<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Topic:hybrid conflict &#8212; Global Security Review %</title>
	<atom:link href="https://globalsecurityreview.com/subject/hybrid-conflict/feed/" rel="self" type="application/rss+xml" />
	<link>https://globalsecurityreview.com/subject/hybrid-conflict/</link>
	<description>A division of the National Institute for Deterrence Studies (NIDS)</description>
	<lastBuildDate>Thu, 17 Jul 2025 10:48:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://globalsecurityreview.com/wp-content/uploads/2023/10/cropped-GSR-Banner-LogoV2-32x32.png</url>
	<title>Topic:hybrid conflict &#8212; Global Security Review %</title>
	<link>https://globalsecurityreview.com/subject/hybrid-conflict/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How Civilian Dual-Use Technologies Are Reshaping Global Security Policies</title>
		<link>https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/</link>
					<comments>https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/#respond</comments>
		
		<dc:creator><![CDATA[Harry Geisler]]></dc:creator>
		<pubDate>Thu, 17 Jul 2025 12:17:17 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Development]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI-enabled navigation]]></category>
		<category><![CDATA[AUKUS]]></category>
		<category><![CDATA[autonomous weapons]]></category>
		<category><![CDATA[Civilian dual-use technologies]]></category>
		<category><![CDATA[collective defense]]></category>
		<category><![CDATA[counter-drone strategy]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[drones]]></category>
		<category><![CDATA[energy grid]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[export control regimes]]></category>
		<category><![CDATA[FPV drones]]></category>
		<category><![CDATA[global security policies]]></category>
		<category><![CDATA[governance gaps]]></category>
		<category><![CDATA[hybrid conflict]]></category>
		<category><![CDATA[infrastructure attacks]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[legal frameworks]]></category>
		<category><![CDATA[National defense]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Nord Stream pipelines]]></category>
		<category><![CDATA[procurement pathways]]></category>
		<category><![CDATA[resilience]]></category>
		<category><![CDATA[sabotage]]></category>
		<category><![CDATA[start-ups]]></category>
		<category><![CDATA[transportation hubs]]></category>
		<category><![CDATA[unmanned aircraft systems]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31187</guid>

					<description><![CDATA[<p>In August 2024, police in northern Germany chased a fleet of drones loitering over critical infrastructure: a decommissioned nuclear plant, a chemical facility, and a Baltic liquified natural gas (LNG) terminal. The drones flew with impunity, reportedly reaching 100 kilometres an hour to evade police. Authorities launched an espionage investigation, suspecting the drones were scouting [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/">How Civilian Dual-Use Technologies Are Reshaping Global Security Policies</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In August 2024, <a href="https://www.defensenews.com/global/europe/2024/08/29/drone-sightings-near-bases-infrastructure-unnerve-german-officials">police in northern Germany</a> chased a fleet of drones loitering over critical infrastructure: a decommissioned nuclear plant, a chemical facility, and a Baltic liquified natural gas (LNG) terminal. The drones flew with impunity, reportedly reaching 100 kilometres an hour to evade police. Authorities launched an espionage investigation, suspecting the drones were scouting for sabotage.</p>
<p>This was not an isolated incident. Civilian-grade drones and other dual-use technologies are increasingly being used to survey or target public infrastructure. From energy grids to airports, the connective tissue of modern life is exposed to risks once confined to traditional warzones. These developments are reshaping global security policies and blurring the boundary between civilian and military domains.</p>
<h3><strong>Civilian Tech, Strategic Impact</strong></h3>
<p>Cheap unmanned aircraft systems (UAS) are now accessible worldwide. While drones were initially developed for military use, the most commonly deployed platforms today, such as DJI’s Mavic series, were originally built for civilian applications like aerial photography and videography. Their affordability, portability, and high-spec cameras made them commercially popular, but those same features have made them easy to repurpose for military contexts.</p>
