<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Topic:innovation &#8212; Global Security Review %</title>
	<atom:link href="https://globalsecurityreview.com/subject/innovation/feed/" rel="self" type="application/rss+xml" />
	<link>https://globalsecurityreview.com/subject/innovation/</link>
	<description>A division of the National Institute for Deterrence Studies (NIDS)</description>
	<lastBuildDate>Thu, 12 Feb 2026 12:11:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://globalsecurityreview.com/wp-content/uploads/2026/05/cropped-GSR-Chrome-Logo-2026-1-32x32.png</url>
	<title>Topic:innovation &#8212; Global Security Review %</title>
	<link>https://globalsecurityreview.com/subject/innovation/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Diplomacy in Great Power Competition and the Limits of Economic Statecraft</title>
		<link>https://globalsecurityreview.com/diplomacy-in-great-power-competition-and-the-limits-of-economic-statecraft/</link>
					<comments>https://globalsecurityreview.com/diplomacy-in-great-power-competition-and-the-limits-of-economic-statecraft/#comments</comments>
		
		<dc:creator><![CDATA[Hafiz Ibrahim]]></dc:creator>
		<pubDate>Thu, 12 Feb 2026 13:10:22 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Challenging Disarmament Disinformation]]></category>
		<category><![CDATA[Deterrence & Foreign Policy]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[alliances]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[coercion]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[Diplomacy]]></category>
		<category><![CDATA[economic diplomacy]]></category>
		<category><![CDATA[economic pressure]]></category>
		<category><![CDATA[economic statecraft]]></category>
		<category><![CDATA[extended deterrence]]></category>
		<category><![CDATA[Foreign Policy]]></category>
		<category><![CDATA[global politics]]></category>
		<category><![CDATA[global security]]></category>
		<category><![CDATA[Great Power Competition]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[international cooperation]]></category>
		<category><![CDATA[international relations]]></category>
		<category><![CDATA[investment]]></category>
		<category><![CDATA[Military Strategy]]></category>
		<category><![CDATA[nuclear triad]]></category>
		<category><![CDATA[power rivalry]]></category>
		<category><![CDATA[punitive deterrence]]></category>
		<category><![CDATA[sanctions]]></category>
		<category><![CDATA[tariffs]]></category>
		<category><![CDATA[Thucydides Trap]]></category>
		<category><![CDATA[Trade]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32289</guid>

					<description><![CDATA[<p>As contemporary rivals, the United States and China echo historical patterns of major competition between an established and a rising power, described within Graham Allison&#8217;s article, “The Thucydides Trap: Are the U.S. and China Headed for War?” Allison warns of an apparent tendency towards war when an emerging power threatens to displace an existing great [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/diplomacy-in-great-power-competition-and-the-limits-of-economic-statecraft/">Diplomacy in Great Power Competition and the Limits of Economic Statecraft</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As contemporary rivals, the United States and China echo historical patterns of major competition between an established and a rising power, <a href="https://www.belfercenter.org/publication/thucydides-trap-are-us-and-china-headed-war">described</a> within Graham Allison&#8217;s article, “The Thucydides Trap: Are the U.S. and China Headed for War?” Allison warns of an apparent tendency towards war when an emerging power threatens to displace an existing great power like a regional or international hegemon.</p>
<p>The term ‘diplomacy’ originates from the ancient Greek word <em>diplōma</em>, <a href="https://kids.britannica.com/students/article/diplomacy/274012">meaning</a> “an object folded in two,” referring to a document granting travel or special privileges to diplomats. Statecraft is <a href="https://kids.britannica.com/students/article/diplomacy/274012">defined</a> as the art of governing state affairs, encompassing diplomacy, economic statecraft, military strategy, and intelligence. Economic statecraft is <a href="https://www.britannica.com/topic/economic-statecraft">defined</a> as “the use of economic means to pursue foreign policy goals,” including foreign aid, trade, sanctions, tariffs, and investment to achieve foreign policy goals. While diplomacy relies on negotiation and alliances to further foreign policy, economic statecraft, on the other hand, relies on economic power to achieve foreign policy objectives.</p>
<p>In early human history, relations between groups were often conflictual, with armed confrontation serving as the primary means for achieving strategic advantage. Yet, even in antiquity, diplomacy emerged as a vital tool for negotiation and conflict resolution. The rivalry between the United States and China, unlike ancient rivalries, did not evolve solely due to military power; rather, it is a hybrid of trade, investment, alliances, and military strength.</p>
<p>China has rooted its diplomacy in trade and economics, stretching its relationships from Asia to Africa and reviving the old Silk Road that was once a symbol of China&#8217;s economic dominance. By using economic diplomacy as its foreign policy tool, China can open new markets and build alliances. Elsewhere in the Western Hemisphere, China is becoming the most important trade partner, with the likes of Argentina, Brazil, and Colombia now shifting towards China despite being traditional allies of the United States.</p>
<p>The United States&#8217; current diplomacy is evolving in the use of economic statecraft as well, through sanctions, tariffs, and foreign investment based on coercion and compliance. If that can be successful in achieving the U.S. foreign policy objective and the interest of the U.S. national security, it is apparent that the strategy is limited, as it does not have global reach. While states may comply with the U.S. policy based on fear of retaliation, success from this method can be limited; as in international relations, states can balance or bandwagon. By analyzing the global politics of small states in the south, the U.S. economic statecraft and boat diplomacy may push them towards balancing towards China.</p>
<p>Robert J. Art and Robert Jervis, in <em>International Politics: Enduring Concepts and Contemporary Issues</em>, <a href="https://studylib.net/doc/26973335/international-politics-enduring-concepts-and-contemporary...">argue</a> that “force can be used to take or to bargain. If you can take what you want, you do not need your adversary’s cooperation and do not have to bargain with him. A country may use force to seize disputed territory just as a robber may kill you to get your wallet. Most of the things people and nations want, however, cannot be taken in this way. A nation may want others to stop menacing it; it may even want others to adopt its values. Brute force alone cannot achieve these goals.”</p>
<p>Coercion has been a tool of U.S. economic statecraft in foreign policy for a long time. However, history shows that it has clear limitations, especially in great power rivalry. In the U.S.-Japan rivalry leading to World War II, Japan achieved early military successes, but its overextension and limited industrial base prevented long-term strategic victory. Rather than deterring Japan, U.S. <a href="https://www.ebsco.com/research-starters/history/japanese-military-aggression">sanctions</a> intensified its aggression, illustrating again that economic pressure can provoke escalation rather than prevent it. Coercive tools such as economic sanctions and tariffs, while a game-changer, cannot alone secure a strategic victory.</p>
<p>For deterrent purposes, economic sanctions historically have not prevented rogue states from changing their behavior. It did not prevent North Korea from developing long-range ballistic missiles, just as it was not successful in changing Iran’s human rights behavior and nuclear ambitions. Rather than punitive deterrence, what ultimately works in Iran is <a href="https://www.airuniversity.af.edu/AUPress/Book-Reviews/Display/Article/3052420/deterrence-by-denial-theory-and-practice/">deterrence by denial,</a> as initial punitive measures did not suffice highlighting the limitations of economic statecraft in power competition. Punitive deterrence will not prevent a new power from rising, as described by Alison in <a href="https://gsas.harvard.edu/news/discussing-thucydides-trap">Thucydides’ Trap</a>, nor will it prevent weaker states from balancing against strong ones. It did not prevent the rise of China, and it will not prevent the rise of other future powers. What has and will make deterrence effective is the innovation of the U.S. nuclear triad, extended deterrence, and international cooperation through diplomacy.</p>
<p>Contemporary politics reflects the same pattern. Russia’s military power has not secured a decisive victory in Ukraine, and economic sanctions, either targeted or sectoral, have not changed Russia&#8217;s posture. As noted by the <a href="https://www.cfr.org/in-brief/three-years-war-ukraine-are-sanctions-against-russia-making-difference">Council on Foreign Relations</a>, “The United States began its 2022 barrage of sanctions by freezing $5 billion of the Russian central bank’s U.S. assets, an unprecedented move to prevent Moscow from using its foreign reserves to prop up the Russian ruble.” While sanctions in other sectors, such defense and energy, have been seriously targeted, the war is still ongoing. In the same vein, the U.S.–China competition and tariffs imposed on Beijing have failed to change China’s behavior as <a href="https://www.globaltrademag.com/chinas-2025-economic-resilience-record-trade-surplus-amid-tariffs/">described</a> by Global Trade Magazine, “China’s annual trade surplus passed $1 trillion, a record high, with a GDP growth remained steady at around 5%.”</p>
<p>It is paramount that the United States develop a hybrid strategy, combining diplomacy and other tools of statecraft to keep its leadership on the global stage, as opposed to relying on power.</p>
<p>While coercion and deterrence are important in great power rivalries, the current global landscape does not favor such a posture. There is a need to consider economic diplomacy as the main tool of U.S. foreign policy and economic statecraft as a second, as a future war will not be determined by military strength but by the mixture of both economic and military might.</p>
