<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Topic:critical infrastructure &#8212; Global Security Review %</title>
	<atom:link href="https://globalsecurityreview.com/subject/critical-infrastructure/feed/" rel="self" type="application/rss+xml" />
	<link>https://globalsecurityreview.com/subject/critical-infrastructure/</link>
	<description>A division of the National Institute for Deterrence Studies (NIDS)</description>
	<lastBuildDate>Tue, 07 Apr 2026 12:45:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://globalsecurityreview.com/wp-content/uploads/2023/10/cropped-GSR-Banner-LogoV2-32x32.png</url>
	<title>Topic:critical infrastructure &#8212; Global Security Review %</title>
	<link>https://globalsecurityreview.com/subject/critical-infrastructure/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Redefining Espionage: The Unseen War for Technological Dominance</title>
		<link>https://globalsecurityreview.com/redefining-espionage-the-unseen-war-for-technological-dominance/</link>
					<comments>https://globalsecurityreview.com/redefining-espionage-the-unseen-war-for-technological-dominance/#respond</comments>
		
		<dc:creator><![CDATA[Joshua Thibert]]></dc:creator>
		<pubDate>Tue, 24 Mar 2026 12:13:13 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[adaptive cyberattacks]]></category>
		<category><![CDATA[anomaly detection]]></category>
		<category><![CDATA[Artemis II]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[automated espionage]]></category>
		<category><![CDATA[big data analysis]]></category>
		<category><![CDATA[counter-disinformation]]></category>
		<category><![CDATA[counterintelligence]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[cyber operations]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[democratic institutions]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[disruptive technologies]]></category>
		<category><![CDATA[economic competitiveness]]></category>
		<category><![CDATA[economic espionage]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[foreign intelligence entities]]></category>
		<category><![CDATA[Generative AI]]></category>
		<category><![CDATA[global power shift]]></category>
		<category><![CDATA[gray zone]]></category>
		<category><![CDATA[Great Power Competition]]></category>
		<category><![CDATA[information domain]]></category>
		<category><![CDATA[insider threat mitigation]]></category>
		<category><![CDATA[intellectual property]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[predictive analysis]]></category>
		<category><![CDATA[security competition]]></category>
		<category><![CDATA[supply-chain vulnerabilities]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[technological arms race]]></category>
		<category><![CDATA[technological dominance]]></category>
		<category><![CDATA[threat mitigation. ​]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32482</guid>

					<description><![CDATA[<p>Published: March 24, 2026 The international system is undergoing a profound global power shift characterized by the resurgence of great power competition and a broad diffusion of technical capabilities. This environment is intensifying security competition across all domains. Concurrently, the proliferation of artificial intelligence (AI) and other disruptive technologies has fundamentally transformed espionage and defense. [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/redefining-espionage-the-unseen-war-for-technological-dominance/">Redefining Espionage: The Unseen War for Technological Dominance</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Published: March 24, 2026</em></p>
<p>The international system is undergoing a profound global power shift characterized by the resurgence of great power competition and a broad diffusion of technical capabilities. This environment is intensifying security competition across all domains. Concurrently, the proliferation of artificial intelligence (AI) and other disruptive technologies has fundamentally transformed espionage and defense. The traditional <a href="https://www.realcleardefense.com/articles/2025/10/30/artificial_intelligence_and_the_future_of_espionage_1144178.html">landscape</a> of counterintelligence (CI) is obsolete and requires rapid, systemic overhaul to address the increasingly amplified, technologically enabled threats posed by state and non-state actors.</p>
<p>Specifically, the shift to great power technological competition has expanded CI&#8217;s mandate from protecting military secrets to securing critical infrastructure, intellectual property (IP), and the integrity of the information domain. The dual-use nature of AI functions as both in support of <a href="https://www.hstoday.us/subject-matter-areas/cybersecurity/ai-driven-espionage-campaign-marks-new-phase-in-cybersecurity-researchers-say/">automated espionage</a> and a critical mechanism for preemptively anticipating and mitigating threats. The failure of the United States to strategically integrate AI into CI methodologies will result in the systemic erosion of national technological and economic advantage.</p>
<p><strong>The Expanded Mandate of Modern Counterintelligence</strong></p>
<p>CI functions to protect a nation’s secrets, personnel, and systems from foreign intelligence entities (FIEs). Yet today, CI must also confront a threat matrix dramatically enlarged in scope, sophistication, and velocity. The current geopolitical climate has necessitated a significant expansion of the traditional CI mission. In the context of great power competition, the most significant threat has shifted from the theft of classified military and diplomatic secrets to the large-scale acquisition of IP, trade secrets, and technological data, as highlighted in the recently released <a href="https://www.odni.gov/index.php/newsroom/reports-publications/reports-publications-2026/4141-2026-annual-threat-assessment">Annual Threat Assessment</a>.</p>
<p>FIEs are aggressively targeting the private sector, academia, and research institutions, the very engines of national innovation through sophisticated economic espionage. Their strategic goal is not merely to obtain information, but to erode a nation&#8217;s competitive advantage and accelerate the adversary&#8217;s technological timetable, thereby shifting the global balance of power. CI must establish robust protective mechanisms that extend deep into the non-governmental technology and research ecosystem.</p>
<p>The dissolution of a clear distinction between peacetime competition and active conflict has resulted in a continuous state of confrontation known as the &#8216;gray zone&#8217;. This strategic domain is characterized by persistent, non-lethal, yet tactically damaging activities designed to achieve political objectives without triggering traditional military responses. CI must now defend against a spectrum of subtle subversion, including large-scale cyber operations, persistent penetration of networks for reconnaissance and preparatory measures, and covert attempts to manipulate political discourse and decision-making.</p>
<p>The globalization of commerce and technology has created intricate, interconnected supply chains. These networks present significant CI risks, as adversaries seek to compromise the integrity, trustworthiness, and authenticity of products and services. By inserting &#8220;backdoors&#8221; or creating exploitable &#8220;choke points&#8221; at various nodes, adversaries establish capabilities for future exploitation. CI efforts are essential to conduct comprehensive due diligence and risk mitigation, securing these complex networks against both hardware and software compromise.</p>
<p><strong>Artificial Intelligence: The Dual-Use Catalyst</strong></p>
<p>AI and emerging technologies are not merely <em>targets</em> of modern espionage; they are simultaneously the most potent tools and the most necessary defenses in the counterintelligence battleground. This dual-use dynamic creates a challenging “AI vs. AI” scenario that demands immediate, radical adaptation. Adversaries are leveraging AI to dramatically enhance the speed, scale, and sophistication of their intelligence operations:</p>
<p><u>Automated Espionage and Big Data Analysis</u>: AI-powered tools can automate and scale the processing, translation, and analysis of vast, heterogeneous datasets (Big Data), vastly increasing the volume and velocity of intelligence collection from both open-source intelligence and classified sources.</p>
<p><u>Adaptive Cyberattacks</u>: Machine learning (ML) algorithms enable the development of more elusive and adaptive cyber threats. This includes automated exploitation of vulnerabilities, dynamic creation of polymorphic malware, and rapid penetration of defenses, operating at speeds that effectively outpace traditional, human-centric cybersecurity responses.</p>
<p><u>Generative AI for Influence</u>: Generative AI can create highly realistic deepfakes (synthetic videos and audio) and synthetic narratives at scale. This facilitates sophisticated disinformation and propaganda campaigns to manipulate public opinion and conduct advanced social engineering, severely compromising the ability of institutions to discern truth from falsehood.</p>
<p>Three interconnected factors fundamentally redefine the scope of CI responsibility: target expansion, the blurring of conflict lines, and supply chain vulnerabilities. To effectively counter these technologically enabled threats, CI must aggressively embrace and integrate these same technologies, transforming them into proactive defensive tools:</p>
<p><u>Threat Anticipation and Predictive Analysis</u>: AI can process and analyze massive amounts of threat data, identifying subtle, non-obvious patterns, trends, and anomalies. This capability allows CI to transition from merely reacting to threats toward predictive modeling, allowing one to forecast adversary actions before they materialize and enabling preemptive defense.</p>
<p><u>Enhanced Surveillance and Anomaly Detection</u>: ML algorithms are crucial for the detection of subtle anomalies in network traffic, user behavior, and physical security systems that a human operator would miss. AI-driven monitoring provides real-time, large-scale pattern-of-life analysis that significantly exceeds human cognitive capacity.</p>
<p><u>Counter-Disinformation and Integrity Checks</u>: CI requires AI-driven tools to effectively identify, analyze, and flag AI-generated propaganda, deepfakes, and synthetic media. Systems designed for content provenance and authenticity verification are essential to safeguard the <a href="https://ash.harvard.edu/articles/weaponized-ai-a-new-era-of-threats/">integrity</a> of the information domain and maintain public trust.</p>
<p><u>Insider Threat Mitigation</u>: Defensively, AI can monitor internal networks to flag anomalous user behaviors such as unusual data access attempts, large data transfers, or deviations in an employee&#8217;s digital pattern-of-life. As such they assist in identifying potential insider threats before significant compromise occurs.</p>
<p><strong>The Strategic Imperative</strong></p>
<p>The shift of global powers and the proliferation of disruptive technologies have thrust counterintelligence into an even more important aspect of national security. The stakes of this technological arms race transcend traditional security concerns, encompassing the integrity of a nation’s innovative ecosystem, its economic competitiveness, and the resilience of its democratic institutions.</p>
<p>CI must rapidly evolve its strategies to prioritize the defense of economic and technological assets, and it must integrate AI as a foundational defensive technology to achieve predictive, scalable threat mitigation. Failure to aggressively master and deploy AI defenses against technologically augmented adversaries risks the systemic erosion of national advantage in a world where technological leadership is increasingly synonymous with global power. The future success of great power competition hinges directly on the adaptive capacity and technological sophistication of CI’s function.</p>
<p><em>Joshua Thibert is a Senior Analyst at the </em><a href="https://thinkdeterrence.com/"><em>National Institute for Deterrence Studies (NIDS)</em></a><em> with over 30 years of comprehensive expertise. His background encompasses roles as a former counterintelligence special agent within the Department of Defense and as a practitioner in compliance, security, and insider risk management in the private sector. His extensive academic and practitioner experience spans strategic intelligence, multiple domains within defense and strategic studies, and critical infrastructure protection. The views of the author are his own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/03/Redefining-Espionage_-AI-Global-Power-Shifts-and-the-Unseen-War-for-Technological-Dominance.pdf"><img decoding="async" class="alignnone wp-image-32091" src="http://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png" alt="" width="187" height="52" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button-300x83.png 300w" sizes="(max-width: 187px) 100vw, 187px" /></a></p>
<p><a href="https://globalsecurityreview.com/redefining-espionage-the-unseen-war-for-technological-dominance/">Redefining Espionage: The Unseen War for Technological Dominance</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/redefining-espionage-the-unseen-war-for-technological-dominance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hacking the Apocalypse: How Cyberattacks Could Trigger Nuclear Escalation</title>
		<link>https://globalsecurityreview.com/hacking-the-apocalypse-how-cyberattacks-could-trigger-nuclear-escalation/</link>
					<comments>https://globalsecurityreview.com/hacking-the-apocalypse-how-cyberattacks-could-trigger-nuclear-escalation/#respond</comments>
		
		<dc:creator><![CDATA[Gilles A. Paché]]></dc:creator>
		<pubDate>Mon, 29 Dec 2025 13:05:26 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[attribution]]></category>
		<category><![CDATA[command and control]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[critical vulnerabilities]]></category>
		<category><![CDATA[cyber deterrence]]></category>
		<category><![CDATA[Cyberattacks]]></category>
		<category><![CDATA[Cyberspace]]></category>
		<category><![CDATA[deconfliction mechanisms]]></category>
		<category><![CDATA[democratic regimes]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[escalation]]></category>
		<category><![CDATA[gray zone]]></category>
		<category><![CDATA[irregular warfare]]></category>
		<category><![CDATA[non-state actors]]></category>
		<category><![CDATA[nuclear doctrine]]></category>
		<category><![CDATA[nuclear escalation]]></category>
		<category><![CDATA[nuclear threshold]]></category>
		<category><![CDATA[offensive cyber capabilities]]></category>
		<category><![CDATA[proportionality]]></category>
		<category><![CDATA[second-strike capability]]></category>
		<category><![CDATA[strategic cyberattacks]]></category>
		<category><![CDATA[strategic stability]]></category>
		<category><![CDATA[strategic threats]]></category>
		<category><![CDATA[vital infrastructure]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32056</guid>