<p>In particular, first-person view (FPV) drones, designed for immersive recreational flying, were rapidly adapted for frontline use in conflict. These drones are now routinely deployed with improvised explosives or used for precision reconnaissance. In Ukraine, both sides repurposed off-the-shelf drones in vast numbers; nearly two million were produced in 2024 alone. Many of these are equipped with AI-enabled navigation and targeting, underscoring how quickly civilian tech can be weaponised.</p>
<p>Non-state actors are following suit. Armed groups are using FPV drones for low-cost, high impact strikes on infrastructure, blurring the lines between military and civilian threats. This second drone age shows that national security vulnerabilities now stem as much from consumer technology as from conventional arsenals.</p>
<p>The broader implication is clear: private-sector innovations, often created without any defense intent, are shaping the battlefield. These companies bring novel use cases, technical advantages, or agile design processes that legacy defense contractors may overlook. Civilian tech is not just a risk; it is a potential strategic asset. Tapping into this ecosystem, especially among start-ups and experts, could redefine how the country protects critical infrastructure in an era of hybrid conflict.</p>
<p><strong>Infrastructure in the Crosshairs</strong></p>
<p>Modern infrastructure is a key target in modern conflicts or hybrid attacks, just like military bases traditionally were. In 2022, after the <a href="https://www.theguardian.com/business/2022/sep/29/nord-stream-attacks-highlight-vulnerability-undersea-pipelines-west">sabotage of the Nord Stream pipelines</a>, over 70 drone sightings were reported near Norwegian offshore oil platforms. Oslo feared Russian-linked hybrid operations targeting Europe’s energy supply and deployed naval assets and invited NATO allies to assist in patrols.</p>
<p>Meanwhile, Ukraine’s energy grid suffered repeated drone and missile attacks, with waves of <a href="https://www.csis.org/analysis/drone-saturation-russias-shahed-campaign">low-cost Shahed drones</a> used to disable power plants. By spring 2024, <a href="https://www.bbc.co.uk/news/articles/czvvj4j4p8ro">roughly half of Ukraine’s electricity capacity</a> was destroyed, forcing nationwide blackouts.</p>
<p>Outside conflict zones, attacks on infrastructure are also rising. In Sudan, a <a href="https://www.bbc.co.uk/news/articles/cx20x8g2nego">drone strike on a power station caused regional outages,</a> and other drone attacks on water purification stations left the country on the <a href="https://www.bbc.co.uk/news/articles/c3v5n5ynl59o">brink of a significant Cholera outbreak</a>. In the US, federal officials stopped an attack on a power grid by a man using an <a href="https://domesticpreparedness.com/articles/protecting-critical-infrastructure-from-weaponized-drones">explosive-carrying drone</a>.</p>
<p>Transportation hubs are vulnerable, too. In January 2025, <a href="https://d-fendsolutions.com/blog/europes-drone-challenge-and-countermeasures-in-2025/">drone activity shut down Riga Airport</a>, disrupting dozens of flights.</p>
<p><strong> </strong><strong>Gaps in Governance</strong></p>
<p><strong> </strong>Despite growing risks, legal and operational frameworks remain fragmented. Drones and AI-driven surveillance systems often fall outside traditional arms control regimes. As a recent<a href="https://www.flyingmag.com/white-house-unveils-package-of-drone-measures-in-executive-order/"> executive order</a> put it, “Criminals, terrorists, and hostile foreign actors have intensified their weaponization of drone technologies, creating new and serious threats to our homeland.”</p>
<p>Jurisdictional confusion is common. In many countries, local authorities lack legal authority to respond to rogue drones above critical sites. Aviation safety rules and privacy laws create hesitation, giving bad actors a head start.</p>
<p>Even when threat awareness exists, coordination is inconsistent. The Cybersecurity and Infrastructure Security Agency warns that drones are used for surveillance and sabotage, yet they lack the comprehensive tools to oversee private-sector resilience or cross-border response.</p>
<p><strong> </strong><strong>A Global Security Challenge</strong></p>
<p><strong> </strong>Drone and AI threats are not confined by borders. In 2023, the <a href="https://ec.europa.eu/newsroom/cipr/items/805599/en">European Commission launched a new counter-drone strategy</a>, urging member states to harden infrastructure and coordinate airspace protections. NATO has added counter-UAS exercises to its joint drills, while AUKUS partners are beginning to share emerging drone and AI tactics.</p>