<p><em>Hafiz Ibrahim is a Ph.D. student at Virginia Tech’s School of Public and International Affairs, specializing in political economy, global security, and African-U.S. affairs. His professional experience includes serving as a Defense Trade Analyst government contractor at the U.S. Department of State, as well as working previously at Deloitte Consulting as a Sanctions Analyst. Views expressed in this article are the author&#8217;s own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/02/The-Role-of-Diplomacy-in-Great-Power-Competition-and-the-limit-of-economic-statecraft.pdf"><img decoding="async" class="alignnone wp-image-32091" src="http://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png" alt="" width="259" height="72" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button-300x83.png 300w" sizes="(max-width: 259px) 100vw, 259px" /></a></p>
<p><a href="https://globalsecurityreview.com/diplomacy-in-great-power-competition-and-the-limits-of-economic-statecraft/">Diplomacy in Great Power Competition and the Limits of Economic Statecraft</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/diplomacy-in-great-power-competition-and-the-limits-of-economic-statecraft/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Drones and the Death of Deterrence: Lessons from Nagorno-Karabakh</title>
		<link>https://globalsecurityreview.com/drones-and-the-death-of-deterrence-lessons-from-nagorno-karabakh/</link>
					<comments>https://globalsecurityreview.com/drones-and-the-death-of-deterrence-lessons-from-nagorno-karabakh/#respond</comments>
		
		<dc:creator><![CDATA[Vikramaditya Shrivastava]]></dc:creator>
		<pubDate>Tue, 26 Aug 2025 12:16:32 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[adaptability]]></category>
		<category><![CDATA[aircraft]]></category>
		<category><![CDATA[algorithmic]]></category>
		<category><![CDATA[algorithms]]></category>
		<category><![CDATA[Armenia]]></category>
		<category><![CDATA[asymmetric]]></category>
		<category><![CDATA[Azerbaijan]]></category>
		<category><![CDATA[bandwidth]]></category>
		<category><![CDATA[bayraktar]]></category>
		<category><![CDATA[conventional]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[drones]]></category>
		<category><![CDATA[escalation]]></category>
		<category><![CDATA[hybrid]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[integration]]></category>
		<category><![CDATA[loitering]]></category>
		<category><![CDATA[munitions]]></category>
		<category><![CDATA[precision]]></category>
		<category><![CDATA[proliferation]]></category>
		<category><![CDATA[resilience]]></category>
		<category><![CDATA[retaliation]]></category>
		<category><![CDATA[strategic]]></category>
		<category><![CDATA[superpowers]]></category>
		<category><![CDATA[tactical]]></category>
		<category><![CDATA[visibility]]></category>
		<category><![CDATA[warfare]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31436</guid>

					<description><![CDATA[<p>Drones did not change how wars are fought; they changed who can win them. In 2020, Azerbaijan used drones to dismantle Armenia’s defenses in Nagorno-Karabakh with chilling efficiency. Tanks, artillery, and air defense systems were destroyed not by elite pilots or stealth jets, but by unmanned machines guided from afar. The war was not won [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/drones-and-the-death-of-deterrence-lessons-from-nagorno-karabakh/">Drones and the Death of Deterrence: Lessons from Nagorno-Karabakh</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Drones did not change how wars are fought; they changed who can win them. In 2020, Azerbaijan used drones to dismantle Armenia’s defenses in Nagorno-Karabakh with chilling efficiency. Tanks, artillery, and air defense systems were destroyed not by elite pilots or stealth jets, but by unmanned machines guided from afar.</p>
<p>The war was not won by overwhelming force—it was won by precision, persistence, and a new kind of visibility. This shift was not just tactical; it was existential. Drones lowered the cost of engagement and shattered the old logic of deterrence. Military planners who once relied on large arsenals and conventional firepower now face a battlefield defined by bandwidth, optics, and algorithms. Nagorno-Karabakh was not an anomaly; it was a preview of what is coming.</p>
<p><strong>Drones Tilt the Balance of Power</strong></p>
<p><a href="https://www.washingtonpost.com/world/europe/nagorno-karabkah-drones-azerbaijan-aremenia/2020/11/11/441bcbd2-193d-11eb-8bda-814ca56e138b_story.html">Azerbaijan’s drone fleet</a>, led by Turkish-made Bayraktar TB2s and Israeli loitering munitions, did more than support ground troops. These drones destroyed tanks, artillery, and air defense systems with surgical precision.</p>
<p>Drone footage flooded social media and state television, galvanizing public support and intimidating adversaries. The battlefield became a stage and drones the lead actors in a performance of technological supremacy.</p>
<p>This was not a remote skirmish; it was a full-spectrum demonstration of how drones can tilt the military balance. Azerbaijan used converted Soviet-era aircraft as bait to expose Armenian air defenses, then struck with precision-guided drones. Air dominance was no longer reserved for wealthy superpowers; it was achieved through strategy and innovation.</p>
<p><strong>Deterrence No Longer Works the Way It Used To</strong></p>
<p>Deterrence did not fail for lack of firepower; it failed because the rules changed faster than anyone could adapt. Armenia’s conventional forces, built on Cold War assumptions, could not withstand the precision and persistence of drone strikes. The belief that large-scale military assets could prevent escalation collapsed under the weight of smaller and smarter systems.</p>
<p>This was not just a tactical failure; it was a conceptual one. Drones lowered the threshold for engagement and allowed Azerbaijan to strike decisively without risking pilots or exposing vulnerable assets. <a href="https://www.c4isrnet.com/battlefield-tech/2023/10/05/israeli-arms-drones-quietly-helped-azerbaijan-retake-nagorno-karabakh/">Deterrence</a>, once rooted in overwhelming retaliation, now faces a new reality: speed, precision, and deniability.</p>
<p><strong>Hybrid Warfare Is the New Normal</strong></p>
<p>The war was not fought only in the skies; it unfolded across screens, networks, and supply chains. Azerbaijan blended conventional ground operations with cyber tactics, <a href="https://www.bbc.com/news/world-europe-54614392">information warfare</a>, and economic pressure. This hybrid model reflects a broader shift in twenty-first century warfare, where victory depends as much on narrative as on firepower.</p>
<p>Azerbaijan’s goals were clear: reclaim a contested enclave and secure vital energy corridors. But its drone-led offensive carried a deeper message—technological capability is political will. The signal to adversaries was unmistakable: resistance will be met with precision, persistence, and total visibility.</p>
<p><strong>Small States Can Now Challenge Big Powers </strong></p>
<p><strong>            </strong>For Armenia, Nagorno-Karabakh represents cultural survival and historical identity. Its defense relied on asymmetrical tactics and guerrilla resilience. But against a technologically superior adversary, these methods faltered. Civilians and soldiers alike were left exposed, sheltering under skies that no longer offered cover.</p>
<p>This vulnerability is not unique to Armenia. Small states with access to drones can now challenge larger powers. Taiwan, for instance, is rapidly scaling up domestic drone production to counter China and support Western allies. Its “<a href="https://www.politico.eu/article/taiwan-eyes-war-drones-to-counter-china/">Drone National Team</a>” initiative aims to produce 15,000 drones per month by 2028, positioning the island as a global hub for secure, AI-enabled drones.</p>
<p><strong>Deterrence Must Be Reimagined</strong></p>
<p>Nagorno-Karabakh may be the first war won by drones, but it will not be the last. The conflict offers a sobering lesson; deterrence must evolve or risk obsolescence. Integrated deterrence—blending military, economic, cyber, and diplomatic tools—is no longer optional. Unlike nuclear weapons, drones are accessible, scalable, and deniable. Their proliferation is horizontal, not vertical, spreading across small states, insurgent groups, and private firms.</p>
<p>As drone technology spreads, so does the risk of escalation, miscalculation, and asymmetric retaliation. The battlefield is no longer bound by geography; it is shaped by bandwidth, optics, and algorithmic intent.</p>
<p><strong>Conclusion</strong></p>
<p><strong>            </strong>Nagorno-Karabakh was not just a battlefield; it was a turning point. It exposed how technological agility can dismantle legacy doctrines and how drones, once tactical novelties, now shape strategic outcomes. In this new era, deterrence is not about mass or might; it is about adaptability, integration, and speed. For nations still clinging to Cold War paradigms, the message is clear: evolve or be outmaneuvered. The future belongs to those who understand not just how to fight, but how to think in bandwidths, algorithms, and stories that shape the battlefield before the first shot is fired.</p>
<p>Evolution demands more than procurement; it requires imagination. Nations must rethink not only how they defend, but what they defend and why. As drones blur the line between war and surveillance, between deterrence and provocation, the strategist of tomorrow must be fluent in both geopolitics and code. The age of <a href="https://researchcentre.army.gov.au/library/land-power-forum/how-are-drones-changing-modern-warfare">unmanned warfare</a> is here and it is rewriting the rules faster than most doctrines can keep up.</p>
<p><em>Vikramaditya Shrivastava is a master’s student in international relations, security, and strategy at OP Jindal Global University.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/08/Drones-and-the-Death-of-Deterrence.pdf"><img decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="198" height="55" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 198px) 100vw, 198px" /></a></p>
<p><a href="https://globalsecurityreview.com/drones-and-the-death-of-deterrence-lessons-from-nagorno-karabakh/">Drones and the Death of Deterrence: Lessons from Nagorno-Karabakh</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/drones-and-the-death-of-deterrence-lessons-from-nagorno-karabakh/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Quiet Dismantling of America’s AI Warfighting Edge</title>
		<link>https://globalsecurityreview.com/the-quiet-dismantling-of-americas-ai-warfighting-edge/</link>
					<comments>https://globalsecurityreview.com/the-quiet-dismantling-of-americas-ai-warfighting-edge/#respond</comments>
		
		<dc:creator><![CDATA[Greg Sharpe]]></dc:creator>
		<pubDate>Wed, 20 Aug 2025 12:16:15 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Government & Politics]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[advanced technologies]]></category>
		<category><![CDATA[adversaries]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI fellowships]]></category>
		<category><![CDATA[AI warfare]]></category>
		<category><![CDATA[algorithmic assessments]]></category>