					<description><![CDATA[<p>Many of the world’s strategists still share the same conviction: as Kathryn Bigelow’s film A House of Dynamite (2025) dramatizes, nuclear escalation can only originate from a missile of unknown origin heading straight for Chicago. Yet, this old “Cold War” vision no longer seems entirely relevant. As cyberattacks target critical infrastructure, a long-taboo question arises: [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/hacking-the-apocalypse-how-cyberattacks-could-trigger-nuclear-escalation/">Hacking the Apocalypse: How Cyberattacks Could Trigger Nuclear Escalation</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Many of the world’s strategists still share the same conviction: as Kathryn Bigelow’s film <em>A House of Dynamite</em> (2025) dramatizes, nuclear escalation can only originate from a missile of unknown origin heading straight for Chicago. Yet, this old “Cold War” vision no longer seems entirely relevant. As cyberattacks target critical infrastructure, a long-taboo question arises: how far can we tolerate digital offensives that paralyze a country or manipulate an election before considering a nuclear response? What if the most dangerous attack to unfold in the late 2020s originates not from a silo, but from a single line of code?</p>
<p><strong>Cyber Shockwaves</strong></p>
<p>Imagine a simple piece of computer code shutting down nuclear power plants, paralyzing transportation networks, and disrupting <a href="https://www.armscontrol.org/act/2019-11/features/cyber-battles-nuclear-outcomes-dangerous-new-pathways-escalation">vital military systems</a>. For more than a decade, cyberattacks against critical infrastructure have been more than just intrusions; they can have effects comparable to those of conventional acts of war, and threatening global stability. For nuclear democracies, the question has become crucial: at what point does a digital incident cross the threshold of severity required to trigger deterrence calculations, or even justify a nuclear response?</p>
<p>Cyberspace is now a theater of constant confrontation where adversaries seek to undermine each other’s trust, disrupt economies, and test resilience. This invisible competition weakens traditional deterrence mechanisms, which rely on clear signals. In cyberspace, nothing is clear, with uncertain effects and often unintentional escalation. Yet, the potential damage of a sophisticated cyberattack against an electrical grid or supply chains could <a href="https://www.mdpi.com/1424-8220/23/8/4060">exceed that of a conventional bombing</a>. The problem stems from three major developments.</p>
<p><strong>Critical Weak Spots</strong></p>
<p>The first development is the <em>increasing vulnerability of critical infrastructure</em>, whose technical complexity creates countless points of <a href="https://www.gao.gov/blog/securing-u.s.-electricity-grid-cyberattacks">weakness</a>. Hospitals, refineries, water distribution systems, and railway networks rely on technologies that are sometimes outdated and rarely protected against determined state and non-state actors. A coordinated and simultaneous attack against multiple sectors could severely paralyze a country for weeks to months, causing economic chaos and widespread social disruption.</p>
<p>The second development concerns the <em>strong integration of cyberspace and nuclear power</em>. Command, control, and communication systems have become more digital than ever, and thus more <a href="https://www.ceeol.com/search/article-detail?id=1306879">exposed to cyberattacks</a>. Even a non-destructive intrusion, subtly targeted and difficult to detect, could be interpreted as an attempt to undermine the capacity to retaliate. In such cases, the precise or approximate perception of risk becomes as dangerous as the attack itself, amplifying the potential for misunderstandings and unintentional escalation.</p>
<p>The third development, finally, is the <em>bolder behavior of adversaries of democratic regimes</em>, who use cyberspace as a tool for exerting pressure without incurring significant costs. Who would doubt that Russia, China, North Korea, and Iran regularly demonstrate their ability to disrupt the institutions of democratic regimes? The relative success of their operations encourages them to <a href="https://www.ccdcoe.org/uploads/2025/07/Tkachuk_N_Tallinn_Paper_15_Ukraine-as-the-Frontline-of-European-Cyber-Defence.pdf">push the boundaries even further</a>, as they are aware of the existence of a “gray zone” where traditional deterrence does not fully apply.</p>
<p>These major transformations lead to a fundamental question: should democracies clarify as quickly as possible that certain cyberattacks could cross a threshold triggering a major military response, including nuclear? The objective of a new doctrine would then not be to lower the nuclear threshold, but to re-establish a credible and robust level of deterrence. Because if adversaries believe that cyberattacks are “zero-cost,” they will continue to systematically target vital infrastructure, exploiting critical vulnerabilities with impunity and minimal risk to themselves.</p>
<p><strong>Strategic High Stakes</strong></p>
<p>A first argument for clarifying the doctrine rests on proportionality: a massive cyberattack targeting critical infrastructure could have consequences comparable to a bombing. In this context, it would be consistent to specify that the response is not limited to conventional means. Analysts point out that U.S. nuclear doctrine already considers the possibility of devastating consequences from non-nuclear strategic attacks, and they believe that the nuclear threat is not explicitly excluded, even if the <a href="https://apps.dtic.mil/sti/html/trecms/AD1182360/"><em>no-first-use</em> scenario remains dominant</a>.</p>
<p>A second argument concerns strategic stability. Today, adversaries regularly stress the defenses of democratic regimes in the “gray zone,” without immediate risk of escalation. Clarifying the rules of engagement and explicitly integrating cyberspace into strategic thinking could strengthen deterrence and limit adversarial gambles in this gray zone. The United States, the United Kingdom, and France could thus reduce uncertainty regarding the potential consequences of sophisticated cyberattacks, one form of <a href="https://irregularwarfarecenter.org/wp-content/uploads/20230111_Perspectives_No_2.pdf">irregular warfare</a>, while emphasizing that any major offensive would have significant repercussions.</p>
<p>A third argument concerns the protection of nuclear command. Even a limited attack on control systems could be interpreted as an attempt to neutralize the second-strike capability, creating an extreme risk of miscalculation, especially with the <a href="https://www.europeanleadershipnetwork.org/wp-content/uploads/2023/11/AVC-Final-Report_online-version.pdf">increasing use of artificial intelligence</a>. By clearly announcing that such an intrusion would be considered a serious and unacceptable act, democratic regimes would strengthen their strategic stability, discouraging any hostile action and reducing the risk of unintentional escalation during times of international crisis.</p>
<p><strong>Perilous Lines</strong></p>
<p>This doctrinal shift, however, carries significant risks, notably the unintentional lowering of the nuclear threshold. Even if the clarification primarily aims to strengthen deterrence, it could be perceived as an excessive threat by non-democratic States, prompting them to rapidly modernize their nuclear arsenals or develop sophisticated offensive cyber capabilities. The proliferation of <a href="https://www.army.mil/article/288840/the_role_of_cyber_conflict_in_nuclear_deterrence">cyber threats</a> with potentially physical effects creates a low-profile but ultimately strategic space for competition, paradoxically exacerbating tensions and instability.</p>
<p>Responding to a cyberattack with a nuclear strike requires absolute certainty as to its true perpetrator. Yet, operations in cyberspace often involve <a href="https://apps.dtic.mil/sti/html/tr/ADA602150/">proxies, opaque international relays, and technical masking of the source</a>. An attribution error could have profound consequences. Additionally, a cyber intrusion seen as preparation for a major attack might provoke an overreaction during a crisis. Any doctrine that includes the possibility of a nuclear response must therefore incorporate rigorous <em>deconfliction mechanisms</em>, otherwise the worst will happen.</p>
<p>However, these risks should not obscure a strategic reality: current doctrine dates to a time when cyberattacks could not paralyze a country in minutes. This is no longer the case. Adversaries of democratic regimes have understood that cyberspace offers them a means of inflicting considerable damage while remaining below the threshold for a nuclear response. Doing nothing would amount to accepting a structural vulnerability, especially since middle ground is emerging. This involves explicitly defining two categories of cyberattacks likely to trigger an appropriate military response:</p>
<ol>
<li>Attacks causing massive impacts on the civilian population or critical infrastructure (hospitals and emergency services, water distribution networks, etc.).</li>
<li>Intrusions targeting the command systems of the armed forces, even without destructive effects, with the aim of degrading a country’s decision-making capacity.</li>
</ol>
<p>Though it would not directly reference nuclear weapons, this clarification would connect strategic cyberattacks to potential responses, giving decision-makers flexibility while clearly warning adversaries. A more explicit doctrine should reduce the risks of accidental escalation and limit the audacity of State and non-State actors willing to test the nerves of democratic regimes, in line with <a href="https://globalsecurityreview.com/arming-for-deterrence-a-nuclear-posture-for-the-next-decade/">recent analyses</a> on the evolution of the U.S. nuclear posture in the face of new strategic threats that the war in Ukraine has only exacerbated.</p>
<p><strong>About the Author</strong></p>
<p><em>Gilles A. Paché is a Professor of Marketing and Supply Chain Management at Aix-Marseille University, France, and a member of the CERGAM Lab. His research focuses on logistics strategy, distribution channel management, and military studies. On these topics, he has authored over 700 scholarly publications, including articles, book chapters, and conference papers, as well as 24 academic books. Views expressed in this article are the author’s own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/12/Hacking-the-Apocalypse-How-Cyberattacks-Could-Trigger-Nuclear-Escalation.pdf"><img decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="176" height="49" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 176px) 100vw, 176px" /></a></p>
<p><a href="https://globalsecurityreview.com/hacking-the-apocalypse-how-cyberattacks-could-trigger-nuclear-escalation/">Hacking the Apocalypse: How Cyberattacks Could Trigger Nuclear Escalation</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/hacking-the-apocalypse-how-cyberattacks-could-trigger-nuclear-escalation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Beyond the Next Administration: Building Enduring Tech–Government Alliances for National Power</title>
		<link>https://globalsecurityreview.com/beyond-the-next-administration-building-enduring-tech-government-alliances-for-national-power/</link>
					<comments>https://globalsecurityreview.com/beyond-the-next-administration-building-enduring-tech-government-alliances-for-national-power/#respond</comments>
		
		<dc:creator><![CDATA[Greg Sharpe]]></dc:creator>
		<pubDate>Mon, 15 Dec 2025 13:14:00 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[accountability]]></category>
		<category><![CDATA[advanced analytics]]></category>
		<category><![CDATA[advisory councils]]></category>
		<category><![CDATA[AI safety frameworks]]></category>
		<category><![CDATA[AI-enabled national preparedness]]></category>
		<category><![CDATA[Air Force Research Laboratory (AFRL)]]></category>
		<category><![CDATA[biosecurity infrastructure]]></category>
		<category><![CDATA[bipartisan engagement]]></category>
		<category><![CDATA[co-stewardship of national resilience]]></category>
		<category><![CDATA[codifying capabilities in law]]></category>
		<category><![CDATA[Congress as strategic partner]]></category>
		<category><![CDATA[continuity across administrations]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[defense planning ​]]></category>
		<category><![CDATA[democratic oversight]]></category>
		<category><![CDATA[Department of Energy (DOE) quantum networks]]></category>
		<category><![CDATA[disaster response]]></category>
		<category><![CDATA[distributed quantum networking testbed]]></category>
		<category><![CDATA[economic competitiveness]]></category>
		<category><![CDATA[Economic Security]]></category>
		<category><![CDATA[entanglement distribution]]></category>
		<category><![CDATA[ethics]]></category>
		<category><![CDATA[experimental infrastructure]]></category>
		<category><![CDATA[federal guidance]]></category>
		<category><![CDATA[intellectual property protections]]></category>
		<category><![CDATA[international norms]]></category>
		<category><![CDATA[ion-trap quantum computer]]></category>
		<category><![CDATA[mission-driven portfolios]]></category>
		<category><![CDATA[multi-stakeholder governance]]></category>
		<category><![CDATA[multi-year funding]]></category>
		<category><![CDATA[National Defense Authorization Act (NDAA)]]></category>
		<category><![CDATA[national power]]></category>
		<category><![CDATA[National Quantum Initiative (NQI)]]></category>
		<category><![CDATA[national resilience]]></category>
		<category><![CDATA[Navy quantum RDT&E]]></category>
		<category><![CDATA[near-term use cases]]></category>
		<category><![CDATA[nontraditional vendors]]></category>
		<category><![CDATA[Other Transaction Authority (OTA)]]></category>
		<category><![CDATA[oversight boards]]></category>
		<category><![CDATA[pilot programs]]></category>
		<category><![CDATA[public trust]]></category>
		<category><![CDATA[public-private partnerships]]></category>
		<category><![CDATA[quantum communications]]></category>
		<category><![CDATA[quantum communications corridor]]></category>
		<category><![CDATA[quantum networking testbeds]]></category>
		<category><![CDATA[quantum-resilient communications]]></category>
		<category><![CDATA[quantum-resistant secure transmission]]></category>
		<category><![CDATA[RDT&E portfolio]]></category>
		<category><![CDATA[responsible technology use]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[stable appropriations]]></category>
		<category><![CDATA[statutory roles for key technologies]]></category>
		<category><![CDATA[strategic competitiveness]]></category>
		<category><![CDATA[streamlined oversight]]></category>
		<category><![CDATA[supply-chain monitoring]]></category>
		<category><![CDATA[supply-chain security]]></category>
		<category><![CDATA[tech–government alliances]]></category>
		<category><![CDATA[threat detection]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[Trust in government]]></category>
		<category><![CDATA[workforce opportunity]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31969</guid>