<p>But international law is lagging. There is still no global treaty governing the use of armed drones or autonomous surveillance. Export control regimes struggle to manage proliferation of AI-enabling components. At the UN, efforts to establish binding norms on autonomous weapons are stalled. Ad hoc coordination is, however, slowly improving.</p>
<p>When Norway’s oil platforms were threatened, NATO allies were called in within days. After drone sightings near Dutch and Belgian ports, neighboring governments exchanged countermeasure plans. These models suggest a path forward: rapid and collective responses based on shared tools, shared doctrine, and shared threat intelligence.</p>
<p>The future of civilian dual-use technologies will not be defined by innovators alone. Whether drones or AI software, these tools are already reshaping how adversaries threaten public safety and economic continuity. What is at stake is not just national security, but the resilience of infrastructure that supports daily life.</p>
<p><strong>The Crucial Role of Start-ups in National Defense</strong></p>
<p><strong> </strong>Civilian-origin technologies are now driving the next wave of defense capability. From FPV drones to AI surveillance tools, some of the most disruptive military applications today are emerging not from traditional defense primes but from commercial markets, often developed by start-ups with no military background.</p>
<p>A coordinated international framework is urgently needed, one that does not just support innovation and infrastructure protection but actively integrates civilian tech into defense planning. This means lowering the barriers for experts and start-ups to meaningfully contribute alongside legacy contractors. The <a href="https://www.gov.uk/government/publications/the-strategic-defence-review-2025-making-britain-safer-secure-at-home-strong-abroad/the-strategic-defence-review-2025-making-britain-safer-secure-at-home-strong-abroad#:~:text=Industry%2Dbacked.,new%2C%20segmented%20approach%20to%20procurement:&amp;text=Major%20modular%20platforms%20(contracting%20within,on%20novel%20technologies%20each%20year.">United Kingdom’s recent <em>Defence Review</em></a> hinted at this shift, recognising that smaller firms are vital to national resilience, particularly when civilian infrastructure is under threat.</p>
<p>What is truly needed is a NATO-wide or broader allied framework that enables cross-border collaboration, streamlines regulation, and opens up procurement pathways.</p>
<p>Today, many start-ups working at the intersection of security and technology face steep hurdles: limited access to capital, opaque compliance regimes, and procurement processes designed around, and for, large incumbents. Yet by creating space for their innovation, we can modernize collective defense from the ground up, using the very same civilian tools that adversaries are already turning into weapons.</p>
<p>A coordinated international framework is urgently needed, one that not only supports innovation and infrastructure protection but also lowers barriers to experts and start-ups to contribute more meaningfully alongside traditional defense primes. The <a href="https://www.gov.uk/government/publications/the-strategic-defence-review-2025-making-britain-safer-secure-at-home-strong-abroad/the-strategic-defence-review-2025-making-britain-safer-secure-at-home-strong-abroad#:~:text=Industry%2Dbacked.,new%2C%20segmented%20approach%20to%20procurement:&amp;text=Major%20modular%20platforms%20(contracting%20within,on%20novel%20technologies%20each%20year.">UK’s recent <em>Defence</em> <em>Review </em>hinted at this shift</a>, recognizing the value smaller firms bring to national resilience. It is time to take similar action at home.</p>
<p><em>Harry Geisler is the CEO of YAVA.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/07/How-Civilian-Dual-Use-Technologies-Are-Reshaping-Global-Security-Policies.pdf"><img decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="180" height="50" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 180px) 100vw, 180px" /></a></p>
<p><a href="https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/">How Civilian Dual-Use Technologies Are Reshaping Global Security Policies</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>China’s AI-Driven Information Operations Are Here: The US Needs an AI RMA</title>