		<category><![CDATA[Arms Race]]></category>
		<category><![CDATA[battlefield innovations]]></category>
		<category><![CDATA[battlefield losses]]></category>
		<category><![CDATA[CDAO]]></category>
		<category><![CDATA[Chief Digital and Artificial Intelligence Office]]></category>
		<category><![CDATA[Chief Technology Officer]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cost-cutting]]></category>
		<category><![CDATA[CTO]]></category>
		<category><![CDATA[Department of Government Efficiency]]></category>
		<category><![CDATA[Digital Corps]]></category>
		<category><![CDATA[DOGE]]></category>
		<category><![CDATA[efficiency mandates]]></category>
		<category><![CDATA[global AI dominance]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[institutional memory]]></category>
		<category><![CDATA[interoperability]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[Military Technology]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[propaganda]]></category>
		<category><![CDATA[readiness]]></category>
		<category><![CDATA[recruitment]]></category>
		<category><![CDATA[reform]]></category>
		<category><![CDATA[retention]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[siloed projects]]></category>
		<category><![CDATA[STEM professionals]]></category>
		<category><![CDATA[strategic deterrence]]></category>
		<category><![CDATA[techno-authoritarianism]]></category>
		<category><![CDATA[technological coherence]]></category>
		<category><![CDATA[technologists]]></category>
		<category><![CDATA[US Department of Defense]]></category>
		<category><![CDATA[wargames]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31400</guid>

					<description><![CDATA[<p>Amid the global artificial intelligence (AI) arms race, elite adversaries such as China and Russia are actively strengthening their military tech structures without any barriers from their government. They are maintaining robust chains of command, particularly in key tech leadership roles, to preserve momentum in AI-driven warfare. Meanwhile, the US Department of Defense (DoD) appears [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-quiet-dismantling-of-americas-ai-warfighting-edge/">The Quiet Dismantling of America’s AI Warfighting Edge</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Amid the global artificial intelligence (AI) arms race, elite adversaries such as China and Russia are actively strengthening their military tech structures without any barriers from their government. They are maintaining robust chains of command, particularly in key tech leadership roles, to preserve momentum in AI-driven warfare.</p>
<p>Meanwhile, the US Department of Defense (DoD) appears to be doing the opposite. The Chief Digital and Artificial Intelligence Office (CDAO) recently <a href="https://defensescoop.com/2025/07/03/pentagon-ai-office-cdao-eliminates-cto-efficiencies-doge">axed its Chief Technology Officer</a> (CTO) directorate, a move many analysts view as strategic self-sabotage.</p>
<p>This directorate, responsible for overseeing more than $340 million in AI and digital integrations in fiscal year 2024, represented a critical nexus linking battlefield innovations with institutional infrastructure. Its elimination, justified under “efficiency” mandates, alarmed defense observers who fear it fractures continuity, erases institutional memory, and sends a dangerous signal to adversaries willing to exploit perceived American weakness.</p>
<p><strong>The Strategic Misstep</strong></p>
<p>The CDAO was formed in 2022 by fusing key functions from the Joint Artificial Intelligence Center, Defense Digital Service, Chief Data Office, and Advana analytics, aiming to unify policy, technology, and digital services. Embedded within <a href="https://defensescoop.com/2025/05/07/dod-cdao-future-uncertain-top-leaders-tech-staffers-depart">CDAO, the CTO led cross-functional teams in AI, cyber, logistics, and command-and-control systems</a>, ensuring that new technologies remained interoperable and aligned with warfighter requirements.</p>
<p>Abruptly dismantling this directorate not only removes a pivotal vision and coordination role but also creates a void with no clear replacement. The result is fragmented efforts, lost synergy across mission areas, and a battlefield advantage handed to adversaries.</p>
<p><strong>Expertise Lost, Momentum Undermined</strong></p>
<p>Leadership and expertise take years, even decades, to develop. Figures like Bill Streilein, former CTO of <a href="https://en.wikipedia.org/wiki/Chief_Digital_and_Artificial_Intelligence_Office">CDAO</a> and veteran of MIT Lincoln Laboratory, carried institutional memory and high standards into Pentagon AI programs. But when top-tier professionals are sidelined under the label of “streamlining,” they often leave and seldom return.</p>
<p>This pattern has already occurred. The Defense Digital Service (DDS), once lauded as the Pentagon’s “<a href="https://www.politico.com/news/2025/04/15/pentagons-digital-resignations-00290930">SWAT team of nerds</a>,” lost almost all of its members by May 2025, prompting its demise. Nearly every DDS member, citing bureaucratic pressure from the Department of Government Efficiency (DOGE), chose to depart rather than conform.</p>
<p>These departures are not benign transfers. They represent the scattering of core innovators and connectors whose insight and trust networks are irreplaceable. Without them, emerging AI systems risk becoming siloed projects rather than battlefield-enabling capabilities.</p>
<p><strong>DOGE: Efficiency or Engineered Evisceration?</strong></p>
<p>DOGE, instituted by a presidential executive order in January 2025, is authorized to slash perceived inefficiencies across federal agencies—often through AI-enhanced, automated assessments. Under the leadership of figures tied to Elon Musk and Vivek Ramaswamy, <a href="https://en.wikipedia.org/wiki/Department_of_Government_Efficiency">DOGE</a> has repurposed its mandate to aggressively target leadership and innovation roles across the board—including in national defense.</p>
<p>DOGE has justified cuts using its proprietary AI systems to flag and eliminate “inefficient” programs, often without human oversight or contextual nuance. The CTO’s directorate was among its most high-profile targets, methodically identified and removed, despite its mission-critical nature.</p>
<p>To make matters worse, DOGE is reportedly comfortable with these decisions. One Pentagon official described it as a “theater of dominance,” not just cost-cutting, but deliberate erasure of institutional anchors to obfuscate the depth and breadth of the sacrifice.</p>
<p><strong>The High-Stakes Fallout</strong></p>
<p>Adversaries feast on the narrative that the US champions AI yet purges its own tech leadership overnight. “America cannibalizes its talent while claiming leadership in AI warfare,” such narratives go. These optics weaken American deterrence, erode allied confidence, and provide cover for Moscow, Beijing, and Pyongyang to reframe the battlefield narrative.</p>
<p>Domestic consequences are equally grim. The consistent removal of flagship tech roles projects a clear message to science, technology, engineering, and math (STEM) professionals; serve, and risk being discarded. That weakness is a recruitment boon for adversaries, national lab contractors, and tech-armed autocracies solving tomorrow’s warfare puzzles.</p>
<p>Real efficiencies lie not in gutting leadership but in fortifying it. Per the <a href="https://en.wikipedia.org/wiki/National_Security_Commission_on_Artificial_Intelligence">National Security Commission</a> on AI, prioritizing disciplined recruitment and retention of technical talent, including a <a href="https://www.youtube.com/shorts/59rGN1OhqDk">Digital Corps and AI fellowships</a>, is key to American competitiveness. Instead, we witness the dismantling of precisely those anchor roles meant to shepherd AI innovation into combat-relevant systems.</p>
<p><strong>The DOGE-Driven Dismantling of Tech Leadership</strong></p>
<p>The concepts herein are alarming and reflect an institutional unraveling that directly undermines America’s global security posture and strategic deterrence in five critical ways. <em>First</em>, the elimination of the Chief Technology Officer (CTO) directorate from the Chief Digital and Artificial Intelligence Office (CDAO) strips away a core pillar of the Pentagon’s ability to adapt emerging technologies for battlefield advantage. This directorate was not redundant bureaucracy; it was the crucible in which ideas from national labs, industry, and warfighters were harmonized into operational capability.</p>
<p>By abruptly dismantling this team, the Department of Defense has extinguished a pipeline of institutional memory and strategic insight at the precise moment when rapid, informed, and integrated decision-making is needed. This brain drain parallels a historical pattern of self-sabotage and leaves adversaries uncontested in the tech talent race.</p>
<p><em>Second</em>, the removal of high-level AI leadership is a propaganda gift to revisionist powers like China and Russia. These states are watching America voluntarily decapitate its own strategic leadership, an act they can now frame as proof of American decline. This strengthens their strategic messaging in influence campaigns aimed at allies, neutral states, and even American citizens.</p>
<p>“America cannibalizes its talent while claiming leadership in AI warfare” is not just a phrase, it is a weaponized narrative that demoralizes partners and emboldens adversaries to challenge American dominance in contested domains like cyberspace, space, and AI warfare.</p>
<p><em>Third</em>, strategic deterrence hinges on credible capability and the perception of cohesion. DOGE’s algorithmic-driven targeting of leadership roles without contextual assessment introduces chaos into the acquisition and integration life cycle of military AI systems. Instead of creating synergistic effects across logistics, cyber, and command and control, the US risks building a fractured, siloed ecosystem that fails in joint operations.</p>
<p>By removing the very leaders who prevent stove piping, the US sabotages its ability to develop and field interoperable, scalable, and warfighter-ready AI tools. This systemic breakdown makes deterrence brittle, vulnerable to being cracked in future high-end conflicts.</p>
<p><em>Fourth</em>, the US has struggled to compete with the private sector for AI and cybersecurity talent. By signaling that even elite government technologists are disposable under the guise of “efficiency,” this policy drives future talent away from public service. Those who might have joined a modern “Digital Corps” will instead seek stability and respect elsewhere, perhaps even abroad.</p>
<p>Strategic deterrence depends not only on weapons but on technologists who know how to deploy them. Gutting these roles ensures that tomorrow’s innovations will not make it past the lab, let alone onto the battlefield.</p>