					<description><![CDATA[<p>The tech industry can increase the nation’s trust in government by becoming a reliable and visibly accountable partner for securing America’s technological edge. Specifically, the tech industry can help Congress codify critical capabilities in law and funding provisions that outlast political cycles. Doing so successfully will require long-term relationships with legislators, bipartisan support, and clear [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/beyond-the-next-administration-building-enduring-tech-government-alliances-for-national-power/">Beyond the Next Administration: Building Enduring Tech–Government Alliances for National Power</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The tech industry can increase the nation’s trust in government by becoming a reliable and visibly accountable partner for securing America’s technological edge. Specifically, the tech industry can help Congress codify critical capabilities in law and funding provisions that outlast political cycles. Doing so successfully will require long-term relationships with legislators, bipartisan support, and clear safeguards that reassure the public that powerful technologies are used in the best interest of the nation.<a href="https://www.edelman.com/trust/2025/trust-barometer">[1</a>]​</p>
<p><strong>Why Trust and Continuity Matter</strong></p>
<p>Recent trust surveys show that public confidence in both government and business has declined, with many people believing institutional leaders are not honest with them. The 2025 Edelman Trust Barometer, for example, highlights a “crisis of grievance,” in which large segments of the population feel left behind and are more inclined to distrust complex policy and technology initiatives.<a href="https://cooleypubco.com/2025/02/11/2025-edelman-trust-barometer-grievance/">[2</a>]​</p>
<p>This erosion of trust is particularly dangerous at a time when artificial intelligence, quantum technologies, and advanced biotechnologies are central to economic and military competition. A report submitted to Congress by U.S.–China policy experts emphasizes that both countries now treat these technologies as strategic industries, tying them directly to national power and long-term security.[<u>4]</u>​</p>
<p><strong>Building Durable Relationships with Legislators</strong></p>
<p>For technology companies, increasing national trust starts with treating Congress as a long‑term strategic partner, not simply as an annual budget gatekeeper.<a href="https://www.uscc.gov/sites/default/files/2024-11/2024_Annual_Report_to_Congress.pdf">[4]</a>​</p>
<ul>
<li>Institutionalize bipartisan technology engagement: Firms can create recurring, nonpartisan briefings and workshops with relevant committees to explain how artificial intelligence (AI), quantum, cyber, and bio tools affect national resilience, economic competitiveness, and workforce opportunity. By engaging members and staff from both parties, companies reduce the perception that emerging technologies are aligned with a single political faction.<a href="https://www.uscc.gov/sites/default/files/2024-11/2024_Annual_Report_to_Congress.pdf">[5]</a>​</li>
<li>Lead with ethics, safety, and security: Research on public attitudes toward AI suggests people are more supportive when they see clear safeguards, transparency, and accountability mechanisms within the tech industry. Companies can build trust by proactively presenting their AI safety frameworks, data-protection policies, and supply‑chain security measures, aligning them with federal guidance and international norms on responsible technology use.<a href="https://www.edelman.com/sites/g/files/aatuss191/files/2025-01/Global%20Top%2010%202025%20Trust%20Barometer.pdf">[6]</a>​</li>
</ul>
<p><strong>Securing Sustained Funding for Critical Technology</strong></p>
<p>Trust is reinforced when technology programs are clearly tied to enduring strategic missions and supported through stable, multi‑year funding rather than fragile pilots.<a href="https://www.uscc.gov/sites/default/files/2024-11/2024_Annual_Report_to_Congress.pdf">[5]</a>​</p>
<ul>
<li>Connect capabilities to mission portfolios: Instead of scattered line items, technology programs can be organized into mission‑driven portfolios—such as quantum‑resilient communications, AI‑enabled national preparedness, or biosecurity infrastructure—that span research, prototyping, and deployment over several years. Multi‑year authorizations and appropriations make it harder for any single administration to abruptly cancel essential capabilities.<a href="https://www.uscc.gov/sites/default/files/2024-11/Chapter_3--U.S.-China_Competition_in_Emerging_Technologies.pdf">[4]</a>​</li>
<li>Use innovation tools that protect both government and industry: Policy analyses highlight the value of mechanisms like Other Transaction Authority and structured public‑private partnerships to bring nontraditional vendors into national security and infrastructure work more quickly. By pairing these tools with clearer intellectual property protections and streamlined oversight, legislators can encourage top-tier tech firms to stay engaged in sensitive missions over the long term.<a href="https://ptacts.uspto.gov/ptacts/public-informations/petitions/1558121/download-documents?artifactId=z4DLuAiI8FBq5qxTCRlq-VPk-yx0lU4p_Mou2oSkOWL2OdIfZr8DAG4">[8]</a>​</li>
</ul>
<p><strong>Embedding Technology in Law, Not Just Budgets</strong></p>
<p>To prevent critical technologies from being swapped out with each political shift, their roles must be written into statute and tied to democratic oversight.<a href="https://www.jdsupra.com/legalnews/white-house-releases-2025-national-7517228/">[9]</a>​</p>
<ul>
<li>Statutory roles for key technologies: Laws governing defense planning, critical infrastructure, and economic security should explicitly call for the use of AI, secure digital infrastructure, and advanced analytics in defined mission areas, such as threat detection, disaster response, and supply‑chain monitoring. Once these roles are codified, dismantling them requires visible legislative action rather than quiet executive changes.<a href="https://www.jdsupra.com/legalnews/white-house-releases-2025-national-7517228/">[9]</a>​</li>
<li>Multi-stakeholder governance in legislation: Legislated advisory councils and oversight boards that include government, industry, academia, and civil society should supervise high-impact technologies and publish regular reports. This structure signals that powerful tools are subject to ongoing, pluralistic scrutiny rather than being controlled solely by political appointees or corporate executives.<a href="https://www.biotech.senate.gov/wp-content/uploads/2025/04/NSCEB-Full-Report-%E2%80%93-Digital-%E2%80%934.28.pdf">[10]</a>​</li>
</ul>
<p><strong>Quantum Networking Testbed Infrastructure</strong></p>
<p>The National Defense Authorization Act (NDAA) put forth by Congress each year does not typically use a single, generic phrase like “quantum networking testbeds” in isolation; instead, it authorizes and directs specific programs and experiments that collectively constitute quantum networking testbed infrastructure. Several provisions and related authoritative documents are especially relevant to the future of quantum technology growth.</p>
<p>A Senate Armed Services Committee fact sheet on the fiscal year 2024 NDAA highlights language that “authorizes increased funding for a distributed quantum networking testbed” and the development of a next-generation ion‑trap quantum computer at the Air Force Research Laboratory (AFRL). While the fact sheet summarizes rather than reproduces the statutory text, it makes clear that Congress explicitly authorized a distributed quantum networking testbed as part of the defense Research, Development, Test, and Evaluation (RDT&amp;E) portfolio.<a href="https://defensescoop.com/2024/01/08/ndaa-2024-quantum-provisions/">[12]</a>​</p>
<p>Within the fiscal year 2025 NDAA, Congress, “authorizes funding to create a ‘quantum communications corridor’ as part of Navy research, development, test, and evaluation.” This is an explicit description of support for a testbed or network to advance quantum communication research so the Navy and the Department of Defense (DoD) can securely transmit information resistant to quantum computer decryption.<a href="https://www.emergingtechnologiesinstitute.org/publications/insights/fy2025ndaa">[15]</a>​</p>
<p>Other recent NDAA cycles also include broader direction that reinforces these testbed authorizations, such as requirements for DoD to establish pilot programs for promising quantum computing capabilities and to identify near‑term use cases that can be fielded within two years. These provisions do not always use the word “testbed” in the operative clause, but they direct the department to stand up experimental infrastructure and pilots that, in practice, operate as quantum networking and computing testbeds for defense applications.<a href="https://www.nextgov.com/emerging-tech/2024/12/fy2025-ndaa-angles-enhance-dods-ai-and-quantum-sciences-capabilities/401545/">[16]</a>​</p>
<p>In parallel, the National Quantum Initiative framework and associated Department of Energy (DOE) efforts describe quantum networking testbeds as shared infrastructure for entanglement distribution and quantum communications, and Congressional action has repeatedly referenced these federal testbeds and network efforts as part of the broader quantum information science ecosystem that the DoD can leverage.<a href="https://www.quantum.gov/wp-content/uploads/2022/08/NQIA2018-NDAA2022-CHIPS2022.pdf">[13]</a>​</p>
<p>Ensuring key technologies not only protect the nation but are also provided with substantial investment and economic promise is a necessity for companies to further their developmental efforts. Demonstrating that quantum technologies are viable for multiple applications—within internal defense and external partnerships—is one possible solution as tech companies become increasingly concerned with the long-term payoff of their test bed programs. For now, defense authorization bills appear to be the most forward leaning avenue supported by government, but the long-term stability of this method has yet to be validated.</p>
<p><strong>How This Approach Builds Public Trust</strong></p>
<p>When the tech industry engages both parties and chambers in Congress, supports multi-year statutory programs, and accepts meaningful oversight, it demonstrates that emerging technologies are being developed within a framework of law, ethics, and long-term national interest. In such a system, citizens can see that AI, quantum computing, and other advanced capabilities are not partisan experiments or purely profit-driven ventures, but part of a durable national strategy subject to democratic control.<a href="https://www.edelman.com/news-awards/2025-edelman-trust-barometer-reveals-high-level-grievance">[2]</a>​</p>
<p>The tech sector can both strengthen U.S. strategic competitiveness and contribute tangibly to rebuilding public trust in government by positioning itself as a co-steward of national resilience, helping design governance mechanisms, committing to transparency, and working with legislators to hard‑wire critical technologies into law and funding.<a href="https://www.uscc.gov/sites/default/files/2024-11/Chapter_3--U.S.-China_Competition_in_Emerging_Technologies.pdf">[5]</a>​</p>
<p>Sources:</p>
<ol>
<li><a href="https://www.edelman.com/trust/2025/trust-barometer">https://www.edelman.com/trust/2025/trust-barometer</a></li>
<li><a href="https://cooleypubco.com/2025/02/11/2025-edelman-trust-barometer-grievance/">https://cooleypubco.com/2025/02/11/2025-edelman-trust-barometer-grievance/</a></li>
<li><a href="https://www.edelman.com/news-awards/2025-edelman-trust-barometer-reveals-high-level-grievance">https://www.edelman.com/news-awards/2025-edelman-trust-barometer-reveals-high-level-grievance</a></li>
<li><a href="https://www.uscc.gov/sites/default/files/2024-11/Chapter_3--U.S.-China_Competition_in_Emerging_Technologies.pdf">https://www.uscc.gov/sites/default/files/2024-11/Chapter_3&#8211;U.S.-China_Competition_in_Emerging_Technologies.pdf</a></li>
<li><a href="https://www.uscc.gov/sites/default/files/2024-11/2024_Annual_Report_to_Congress.pdf">https://www.uscc.gov/sites/default/files/2024-11/2024_Annual_Report_to_Congress.pdf</a></li>
<li><a href="https://www.edelman.com/sites/g/files/aatuss191/files/2025-01/Global%20Top%2010%202025%20Trust%20Barometer.pdf">https://www.edelman.com/sites/g/files/aatuss191/files/2025-01/Global%20Top%2010%202025%20Trust%20Barometer.pdf</a></li>
<li><a href="https://www.nationalsecurity.ai/chapter/executive-summary">https://www.nationalsecurity.ai/chapter/executive-summary</a></li>
<li><a href="https://ptacts.uspto.gov/ptacts/public-informations/petitions/1558121/download-documents?artifactId=z4DLuAiI8FBq5qxTCRlq-VPk-yx0lU4p_Mou2oSkOWL2OdIfZr8DAG4">https://ptacts.uspto.gov/ptacts/public-informations/petitions/1558121/download-documents?artifactId=z4DLuAiI8FBq5qxTCRlq-VPk-yx0lU4p_Mou2oSkOWL2OdIfZr8DAG4</a></li>
<li><a href="https://www.jdsupra.com/legalnews/white-house-releases-2025-national-7517228/">https://www.jdsupra.com/legalnews/white-house-releases-2025-national-7517228/</a></li>
<li><a href="https://www.biotech.senate.gov/wp-content/uploads/2025/04/NSCEB-Full-Report-%E2%80%93-Digital-%E2%80%934.28.pdf">https://www.biotech.senate.gov/wp-content/uploads/2025/04/NSCEB-Full-Report-%E2%80%93-Digital-%E2%80%934.28.pdf</a></li>
<li><a href="https://www.imd.org/ibyimd/audio-articles/restoring-faith-in-leadership-in-the-age-of-grievance/">https://www.imd.org/ibyimd/audio-articles/restoring-faith-in-leadership-in-the-age-of-grievance/</a></li>
<li><a href="https://defensescoop.com/2024/01/08/ndaa-2024-quantum-provisions/">https://defensescoop.com/2024/01/08/ndaa-2024-quantum-provisions/</a></li>
<li><a href="https://www.quantum.gov/wp-content/uploads/2022/08/NQIA2018-NDAA2022-CHIPS2022.pdf">https://www.quantum.gov/wp-content/uploads/2022/08/NQIA2018-NDAA2022-CHIPS2022.pdf</a></li>
<li><a href="https://www.quantum.gov/wp-content/uploads/2024/12/NQI-Annual-Report-FY2025.pdf">https://www.quantum.gov/wp-content/uploads/2024/12/NQI-Annual-Report-FY2025.pdf</a></li>
<li><a href="https://www.emergingtechnologiesinstitute.org/publications/insights/fy2025ndaa">https://www.emergingtechnologiesinstitute.org/publications/insights/fy2025ndaa</a></li>
<li><a href="https://www.nextgov.com/emerging-tech/2024/12/fy2025-ndaa-angles-enhance-dods-ai-and-quantum-sciences-capabilities/401545/">https://www.nextgov.com/emerging-tech/2024/12/fy2025-ndaa-angles-enhance-dods-ai-and-quantum-sciences-capabilities/401545/</a></li>
</ol>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/12/Beyond-the-Next-Administration-Building-Enduring-TechGovernment-Alliances-for-National-Power.pdf"><img decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="256" height="71" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 256px) 100vw, 256px" /></a></p>
<p><a href="https://globalsecurityreview.com/beyond-the-next-administration-building-enduring-tech-government-alliances-for-national-power/">Beyond the Next Administration: Building Enduring Tech–Government Alliances for National Power</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/beyond-the-next-administration-building-enduring-tech-government-alliances-for-national-power/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Tech-centric Partnership in the Indo-Pacific to Deter Digital Curtain</title>
		<link>https://globalsecurityreview.com/tech-centric-partnership-in-the-indo-pacific-to-deter-digital-curtain/</link>
					<comments>https://globalsecurityreview.com/tech-centric-partnership-in-the-indo-pacific-to-deter-digital-curtain/#respond</comments>
		
