&amp;keywords=The+Dynamics+of+Military+Revolutions&amp;qid=1758480145&amp;sprefix=%2Caps%2C153&amp;sr=8-1"><em>The Dynamics of Military Revolutions</em></a><em>:</em><em> 1300–2050</em>, MacGregor Knox and Williamson Murray outline five significant military revolutions in the West since 1618. Each one, they argue, set off a chain of revolutionary changes in military affairs.</p>
<p>These include the emergence of the modern state with its standing armies, the political and social upheavals brought on by the French Revolution, the industrialization of warfare in the 19th century, the era of total war in the 20th century, and the transformative impact of nuclear weapons. If a new RMA is underway, we may not fully recognize it until it has already matured.</p>
<p>The concept of RMA has drawn justified criticism for being abstract, amorphous, and debated to the point of analytical paralysis. After the Gulf War, the DoD’s fixation on identifying the “next RMA” often overshadowed the operational impact of emerging capabilities. Scholars frequently focus on definitional purity rather than assessing real battlefield transformation.</p>
<p>Whether the MSS fits a textbook definition, adopted by the DoW or derived from historical theory, is less important than its functional impact. If an RMA is indeed emerging or approaching, there should be tangible real-world consequences. Otherwise, theory becomes disconnected from practice. In this light, the MSS may serve as a bridge between the long-unfolding information RMA and a new, AI-driven transformation.</p>
<p>The MSS could be indicative of another significant shift in command and control (C2). While the US Army’s command post computing environment (CPCE) already integrates legacy systems into a modular, cloud-capable architecture for multi-domain operations, the MSS pushes these capabilities toward revolutionary real-time situational awareness.</p>
<p>While initially developed to automate drone feed analysis, the MSS has evolved into an AI-powered battlefield intelligence engine. It fuses intelligence, surveillance, and reconnaissance (ISR) data, enables real-time targeting, and supports distributed decision-making. As with the telegraph in the 19th century, the MSS may redefine the military’s relationship with information and time.</p>
<p>Historically, C2 was slow and fragmented. Commanders relied on flags, runners, and direct observation, limited by geography and transmission delay. The Industrial Revolution began to change this. Introduced in 1793, Claude Chappe invented the optical telegraph which allowed faster coordination across long distances. It was Samuel Morse’s electrical telegraph, patented in <strong>1837,</strong> that truly revolutionized communication.</p>
<p>AI is reshaping combat just as electricity once did. Electricity transformed communication by creating the foundation for critical innovation, like the internet. The harnessing of electricity for industrial use itself was not an RMA, but it was the essential prerequisite for one. Without it, the revolution in communication that began with the telegraph would not have been possible. AI may not constitute a full RMA on its own, but it is the enabling foundation for one.</p>
<p>During the Crimean War and the American Civil War, the telegraph enabled real-time command for the first time. In the US, President Lincoln relied on the War Department telegraph office to direct Union forces and enforce strategic decisions. Strategic-level C2 became possible, and expectations for real-time situational awareness took hold. The rise of the steam-powered printing press and the expansion of railways accelerated this transformation, making war reporting nearly instantaneous—a precursor to modern information warfare.</p>
<p>Similarly, Project Maven, initiated in 2017, began as a machine learning initiative to automate drone video analysis. Since then, the MSS has grown to integrate cloud computing, ISR fusion, and targeting. The MSS delivers intelligence to the tactical edge at machine speed on enterprise cloud infrastructure. It processes unfathomable amounts of data in milliseconds— augmenting analysts and automating portions of the workflow.</p>
<p>Just like the electric telegraph centralized control and supported linear commander decisions, the MSS introduces machine learning, machine inference, and adaptive analytics to take command and control. The MSS provides a picture of the theater that is not merely quantitative, but qualitative.</p>
<p>A <a href="https://csbaonline.org/uploads/documents/2002.10.02-Military-Technical-Revolution.pdf">true RMA</a> requires more than new technology. It demands operational adaptation, organizational restructuring, and doctrinal evolution. The MSS checks many of these boxes. Technologically, the MSS merges AI, edge computing, and cloud infrastructure in a holistic fashion. Operationally, it uses human-machine teaming to accelerate kill chains. Organizationally, it catalyzed the creation of institutions such as the Joint AI Center (JAIC) and the Chief Digital and Artificial Intelligence Office. Doctrinally, it promotes shifts toward algorithmic and mosaic warfare, which are adaptive, data-driven models of conflict.</p>