<p><em>Fifth</em>, DOGE’s use of automated assessments to eliminate “inefficiencies” without human oversight is a grotesque parody of reform. Its reliance on cold, context-blind algorithms to purge critical roles mimics adversary models of techno-authoritarianism, not democratic accountability. If allowed to continue, this will hollow out innovation across government agencies and military branches.</p>
<p>Efficiency is not the enemy, misapplied efficiency is. Strategic deterrence requires smart investments, not cost-cutting theater that sacrifices our warfighting edge on the altar of political optics.</p>
<p><strong>Strategic Self-Sabotage Must Be Reversed</strong></p>
<p>This is not merely streamlining, it is full-blown surrender. The dismantling of the CDAO’s CTO directorate and the broader DOGE initiative represents an engineered unraveling of the very leadership needed to project U.S. strategic deterrence in the AI era. Leadership is the vector through which technology becomes capability. Remove it, and you hand your adversaries not only the advantage, but the narrative.</p>
<p>Unless reversed, these concepts and actions will echo through wargames, deterrence failures, and battlefield losses. The US must stop cannibalizing its competitive edge and re-center its national security strategy on strengthening, not sidelining, its AI leadership.</p>
<p><strong>Conclusion</strong></p>
<p>Leadership is not just overhead on the funding spreadsheet; these leaders are our ammunition in the fight for global AI dominance. Removing them during a strategic inflection point is not reform, it is a self-made vulnerability, and as the US disables its own leadership of advanced technologies, it is dismantling future readiness.</p>
<p>The nation must insist on accountability. Cost-cutting means nothing if it costs the technological coherence to compete in tomorrow’s battles. In the strategic competition unfolding now, leadership is the weapon, and ceding it is surrender. This page out of the DOGE handbook should be shredded and burned. Remember, Iranian nuclear scientists were not dismantled by their own regime, they were destroyed by US and Israeli bombs.</p>
<p><em>Greg Sharpe is Marketing Director at the National Institute for Deterrence Studies. He is retired from the US Air Force. The views expressed are his own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/08/Sabotage-from-Within-A-DOGE-Debocle.pdf"><img decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="306" height="85" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 306px) 100vw, 306px" /></a></p>
<p><a href="https://globalsecurityreview.com/the-quiet-dismantling-of-americas-ai-warfighting-edge/">The Quiet Dismantling of America’s AI Warfighting Edge</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-quiet-dismantling-of-americas-ai-warfighting-edge/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How Civilian Dual-Use Technologies Are Reshaping Global Security Policies</title>
		<link>https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/</link>
					<comments>https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/#respond</comments>
		
		<dc:creator><![CDATA[Harry Geisler]]></dc:creator>
		<pubDate>Thu, 17 Jul 2025 12:17:17 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Development]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI-enabled navigation]]></category>
		<category><![CDATA[AUKUS]]></category>
		<category><![CDATA[autonomous weapons]]></category>
		<category><![CDATA[Civilian dual-use technologies]]></category>
		<category><![CDATA[collective defense]]></category>
		<category><![CDATA[counter-drone strategy]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[drones]]></category>
		<category><![CDATA[energy grid]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[export control regimes]]></category>
		<category><![CDATA[FPV drones]]></category>
		<category><![CDATA[global security policies]]></category>
		<category><![CDATA[governance gaps]]></category>
		<category><![CDATA[hybrid conflict]]></category>
		<category><![CDATA[infrastructure attacks]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[legal frameworks]]></category>
		<category><![CDATA[National defense]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Nord Stream pipelines]]></category>
		<category><![CDATA[procurement pathways]]></category>
		<category><![CDATA[resilience]]></category>
		<category><![CDATA[sabotage]]></category>
		<category><![CDATA[start-ups]]></category>
		<category><![CDATA[transportation hubs]]></category>
		<category><![CDATA[unmanned aircraft systems]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31187</guid>

					<description><![CDATA[<p>In August 2024, police in northern Germany chased a fleet of drones loitering over critical infrastructure: a decommissioned nuclear plant, a chemical facility, and a Baltic liquified natural gas (LNG) terminal. The drones flew with impunity, reportedly reaching 100 kilometres an hour to evade police. Authorities launched an espionage investigation, suspecting the drones were scouting [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/">How Civilian Dual-Use Technologies Are Reshaping Global Security Policies</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In August 2024, <a href="https://www.defensenews.com/global/europe/2024/08/29/drone-sightings-near-bases-infrastructure-unnerve-german-officials">police in northern Germany</a> chased a fleet of drones loitering over critical infrastructure: a decommissioned nuclear plant, a chemical facility, and a Baltic liquified natural gas (LNG) terminal. The drones flew with impunity, reportedly reaching 100 kilometres an hour to evade police. Authorities launched an espionage investigation, suspecting the drones were scouting for sabotage.</p>
<p>This was not an isolated incident. Civilian-grade drones and other dual-use technologies are increasingly being used to survey or target public infrastructure. From energy grids to airports, the connective tissue of modern life is exposed to risks once confined to traditional warzones. These developments are reshaping global security policies and blurring the boundary between civilian and military domains.</p>
<h3><strong>Civilian Tech, Strategic Impact</strong></h3>
<p>Cheap unmanned aircraft systems (UAS) are now accessible worldwide. While drones were initially developed for military use, the most commonly deployed platforms today, such as DJI’s Mavic series, were originally built for civilian applications like aerial photography and videography. Their affordability, portability, and high-spec cameras made them commercially popular, but those same features have made them easy to repurpose for military contexts.</p>
<p>In particular, first-person view (FPV) drones, designed for immersive recreational flying, were rapidly adapted for frontline use in conflict. These drones are now routinely deployed with improvised explosives or used for precision reconnaissance. In Ukraine, both sides repurposed off-the-shelf drones in vast numbers; nearly two million were produced in 2024 alone. Many of these are equipped with AI-enabled navigation and targeting, underscoring how quickly civilian tech can be weaponised.</p>
<p>Non-state actors are following suit. Armed groups are using FPV drones for low-cost, high impact strikes on infrastructure, blurring the lines between military and civilian threats. This second drone age shows that national security vulnerabilities now stem as much from consumer technology as from conventional arsenals.</p>
<p>The broader implication is clear: private-sector innovations, often created without any defense intent, are shaping the battlefield. These companies bring novel use cases, technical advantages, or agile design processes that legacy defense contractors may overlook. Civilian tech is not just a risk; it is a potential strategic asset. Tapping into this ecosystem, especially among start-ups and experts, could redefine how the country protects critical infrastructure in an era of hybrid conflict.</p>
<p><strong>Infrastructure in the Crosshairs</strong></p>
<p>Modern infrastructure is a key target in modern conflicts or hybrid attacks, just like military bases traditionally were. In 2022, after the <a href="https://www.theguardian.com/business/2022/sep/29/nord-stream-attacks-highlight-vulnerability-undersea-pipelines-west">sabotage of the Nord Stream pipelines</a>, over 70 drone sightings were reported near Norwegian offshore oil platforms. Oslo feared Russian-linked hybrid operations targeting Europe’s energy supply and deployed naval assets and invited NATO allies to assist in patrols.</p>
<p>Meanwhile, Ukraine’s energy grid suffered repeated drone and missile attacks, with waves of <a href="https://www.csis.org/analysis/drone-saturation-russias-shahed-campaign">low-cost Shahed drones</a> used to disable power plants. By spring 2024, <a href="https://www.bbc.co.uk/news/articles/czvvj4j4p8ro">roughly half of Ukraine’s electricity capacity</a> was destroyed, forcing nationwide blackouts.</p>
<p>Outside conflict zones, attacks on infrastructure are also rising. In Sudan, a <a href="https://www.bbc.co.uk/news/articles/cx20x8g2nego">drone strike on a power station caused regional outages,</a> and other drone attacks on water purification stations left the country on the <a href="https://www.bbc.co.uk/news/articles/c3v5n5ynl59o">brink of a significant Cholera outbreak</a>. In the US, federal officials stopped an attack on a power grid by a man using an <a href="https://domesticpreparedness.com/articles/protecting-critical-infrastructure-from-weaponized-drones">explosive-carrying drone</a>.</p>
<p>Transportation hubs are vulnerable, too. In January 2025, <a href="https://d-fendsolutions.com/blog/europes-drone-challenge-and-countermeasures-in-2025/">drone activity shut down Riga Airport</a>, disrupting dozens of flights.</p>
<p><strong> </strong><strong>Gaps in Governance</strong></p>
<p><strong> </strong>Despite growing risks, legal and operational frameworks remain fragmented. Drones and AI-driven surveillance systems often fall outside traditional arms control regimes. As a recent<a href="https://www.flyingmag.com/white-house-unveils-package-of-drone-measures-in-executive-order/"> executive order</a> put it, “Criminals, terrorists, and hostile foreign actors have intensified their weaponization of drone technologies, creating new and serious threats to our homeland.”</p>
<p>Jurisdictional confusion is common. In many countries, local authorities lack legal authority to respond to rogue drones above critical sites. Aviation safety rules and privacy laws create hesitation, giving bad actors a head start.</p>
<p>Even when threat awareness exists, coordination is inconsistent. The Cybersecurity and Infrastructure Security Agency warns that drones are used for surveillance and sabotage, yet they lack the comprehensive tools to oversee private-sector resilience or cross-border response.</p>
<p><strong> </strong><strong>A Global Security Challenge</strong></p>