		<dc:creator><![CDATA[Abrar Rahman Namir]]></dc:creator>
		<pubDate>Tue, 05 Aug 2025 12:08:07 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Abrar Rahman Namir. ​]]></category>
		<category><![CDATA[Advanced Persistent Threat (APT)]]></category>
		<category><![CDATA[American Strategic Interests]]></category>
		<category><![CDATA[ASEAN]]></category>
		<category><![CDATA[asymmetric capabilities]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Critical and Emerging Technology]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[Cyber Coercion]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Cyber Incidents]]></category>
		<category><![CDATA[Cyberspace]]></category>
		<category><![CDATA[Democracies]]></category>
		<category><![CDATA[Digital Age]]></category>
		<category><![CDATA[Digital Curtain]]></category>
		<category><![CDATA[Digital Enforcement Body]]></category>
		<category><![CDATA[Digital Silk Road]]></category>
		<category><![CDATA[Disinformation campaigns]]></category>
		<category><![CDATA[Economic Security]]></category>
		<category><![CDATA[Free and Open Indo-Pacific]]></category>
		<category><![CDATA[Geopolitical Significance]]></category>
		<category><![CDATA[Gray Zone Tactics]]></category>
		<category><![CDATA[Great Power Competition]]></category>
		<category><![CDATA[Indo-Pacific]]></category>
		<category><![CDATA[Indo-Pacific Partnership for Maritime Domain Awareness (IPMDA)]]></category>
		<category><![CDATA[Maritime Initiative for Training in the Indo-Pacific (MAITRI)]]></category>
		<category><![CDATA[maritime security]]></category>
		<category><![CDATA[Pacific Island Forum]]></category>
		<category><![CDATA[Quad Cyber Challenge]]></category>
		<category><![CDATA[Quad Foreign Ministers’ Meeting]]></category>
		<category><![CDATA[Quad Partnership on Cable Connectivity and Resilience]]></category>
		<category><![CDATA[Regional Partners]]></category>
		<category><![CDATA[resource allocation]]></category>
		<category><![CDATA[Specialized Workers]]></category>
		<category><![CDATA[Strategic Inertia]]></category>
		<category><![CDATA[Tech-centric Partnership]]></category>
		<category><![CDATA[technological advancements]]></category>
		<category><![CDATA[Technology-enabled Authoritarianism]]></category>
		<category><![CDATA[Telecommunications Infrastructure]]></category>
		<category><![CDATA[Undersea Cables]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Volt Typhoon]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31294</guid>

					<description><![CDATA[<p>From Pakistan in the Indian Ocean to Kiribati in Oceania, a digital curtain is falling across the Indo-Pacific. Various actors are leveraging cyberspace and technological advancements to implement an alternative vision to a free and open Indo-Pacific—a direct affront to democracies and American strategic interests. It is reported that 77 percent of all known state-backed [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/tech-centric-partnership-in-the-indo-pacific-to-deter-digital-curtain/">Tech-centric Partnership in the Indo-Pacific to Deter Digital Curtain</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>From Pakistan in the Indian Ocean to Kiribati in Oceania, a digital curtain is falling across the Indo-Pacific. Various actors are leveraging cyberspace and technological advancements to implement an alternative vision to a free and open Indo-Pacific—a direct affront to democracies and American strategic interests. It is reported that <a href="https://www.cnas.org/publications/reports/cyber-crossroads-in-the-indo-pacific">77 percent of all known state-backed cyber operations</a> emanate from China and its associates, while those attacks attempt to undermine societal institutions in countries such as Taiwan, Japan, Australia, and New Zealand, among others. These incidents reveal China’s broader strategic vision, one that entails shaping the regional structure in its favor.</p>
<p>The digital Silk Road (DSR), China’s initiative to invest in critical telecommunications and emerging technology in foreign countries, is a vehicle to lower the barriers to cyber coercion and propagate the digital curtain. By embedding its “<a href="https://www.cfr.org/china-digital-silk-road/">model of technology-enabled authoritarianism</a>” in recipient nations, Beijing seeks to shape the digital ecosystems of other countries in ways that serve its strategic interests. Such attempts call for a proactive and coordinated response from the United States and its regional partners—one that builds a resilient, tech-driven organization capable of countering China’s digital expansion across the the Indo-Pacific.</p>
<p>The United States and China are engaged in a great power competition, one which has seeped into multiple theaters and domains. The Indo-Pacific region is generally understood to be the frontline of this contest.</p>
<p>However, China’s burgeoning technological capacity has led to cyberspace being a critical juncture in this competition; one where traditional borders fade, thereby allowing the proliferation of gray zone tactics. Such tactics are deployed in various ways—<a href="https://www.cnas.org/publications/reports/cyber-crossroads-in-the-indo-pacific">infiltrating critical infrastructure</a>, cyber espionage, and disinformation campaigns—on key democracies in the region.</p>
<p>Considering the geopolitical significance of the Indo-Pacific, China’s attempts to use cyber coercion to cleave the region from the United States’ sphere of influence highlights a calculated strategy by the Chinese Communist Party (CCP). The region is home to over <a href="https://www.trade.gov/indo-pacific-commercial-service">50 percent</a> of the world’s population, and <a href="https://www.isdp.eu/publication/indo-pacific-security-in-2030-35-links-in-the-chain/">80 percent</a> of global trade volume transits through its channels. It houses “<a href="https://washingtondc.jhu.edu/news/three-observations-about-the-strategic-importance-of-the-indo-pacific/">seven of the world’s largest militaries, and five American treaty allies</a>.”</p>
<p>Moreover, digital connectivity and <a href="https://www.cnas.org/publications/reports/cyber-crossroads-in-the-indo-pacific">internet adoption rates</a> are the fastest growing compared to any region in the word, making it rife with opportunities and threats. These vulnerabilities not only indicate further volatility for regional governments but could also undermine American national security.</p>
<p>The list of cyber incidents already attributed to Chinese state-sponsored entities is extensive, and its targets are equally expansive. Advanced persistent threat (APT)—long-term, sophisticated, and entrenched cyber intrusions designed to hack, steal, and/or neutralize systems—have been a weapon of choice for those entities. For instance, <a href="https://www.cnas.org/publications/reports/cyber-crossroads-in-the-indo-pacific">APT-30 and APT-40</a>, which targeted Association of South East Asian Nations (ASEAN) members and New Zealand’s government, respectively, are reportedly linked to the Chinese government.</p>
<p>Furthermore, American intelligence and cybersecurity agencies recently confirmed that <a href="https://www.cisa.gov/topics/cyber-threats-and-advisories/nation-state-cyber-actors/china">Volt Typhoon</a>, a Chinese state-sponsored entity, compromised American critical infrastructure ranging from telecommunications to water systems; its reach even included US territories such as Guam.</p>
<p>While the specter of ATPs and digital intrusions have entered the purview of several governments in the Indo-Pacific region, individual efforts to deter those threats are futile. This is often due to strategic inertia, a shortage of specialized workers, and asymmetric capabilities.</p>
<p>A consolidated effort by the United States and its regional partners is needed to build consensus, direct resources, and establish a digital enforcement body. This could address those issues while mitigating any potential upheaval from China’s tactics. Fortunately, the groundwork for such a partnership is already in place.</p>
<p>On July 1, 2025, the 10th Quad foreign ministers’ meeting was hosted by US Secretary of State Marco Rubio, where he was joined by his counterparts from Japan, India, and Australia. It was the second such meeting since January, signifying the importance placed on the vision of the group by the Trump administration.</p>
<p>The measures agreed upon as a result are further evidence to that fact—<a href="https://www.state.gov/releases/office-of-the-spokesperson/2025/07/2025-quad-foreign-ministers-meeting/">initiatives to bolster maritime and transnational security, economic security, critical and emerging technology</a>, among others. Therefore, the vast security mandates of those initiatives provide a viable path to constructing a techno-centric partnership while addressing the region’s strategic, skills, and capabilities gaps when it comes to deterring China’s digital incursions.</p>
<p>The decision to expand the <a href="https://www.pmc.gov.au/resources/quad-leaders-summit-2023/indo-pacific-partnership-maritime-domain-awareness">Indo-Pacific Partnership for Maritime Domain Awareness</a> (IPMDA)—a technology-focused initiative to augment the maritime security landscape—provides a practical foundation for a techno-centric partnership. Its stated goal of developing a “<a href="https://www.state.gov/releases/office-of-the-spokesperson/2025/07/2025-quad-foreign-ministers-meeting/">common operating picture</a>” for the IPMDA could lead to the basis for a strategic consensus among potential members.</p>
<p>Furthermore, incorporating insights from the <a href="https://www.state.gov/releases/office-of-the-spokesperson/2025/07/2025-quad-foreign-ministers-meeting/">first Maritime Initiative for Training in the Indo-Pacific</a> (MAITRI) workshop could assist in closing the skills gap for a regional digital workforce, further adding to the partnership’s feasibility.</p>
<p>Additional features which could be utilized for the partnership and address the capabilities gap include the <a href="https://2021-2025.state.gov/2024-quad-cyber-challenge-joint-statement/">Quad Cyber Challenge</a> and the <a href="https://www.dfat.gov.au/international-relations/regional-architecture/quad/cable-connectivity-and-resilience-centre">Quad Partnership on Cable Connectivity and Resilience</a>. The Cyber Challenge seeks to enhance the cyber ecosystem, digital awareness, and resourcing among member nations.</p>
<p>The Partnership on Cable Connectivity and Resilience, on the other hand, bears a more tactical responsibility of strengthening telecommunications infrastructure, specifically, undersea cables—arguably the most critical component of the digital ecosystem. Although these initiatives are focused on Quad member-nations, they could be expanded in a larger forum to engage ASEAN and Pacific subregional organizations such as the Pacific Island Forum, providing more opportunities for resource allocation.</p>
<p>There is institutional and strategic momentum behind the formation of a tech-centric partnership, not to mention the critical security imperative that exists. The broad consensus, coupled with the runway to take near-term action, makes this a prospective enterprise. Such concrete action is necessitated if the US and its regional allies expect to maintain a free and open Indo-Pacific and establish an active deterrent to China, which seeks to write the rules and draw the margins of the evolving digital age.</p>
<p><em>Abrar Rahman Namir is currently interning at Associated Universities and assisting in the Batteries and Energies to Advance Commercialization and National Security program as a supply chains and trade analyst.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/08/Tech-centric.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="230" height="64" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 230px) 100vw, 230px" /></a></p>
<p><a href="https://globalsecurityreview.com/tech-centric-partnership-in-the-indo-pacific-to-deter-digital-curtain/">Tech-centric Partnership in the Indo-Pacific to Deter Digital Curtain</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/tech-centric-partnership-in-the-indo-pacific-to-deter-digital-curtain/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How Civilian Dual-Use Technologies Are Reshaping Global Security Policies</title>
		<link>https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/</link>
					<comments>https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/#respond</comments>
		