<p>The MSS could signal a broader shift in military operations, much like the telegraph reshaped communication in the 19th century. By combining intelligence, surveillance, and reconnaissance (ISR) with artificial intelligence at operational speed, the MSS is changing how armed forces interpret the battlespace, make decisions, and coordinate action—all while improving the shared situational picture. Yet without a corresponding cultural shift, even the best tools can fail to yield a true RMA. Whether the Department of War can fully adapt its doctrine and institutions to leverage the MSS remains to be seen.</p>
<p><em>Lieutenant Colonel Matthew J. Fecteau is an information operations officer working with artificial intelligence. </em><em>The views expressed in this report are those of the author and do not necessarily reflect the official policy or position of the Department of the Army, the Department of War, or the US Government. </em></p>
<p><em><a href="http://globalsecurityreview.com/wp-content/uploads/2025/10/Signals-of-a-New-Revolution.pdf"><img decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png" alt="" width="239" height="66" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w" sizes="(max-width: 239px) 100vw, 239px" /></a> </em></p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/signals-of-a-new-revolution-maven-smart-system-and-the-ai-rma-horizon/">Signals of a New Revolution: Maven Smart System and the AI-RMA Horizon</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/signals-of-a-new-revolution-maven-smart-system-and-the-ai-rma-horizon/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Is America Prepared for a Strike Against its Nuclear Command and Control?</title>
		<link>https://globalsecurityreview.com/is-america-prepared-for-a-strike-against-its-nuclear-command-and-control/</link>
					<comments>https://globalsecurityreview.com/is-america-prepared-for-a-strike-against-its-nuclear-command-and-control/#comments</comments>
		
		<dc:creator><![CDATA[Curtis McGiffin,&nbsp;Adam Lowther&nbsp;&&nbsp;James Petrosky]]></dc:creator>
		<pubDate>Fri, 25 Jul 2025 11:16:43 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Adam]]></category>
		<category><![CDATA[airborne alert systems]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[article review]]></category>
		<category><![CDATA[command and control]]></category>
		<category><![CDATA[command and control structure]]></category>
		<category><![CDATA[Curtis]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[effective deterrence]]></category>
		<category><![CDATA[historical context]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Jim]]></category>
		<category><![CDATA[Looking Glass mission]]></category>
		<category><![CDATA[modern technology]]></category>
		<category><![CDATA[modernization]]></category>
		<category><![CDATA[nuclear arsenal]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[nuclear facilities]]></category>
		<category><![CDATA[nuclear strategy]]></category>
		<category><![CDATA[nuclear systems]]></category>
		<category><![CDATA[strike]]></category>
		<category><![CDATA[successful attack]]></category>
		<category><![CDATA[technological advancements]]></category>
		<category><![CDATA[traditional systems]]></category>
		<category><![CDATA[U.S.]]></category>
		<category><![CDATA[unprepared]]></category>
		<category><![CDATA[visibility]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31253</guid>

					<description><![CDATA[<p>What happens when the deterrent becomes the target? In this episode, Adam, Curtis, and Jim tackle a bold and unsettling question: After America’s successful strike on Iran’s nuclear facilities, is the U.S. truly prepared to defend its nuclear arsenal? This conversation dives deep into the heart of nuclear strategy and deterrence: The critical role of [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/is-america-prepared-for-a-strike-against-its-nuclear-command-and-control/">Is America Prepared for a Strike Against its Nuclear Command and Control?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>What happens when the deterrent becomes the target?</strong></p>
<p>In this episode, Adam, Curtis, and Jim tackle a bold and unsettling question:<br />
<em>After America’s successful strike on Iran’s nuclear facilities, is the U.S. truly prepared to defend its nuclear arsenal?</em></p>
<p>This conversation dives deep into the heart of nuclear strategy and deterrence:</p>
<ul>
<li>The critical role of <strong>airborne alert systems</strong> and the lessons of the <strong>Looking Glass mission</strong>.</li>
<li>The tension between <strong>traditional deterrence systems</strong> and <strong>emerging technologies</strong>.</li>
<li>Why <strong>visibility, command, and control</strong> remain the pillars of credible nuclear deterrence.</li>
<li>How <strong>modernization</strong> of nuclear forces shapes the future of U.S. security.</li>
</ul>
<p>In an age of rapid technological change, understanding deterrence isn’t just for policymakers—it’s vital for anyone who values global stability.</p>