<p><strong> </strong>Drone and AI threats are not confined by borders. In 2023, the <a href="https://ec.europa.eu/newsroom/cipr/items/805599/en">European Commission launched a new counter-drone strategy</a>, urging member states to harden infrastructure and coordinate airspace protections. NATO has added counter-UAS exercises to its joint drills, while AUKUS partners are beginning to share emerging drone and AI tactics.</p>
<p>But international law is lagging. There is still no global treaty governing the use of armed drones or autonomous surveillance. Export control regimes struggle to manage proliferation of AI-enabling components. At the UN, efforts to establish binding norms on autonomous weapons are stalled. Ad hoc coordination is, however, slowly improving.</p>
<p>When Norway’s oil platforms were threatened, NATO allies were called in within days. After drone sightings near Dutch and Belgian ports, neighboring governments exchanged countermeasure plans. These models suggest a path forward: rapid and collective responses based on shared tools, shared doctrine, and shared threat intelligence.</p>
<p>The future of civilian dual-use technologies will not be defined by innovators alone. Whether drones or AI software, these tools are already reshaping how adversaries threaten public safety and economic continuity. What is at stake is not just national security, but the resilience of infrastructure that supports daily life.</p>
<p><strong>The Crucial Role of Start-ups in National Defense</strong></p>
<p><strong> </strong>Civilian-origin technologies are now driving the next wave of defense capability. From FPV drones to AI surveillance tools, some of the most disruptive military applications today are emerging not from traditional defense primes but from commercial markets, often developed by start-ups with no military background.</p>
<p>A coordinated international framework is urgently needed, one that does not just support innovation and infrastructure protection but actively integrates civilian tech into defense planning. This means lowering the barriers for experts and start-ups to meaningfully contribute alongside legacy contractors. The <a href="https://www.gov.uk/government/publications/the-strategic-defence-review-2025-making-britain-safer-secure-at-home-strong-abroad/the-strategic-defence-review-2025-making-britain-safer-secure-at-home-strong-abroad#:~:text=Industry%2Dbacked.,new%2C%20segmented%20approach%20to%20procurement:&amp;text=Major%20modular%20platforms%20(contracting%20within,on%20novel%20technologies%20each%20year.">United Kingdom’s recent <em>Defence Review</em></a> hinted at this shift, recognising that smaller firms are vital to national resilience, particularly when civilian infrastructure is under threat.</p>
<p>What is truly needed is a NATO-wide or broader allied framework that enables cross-border collaboration, streamlines regulation, and opens up procurement pathways.</p>
<p>Today, many start-ups working at the intersection of security and technology face steep hurdles: limited access to capital, opaque compliance regimes, and procurement processes designed around, and for, large incumbents. Yet by creating space for their innovation, we can modernize collective defense from the ground up, using the very same civilian tools that adversaries are already turning into weapons.</p>
<p>A coordinated international framework is urgently needed, one that not only supports innovation and infrastructure protection but also lowers barriers to experts and start-ups to contribute more meaningfully alongside traditional defense primes. The <a href="https://www.gov.uk/government/publications/the-strategic-defence-review-2025-making-britain-safer-secure-at-home-strong-abroad/the-strategic-defence-review-2025-making-britain-safer-secure-at-home-strong-abroad#:~:text=Industry%2Dbacked.,new%2C%20segmented%20approach%20to%20procurement:&amp;text=Major%20modular%20platforms%20(contracting%20within,on%20novel%20technologies%20each%20year.">UK’s recent <em>Defence</em> <em>Review </em>hinted at this shift</a>, recognizing the value smaller firms bring to national resilience. It is time to take similar action at home.</p>
<p><em>Harry Geisler is the CEO of YAVA.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/07/How-Civilian-Dual-Use-Technologies-Are-Reshaping-Global-Security-Policies.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="180" height="50" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 180px) 100vw, 180px" /></a></p>
<p><a href="https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/">How Civilian Dual-Use Technologies Are Reshaping Global Security Policies</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/how-civilian-dual-use-technologies-are-reshaping-global-security-policies/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Extending the Golden Dome: AUKUS Pillar 2</title>
		<link>https://globalsecurityreview.com/extending-the-golden-dome-aukus-pillar-2/</link>
					<comments>https://globalsecurityreview.com/extending-the-golden-dome-aukus-pillar-2/#respond</comments>
		
		<dc:creator><![CDATA[Natalie Treloar]]></dc:creator>
		<pubDate>Mon, 30 Jun 2025 10:39:04 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[advanced technologies]]></category>
		<category><![CDATA[allied territory]]></category>
		<category><![CDATA[anti-submarine warfare]]></category>
		<category><![CDATA[artificial intelligence (AI)]]></category>
		<category><![CDATA[AUKUS pillar two]]></category>
		<category><![CDATA[autonomy]]></category>
		<category><![CDATA[boost phase]]></category>
		<category><![CDATA[burden sharing]]></category>
		<category><![CDATA[collective defense]]></category>
		<category><![CDATA[command-and-control systems]]></category>
		<category><![CDATA[counter-hypersonics]]></category>
		<category><![CDATA[cyber capabilities]]></category>
		<category><![CDATA[cyber-reconnaissance]]></category>
		<category><![CDATA[deep-space advanced radar capability program (DARC)]]></category>
		<category><![CDATA[directed-energy platforms]]></category>
		<category><![CDATA[electromagnetic spectrum.]]></category>
		<category><![CDATA[electromagnetic weapons]]></category>
		<category><![CDATA[electronic attack]]></category>
		<category><![CDATA[electronic counter-countermeasures]]></category>
		<category><![CDATA[electronic countermeasures (ECM)]]></category>
		<category><![CDATA[electronic protection]]></category>
		<category><![CDATA[electronic warfare]]></category>
		<category><![CDATA[five-eyes countries]]></category>
		<category><![CDATA[fractional orbital bombardment system (FOBS)]]></category>
		<category><![CDATA[Golden Dome]]></category>
		<category><![CDATA[high-power lasers]]></category>
		<category><![CDATA[hypersonic glide weapons]]></category>
		<category><![CDATA[hypersonic interceptors]]></category>
		<category><![CDATA[hypersonics]]></category>
		<category><![CDATA[information sharing]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[interceptors]]></category>
		<category><![CDATA[intercontinental ballistic missiles (ICBM)]]></category>
		<category><![CDATA[jamming]]></category>
		<category><![CDATA[kinetic interceptors]]></category>
		<category><![CDATA[land-attack cruise missiles]]></category>
		<category><![CDATA[low Earth orbit (LEO) satellites]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[microwave weapons]]></category>
		<category><![CDATA[mine warfare]]></category>
		<category><![CDATA[missile defense]]></category>
		<category><![CDATA[multilayered defense network]]></category>
		<category><![CDATA[nuclear command control and communications (NC3)]]></category>
		<category><![CDATA[quantum computing]]></category>
		<category><![CDATA[quantum key distribution]]></category>
		<category><![CDATA[quantum technologies]]></category>
		<category><![CDATA[quantum-resistant cryptography]]></category>
		<category><![CDATA[regional stability]]></category>
		<category><![CDATA[sensors]]></category>
		<category><![CDATA[signals interception]]></category>
		<category><![CDATA[space-based targeting]]></category>
		<category><![CDATA[spoofing]]></category>
		<category><![CDATA[strategic deterrence]]></category>
		<category><![CDATA[submarine-launched ballistic missiles (SLBM)]]></category>
		<category><![CDATA[submarines]]></category>
		<category><![CDATA[undersea capabilities]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31074</guid>

					<description><![CDATA[<p>As the United States attempts to better understand the requirements of President Trump’s Golden Dome program, pillar two of the AUKUS agreement has the potential to help solve the “integration problem at massive scale” and provide the needed architecture for collective defense. This initiative would also prevent AUKUS pillar two from “failing in its mission” [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/extending-the-golden-dome-aukus-pillar-2/">Extending the Golden Dome: AUKUS Pillar 2</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As the United States attempts to better understand the requirements of President Trump’s Golden Dome program, pillar two of the AUKUS agreement has the potential to help solve the “<a href="https://www.csis.org/events/americas-golden-dome-explained">integration problem at massive scale</a>” and provide the needed architecture for collective defense. This initiative would also prevent AUKUS pillar two from “<a href="https://warontherocks.com/2025/06/aukus-pillar-ii-is-failing-in-its-mission-it-needs-its-own-optimal-pathway/">failing in its mission</a>” by enabling the prioritization of advanced technologies at the <a href="https://www.foreignaffairs.com/podcasts/why-america-shouldnt-underestimate-chinese-power">scale</a> required to achieve Golden Dome missile defense.</p>
<p>Golden Dome is focused on specific <a href="https://www.dia.mil/Portals/110/Documents/News/golden_dome.pdf">missile threats to the American homeland</a>. AUKUS pillar two is designed to reduce the <a href="https://ad-aspi.s3.ap-southeast-2.amazonaws.com/2023-06/PB69-CriticalTechTracker-AUKUS%20relevant%20technologies%20top%2010%20country%20snapshot.pdf">significant lead</a> China has in dual-use emerging technologies. An “extended” Golden Dome approach that produces strong and resilient allies may provide greater strategic deterrence than an America alone approach.</p>
<p>As stronger allies contribute more to collective defense through <a href="https://www.csis.org/analysis/shared-threats-indo-pacific-alliances-and-burden-sharing-todays-geopolitical-environment">burden sharing</a>, this can reduce the financial and military burden on the United States. Capable allies can deter aggression and manage local conflicts, promoting <a href="https://www.csis.org/analysis/burden-sharing-responsibility-sharing">regional stability</a> without constant American intervention.</p>