		<dc:creator><![CDATA[Harry Geisler]]></dc:creator>
		<pubDate>Thu, 17 Jul 2025 12:17:17 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Development]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI-enabled navigation]]></category>
		<category><![CDATA[AUKUS]]></category>
		<category><![CDATA[autonomous weapons]]></category>
		<category><![CDATA[Civilian dual-use technologies]]></category>
		<category><![CDATA[collective defense]]></category>
		<category><![CDATA[counter-drone strategy]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[drones]]></category>
		<category><![CDATA[energy grid]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[export control regimes]]></category>
		<category><![CDATA[FPV drones]]></category>
		<category><![CDATA[global security policies]]></category>
		<category><![CDATA[governance gaps]]></category>
		<category><![CDATA[hybrid conflict]]></category>
		<category><![CDATA[infrastructure attacks]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[legal frameworks]]></category>
		<category><![CDATA[National defense]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Nord Stream pipelines]]></category>
		<category><![CDATA[procurement pathways]]></category>
		<category><![CDATA[resilience]]></category>
		<category><![CDATA[sabotage]]></category>
		<category><![CDATA[start-ups]]></category>
		<category><![CDATA[transportation hubs]]></category>
		<category><![CDATA[unmanned aircraft systems]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31187</guid>

					<description><![CDATA[<p>In August 2024, police in northern Germany chased a fleet of drones loitering over critical infrastructure: a decommissioned nuclear plant, a chemical facility, and a Baltic liquified natural gas (LNG) terminal. The drones flew with impunity, reportedly reaching 100 kilometres an hour to evade police. Authorities launched an espionage investigation, suspecting the drones were scouting [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/">How Civilian Dual-Use Technologies Are Reshaping Global Security Policies</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In August 2024, <a href="https://www.defensenews.com/global/europe/2024/08/29/drone-sightings-near-bases-infrastructure-unnerve-german-officials">police in northern Germany</a> chased a fleet of drones loitering over critical infrastructure: a decommissioned nuclear plant, a chemical facility, and a Baltic liquified natural gas (LNG) terminal. The drones flew with impunity, reportedly reaching 100 kilometres an hour to evade police. Authorities launched an espionage investigation, suspecting the drones were scouting for sabotage.</p>
<p>This was not an isolated incident. Civilian-grade drones and other dual-use technologies are increasingly being used to survey or target public infrastructure. From energy grids to airports, the connective tissue of modern life is exposed to risks once confined to traditional warzones. These developments are reshaping global security policies and blurring the boundary between civilian and military domains.</p>
<h3><strong>Civilian Tech, Strategic Impact</strong></h3>
<p>Cheap unmanned aircraft systems (UAS) are now accessible worldwide. While drones were initially developed for military use, the most commonly deployed platforms today, such as DJI’s Mavic series, were originally built for civilian applications like aerial photography and videography. Their affordability, portability, and high-spec cameras made them commercially popular, but those same features have made them easy to repurpose for military contexts.</p>
<p>In particular, first-person view (FPV) drones, designed for immersive recreational flying, were rapidly adapted for frontline use in conflict. These drones are now routinely deployed with improvised explosives or used for precision reconnaissance. In Ukraine, both sides repurposed off-the-shelf drones in vast numbers; nearly two million were produced in 2024 alone. Many of these are equipped with AI-enabled navigation and targeting, underscoring how quickly civilian tech can be weaponised.</p>
<p>Non-state actors are following suit. Armed groups are using FPV drones for low-cost, high impact strikes on infrastructure, blurring the lines between military and civilian threats. This second drone age shows that national security vulnerabilities now stem as much from consumer technology as from conventional arsenals.</p>
<p>The broader implication is clear: private-sector innovations, often created without any defense intent, are shaping the battlefield. These companies bring novel use cases, technical advantages, or agile design processes that legacy defense contractors may overlook. Civilian tech is not just a risk; it is a potential strategic asset. Tapping into this ecosystem, especially among start-ups and experts, could redefine how the country protects critical infrastructure in an era of hybrid conflict.</p>
<p><strong>Infrastructure in the Crosshairs</strong></p>
<p>Modern infrastructure is a key target in modern conflicts or hybrid attacks, just like military bases traditionally were. In 2022, after the <a href="https://www.theguardian.com/business/2022/sep/29/nord-stream-attacks-highlight-vulnerability-undersea-pipelines-west">sabotage of the Nord Stream pipelines</a>, over 70 drone sightings were reported near Norwegian offshore oil platforms. Oslo feared Russian-linked hybrid operations targeting Europe’s energy supply and deployed naval assets and invited NATO allies to assist in patrols.</p>
<p>Meanwhile, Ukraine’s energy grid suffered repeated drone and missile attacks, with waves of <a href="https://www.csis.org/analysis/drone-saturation-russias-shahed-campaign">low-cost Shahed drones</a> used to disable power plants. By spring 2024, <a href="https://www.bbc.co.uk/news/articles/czvvj4j4p8ro">roughly half of Ukraine’s electricity capacity</a> was destroyed, forcing nationwide blackouts.</p>
<p>Outside conflict zones, attacks on infrastructure are also rising. In Sudan, a <a href="https://www.bbc.co.uk/news/articles/cx20x8g2nego">drone strike on a power station caused regional outages,</a> and other drone attacks on water purification stations left the country on the <a href="https://www.bbc.co.uk/news/articles/c3v5n5ynl59o">brink of a significant Cholera outbreak</a>. In the US, federal officials stopped an attack on a power grid by a man using an <a href="https://domesticpreparedness.com/articles/protecting-critical-infrastructure-from-weaponized-drones">explosive-carrying drone</a>.</p>
<p>Transportation hubs are vulnerable, too. In January 2025, <a href="https://d-fendsolutions.com/blog/europes-drone-challenge-and-countermeasures-in-2025/">drone activity shut down Riga Airport</a>, disrupting dozens of flights.</p>
<p><strong> </strong><strong>Gaps in Governance</strong></p>
<p><strong> </strong>Despite growing risks, legal and operational frameworks remain fragmented. Drones and AI-driven surveillance systems often fall outside traditional arms control regimes. As a recent<a href="https://www.flyingmag.com/white-house-unveils-package-of-drone-measures-in-executive-order/"> executive order</a> put it, “Criminals, terrorists, and hostile foreign actors have intensified their weaponization of drone technologies, creating new and serious threats to our homeland.”</p>
<p>Jurisdictional confusion is common. In many countries, local authorities lack legal authority to respond to rogue drones above critical sites. Aviation safety rules and privacy laws create hesitation, giving bad actors a head start.</p>
<p>Even when threat awareness exists, coordination is inconsistent. The Cybersecurity and Infrastructure Security Agency warns that drones are used for surveillance and sabotage, yet they lack the comprehensive tools to oversee private-sector resilience or cross-border response.</p>
<p><strong> </strong><strong>A Global Security Challenge</strong></p>
<p><strong> </strong>Drone and AI threats are not confined by borders. In 2023, the <a href="https://ec.europa.eu/newsroom/cipr/items/805599/en">European Commission launched a new counter-drone strategy</a>, urging member states to harden infrastructure and coordinate airspace protections. NATO has added counter-UAS exercises to its joint drills, while AUKUS partners are beginning to share emerging drone and AI tactics.</p>
<p>But international law is lagging. There is still no global treaty governing the use of armed drones or autonomous surveillance. Export control regimes struggle to manage proliferation of AI-enabling components. At the UN, efforts to establish binding norms on autonomous weapons are stalled. Ad hoc coordination is, however, slowly improving.</p>
<p>When Norway’s oil platforms were threatened, NATO allies were called in within days. After drone sightings near Dutch and Belgian ports, neighboring governments exchanged countermeasure plans. These models suggest a path forward: rapid and collective responses based on shared tools, shared doctrine, and shared threat intelligence.</p>
<p>The future of civilian dual-use technologies will not be defined by innovators alone. Whether drones or AI software, these tools are already reshaping how adversaries threaten public safety and economic continuity. What is at stake is not just national security, but the resilience of infrastructure that supports daily life.</p>
<p><strong>The Crucial Role of Start-ups in National Defense</strong></p>
<p><strong> </strong>Civilian-origin technologies are now driving the next wave of defense capability. From FPV drones to AI surveillance tools, some of the most disruptive military applications today are emerging not from traditional defense primes but from commercial markets, often developed by start-ups with no military background.</p>
<p>A coordinated international framework is urgently needed, one that does not just support innovation and infrastructure protection but actively integrates civilian tech into defense planning. This means lowering the barriers for experts and start-ups to meaningfully contribute alongside legacy contractors. The <a href="https://www.gov.uk/government/publications/the-strategic-defence-review-2025-making-britain-safer-secure-at-home-strong-abroad/the-strategic-defence-review-2025-making-britain-safer-secure-at-home-strong-abroad#:~:text=Industry%2Dbacked.,new%2C%20segmented%20approach%20to%20procurement:&amp;text=Major%20modular%20platforms%20(contracting%20within,on%20novel%20technologies%20each%20year.">United Kingdom’s recent <em>Defence Review</em></a> hinted at this shift, recognising that smaller firms are vital to national resilience, particularly when civilian infrastructure is under threat.</p>
<p>What is truly needed is a NATO-wide or broader allied framework that enables cross-border collaboration, streamlines regulation, and opens up procurement pathways.</p>
<p>Today, many start-ups working at the intersection of security and technology face steep hurdles: limited access to capital, opaque compliance regimes, and procurement processes designed around, and for, large incumbents. Yet by creating space for their innovation, we can modernize collective defense from the ground up, using the very same civilian tools that adversaries are already turning into weapons.</p>
<p>A coordinated international framework is urgently needed, one that not only supports innovation and infrastructure protection but also lowers barriers to experts and start-ups to contribute more meaningfully alongside traditional defense primes. The <a href="https://www.gov.uk/government/publications/the-strategic-defence-review-2025-making-britain-safer-secure-at-home-strong-abroad/the-strategic-defence-review-2025-making-britain-safer-secure-at-home-strong-abroad#:~:text=Industry%2Dbacked.,new%2C%20segmented%20approach%20to%20procurement:&amp;text=Major%20modular%20platforms%20(contracting%20within,on%20novel%20technologies%20each%20year.">UK’s recent <em>Defence</em> <em>Review </em>hinted at this shift</a>, recognizing the value smaller firms bring to national resilience. It is time to take similar action at home.</p>
<p><em>Harry Geisler is the CEO of YAVA.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/07/How-Civilian-Dual-Use-Technologies-Are-Reshaping-Global-Security-Policies.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="180" height="50" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 180px) 100vw, 180px" /></a></p>
<p><a href="https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/">How Civilian Dual-Use Technologies Are Reshaping Global Security Policies</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Russia’s Vulnerable Underbelly: The Failure of Force Protection on Critical Infrastructure</title>
		<link>https://globalsecurityreview.com/russias-vulnerable-underbelly-the-failure-of-force-protection-on-critical-infrastructure/</link>
					<comments>https://globalsecurityreview.com/russias-vulnerable-underbelly-the-failure-of-force-protection-on-critical-infrastructure/#respond</comments>
		
		<dc:creator><![CDATA[Joshua Thibert]]></dc:creator>
		<pubDate>Tue, 27 May 2025 12:09:22 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[economic destabilization]]></category>
		<category><![CDATA[energy sector]]></category>
		<category><![CDATA[force protection]]></category>
		<category><![CDATA[intelligence failures]]></category>
		<category><![CDATA[internal dissent]]></category>
		<category><![CDATA[international standing]]></category>
		<category><![CDATA[logistical shortcomings]]></category>
		<category><![CDATA[Military Doctrine]]></category>
		<category><![CDATA[national interests. ​]]></category>
		<category><![CDATA[natural gas]]></category>
		<category><![CDATA[Oil]]></category>
		<category><![CDATA[psychological impact]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[sabotage]]></category>
		<category><![CDATA[security strategies]]></category>
		<category><![CDATA[supply chain disruptions]]></category>
		<category><![CDATA[tactical miscalculations]]></category>
		<category><![CDATA[Ukraine conflict]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30811</guid>