<p><img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f517.png" alt="🔗" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Listen now to uncover why the strength of deterrence rests not just on weapons, but on resilient systems and clear strategy.</strong></p>
<p><a href="https://youtu.be/Ua18BeWv1es"><img decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="205" height="57" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 205px) 100vw, 205px" /></a></p>
<p>#NuclearDeterrence #NationalSecurity #Modernization #CommandAndControl #StrategicStability #DefenseInnovation</p>
<p>Watch now.</p>
<p><iframe title="134 Is America Prepared for a Strike Against its Nuclear Command and Control?" width="640" height="360" src="https://www.youtube.com/embed/Ua18BeWv1es?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/is-america-prepared-for-a-strike-against-its-nuclear-command-and-control/">Is America Prepared for a Strike Against its Nuclear Command and Control?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/is-america-prepared-for-a-strike-against-its-nuclear-command-and-control/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>“Peace Through Strength”: Enhancing America’s Nuclear Deterrence Today</title>
		<link>https://globalsecurityreview.com/peace-through-strength-enhancing-americas-nuclear-deterrence-today/</link>
					<comments>https://globalsecurityreview.com/peace-through-strength-enhancing-americas-nuclear-deterrence-today/#comments</comments>
		
		<dc:creator><![CDATA[Curtis McGiffin&nbsp;&&nbsp;Kirk Fansher]]></dc:creator>
		<pubDate>Thu, 06 Feb 2025 13:39:18 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[B-1 bombers]]></category>
		<category><![CDATA[bombers]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Col. Curtis McGiffin]]></category>
		<category><![CDATA[Col. Kirk Fansher ​]]></category>
		<category><![CDATA[cold war]]></category>
		<category><![CDATA[command and control]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[global order]]></category>
		<category><![CDATA[international environment]]></category>
		<category><![CDATA[military rebuild]]></category>
		<category><![CDATA[Minuteman III]]></category>
		<category><![CDATA[modernization]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[New START]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[nuclear arsenal]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[Nuclear Non-Proliferation Treaty]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[Ohio-class submarines]]></category>
		<category><![CDATA[peace through strength]]></category>
		<category><![CDATA[Pete Hegseth]]></category>
		<category><![CDATA[Roman Emperor Hadrian]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[sea-launched nuclear cruise missile]]></category>
		<category><![CDATA[secretary of defense]]></category>
		<category><![CDATA[slcm-n]]></category>
		<category><![CDATA[South China Sea]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[TLAM-N]]></category>
		<category><![CDATA[Trump]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[US Strategic Command]]></category>
		<category><![CDATA[warhead refurbishment]]></category>
		<category><![CDATA[warrior ethos]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29995</guid>

					<description><![CDATA[<p>Immediately after being sworn in as the nation’s 29th Secretary of Defense, Pete Hegseth established three guiding principles: (1) restore the warrior ethos in everything we do, (2) rebuild the military, and (3) reestablish deterrence. According to Secretary Hegseth, “We don’t want to fight wars; we want to deter them.” This captures the essence of [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/peace-through-strength-enhancing-americas-nuclear-deterrence-today/">“Peace Through Strength”: Enhancing America’s Nuclear Deterrence Today</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Immediately after being sworn in as the nation’s 29th Secretary of Defense, Pete Hegseth established three guiding principles: (1) restore the warrior ethos in everything we do, (2) rebuild the military, and (3) reestablish deterrence. According to Secretary Hegseth, “<a href="https://www.youtube.com/watch?v=XxjK3bycsK4">We don’t want to fight wars; we want to deter them</a>.”</p>
<p>This captures the essence of the doctrine of “peace through strength.” As President <a href="https://www.rev.com/transcripts/trump-speaks-at-commander-in-chief-inaugural-ball">Trump described</a> during the commander-in-chief inaugural ball, “We will measure our success not only by the battles we win but also by the wars we end—and perhaps most importantly, the wars we never get into. It’s called peace through strength. Through our power and might, we will lead the world to peace, our friends will respect us, our enemies will fear us, and the whole world will admire the unrivaled greatness of the United States military.”</p>
<p>“Peace through strength” <a href="https://politicaldictionary.com/words/peace-through-strength/">refers</a> to accumulating and displaying forms of national power to create a favorable international environment. The phrase originates from the Roman Emperor Hadrian, who said, “Seek peace through strength, or failing that, peace through threat.” This concept shaped the strategy and goals of Western deterrence during the Cold War and should today. While America squandered its deterrence capabilities, its adversaries relentlessly pursued a deliberate strategy of “subjugation through intimidation.”</p>