<p>If allies are seen as weak and easily overrun, it may undermine the <a href="https://researchportalplus.anu.edu.au/en/publications/alliances-and-nuclear-risk-strengthening-us-extended-deterrence">credibility of alliances and security guarantees</a>, thereby emboldening adversaries. Strong allies often bring <a href="https://carnegieindia.org/research/2024/09/innovative-alliance-us-australian-defense-science-and-technology-cooperation-for-a-dangerous-decade?lang=en">advanced technologies</a> and capabilities that enhance joint operations through interoperability and innovation.</p>
<p>Defeating fractional orbital bombardment system (FOBS), intercontinental ballistic missiles (ICBM), submarine-launched ballistic missiles (SLBM), hypersonic glide weapons, and land-attack cruise missile threats is the <a href="https://www.dia.mil/Portals/110/Documents/News/golden_dome.pdf">focus</a> of Golden Dome, which “<a href="https://www.geopoliticalmonitor.com/golden-dome-strategic-impacts-of-an-untouchable-united-states/">proposes</a> a multilayered defense network capable of intercepting threats during the boost, <a href="https://www.heritage.org/military-strength/assessment-us-military-power/missile-defense">midcourse, and terminal stages</a> of missile flight.” Some analysts argue that it is easiest to target these threats in the <a href="https://www.youtube.com/watch?v=MOVMSRxbyl4">boost/ascent phase</a>.</p>
<p>Targeting the <a href="https://www.inss.org.il/publication/interception/#:~:text=A%20COIL%20system%20(Chemical%20Oxygen,benefits%20of%20using%20a%20Zeppelin.">boost</a> phase can either occur from allied territory, targeting North Korean missiles from South Korea, or the homeland. The boost phase can also be <a href="https://www.youtube.com/watch?v=MOVMSRxbyl4">targeted from space</a>. However, targeting from space is not without its own unique set of challenges. Either way, it will not be solved by America without its allies.</p>
<p>Arguably, five-eyes countries (Australia, Canada, New Zealand, United Kingdom, and United States) are already entangled in American <a href="https://www.congress.gov/crs_external_products/IF/PDF/IF11697/IF11697.6.pdf">nuclear command, control, and communications (NC3)</a>. Furthermore, the US operates in coordination with other military forces as part of broader coalition operations. Hence, extending Golden Dome to allies is not only possible, but can further leverage the AUKUS pillar two effort. Moreover, a missile defense system consists of <a href="https://missilethreat.csis.org/sensors-command-control/">sensors, interceptors, and command-and-control systems</a> that work together to detect, track, and intercept incoming missiles.</p>
<p>These necessary components exist in AUKUS pillar two working groups like the cyber capabilities, artificial intelligence (AI) and autonomy, quantum technologies, undersea capabilities, hypersonics and counter-hypersonics, electronic warfare capabilities, innovation and information sharing, and the deep-space advanced radar capability program (DARC).</p>
<p>AUKUS pillar two leadership should prioritize the development of technologies and supporting systems for an effective extended Golden Dome architecture. America is unlikely to solve the problem in isolation by building a “<a href="https://www.geopoliticalmonitor.com/golden-dome-strategic-impacts-of-an-untouchable-united-states/">tightly integrated system of low Earth orbit (LEO) satellites, terrestrial radar stations, directed-energy platforms, and kinetic interceptors</a>” that senses, decides, and neutralizes incoming missiles. The linkages and opportunities for the prioritization of advanced technology development for missile defense can be found in the following summaries.</p>
<p>Cyber capabilities encompass both offensive and defensive operations for missile defense. Offensive cyber tools are used to deter adversaries and disrupt their operations through tactics such as cyber-reconnaissance, communication isolation, targeted strikes, and network intrusions. Defensively, military forces can prioritize robust network protection, active threat disruption, and seamless coordination across units to safeguard critical systems. Cyber operations can enhance intelligence gathering, command and control, and information warfare to shape public perception and the broader information environment. As conflict evolves, training personnel in cyber tactics and integrating machine learning for threat detection and analysis can maintain strategic advantage.</p>
<p>AI and autonomy can transform missile defense and military operations by enhancing efficiency, precision, and decision-making. Autonomous weapon systems are used for reconnaissance, surveillance, and combat missions. AI-driven wargaming platforms simulate real-world combat scenarios to help strategists test tactics and improve readiness. In command and control, AI supports real-time data processing and analysis. AI optimizes logistics by improving resource allocation, supply-chain management, and transportation.</p>
<p>In intelligence and surveillance, AI analyzes vast datasets to detect patterns and identify threats. Additionally, AI monitors threats and predicts future events. Human-machine teaming allows AI systems to collaborate with human operators, combining strengths and minimizing errors.</p>
<p>Quantum technologies transform missile defenses through enhanced security, operational efficiency, and advanced training. In cybersecurity, quantum-resistant cryptography is being developed to protect against the threat quantum computers pose to traditional encryption. Quantum key distribution offers highly secure communication by transmitting encryption keys through quantum channels, making interception nearly impossible.</p>
<p>In military operations, quantum algorithms can optimize logistics, supply chains, and battlefield strategies by analyzing complex data in real time. Quantum computing could process data in real time, enabling missile defense systems to rapidly analyze incoming threats, allowing for quicker decision-making and more effective interception. Additionally, quantum computing could enable highly accurate simulations of complex systems like nuclear reactions and weapon designs.</p>
<p>Undersea capabilities encompass a wide range of offensive and defensive functions that contribute to missile defense. Offensively, submarines and other undersea platforms can strike surface vessels, submarines, and land-based targets. They are also instrumental in inserting special forces into hostile territory for reconnaissance or sabotage missions. Undersea vehicles play a key role in mine warfare, either by laying mines or clearing minefields. On the defensive side, these platforms are vital for anti-submarine warfare, enabling the detection and neutralization of enemy submarines. They also support surveillance and reconnaissance efforts, gathering intelligence on enemy naval movements. Undersea systems help protect vital infrastructure such as pipelines and communication cables and help ensure safe navigation.</p>
<p>Hypersonic weapons and counter-hypersonic systems are vital to missile defense operations. Hypersonic glide weapons and hypersonic cruise missiles are designed to strike targets with exceptional speed, maneuverability, and precision while evading traditional defenses. Counter-hypersonic capabilities include advanced sensors and tracking systems like radar and satellite imaging to detect and monitor hypersonic weapons. Hypersonic interceptors aim to neutralize threats mid-flight, while high-power lasers and microwave weapons can disrupt their guidance systems. Effective command-and-control systems are essential for coordinating these defenses, and soft-kill measures such as cyberattacks offer additional means to interfere with hypersonic weapons.</p>
<p>Electronic warfare is fundamental for gaining military advantages in cross-domain missile defense. Electronic attack includes jamming enemy communications, radar, and navigation systems. It also includes spoofing—sending false signals to enemy forces. Electromagnetic or directed-energy weapons disable or destroy enemy assets. Electronic protection ensures secure communication through encryption and satellite links and employs electronic countermeasures (ECM) to defend against attack. Electronic counter-countermeasures are used to overcome enemy ECM and maintain operational effectiveness. Electronic support can be focused on gathering intelligence through signals interception, using sensors for surveillance and target acquisition, and detecting threats in the electromagnetic spectrum.</p>
<p><em>            In short, under the auspices of AUKUS pillar two, Australia and the United Kingdom can contribute to Golden Dome in ways that many may not be thinking about. As longtime allies with a shared culture, history, and values, working together on Golden Dome just makes sense. </em></p>
<p><em>Natalie Treloar is a Senior Analyst at the National Institute for Deterrence Studies (NIDS), a Non-Resident Fellow at the Indo-Pacific Studies Center (IPSC), the Australian Company Director of Alpha-India Consultancy, and a cohost of the NIDS Deterrence Down Under Podcast.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/06/Extending-the-Golden-Dome-AUKUS-Pillar-2-and-the-Architecture-of-Collective-Defense.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="173" height="48" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 173px) 100vw, 173px" /></a></p>
<p><a href="https://globalsecurityreview.com/extending-the-golden-dome-aukus-pillar-2/">Extending the Golden Dome: AUKUS Pillar 2</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/extending-the-golden-dome-aukus-pillar-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ghosts in the Skies: How Ukraine’s Drone Tactics Recast Modern Deterrence</title>
		<link>https://globalsecurityreview.com/ghosts-in-the-skies-how-ukraines-drone-tactics-recast-modern-deterrence/</link>
					<comments>https://globalsecurityreview.com/ghosts-in-the-skies-how-ukraines-drone-tactics-recast-modern-deterrence/#comments</comments>
		
		<dc:creator><![CDATA[Brandon Toliver]]></dc:creator>
		<pubDate>Tue, 24 Jun 2025 12:35:23 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[autonomous systems]]></category>
		<category><![CDATA[Defense Spending]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[drones]]></category>
		<category><![CDATA[escalation]]></category>
		<category><![CDATA[escalation management]]></category>
		<category><![CDATA[global security]]></category>
		<category><![CDATA[homeland defense]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[Military Strategy]]></category>
		<category><![CDATA[multidomain conflicts]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[non-nuclear options]]></category>
		<category><![CDATA[nuclear strategy]]></category>
		<category><![CDATA[precision strikes]]></category>
		<category><![CDATA[signaling frameworks]]></category>
		<category><![CDATA[strategic agility]]></category>
		<category><![CDATA[strategic impact]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[warfare]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31040</guid>