					<description><![CDATA[<p>Russia’s military doctrine, honed through decades of sparse experience and adapted in the post-Soviet era, emphasizes the projection of power and the defense of its vast territory. However, the ongoing conflict in Ukraine has exposed a critical weakness: a systemic inability to implement effective force protection measures, resulting in significant vulnerabilities for Russia’s critical infrastructure, [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/russias-vulnerable-underbelly-the-failure-of-force-protection-on-critical-infrastructure/">Russia’s Vulnerable Underbelly: The Failure of Force Protection on Critical Infrastructure</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Russia’s military doctrine, honed through decades of sparse experience and adapted in the post-Soviet era, emphasizes the projection of power and the defense of its vast territory. However, the ongoing conflict in Ukraine has exposed a critical weakness: a systemic inability to implement effective force protection measures, resulting in significant vulnerabilities for Russia’s critical infrastructure, particularly its oil and natural gas fields. This failure stems from a complex interplay of factors, ranging from tactical miscalculations and logistical shortcomings to a potential underestimation of the adversary’s capabilities and a possible overconfidence in Russia’s own defensive capabilities.</p>
<p>Force protection, in its broadest sense, encompasses all measures taken to safeguard personnel, equipment, and facilities from hostile actions. For the military, this includes battlefield tactics, intelligence gathering, logistics security, and the establishment of robust defensive perimeters. For critical infrastructure, it involves physical security, cybersecurity, and contingency planning to mitigate the impact of attacks. Russia’s struggles in both areas are glaringly apparent.</p>
<p>On the battlefield, Russian forces repeatedly demonstrated a lack of effective force protection. From the initial botched attempts to seize Kyiv to the protracted and costly battles in eastern Ukraine, Russian units suffered heavy casualties. This was often due to a combination of poor tactical decisions, inadequate reconnaissance, and a failure to adapt to the evolving battlefield. Ambushes, artillery strikes, and drone attacks took a heavy toll, revealing vulnerabilities in their supply lines and a lack of situational awareness. This inability to protect its forces has not only hampered Russia’s military objectives but also had a cascading effect on the security of its critical infrastructure.</p>
<p>The vulnerability of Russia’s infrastructure, particularly its energy sector, is a direct consequence of these force protection failures. Oil and natural gas fields, pipelines, and processing facilities, often located in remote areas, require robust security to prevent sabotage or attack. However, the demands of the war in Ukraine stretched Russia’s military resources thin, leaving critical infrastructure exposed.</p>
<p>Ukraine’s ability to strike targets deep within Russian territory, including energy facilities, demonstrates this vulnerability. These attacks not only disrupt energy production and supply but also have a significant psychological impact, undermining public confidence in the government’s ability to protect its citizens and vital assets.</p>
<p>Several factors contribute to Russia’s struggles with force protection and the resulting infrastructure vulnerabilities. Firstly, the sheer size of Russia and the length of its borders make it incredibly challenging to secure all potential targets. This geographical challenge is compounded by the fact that many critical infrastructure sites are dispersed and remote, making them difficult to defend effectively. Secondly, there are indications of potential intelligence failures. Russia may have underestimated Ukraine’s resilience and its ability to conduct effective counter-offensives, leading to a misallocation of resources and a lack of preparedness for attacks on its own territory. Thirdly, logistical issues plague the Russian military. Supply-chain disruptions, shortages of essential equipment, and a lack of well-trained personnel have all contributed to the erosion of force protection capabilities.</p>
<p>Furthermore, the potential for internal dissent and sabotage cannot be discounted. The war in Ukraine fuels anti-government sentiment in Russia, and there is a risk that individuals or groups opposed to the regime may seek to exploit the vulnerabilities of critical infrastructure to express their discontent. Such internal threats further complicate the task of ensuring the security of these facilities.</p>
<p>The implications of Russia’s failure to implement effective force protection are far-reaching. The disruption of energy supplies can have a devastating impact on the Russian economy, leading to shortages, price increases, and social unrest. Moreover, the vulnerability of critical infrastructure can undermine Russia’s international standing and its ability to project power. The perception of weakness can embolden adversaries and erode alliances, further isolating Russia on the world stage.</p>
<p>Russia’s ongoing struggles with force protection in the context of the Ukraine conflict have exposed critical vulnerabilities in its infrastructure, particularly its oil and natural gas fields. These vulnerabilities stem from a combination of tactical miscalculations, logistical shortcomings, intelligence failures, and the inherent challenges of securing a vast and geographically dispersed territory. The consequences of these failures are significant, with the potential to destabilize the Russian economy, undermine public confidence, and weaken Russia’s international standing. As the conflict continues, Russia will need to address these shortcomings if it hopes to protect its critical infrastructure and safeguard its national interests. The ability to learn from these failures and adapt its security strategies will be crucial for Russia’s long-term stability and its ability to project power in the region and beyond.</p>
<p><em>Joshua Thibert is a Contributing Senior Analyst at the </em><a href="https://thinkdeterrence.com/"><em>National Institute for Deterrence Studies (NIDS)</em></a><em> and doctoral student at Missouri State University. His extensive academic and practitioner experience spans strategic intelligence, multiple domains within defense and strategic studies, and critical infrastructure protection. Joshua currently resides in Columbus, Ohio.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/05/Russias-Vulnerable-Underbelly_-The-Failure-of-Force-Protection-and-its-Impact-on-Critical-Infrastructure.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="187" height="52" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 187px) 100vw, 187px" /></a></p>
<p><a href="https://globalsecurityreview.com/russias-vulnerable-underbelly-the-failure-of-force-protection-on-critical-infrastructure/">Russia’s Vulnerable Underbelly: The Failure of Force Protection on Critical Infrastructure</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/russias-vulnerable-underbelly-the-failure-of-force-protection-on-critical-infrastructure/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Deterrence and NATO’s Emerging Security Environment</title>
		<link>https://globalsecurityreview.com/deterrence-and-natos-emerging-security-environment/</link>
					<comments>https://globalsecurityreview.com/deterrence-and-natos-emerging-security-environment/#respond</comments>
		
		<dc:creator><![CDATA[Alex Alfirraz Scheers]]></dc:creator>
		<pubDate>Thu, 30 Jan 2025 13:16:07 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[anti-submarine warfare]]></category>
		<category><![CDATA[Arctic]]></category>
		<category><![CDATA[battlefield nuclear weapons]]></category>
		<category><![CDATA[BRICS]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[conventional threats]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[cross-domain deterrence]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[Cyberattacks]]></category>
		<category><![CDATA[deep sea]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[economic threats]]></category>
		<category><![CDATA[geopolitical objectives]]></category>
		<category><![CDATA[hybrid threats]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[international norms]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[military readiness]]></category>
		<category><![CDATA[national power]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[nuclear arsenal]]></category>
		<category><![CDATA[nuclear threats]]></category>
		<category><![CDATA[reconnaissance]]></category>
		<category><![CDATA[resilience]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[security environment]]></category>
		<category><![CDATA[space threats]]></category>
		<category><![CDATA[space-based systems]]></category>
		<category><![CDATA[strategic competition]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[terrorist attacks]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29950</guid>

					<description><![CDATA[<p>The international security environment is deteriorating rapidly and becoming increasingly dangerous and uncertain. China, Iran, North Korea, and Russia pose a threat to Western interests in multiple domains. Among them are economic, conventional, and nuclear, as well as emerging domains such as cyber and space. The Arctic and the deep sea are also areas where [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/deterrence-and-natos-emerging-security-environment/">Deterrence and NATO’s Emerging Security Environment</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The international security environment is deteriorating rapidly and becoming increasingly dangerous and uncertain. China, Iran, North Korea, and Russia pose a threat to Western interests in multiple domains. Among them are economic, conventional, and nuclear, as well as emerging domains such as cyber and space. The Arctic and the deep sea are also areas where they are challenging the West.</p>
<p>These domains and areas are being weaponized for strategic purposes, as adversaries target cross-domain North Atlantic Treaty Organization (NATO) interests with the intent of weakening the Western security architecture and fragmenting alliance cohesion. The Trump administration must work closely with NATO allies to confront the many challenges that face them.</p>
<p>Strategic challenges, such as the Arctic, deep sea, and space, and the threats they pose require improved joint military readiness, enhanced deterrence by denial capabilities, and improved intelligence, surveillance, and reconnaissance.</p>
<p>“Over the last 15 years,” <a href="https://euro-sd.com/wp-content/uploads/2022/10/ESD_MDM_Combined-Issue_October-2022.pdf">writes</a> Scott Savits, “the Arctic has become a renewed theatre of military competition…. [T]op Russian officials have referred to the Arctic as Russia’s ‘Mecca,’ and a large fraction of Russia’s economy is based on Arctic fossil fuels and minerals.” Frustrating Russian efforts to gain a strategic advantage in the Arctic is of paramount importance to NATO’s deterrence mission.</p>
<p>Russia gaining an advantage in the Arctic will enhance its ability to establish escalation dominance against NATO in the event of a conflict with the alliance. Deterring Russia from broadening the scope of conflict, by threatening NATO’s vital interests in the Arctic, remains critical in dissuading other adversaries, such as China, from seeking to gain similar advantage.</p>
<p>With China developing and deploying new detection technologies in anti-submarine warfare, American nuclear submarine capabilities are becoming increasingly vulnerable to detection and targeting. China’s “Death Star” satellite claims to possess detection capabilities that renders the <a href="https://www.youtube.com/watch?v=5CEKV6SOYdY&amp;t=2264s">ocean transparent</a> for up to 500 meters beneath the surface, putting American submarines at risk.</p>
<p>In the space domain, it is estimated that loss of access to space would come at a cost of roughly <a href="https://www.gov.uk/government/publications/the-case-for-space">One billion pounds</a> per day to the British economy. The reported deployment of Russian <a href="https://www.armscontrol.org/act/2024-03/news/us-warns-new-russian-asat-program">anti-satellite weapons systems</a> (ASAT) in space are clearly coercive moves designed to threaten NATO’s space assets.</p>
<p>Russia’s weaponization of space is especially concerning as NATO depends on space to conduct an array of operations across the spectrum of deterrence and defence. Most notably, NATO airpower relies on space-based and space-dependent systems to fulfil a series of critical security functions. Leveraging robust deterrence capabilities in orbit, through targeting Russian and Chinese space-based military and non-military assets, is critical to securing NATO’s vital interests in space.</p>
<p>Beyond seeking strategic advantage, China is also expanding and modernising its nuclear arsenal at an unprecedented rate since the end of the Cold War. The Pentagon forecasts that China will be a <a href="https://www.tandfonline.com/doi/full/10.1080/00963402.2023.2295206">nuclear peer</a> of the United States by 2035. The latest figures published by the Federation of American Scientists show that China now possesses at least <a href="https://fas.org/initiative/status-world-nuclear-forces/">500 operationally deployed nuclear weapons</a>—up 43 percent from <a href="https://thebulletin.org/premium/2020-12/nuclear-notebook-chinese-nuclear-forces-2020/">2020</a>.</p>
<p>Russian President Vladimir Putin continues to undermine international norms by persisting in threats to use battlefield nuclear weapons in Ukraine. Russia also deploys dual-use satellite technologies in space, capable of carrying nuclear warheads into orbit, in direct contravention of long-standing international treaties such as the <a href="https://www.unoosa.org/oosa/en/ourwork/spacelaw/treaties/outerspacetreaty.html">Outer Space Treaty</a> (1967), which prohibits the weaponization and nuclearization of space.</p>
<p>Meanwhile, Iran, a latent nuclear state, coerces the West by threatening the weaponization of its nuclear program. Iran also infiltrated the West by creating <a href="https://blogs.timesofisrael.com/the-role-of-terrorism-in-iranian-foreign-policy/">extremist networks</a> through community centers, <a href="https://www.iranintl.com/en/202301317124">laundering money</a> in major European and American cities that is used by <a href="https://blogs.timesofisrael.com/foxtrot-rumba-and-iran-who-are-the-criminal-gangs-hired-by-the-irgc/">criminal gangs</a> to plot and execute terrorist attacks.</p>
<p>Proxies supported by Iran, such as Hamas and Hezbollah, can also launch increasingly devastating attacks. Furthermore, attacks like October 7, 2024, or September 11, 2001, do not warrant nuclear retaliation. A nuclear response to a terrorist attack, depending on the attack, is likely a disproportionate response.</p>
<p>China and Russia also engage in subversive activities within the cyber domain, sowing discord by using <a href="https://www.cfr.org/expert-brief/how-us-can-counter-disinformation-russia-and-china">disinformation</a>, <a href="https://www.fbi.gov/investigate/counterintelligence/the-china-threat">intellectual property theft</a>, and <a href="https://www.csis.org/programs/europe-russia-and-eurasia-program/projects/russia-and-eurasia/countering-russian-chinese">malign interference</a> to destabilize NATO member states. Cyberattacks on critical national infrastructure can also inflict severe levels of damage. The appropriateness of cross-domain responses is yet to be decided.</p>
<p>The <a href="https://ccdcoe.org/uploads/2018/10/Ottis2008_AnalysisOf2007FromTheInformationWarfarePerspective.pdf">cyber attacks against Estonia</a> in 2007, which lasted for 22 days, did not result in the triggering of NATO’s Article 5 collective defense clause. Yet, it was an attack on a NATO member state. The character of the attack complicated the process by which a viable and appropriate retaliatory response could be devised. In a multidomain threat landscape, hostile state actors conducting their operations in the grey zone can claim plausible deniability.</p>
<p>China, Iran, Russia, and North Korea also hold joint exercises, share intelligence, exchange military capabilities, and share a diplomatic and political kinship. This axis of Western adversaries shares the same geopolitical and economic objectives. They seek to replace the international rules-based order and establish alternative institutional frameworks to global order that undermine concepts such as democracy, human rights, rule of law, and national sovereignty.</p>
<p>Militarily, nowhere is this more apparent than in Russia, where <a href="https://www.reuters.com/world/europe/ukraine-says-russia-launched-8060-iran-developed-drones-during-war-2024-09-13/">Iranian drones</a> and <a href="https://www.reuters.com/world/europe/zelenskiy-says-russia-is-deploying-more-north-korean-troops-repel-kursk-2024-12-14/">North Korean soldiers</a> were provided to aid Putin’s war in Ukraine. Politically, emerging international blocs such as the BRICS demonstrate the extent to which countries like China and Russia are gaining traction in driving alternatives to the current order.</p>
<p>“As hybrid threats evolve to encompass the whole of digital and networked societies,” <a href="https://www.hybridcoe.fi/wp-content/uploads/2022/03/20220331-Hybrid-CoE-Paper-12-Fifth-wave-of-deterrence-WEB.pdf">wrote</a> Sean Monaghan, “so too will the capabilities required to deter them. A more complex threat environment will make predicting attacks and vulnerabilities more difficult, so nations may rely more on resilience.”</p>
<p>Hence, for deterrence to be effective today, credibility must incorporate more than hard power capabilities. Red lines must be communicated effectively across different channels. Resolve must be demonstrated through a force posture that includes a willingness to establish escalation dominance in a crisis scenario. The art of deterrence is also about determining and holding at risk what an adversary values.</p>
<p>As the outgoing US Secretary of Defence General (Ret.) Lloyd Austin <a href="https://sites.duke.edu/lawfire/2022/01/08/guest-post-dr-frank-hoffman-on-conceptualizing-integrated-deterrence/">said</a> in 2022, cross-domain deterrence “is the right mix of technology, operational concepts, and capabilities—all woven together and networked in a way that is credible, flexible and so formidable that it will give any adversary pause…. [It is] multidomain, spans numerous geographic areas of responsibility, is united with allies and partners, and is fortified by all instruments of national power.”</p>
<p>Ultimately, deterrence is about credibly threatening to impose unacceptable costs, by denial or punishment, on a would-be aggressor. Those costs must convince the would-be aggressor that they outweigh any potential gains made.</p>
<p>Therefore, it is imperative for the US and NATO to increase cross-domain capabilities to match those of adversaries. Adopting a combination of different violent and non-violent means, to conduct deterrence credibly across multiple domains and at various levels of intensity, will enhance NATO’s ability to secure its vital interests in an increasingly volatile era of global strategic competition.</p>
<p><em>Alex Alfirraz Scheers holds a diploma in Politics and History from the Open University, a bachelor’s degree in War Studies and History from King’s College London, and a master’s degree in National Security Studies from King’s College London. He has held research positions at the Henry Jackson Society and the International Centre for the Study of Radicalisation, and his articles have been published in the </em>Diplomat<em>, </em>Times of Israel<em>, RealClearDefense, and the Royal United Services Institute. Views expressed in this article are the author&#8217;s own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/01/NATO-NEW-THREATS-NEW-DOMAINS.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/deterrence-and-natos-emerging-security-environment/">Deterrence and NATO’s Emerging Security Environment</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/deterrence-and-natos-emerging-security-environment/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Iran’s Threat to Azerbaijan’s Critical Energy Infrastructure</title>
		<link>https://globalsecurityreview.com/irans-threat-to-azerbaijans-critical-energy-infrastructure/</link>
					<comments>https://globalsecurityreview.com/irans-threat-to-azerbaijans-critical-energy-infrastructure/#respond</comments>
		