<p>The ripening <em>entente</em> between Russia and China, alongside the alarming <a href="https://www.defense.gov/News/Speeches/Speech/Article/3241858/remarks-by-secretary-of-defense-lloyd-j-austin-iii-at-the-us-strategic-command/">rate of their expanding and diversifying nuclear arsenals</a>, is further complicated by an expanding <a href="https://crsreports.congress.gov/product/pdf/IF/IF10472">North Korean</a> nuclear capability. A <a href="https://www.ida.org/research-and-publications/publications/all/a/am/americas-strategic-posture">collaborative campaign of deliberate and opportunistic aggression</a> fueled by revisionist ambitions torments the South China Sea, is devastating Ukraine, and threatens Taiwan. These <a href="https://oxfordre.com/internationalstudies/display/10.1093/acrefore/9780190846626.001.0001/acrefore-9780190846626-e-607">malcontent states</a> seek to sow chaos, undermining the existing international order by altering its rules, resource distribution, recognition, territorial boundaries, and economic dominance. To impede these “mavens of malice,” the USA will need to rely on its most formidable hard-power option––nuclear weapons.</p>
<p>Secretary Hegseth must drive the urgent regeneration of America’s nuclear deterrence capability and credibility. This will require an expanded and more capable American nuclear arsenal to effectively counter the mavens’ growing forces. The ongoing <a href="https://nationalinterest.org/blog/buzz/american-nuclear-arsenal-guarantees-peace-213744/">$1.1 trillion nuclear enterprise modernization</a>, designed to meet the previous decade’s <a href="https://www.powerthesaurus.org/threatscape/definitions">threat</a>, is plagued by delays in nearly every major system and is insufficient to meet the growing threat of the next decade. The United States requires additional nuclear capacity to ensure deterrence tomorrow. Here are four proposals that President Trump and Secretary Hegseth could initiate tomorrow to enhance the warrior ethos and strengthen deterrence.</p>
<p>First, the United States should suspend participation in New START, as Russia <a href="http://en.kremlin.ru/events/president/news/70565">did</a> in February 2023. Regardless of Putin’s grievances, Russia’s actions purposefully undermine the rules-based international order. Given Russia’s consistent <a href="https://thehill.com/opinion/international/4443781-history-shows-that-no-ceasefire-or-treaty-with-russia-can-be-trusted/">history of treaty violations</a>, China’s <a href="https://nipp.org/wp-content/uploads/2021/11/Grant-OP-for-web.pdf">violation of Article VI of the Nuclear Non-Proliferation Treaty (NPT)</a>, and recent <a href="https://2021-2025.state.gov/2024-report-to-congress-on-implementation-of-the-new-start-treaty/">revelations</a> Moscow exceeded New START warhead limits in 2024, new arms control treaties are unlikely for the foreseeable future. Moscow perceives military and political advantage by not engaging in these matters, instead pursuing escalation dominance without fear of American reprisal. Participating in any treaty alone devalues the treaty process and demeans American credibility.</p>
<p>Second, the US must immediately cease all warhead dismantlement and begin urgent refurbishment of the remaining <a href="https://www.energy.gov/nnsa/transparency-us-nuclear-weapons-stockpile">2,000 retired warheads</a>. The provisions of the 2025 National Defense Authorization Act, including salvaging B83 nuclear bombs and W72-2 warheads from retirement, must be implemented immediately. In conjunction with the 2023 decision to build a <a href="https://www.defense.gov/News/Releases/Release/Article/3571660/department-of-defense-announces-pursuit-of-b61-gravity-bomb-variant/">B61-13</a>, the president should direct the reconditioning and deployment of every weapon in the active and inactive stockpiles to achieve full mission capability as soon as possible.</p>
<p>Third, the president should promptly adjust the posture of America’s current nuclear forces to strengthen deterrence. This includes redeploying stored warheads to re-MIRV the Minuteman III with <a href="https://www.twz.com/35352/test-of-minuteman-iii-icbm-with-three-reentry-vehicles-sure-seems-like-a-warning-to-russia">three warheads per missile</a>—as <a href="https://www.armed-services.senate.gov/imo/media/doc/24-07_02-29-2024_transcript.pdf">recently advised</a> by US Strategic Command’s commander, General Anthony Cotton. Adding nearly <a href="https://crsreports.congress.gov/product/pdf/IF/IF10519">800 warheads</a> demonstrates American resolve in the face of China’s and Russia’s nuclear modernization and expansion to reassure <a href="https://www.upi.com/Top_News/World-News/2024/02/06/Gallup-Chey-survey-North-Korea-nuclear-weapons-denuclearization/8841707211962/">allies whose populations</a> contemplate acquiring their own nuclear forces.</p>