		<link>https://globalsecurityreview.com/chinas-ai-driven-information-operations-are-here-the-us-needs-an-ai-rma/</link>
					<comments>https://globalsecurityreview.com/chinas-ai-driven-information-operations-are-here-the-us-needs-an-ai-rma/#respond</comments>
		
		<dc:creator><![CDATA[Matthew J. Fecteau]]></dc:creator>
		<pubDate>Tue, 06 May 2025 12:11:01 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI investment]]></category>
		<category><![CDATA[AI supremacy]]></category>
		<category><![CDATA[AI technical competency.]]></category>
		<category><![CDATA[AI training]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Baidu]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Chinese aggression]]></category>
		<category><![CDATA[data centers]]></category>
		<category><![CDATA[decision dominance]]></category>
		<category><![CDATA[deepfakes]]></category>
		<category><![CDATA[DeepSeek]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[ERNIE model]]></category>
		<category><![CDATA[Generative AI]]></category>
		<category><![CDATA[gray zone conflict]]></category>
		<category><![CDATA[hybrid conflict]]></category>
		<category><![CDATA[Information Operations]]></category>
		<category><![CDATA[joint force]]></category>
		<category><![CDATA[large language models]]></category>
		<category><![CDATA[malign information operations]]></category>
		<category><![CDATA[military affairs]]></category>
		<category><![CDATA[multidomain operations]]></category>
		<category><![CDATA[Nvidia chips]]></category>
		<category><![CDATA[open-source AI]]></category>
		<category><![CDATA[Project Maven]]></category>
		<category><![CDATA[psychological operations]]></category>
		<category><![CDATA[Qwen]]></category>
		<category><![CDATA[Spamouflage Dragon]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30686</guid>

					<description><![CDATA[<p>The DoD must incorporate artificial intelligence (AI) capabilities to counter the influence of China. Artificial intelligence will inevitably determine who shapes future conflicts. China is actively using these capabilities to gain decision dominance. Focusing on information operations is critical. Drones, for example, use artificial intelligence capabilities, as do defensive systems. However, conflict between near-peer adversaries [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/chinas-ai-driven-information-operations-are-here-the-us-needs-an-ai-rma/">China’s AI-Driven Information Operations Are Here: The US Needs an AI RMA</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The DoD must incorporate artificial intelligence (AI) capabilities to counter the influence of China. Artificial intelligence will inevitably determine who shapes future conflicts. China is actively using these capabilities to gain decision dominance.</p>
<p>Focusing on information operations is critical. Drones, for example, <a href="https://medium.com/@adelstein/ai-powered-defense-how-cutting-edge-technology-is-revolutionizing-national-security-against-drones-1934a13123fa">use artificial intelligence capabilities</a>, as do defensive systems. However, conflict between near-peer adversaries and competitors is still unlikely <a href="https://www.atlanticcouncil.org/blogs/new-atlanticist/todays-wars-are-fought-in-the-gray-zone-heres-everything-you-need-to-know-about-it/">as gray zone and hybrid conflict are the dominant avenues for competition</a>. With the information environment transcending all domains of warfare, artificial intelligence capabilities become the go-to capability to ensure and maintain information advantage.</p>
<p>China’s AI-enhanced information operations are becoming increasingly sophisticated. For example, the Chinese advanced persistent threat actor <a href="https://cyberscoop.com/tag/spamouflage-dragon/">Spamouflage Dragon</a> uses generative AI to create online personas to influence public opinion. China and its proxy companies seek to develop or compete for AI supremacy within the information environment.</p>
<p>Of course, China will use anything within its arsenal to shape strategic, operational, and tactical levels of war to its advantage, expand its influence, and create an ecosystem that is dependent on its technologies. For example, <a href="https://www.cnbc.com/2016/07/01/baidu--the-google-of-china--eyes-expansion-to-us-europe-ceo.html">Baidu, known as the “Google of China,</a>” invested billions into AI capabilities, creating the <a href="https://medium.com/ai-frontiers/baidu-goes-open-source-ernie-ai-model-to-be-released-by-june-2025-72a918897da4">proprietary ERNIE model</a>, which has been trained on billions of parameters, increasing the output’s quality and complexity.</p>