		<dc:creator><![CDATA[Rufat Ahmedzade]]></dc:creator>
		<pubDate>Thu, 21 Nov 2024 13:15:54 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Abraham Accords]]></category>
		<category><![CDATA[Azerbaijan]]></category>
		<category><![CDATA[Baku-Tbilisi-Ceyhan oil pipeline]]></category>
		<category><![CDATA[ballistic missiles]]></category>
		<category><![CDATA[Caspian Sea]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[cyber capabilities]]></category>
		<category><![CDATA[energy infrastructure]]></category>
		<category><![CDATA[Freedom Support Act]]></category>
		<category><![CDATA[hamas]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Karabakh]]></category>
		<category><![CDATA[Leviathan gas field]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[military drills]]></category>
		<category><![CDATA[Muddy Water]]></category>
		<category><![CDATA[oil refineries]]></category>
		<category><![CDATA[Rufat Ahmadzada ​]]></category>
		<category><![CDATA[Section 907]]></category>
		<category><![CDATA[SOCAR]]></category>
		<category><![CDATA[South Caucasus]]></category>
		<category><![CDATA[Turkey]]></category>
		<category><![CDATA[US policy]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29415</guid>

					<description><![CDATA[<p>Iranian leaders increased their belligerent rhetoric following the October 1 attack in which the Islamic Republic fired nearly 200 ballistic missiles on Israel. Codenamed “True Promise,” the attack was the second direct Iranian action against Israel since April and indicates Tehran’s growing aggressiveness, which poses a significant threat in its neighbourhood. As discussions of retaliation [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/irans-threat-to-azerbaijans-critical-energy-infrastructure/">Iran’s Threat to Azerbaijan’s Critical Energy Infrastructure</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Iranian leaders increased their belligerent rhetoric following the October 1 attack in which <a href="https://www.washingtonpost.com/world/2024/10/01/israel-lebanon-hezbollah-hamas-war-news-gaza/">the Islamic Republic fired nearly 200 ballistic missiles on Israel</a>. Codenamed “True Promise,” the attack was the second direct Iranian action against Israel since April and indicates Tehran’s growing aggressiveness, which poses a significant threat in its neighbourhood.</p>
<p>As discussions of retaliation by Israel continue, <a href="https://www.jpost.com/breaking-news/article-822936">the media discuss Iranian oil refineries as possible targets</a> that might be hit. Israeli Defence minister, <a href="https://www.telegraph.co.uk/world-news/2024/10/09/biden-and-harris-call-netanyahu-plan-retaliate-iran/">Yoav Gallant, stated that retaliation against Iran’s missile attacks will be “lethal and surprising.</a>” Meanwhile, Islamic Revolutionary Guard Corps-linked social media accounts are already spreading reports that Tehran warned the United States that actions against Iranian oil refineries will lead <a href="https://x.com/SinaToossi/status/1841207114666057848">the Islamic Republic to target oil facilities in Saudi Arabia, Azerbaijan, the United Arab Emirates, Bahrain, and Kuwait</a>. According to a Reuters report, <a href="https://www.iranintl.com/en/202410096899">Iran also warned the Gulf Arab states</a> that any use of their airspace or military bases to target Iran will be unacceptable and threatened a military response.</p>
<p><strong>Iran’s Strategy</strong></p>
<p>Iran’s reference to Azerbaijan as a potential target, should Israel attack Iranian oil refineries, is an indication of the Islamic Republic’s growing threat to critical energy infrastructure not only in the Middle East, but also in the South Caucasus and the Caspian Sea basin region. <a href="https://www.thej.ca/2022/06/08/israel-looks-to-azerbaijan-for-increased-energy-needs/">Azerbaijan supplies 40 percent of Israel’s energy needs</a> and Azerbaijan’s oil and gas infrastructure is the backbone of its independence in the geopolitically tense region.</p>
<p>Not only does Azerbaijan meet nearly 40 percent of Israel’s demand for crude oil, Azerbaijan’s state energy giant <a href="https://theenergyyear.com/news/israel-awards-blocks-to-eni-socar-bp-in-bid-round/">SOCAR, alongside British Petroleum and Israel’s NewMed, was awarded a licence</a> to explore an area to the north of Israel’s Leviathan gas field in the Eastern Mediterranean. The strong bilateral and multifaceted relations between Israel and Azerbaijan are a primary concern for Iran.</p>
<p>In anticipation of Israeli retaliation against the Iranian ballistic missile attacks, the <a href="https://www-irdiplomacy-ir.translate.goog/fa/news/2028640/%D9%87%D9%85%DA%A9%D8%A7%D8%B1%DB%8C-%D9%86%D8%B8%D8%A7%D9%85%DB%8C-%D8%A8%D8%A7%DA%A9%D9%88-%D8%AA%D9%84-%D8%A2%D9%88%DB%8C%D9%88-%D8%B1%D9%88%DB%8C-%D8%AF%D9%88%D8%B1-%D8%AA%D9%86%D8%AF?_x_tr_sch=http&amp;_x_tr_sl=fa&amp;_x_tr_tl=en&amp;_x_tr_hl=en&amp;_x_tr_pto=sc">Iranian media continues to make unsubstantiated claims</a> about supposed secret Israeli military bases in Azerbaijan with a ridiculous accusation that Azerbaijan is one of the origins of sabotage against the Islamic Republic. Talking about possible Israeli retaliation against Iranian oil facilities, Iranian diplomat Abbas Mousavi falsely claimed in an interview to <em>Tejarat News</em> that <a href="https://41521871-khabarban-com.translate.goog/?_x_tr_sl=fa&amp;_x_tr_tl=en&amp;_x_tr_hl=en&amp;_x_tr_pto=sc">Israel deployed many planes to Azerbaijan</a>.</p>
<p>In fact, since Hamas launched the brutal terrorist attacks against Israel in October 2023, Iran’s main goal is the consolidation of the members of the Organisation of Islamic States to achieve an economic blockade and diplomatic isolation from Israel. Iranian Supreme leader <a href="https://www.newarab.com/news/iran-calls-arab-islamic-boycott-oil-embargo-israel">Ayatollah Khamenei repeatedly called on Arab and Muslim countries to impose an oil embargo</a> on Israel. <a href="https://www.iranintl.com/en/202311118506">Iranian officials frequently repeat similar calls</a> showing Tehran’s agenda behind the Hamas attacks, which aimed to disrupt economic, political, and diplomatic relations between the State of Israel and Muslim-majority nations.</p>
<p>Iran’s multidimensional strategy behind the Hamas attacks was based on several ambitious goals, including preventing possible normalisation between Israel and Saudi Arabia and other Arab states; derailing the Abraham Accords; preventing efforts to improve strained Turkish-Israeli ties; and trying to inflict economic and diplomatic damage on Israel-Azerbaijan strategic ties. Iran’s strategy seeks to achieve multiple goals simultaneously in both the Middle East and South Caucasus.</p>
<p>Iranian media outlets launched coordinated <a href="https://www.tehrantimes.com/news/492711/Turkey-s-support-for-Gaza-heartwarming-but-nowhere-near-enough">propaganda attacks against Turkey and Azerbaijan</a> for supplying crude oil to Israel via the Baku-Tbilisi-Ceyhan oil pipeline since the Hamas terrorist attacks and start of the subsequent war in Gaza. Iran-inspired, pro-Hamas Islamist, and leftist circles in Turkey <a href="https://www.rfi.fr/en/podcasts/international-media/20240622-protests-escalate-in-turkey-over-azerbaijani-oil-shipments-to-israel-amid-embargo">staged several demonstrations where they vandalised Azerbaijani oil company, SOCAR, offices</a> in Istanbul in an attempt to halt oil exports.</p>
<p>Considering the influence of the Muslim Brotherhood in Turkey, the country is a comfortable space for Iranian propaganda and hybrid activities covered by so-called Islamic narratives. Ironically, the fact that <a href="https://eurasianet.org/iranian-trucks-in-karabakh-spark-protest-in-azerbaijan">Iran is a major energy supplier to Armenia and supplied the formerly Armenian-occupied Karabakh region</a> received no similar response from Islamists or leftists in Turkey.</p>
<p><strong>Coercive Actions</strong></p>
<p>Iran’s military threats against Azerbaijan increased from the end of the Second Karabakh War, when the balance of power in the South Caucasus shifted in Baku’s favor. Iran conducted several military drills near Azerbaijan’s border, putting on a show of force against the geopolitical changes in the region. In late September and early October 2021 Iran suddenly conducted military drills near Azerbaijan’s borders.</p>
<p>An Iranian Ministry of Foreign Affairs spokesman described the exercises as a “sovereign right,” saying, “<a href="https://www.timesofisrael.com/iran-says-drills-near-azerbaijan-border-due-to-zionist-presence-in-area/">Iran will not tolerate the presence of the Zionist regime</a>” near its borders. Iran undertook another military provocation a year later when <a href="https://www.iranintl.com/en/202210192320">Tehran laid pontoon bridges across the Araz River</a> near the Azerbaijani border and crossed the river as part of war games. In March 2023, an <a href="https://turan.az/en/politics/iranian-fighter-jet-violated-azerbaijans-state-border-iranian-ambassador-summoned-to-mfa-763891">Iranian air force fighter jet violated Azerbaijan’s airspace</a>. The Azerbaijani Foreign Ministry summoned Iran’s ambassador, and the Azerbaijani Defence and Foreign Ministries issued a joint statement condemning the incursion.</p>
<p>When Israel liquidated Mohammad Reza Zahedi, a senior commander in the Iranian Revolutionary Guard Corps-Quds Force, in Damascus in April 2024, <a href="https://x.com/j_rashidikoochi/status/1774907313402327450">Iranian member of parliament, Jalal Rashidi Kochi, called for strikes on an Israeli embassy in the region</a>, preferably in Azerbaijan. Iranian attempts to target the Israeli embassy and ambassadors in Baku were also foiled on many occasions over the years; <a href="https://www.timesofisrael.com/iran-behind-failed-attack-on-israeli-embassy-in-azerbaijan-foreign-minister-says/">the most recent reported attempt involved the arrest of an Afghan national in July 2023</a>. Recently <a href="https://www.independent.co.uk/news/iran-ap-tehran-caspian-sea-azerbaijan-b2454325.html">Iran has enhanced its naval capabilities in the Caspian Sea</a> and <a href="https://en.mehrnews.com/news/219497/Iran-s-Navy-conducts-drill-in-Caspian-Sea">increased naval drills</a>, including <a href="https://tass.com/defense/1819611">joint drills with Russia</a>.</p>
<p><strong>Iran’s Missile and Cyber Capabilities</strong></p>
<p>Iran possesses numerous capabilities to threaten critical infrastructure including energy and power in the region. Among them Tehran’s ballistic missiles and cyber tools are key. <a href="https://www.csis.org/analysis/irans-threat-saudi-critical-infrastructure-implications-us-iranian-escalation">Iran maintains the largest ballistic and cruise missile force in the Middle East</a>, capable of reaching 2,500 kilometres from its borders. Moreover, these capabilities combined with Iran’s drone arsenal can overwhelm missile defence systems. <a href="https://www.bbc.co.uk/news/world-middle-east-49746645">Iran’s missile attacks against Saudi oil facilities in 2019 were conducted by a combination of drones and cruise missiles</a>.</p>
<p>Iran has improved its offensive cyber capabilities, too, and <a href="https://www.csis.org/analysis/irans-threat-saudi-critical-infrastructure-implications-us-iranian-escalation">is capable of causing localised and temporary disruption to corporate networks</a> for days or weeks. Drilling oil wells, pumping crude oil, and loading fuel are processes where cyberattacks can cause significant disruptions. According to an FBI report released in August 2024, <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-241a">Iran exploited computer network vulnerabilities</a> to infiltrate and steal sensitive technical data from organisations in Israel and Azerbaijan. In July, cybersecurity firm Check Point reported that an <a href="https://research.checkpoint.com/2024/new-bugsleep-backdoor-deployed-in-recent-muddywater-campaigns/">Iranian hacker group named Muddy Water</a>, affiliated with Iran’s Ministry of Intelligence and Security, increased its cyber activities against targets in Azerbaijan, Israel, Portugal, Saudi Arabia, and Turkey.</p>
<p><strong>Securing Critical Infrastructure</strong></p>
<p>Overall, considering Azerbaijan’s key role in the energy security of vital American allies, such as Europe, Israel, and Turkey, and its significant help in supplying energy to US-friendly states Georgia, Moldova, and Ukraine, the next administration needs to reverse shortsighted Biden State Department policy. The decision not to waive Section 907 of the Freedom Support Act, banning US aid to the Azerbaijani government, damages American interests in the South Caucasus. It is in the interest of the US and Azerbaijan to expand their military and technical partnership to secure critical infrastructure in the region.</p>
<p><em>Rufat Ahmadzada is a graduate of City University London. His research area covers the South Caucasus and Iran. The views expressed in this article are the author’s own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/11/IRANS-THREAT-TO-AZERBAIJANS-CRITICAL-ENERGY-INFRASTRUCTURE.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-28926 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/irans-threat-to-azerbaijans-critical-energy-infrastructure/">Iran’s Threat to Azerbaijan’s Critical Energy Infrastructure</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/irans-threat-to-azerbaijans-critical-energy-infrastructure/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Counter Terror’s High-tech to Low-tech Backfire</title>
		<link>https://globalsecurityreview.com/counter-terrors-high-tech-to-low-tech-backfire/</link>
					<comments>https://globalsecurityreview.com/counter-terrors-high-tech-to-low-tech-backfire/#respond</comments>
		