					<description><![CDATA[<p>What happens to nuclear deterrence when a non-nuclear state strikes deep into a nuclear-armed adversary? The stark reality is that the world does not collapse, but the era of conventional deterrence is rapidly evolving. Ukraine’s long-range drone strikes, penetrating deep into Russian territory, upended traditional deterrence theory. These unmanned and precision attacks targeted strategic locations, [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/ghosts-in-the-skies-how-ukraines-drone-tactics-recast-modern-deterrence/">Ghosts in the Skies: How Ukraine’s Drone Tactics Recast Modern Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>What happens to nuclear deterrence when a non-nuclear state strikes deep into a nuclear-armed adversary? The stark reality is that the world does not collapse, but the era of conventional deterrence is rapidly evolving. <a href="https://copilot.microsoft.com/chats/sF4qQ3JxwBAucoaty1PUV#:~:text=Ukraine%E2%80%99s%20Drone%20Ecosystem%20and%20the%20Defence%20of%20Europe%E2%80%9D">Ukraine’s long-range drone strikes</a>, penetrating deep into Russian territory, upended traditional deterrence theory.</p>
<p>These unmanned and precision attacks targeted strategic locations, ranging from early warning radar sites to critical military installations. They did not provoke the feared nuclear response. Instead, these operations exposed a new threat calculus where persistence, precision, and the power of perception are paramount.</p>
<p>Recent analyses suggest that such <a href="https://researchcentre.army.gov.au/sites/default/files/241022-Occasional-Paper-29-Lessons-Learnt-from-Ukraine_2.pdf">drone operations</a> contributed to shifting risk assessments within adversary states, where even a 10 percent to 15 percent error in perception could lead to miscalculation. American nuclear strategists now contend with an urgent need to rethink deterrence as the boundary between conventional and nuclear erodes.</p>
<p><strong>Spectral Shifts: Rethinking Strategic Assumptions</strong></p>
<p>For decades, American nuclear strategy hinged on the assumption that any conventional attack on nuclear command and control assets would inevitably trigger a nuclear counter-response. Data from Cold War–era exercises and subsequent real-world incidents reinforced this mindset among defense planners. Ukraine’s repeated drone strikes on sensitive Russian assets, including radar installations integral to Russia’s early warning systems, force a <a href="https://doi.org/10.1162/isec_a_00320">reconsideration of long-held assumptions</a>.</p>
<p>The Kremlin’s response is notably restrained, treating these incursions as manageable costs rather than triggers for nuclear escalation. This strategic restraint, observed in multiple public and classified communications from Moscow, signals that deterrence may now rely less on the brute force of nuclear capability and more on the sophistication of targeting and intent. The takeaway for modern policymakers is that deterrence must now incorporate a broader array of factors, including technology-driven precision and the adversary’s threshold for escalation.</p>
<p><strong>Phantom Impact: Redefining Strategy Beyond Nuclear Might</strong></p>
<p>The era when the primary measure of strategic impact was synonymous with nuclear firepower is ending. Ukraine’s innovative use of low-cost, high-precision drones demonstrates that small platforms can disrupt traditional security calculations. Recent reports from defense think tanks estimate that the unit cost of drone operations is less than 1 percent of what a conventional fighter aircraft mission might cost, yet their operational impact in terms of intelligence and tactical disruption is comparable in key areas.</p>
<p>These drones infiltrate deep into adversary territory and strike high-value military and economic assets once presumed invulnerable. Such operational dynamics challenge the long-standing monopoly of nuclear-armed states over credible homeland threats. American planners must now <a href="https://copilot.microsoft.com/chats/sF4qQ3JxwBAucoaty1PUV#:~:text=The%20Implications%20of%20Drone%20Proliferation%20for%20US%20Grand%20Strategy%E2%80%9D">recalibrate</a> their threat models to integrate non-nuclear options, recognizing that the future of strategic impact is both more economical and more technologically complex than ever before.</p>
<p><strong>Haunted Homelands: The Crumbling Illusion of Sanctuary</strong></p>
<p>During the Cold War, vast distances, natural barriers, and the geographic isolation provided by oceans created the comforting illusion that major powers could enjoy an impenetrable sanctuary. Today, that illusion is crumbling. Ukraine’s drone operations are a vivid demonstration that even regions thought to be well-protected can be penetrated. Attacks targeting Russia’s early warning networks, critical oil infrastructure, and military bases reveal that no area can rest on its laurels.</p>
<p>American infrastructure, ranging from energy grids to communication systems and early warning radars, face elevated risks in an age of highly agile autonomous systems. Consider that the global market for unmanned aerial vehicles is projected to reach nearly $50 billion by 2030. Considering this, there is an immediate imperative to overhaul homeland defense strategies. Rapid response protocols, increased situational awareness, and investment in counter-drone technologies are no longer optional. They are emerging as essential components of modern deterrence.</p>
<p><strong>Phantom Signals: How Optics and Intent Drive Escalation</strong></p>
<p>One of the most remarkable aspects of Ukraine’s campaign is its ability to secure tactical advantages without spiraling into uncontrolled escalation. The success of these drone strikes lies in their careful timing, precision, and measured execution. Ukrainian forces consistently space out operations and meticulously choose targets that convey national resolve without risking mass casualties. This dual messaging, delivering a tangible operational effect while sending a clear political signal, underscores a critical evolution in deterrence thinking.</p>
<p>Today, the optics and perceived intent behind an action can be as decisive as the physical impact. One analysis points out that misinterpretations of strategic intent now pose as much risk of inadvertent escalation as traditional force-on-force scenarios. For the United States, this means that <a href="https://copilot.microsoft.com/chats/sF4qQ3JxwBAucoaty1PUV#:~:text=%E2%80%9CDefending%20U.S.%20Military%20Bases%20Against%20Drones%3F%20A%20Recent%20Tabletop%20Exercise%20Explores%20How%E2%80%9D">developing clear, well-articulated signaling frameworks</a> is crucial. Such frameworks must enable policymakers and military leaders to assert credible force while avoiding actions that might be misread as provocative by adversaries. In a world where every action is scrutinized and the margins for error are thinning, clarity in communication becomes a cornerstone of modern deterrence.</p>
<p><strong>Ghosts in the Arsenal: Integrating Drones into Deterrence</strong></p>
<p>Drones are transcending their traditional role on the battlefield and are emerging as indispensable strategic assets. Modern unmanned systems serve multiple roles, from surveillance and intelligence gathering to direct precision strikes against key targets. Their integration is revolutionizing how <a href="https://www.rand.org/pubs/research_reports/RRA2215-1.html">military operations</a> are conducted without risking human life. Moreover, these systems have the added benefit of being less politically charged than manned strike platforms. However, their growing prominence also introduces the potential for miscalculation.</p>
<p>With investments in drone technology doubling over the past decade in many leading militaries, the United States must swiftly incorporate these assets into its overarching deterrence framework. This requires the formulation of robust policies that define the operational limits and acceptable contexts for drone employment, comprehensive training programs for commanders in escalation management, and public messaging that reinforces strategic resolve without escalating tensions. The rapid pace of technological adoption means that the window for effective integration is short, and strategic agility is paramount.</p>
<p><strong>Phantoms of the Future: Recasting Deterrence in the Drone Age</strong></p>
<p>Retaining U.S. strategic credibility in the coming decades will demand an evolution beyond a <a href="https://csbaonline.org/research/publications/extending-deterrence-by-detection-the-case-for-integrating-unmanned-aircraft-systems-into-the-indo-pacific-partnership-for-maritime-domain-awareness">deterrence model</a> solely anchored in nuclear might. Although nuclear forces remain critical, they are no longer the exclusive instruments that shape adversary behavior in today’s multidomain conflicts. The future of deterrence depends on a seamless strategy where nuclear and non-nuclear capabilities are coherently integrated. This entails developing a comprehensive national doctrine for drone utilization that explicitly defines clear thresholds for action, acceptable target sets, and robust escalation-management protocols. In parallel, efforts must focus on modernizing homeland defenses to counter the threat of long-range, autonomous drone attacks, especially in sectors such as space-based assets, energy, and telecommunications. Data from defense budget analyses show that if every NATO member met the 2 percent gross domestic product defense spending target, the alliance’s budget would increase by over $100 billion annually. Such investments, along with analogous U.S. initiatives to enhance technological resilience, are crucial if deterrence is to remain credible and effective in this <a href="https://www.academia.edu/41364115/Artificial_Intelligence_Drone_Swarming_and_Escalation_Risks_in_Future_Warfare">new operational environment</a>.</p>
<p><strong>Final Haunting: Embracing the Ghostly Evolution of Deterrence</strong></p>
<p>“Ghosts in the Skies” is not just a metaphor; it encapsulates the profound transformation underway in <a href="https://c2coe.org/seminar-read-ahead-hybrid-warfare-operating-on-multi-domain-battlefields/">modern deterrence</a>. Ukraine’s innovative use of drone technology is forcefully redefining the conventional wisdom that has long informed global security policy. This paradigm shift challenges entrenched assumptions and demands a rapid evolution of U.S. military strategy. In an era of hybrid threats and rapid technological change, our global security environment is more complex and interdependent than ever before. The future of deterrence will rely on the capacity to adapt swiftly, integrate non-linear threat responses, and build flexible defense systems that are as agile as the adversaries they are designed to deter. The message for policymakers is clear: embrace this ghostly evolution now, for in the emerging multidomain battlefield every misstep carries the risk of destabilizing not only regional security but also global order.</p>