<p>However, China is also leveraging open-source AI models to shape the information environment. With the recent release of open-source <a href="https://www.thenationalnews.com/business/markets/2025/03/06/what-is-qwen-the-open-source-genai-model-from-alibaba-challenging-deepseek/">large language models such as DeepSeek and Qwen</a>, Chinese-linked subsidiaries, <a href="https://www.bloomberg.com/news/articles/2023-10-17/alibaba-tencent-join-funding-for-chinese-ai-high-flyer-baichuan">High-Flyer and Alibaba Group</a> created a way to expand their influence, revise history, and likely create a dependent ecosystem for target countries. Unlike the much more expensive ChatGPT, for which the more basic model is free, China’s investment in <a href="https://economictimes.indiatimes.com/tech/artificial-intelligence/alibaba-releases-ai-model-it-claims-surpasses-deepseek-v3/articleshow/117670287.cms?from=mdr">generative AI models is free</a> for the public and even surpasses <a href="https://www.sparkouttech.com/deepseek-vs-chatgpt/">ChatGPT’s in some respects</a>.</p>
<p>There is a debate about how China’s proxy state companies were able to create these advanced models without US-based critical components. China allegedly <a href="https://www.csis.org/analysis/deepseek-huawei-export-controls-and-future-us-china-ai-race">did not have access to the advanced critical Nvidia chips</a> for which most AI models are dependent. China seems to have created generative models just as suitable or even better than that of ChatGPT, but allegedly at a <a href="https://www.techpolicy.press/closing-the-loopholes-options-for-the-trump-administration-to-strengthen-ai-chip-export-controls/">fraction of the cost and free of charge to the public</a>. The US limited Nvidia chip exports to China, a market predicted to top <a href="https://www.forbes.com/sites/martineparis/2024/07/26/ai-to-drive-1-trillion-in-global-chip-sales-by-2030-as-nvidia-leads/">$1 trillion in revenue within a decade</a>. Still, the accusation is that the Chinese subsidiary leased or bought the more advanced <a href="https://www.business-standard.com/technology/tech-news/us-trade-rules-breached-singapore-detains-three-in-nvidia-gpu-crackdown-125030400651_1.html">Nvidia chips from Singapore, circumventing restrictions</a>, and used <a href="https://www.theverge.com/news/601195/openai-evidence-deepseek-distillation-ai-data">ChatGPT to train its model</a>.</p>
<p>Regardless of how China secured these critical technologies, the cat is indeed out of the bag. China has shown that it has the capability to develop new and emerging AI technologies. From the capabilities already built, it now has a baseline to create even more capabilities to develop its own AI chip ecosystem. With such capabilities, China will become more active within the information environment with the help of AI capabilities, and its motives are far from benevolent.</p>
<p>Why is the Chinese model free? China has several motives, but it is likely in hopes that data and information across the globe are the price tag for using the model while lessening a dependency on Western technologies and <a href="https://www.weforum.org/stories/2025/01/transforming-industries-with-ai-lessons-from-china/#:~:text=China's%20trajectory%20in%20AI%20is,for%20AI%20innovation%20by%202030.">becoming a global leader in AI by 2030</a>. Whatever data is obtained by the United States is icing on the cake. The West is not the primary target audience. Both models have servers in Singapore and China, where information is likely subject to Chinese laws, and terms and conditions are meaningless.</p>
<p>The Chinese will use AI technologies to gain an advantage in the information environment and seek to expand influence by creating an ecosystem for which other countries are dependent on their models. The incentive is to give countries this technology to foster dependency. The idea is similar to China’s debt-trap diplomacy—<a href="https://www.cfr.org/backgrounder/chinas-massive-belt-and-road-initiative">the Belt and Road Initiative</a>. While ChatGPT’s basic model is free, China seeks to develop better models at a cheaper price to serve as leverage over countries that cannot afford the higher-end US-based models.</p>
<p>The United States is taking the right approach to maintaining its information advantage through AI development and investment. The <a href="https://www.reuters.com/technology/artificial-intelligence/behind-500-billion-ai-data-center-plan-us-startups-jockey-with-tech-giants-2025-01-23/">billions pouring into creating AI data centers</a> will play an important role in ensuring the United States has the edge in AI.</p>