		<dc:creator><![CDATA[Justin Leopold-Cohen]]></dc:creator>
		<pubDate>Mon, 28 Oct 2024 12:15:51 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA["Counter-terrorism]]></category>
		<category><![CDATA[analog communications]]></category>
		<category><![CDATA[armed assaults]]></category>
		<category><![CDATA[Aum Shinrikyo]]></category>
		<category><![CDATA[bombings]]></category>
		<category><![CDATA[cellular detection]]></category>
		<category><![CDATA[Center for Strategic and International Studies]]></category>
		<category><![CDATA[chemical weapons]]></category>
		<category><![CDATA[commercial drones]]></category>
		<category><![CDATA[couriers]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[dead drops]]></category>
		<category><![CDATA[dynamite]]></category>
		<category><![CDATA[economic impact]]></category>
		<category><![CDATA[gasoline]]></category>
		<category><![CDATA[Global Terrorism Index]]></category>
		<category><![CDATA[ground operation]]></category>
		<category><![CDATA[gunpowder]]></category>
		<category><![CDATA[hamas]]></category>
		<category><![CDATA[handwritten notes]]></category>
		<category><![CDATA[Hezbollah]]></category>
		<category><![CDATA[high-tech]]></category>
		<category><![CDATA[homeland security]]></category>
		<category><![CDATA[IDF]]></category>
		<category><![CDATA[incendiary balloons]]></category>
		<category><![CDATA[inexpensive methods]]></category>
		<category><![CDATA[International Security]]></category>
		<category><![CDATA[Iranian missile attack]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[low-tech]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[pagers]]></category>
		<category><![CDATA[power plant attack]]></category>
		<category><![CDATA[Sarin gas attack]]></category>
		<category><![CDATA[technology in warfare]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[terrorism statistics]]></category>
		<category><![CDATA[UAVs]]></category>
		<category><![CDATA[walkie-talkies]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29212</guid>

					<description><![CDATA[<p>As the media ponders how Israel will respond to Iranian missile attack, many remain awestruck by the September 17, 2024, Israeli pager attack and subsequent walkie-talkie detonations that killed or injured Lebanon-based Hezbollah fighters. While the legality of such an attack is debatable, some are considering this a next step in using technology in warfare. [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/counter-terrors-high-tech-to-low-tech-backfire/">Counter Terror’s High-tech to Low-tech Backfire</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As the media ponders how Israel will respond to <a href="https://www.cnn.com/2024/10/01/politics/iran-missile-attack-israel/index.html">Iranian missile </a>attack, many remain awestruck by the September 17, 2024, Israeli <a href="https://www.cnn.com/2024/09/17/middleeast/lebanon-pager-attack-explosions-hezbollah-explainer-intl-latam/index.html">pager attack</a> and subsequent <a href="https://www.bbc.com/news/articles/cz04m913m49o">walkie-talkie </a>detonations that killed or injured Lebanon-based Hezbollah fighters. While the legality of such an attack is debatable, some are considering this a next step in using <a href="https://www.nytimes.com/2024/09/19/us/politics/israel-hezbollah-pager-attacks.html">technology in warfare</a>. Some are concerned that terrorists may copy the method.</p>
<p>Hezbollah, now attempting to fend off Israel’s <a href="https://www.nytimes.com/2024/09/30/world/middleeast/israel-hezbollah-lebanon-ground-invasion.html#:~:text=Sept.%2030,%202024.%20The%20Israeli%20military">September 30 ground operation</a>, is simultaneously working to adapt its own approach to technology, and, if history is any indicator of the future, the terror group will likely continue as it has, answering Israel’s high-tech efforts with ironically harder to trace low-tech options. That Hezbollah was even using pagers was to <a href="https://www.cnn.com/2024/09/17/middleeast/lebanon-pager-attack-explosions-hezbollah-explainer-intl-latam/index.html">avoid cellular detection</a>. And as they adapt, their communications will likely go even more analog, perhaps communicating only through <a href="https://www.nbcnews.com/id/wbna42853221">couriers</a><u>,</u> as Osama Bin Laden was known to do, or using physical handwritten <a href="https://www.bbc.com/news/world-europe-12068534">notes and dead drops</a>, as militant Italian anarchist groups did in the early 2000s.</p>
<p>While the idea of a terrorist group obtaining a more technologically advanced arsenal, such as nuclear or chemical weapons, or instituting a mass cyberattack is daunting, it is not exactly uncommon due to expense and required expertise. What is far more likely is that Hezbollah and other terrorist groups will downgrade methods, opting for cheaper and easier to implement weapons and methods which are more than capable of lethal outcomes.</p>
<p>Time and time again, society has seen heavy damage wrought on person and property via methods that seem relatively primitive.</p>
<p>In 2021, the Gaza-based terrorist group Hamas increased their use of <a href="https://www.cnn.com/2021/06/16/middleeast/israel-gaza-incendiary-balloons-cmd-intl/index.html">incendiary balloons</a> when attacking Israel, causing more than 20 fires in southern Israel, straining civilian and IDF emergency service resources, and burning upward of 10,000 acres of farmland over the preceding three years. These “balloons are easily constructed and require little setup to launch compared to rockets, which are expensive and time-consuming to produce” but are still incredibly effective.</p>
<p>In 2013, a US power plant in California was victim of an as yet unsolved <a href="https://www.npr.org/sections/thetwo-way/2014/02/05/272015606/sniper-attack-on-calif-power-station-raises-terrorism-fears">shooting attack</a>, damaging multiple transformers. Surprisingly set up with little to no security, the plant’s perimeter was breached and approximately 100 rounds of high-powered rifle ammunition were fired into 17 transformers before police arrived. The damage was severe enough that to avoid blackouts across Silicon Valley power had to be diverted from other areas during the months-long repair.</p>
<p>While these incidents are high profile, given the critical infrastructure connections, they did not result in any fatalities. However, that is not always the goal of terrorists and is hardly the reality for other common low-tech methods. Shootings, bombings, and melee attacks continue to make up the <a href="https://www.csis.org/analysis/tactics-and-targets-domestic-terrorists">overwhelming majority</a> of terrorist attacks. Research from the <a href="https://www.csis.org/analysis/tactics-and-targets-domestic-terrorists">Center for Strategic and International Studies</a> shows that from 2015 to 2020,  85 percent of terror attacks employed one of these methods, with 12 percent being unrealized threats, 2 percent other, and 1 percent vehicle ramming.</p>
<p>The numbers are remarkably similar for lethal attacks in 2023 according to the <a href="https://www.visionofhumanity.org/wp-content/uploads/2024/02/GTI-2024-web-290224.pdf">2024 Global Terrorism Index</a> published by Vision of Humanity. Out of the 50 most lethal terrorist attacks, only one, an incident in the Homs Province of Syria, featuring an explosive-laden unmanned aerial vehicle (UAV) targeting a military graduation ceremony which killed 89 people, could be thought of as a high-tech weapon. The other 49 were made up of 43 armed assaults, five bombings, and one explosive projectile.</p>
<p>As terrorist groups get backed into a corner by high-tech counter methods like the Israeli pager attack, it is increasingly likely they will rely on time-proven simple methods. The world may even see them adapting and learning from accidents such as the September 2024 <a href="https://www.usatoday.com/story/news/nation/2024/09/17/texas-pipeline-fire-deer-park/75266574007/">car crash into a gas pipeline</a> in Texas which caused an explosion or the 2017 Hamburg, Germany, airport evacuation which resulted from the accidental discharge of a simple, lipstick-sized can of <a href="https://www.washingtonpost.com/world/europe/hamburg-airport-briefly-closed-after-dozens-injured-by-unidentified-substance/2017/02/12/7371809c-f129-11e6-a9b0-ecee7ce475fc_story.html">pepper spray</a>. While these were both accidents, one can imagine the economic and fear-induced impact if a terrorist group were to try to replicate the outcomes.</p>
<p>There are, of course, outliers to the terrorist use of low-tech methods. There is the terrorist cult Aum Shinrikyo’s launch of the notorious <a href="https://www.bbc.com/news/world-asia-35975069">Tokyo Sarin gas attack</a> in 1995 or drone attacks along the lines of  2023’s drone attack in Syria, as well as other groups’ potential use of <a href="https://www.nbcnews.com/tech/security/flip-side-drone-boom-airports-stadiums-power-plants-need-defending-rcna128248">commercial drones</a>. But today’s would-be terrorist is likely not resorting to high-tech weapon or communication devices, and more often than not, going for something easy and/or available. To borrow from Chistopher Nolan’s Joker in the <a href="https://www.imdb.com/title/tt0468569/quotes/?item=qt0484253&amp;ref_=ext_shr_lnk"><em>Dark Knight</em></a>, items like “dynamite, and gunpowder, and gasoline [are] cheap” and are going to comprise the bulk of the future threats from terrorist groups.</p>
<p><em>Justin Leopold-Cohen is a homeland security analyst in Washington, DC. He has written widely on national and international security issues for outlets including </em>Small Wars Journal<em>, the Wavell Room, and Inkstick Media. Any views expressed in the article are his own and not representative of, or endorsed by, any organization or government.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/10/Counter-Terrors-High-tech-to-Low-tech-Backfire.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-28926 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/counter-terrors-high-tech-to-low-tech-backfire/">Counter Terror’s High-tech to Low-tech Backfire</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/counter-terrors-high-tech-to-low-tech-backfire/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