<p>Reconfiguring denuclearized bombers to a nuclear-capable configuration and returning bombers to nuclear alert status is critical—with one-fourth of bombers postured for rapid takeoff to ensure survival. Dispersed bombers and supporting tanker aircraft on alert ensure a robust second-strike bomber capability, essential for credible deterrence, preserve employment options for the president, and complicate adversary targeting.</p>
<p>Adversaries cannot believe they can disrupt the crucial <a href="https://warontherocks.com/2019/08/america-needs-a-dead-hand/">detect-decide-direct </a>command and control chain necessary to respond to a nuclear first strike. They must never believe that a decapitating first strike could stop American retaliation. Therefore, alternative and mobile command centers should be continuously enhanced, staffed, and mobilized.</p>
<p>Fourth, rapidly deploying a sea-launched nuclear cruise missile (such as the TLAM-N or SLCM-N) is essential to counter the significant non-strategic nuclear weapons advantage held by both China and Russia. Former Secretary of Defense Casper Weinberger’s <a href="https://history.defense.gov/Portals/70/Documents/annual_reports/1986_DOD_AR.pdf?ver=2016-02-25-102404-647.">report</a> emphasized these systems’ significance over four decades ago. Since 1984, the US regarded nuclear SLCMs on submarines and surface ships as cost-effective and operationally efficient options against a wide range of targets.</p>
<p>Weinberger favored nuclear SLCMs across multiple vessel types to complicate an attacker’s planning and enhance overall survivability of the force. At a minimum, the Navy’s <a href="https://www.navy.mil/Resources/Fact-Files/Display-FactFiles/Article/2169613/guided-missile-submarines-ssgn/">four <em>Ohio</em>-Class guided-missile nuclear submarines</a> could be rearmed with refurbished TLAM-N nuclear cruise missiles that <a href="https://www.usni.org/magazines/proceedings/2020/august/tactical-nuclear-weapons-sea">retired from service</a> around 2011. This would enhance the potential at-sea deterrent by 28 percent until the future SLCM-N comes online. Deployment of larger numbers of SLCMs will dramatically increase the size of the survivable sea-based deterrent and provide a viable nuclear-limited strike capability.</p>
<p>Increasing the number of bombers, missiles, and warheads in the active force enhances American military capabilities. <a href="https://nipp.org/information_series/keith-b-payne-and-mark-b-schneider-u-s-nuclear-deterrence-what-went-wrong-and-what-can-be-done-no-601-october-7-2024/">Once removed</a> from the constraints of New START, the <a href="https://www.navy.mil/Resources/Fact-Files/Display-FactFiles/Article/2169580/fleet-ballistic-missile-submarines-ssbn/"><em>Ohio</em>-class submarines</a> could be restored to their original capacity of 24 missile tubes, adding 56 submarine-launched (MIRVed) ballistic missiles. B-1 bombers should be <a href="https://www.airandspaceforces.com/8th-air-force-commander-final-b-1-b-2-retirements/">retained rather than retired</a> and <a href="https://nautilus.org/wp-content/uploads/2015/07/b1rerole.pdf">reconfigured</a> for nuclear operations <a href="https://www.airandspaceforces.com/8th-air-force-commander-final-b-1-b-2-retirements/">to meet nuclear and conventional demand</a>s on an overburdened bomber force.</p>
<p>With global tensions escalating, the United States must reclaim its position of strength to maintain the peace through a powerful deterrent. Only swift and decisive action can preserve national security and safeguard the global order America forged. The strategic challenges presented by these mavens of malice demand the United States urgently strengthen its nuclear deterrent. Secretary Hegseth inherited a sluggish modernization effort that will not “<a href="https://www.airandspaceforces.com/hyten-says-us-must-be-clear-about-threats-and-act-faster/">go faster</a>”––unless it becomes a national priority.</p>
<p>A peace through strength doctrine urgently requires increased capacity and enhanced readiness. Suspending New START participation and returning to a pre-1991 deterrence posture sends a clear message. Any attempt to subvert the global order or threaten American interests will be met with resolute and overwhelming force.</p>
<p><em>Col. Curtis McGiffin (US Air Force, Ret.) is Vice President for Education of the National Institute for Deterrence Studies and a visiting professor at Missouri State University’s School of Defense and Strategic Studies. </em></p>
<p><em>Col. Kirk Fansher (US Air Force, Ret.) is a Senior Fellow at the National Institute for Deterrence Studies, a graduate of the Yale School of Management, and President of Grey Wolf Advisors. </em></p>
<p><em> <a href="http://globalsecurityreview.com/wp-content/uploads/2025/02/Peace-Through-Strength.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></em></p>
<p><a href="https://globalsecurityreview.com/peace-through-strength-enhancing-americas-nuclear-deterrence-today/">“Peace Through Strength”: Enhancing America’s Nuclear Deterrence Today</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/peace-through-strength-enhancing-americas-nuclear-deterrence-today/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