<p>These data centers remain critical for identifying and countering any malign information operations against the United States, its partners, and its allies. When Iran attempted to influence the 2024 presidential election using the generative model GPT, <a href="https://openai.com/index/disrupting-deceptive-uses-of-AI-by-covert-influence-operations/">OpenAI detected and shut it down</a>. Without this expansive investment in AI data centers that keep information within the letter of US law and oversight, these interventions would be out of reach, and information operations may be even more challenging to detect.</p>
<p>However, this approach is insufficient without incorporating artificial Intelligence into all aspects of military operations. The DoD uses artificial intelligence within some branches, but given the expansive nature of AI, this is not enough. AI is expected to touch nearly all aspects of military operations, especially information operations, and may not have time to wait for its major AI initiative, <a href="https://interestingengineering.com/military/project-maven-the-epicenter-of-us-ai-military-efforts">Project Maven</a>, to fully develop.</p>
<p>Some military scholars have called something like this a <a href="https://www.csis.org/analysis/real-revolution-military-affairs">revolution in military affairs</a>, but perhaps, given the impact of war, it could be classified as such. <a href="https://nationalinterest.org/feature/nothing-new-why-revolution-military-affairs-same-old-one-77266">The concept is somewhat antiquated and outdated without some context</a>, but it remains the best way to describe what should take place within the DoD. The foundation is already in place through the conceptual framework of multidomain operations.</p>
<p>Artificial capabilities are widely available through graphical user interfaces in deployable, ready-to-use form, such as ChatGPT or even internal <a href="https://www.army.mil/article/283601/enhancing_military_operational_effectiveness_through_the_integration_of_camo_and_nipr_gpt">large language models</a>. The joint force should use these capabilities to the broadest extent possible. If anything, artificial intelligence, including large language models, will make joint and combined forces more lethal and accurate as they counter Chinese efforts within the information environment.</p>
<p>The DoD must adopt incentives for service members to understand the capabilities of AI and incorporate them in all training environments. These incentives can include bonuses for taking AI-driven courses. The DoD can also increase awareness and accessibility of AI courses on its education platforms which now have a paucity of artificial intelligence courses.</p>
<p>The DoD must also improve the training environment. With proprietary or off-the-shelf software, the DoD can incorporate AI offensive and defensive platforms within all training and mission-critical tasks. Even simply assisting with identifying generative outputs, e.g., deepfakes, will counter Chinese influence within the information environment, especially during hybrid conflict. Furthermore, military doctrine should recognize the importance of AI, especially information operations, with an emphasis on psychological operations.</p>
<p>While AI investment is critical to countering Chinese influence within the information environment, the only way to truly embrace multidomain operations is to ensure service members have the AI technical competency necessary to maneuver within the information environment deterring Chinese aggression.</p>
<p><em>US Army Lieutenant Colonel Matthew J. Fecteau is a PhD researcher at King’s College London studying how artificial Intelligence will impact conflict. He can be reached at matthew.fecteau.alumni@armywarcollege.edu.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/05/Chinas-AI-Driven-Information-Operations-are-Here.pdf"><img decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="288" height="80" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 288px) 100vw, 288px" /></a></p>
<p><a href="https://globalsecurityreview.com/chinas-ai-driven-information-operations-are-here-the-us-needs-an-ai-rma/">China’s AI-Driven Information Operations Are Here: The US Needs an AI RMA</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/chinas-ai-driven-information-operations-are-here-the-us-needs-an-ai-rma/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