<p>The transformation in deterrence prompted by Ukraine’s drone operations is a stark reminder that innovation in warfare can render old paradigms obsolete. As nations invest in cost-effective, high-precision autonomous systems, the calculus of deterrence will continue to shift, compelling the United States and its allies to rethink both doctrine and defense spending. In this new era, where even the faintest ghost can upend strategic balance, the ability to adapt and respond with agility will be the true measure of national security.</p>
<p><em>Brandon Toliver, PhD, serves on the A4 staff of Headquarters Air Force. The views expressed are those of the author alone.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/06/Ghosts-in-the-Skies.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="248" height="69" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 248px) 100vw, 248px" /></a></p>
<p><a href="https://globalsecurityreview.com/ghosts-in-the-skies-how-ukraines-drone-tactics-recast-modern-deterrence/">Ghosts in the Skies: How Ukraine’s Drone Tactics Recast Modern Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/ghosts-in-the-skies-how-ukraines-drone-tactics-recast-modern-deterrence/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>How Trade Disputes Threaten the Future of Arms Control</title>
		<link>https://globalsecurityreview.com/how-trade-disputes-threaten-the-future-of-arms-control/</link>
					<comments>https://globalsecurityreview.com/how-trade-disputes-threaten-the-future-of-arms-control/#respond</comments>
		
		<dc:creator><![CDATA[Muhammad Shahzad Akram]]></dc:creator>
		<pubDate>Mon, 09 Jun 2025 12:15:50 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[accountability]]></category>
		<category><![CDATA[American exports]]></category>
		<category><![CDATA[American global leadership]]></category>
		<category><![CDATA[Arms Control]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[consensus]]></category>
		<category><![CDATA[cyber warfare]]></category>
		<category><![CDATA[dialogue]]></category>
		<category><![CDATA[diplomatic relations]]></category>
		<category><![CDATA[disarmament]]></category>
		<category><![CDATA[equilibrium]]></category>
		<category><![CDATA[fragmented world order]]></category>
		<category><![CDATA[great powers]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[Intermediate-Range Nuclear Forces (INF) Treaty]]></category>
		<category><![CDATA[military effectiveness]]></category>
		<category><![CDATA[Muhammad Shahzad Akram]]></category>
		<category><![CDATA[multilateralism]]></category>
		<category><![CDATA[mutual respect]]></category>
		<category><![CDATA[New START]]></category>
		<category><![CDATA[nuclear deterrent]]></category>
		<category><![CDATA[proliferation]]></category>
		<category><![CDATA[protectionist policies]]></category>
		<category><![CDATA[rare Earth minerals]]></category>
		<category><![CDATA[restraint]]></category>
		<category><![CDATA[sanctions]]></category>
		<category><![CDATA[shipbuilding capacity]]></category>
		<category><![CDATA[South Korea]]></category>
		<category><![CDATA[strategy]]></category>
		<category><![CDATA[tariffs]]></category>
		<category><![CDATA[technological superiority]]></category>
		<category><![CDATA[Trade disputes]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[trust]]></category>
		<category><![CDATA[Ukraine conflict]]></category>
		<category><![CDATA[US Army Science Board]]></category>
		<category><![CDATA[US Navy]]></category>
		<category><![CDATA[verification]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30898</guid>

					<description><![CDATA[<p>Global arms control regimes are built on the pillars of trust, dialogue, transparency, mutual respect, restraint, verification, and, most critically, consensus among great powers. However, leadership in this domain risks deterioration at a time when the world urgently needs a renewed commitment to peace and stability. As great powers become entangled in trade disputes, the [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/how-trade-disputes-threaten-the-future-of-arms-control/">How Trade Disputes Threaten the Future of Arms Control</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Global arms control regimes are built on the pillars of trust, dialogue, transparency, <a href="https://www.tandfonline.com/doi/full/10.1080/25751654.2023.2292812">mutual respect</a>, restraint, verification, and, most critically, consensus among great powers. However, leadership in this domain risks deterioration at a time when the world urgently needs a renewed commitment to peace and stability.</p>
<p>As great powers become entangled in trade disputes, the spillover effects threaten to undermine the cooperative spirit essential for effective arms control. These <a href="https://www.cfr.org/backgrounder/contentious-us-china-trade-relationship">economic conflicts</a> erode bilateral relationships, making it even more challenging to negotiate future agreements on critical and emerging domains such as artificial intelligence, cyber warfare, and the militarization of outer space.</p>
<p>Tariffs can disrupt trade, increase prices, stifle innovation, and agitate the <a href="https://www.theamericanconservative.com/ending-the-china-paradox/">supply chain</a>. Moreover, it can weaken American <a href="https://www.cfr.org/backgrounder/contentious-us-china-trade-relationship">global leadership</a> as long-term allies face an American president unwilling to accept high tariffs on American exports while guaranteeing low tariffs on imports. American efforts to counter China are disrupted by tariff disputes as well, as allies and foes coordinate their strategies for countering President Trump’s effort to reduce tariffs on American exports. The president’s actions erode the confidence of allies in extended nuclear deterrence because allies begin to question whether the United States will continue to subsidize security, if they are demanding an end to protective tariffs.</p>
<p>The tariff dispute between China and the US, two large trading partners, severely affects arms control and <a href="https://www.investopedia.com/terms/t/trade-war.asp">strategic stability</a>. It exacerbates crisis, heightens mistrust, undermines confidence-building measures, and curtails the possibility of a constructive arms control framework. It is, however, not unexpected. The United States long tolerated protective tariffs and poor intellectual property protections by the Chinese. Thus, rebalancing should not come as any surprise, even if it is disconcerting.</p>
<p>American <a href="https://behorizon.org/china-u-s-tech-war-new-hegemony/">technological superiority</a>, innovation, cutting-edge military and civilian technology, and significant soft-power influence are the key components of its hegemonic status. Central to this dominance is access to rare earth minerals, which are critical for producing advanced weaponry, including missiles, drones, artificial intelligence (AI)–driven systems, and cutting-edge civilian technologies. However, the US faces a growing vulnerability in this domain, as China currently controls approximately <a href="https://www.bbc.com/news/articles/c1drqeev36qo#:~:text=A%20US%20Geological%20report%20notes,%2C%20radar%2C%20and%20permanent%20magnets.">70 percent of the global supply</a> of rare earth elements. This strategic dependency seriously challenges American innovation and military effectiveness.</p>
<p>However, the American military is already in <a href="https://www.aei.org/foreign-and-defense-policy/americas-incredible-shrinking-navy/">decline</a> according to a report from the US Army Science Board, which reveals the limitations of the American industrial base. The report warned that the US may be “incapable of meeting the munitions demand created by a potential future fight against a peer adversary.”</p>
<p>The conflict in Ukraine underscores this concern, as the US struggles to maintain adequate production levels of artillery shells, drones, rockets, and missiles primarily due to insufficient stockpiles of critical components. Furthermore, structural deficiencies are increasingly evident within the US Navy. As of 2023, less than 68 percent of surface fleet ships were rated “mission-capable,” with only 63 percent of attack submarines meeting the same standard. Compounding these challenges, American shipyards are currently unable to produce more than <a href="https://news.usni.org/2023/03/21/osd-comptroller-says-u-s-shipyards-cant-build-3-destroyers-a-year">three destroyers annually</a>. By contrast, <a href="https://www.csis.org/analysis/threat-chinas-shipbuilding-empire#:~:text=Today%2C%20Jiangnan%20Shipyard%20alone%20has,support%20China's%20military%20industrial%20complex.">China</a> possesses 13 shipyards capable of constructing large and deep-draft vessels one of which reportedly surpasses the entire US shipbuilding capacity.</p>
<p>The ongoing US-China tariff dispute reflects a <a href="https://www.nytimes.com/2025/04/08/us/politics/jd-vance-peasants-china.html">zero-sum</a> strategic mindset, intensifying hostilities and reducing incentives for restraint or cooperation. This economic confrontation has already narrowed the space for meaningful arms control dialogue. The imposition of sanctions on each other’s officials and entities alongside increasingly <a href="https://www.bbc.com/news/articles/c20zd4k6d36o">provocative rhetoric</a> from senior officials risks further erosions of the fragile trust necessary for future diplomatic engagement, particularly in arms control and emerging domains such as AI, cyber warfare, and outer space.</p>
<p>Traditionally, <a href="https://www.newsweek.com/why-china-not-trust-america-nuclear-weapons-talks-1926809">China rejects</a> arms control as the US had far more weapons than China. Tarriff disputes reinforce the narrative that the US is using economic means to contain China’s rise, making China less likely to engage in future arms control discussions. Moreover, diplomatic relations and multilateralism will weaken and increase mistrust—leaving no room for constructive future arms control talks.</p>
<p>Arms control forums are increasingly fragile as mutual trust and respect for arms control and disarmament among the <a href="https://www.jstor.org/stable/424348">great powers</a> declines. Tariff disputes create mistrust, which complicates the <a href="https://www.jstor.org/stable/424348">verification process</a>, and the <a href="https://www.jstor.org/stable/424348">supply chain</a> supporting the global cooperative arms control verification limits the ability to enforce or verify compliance with arms control agreements.</p>
<p>Trade disputes deepen mistrust and normalize confrontation over cooperation, secrecy over transparency, and arms racing over arms control. This leads to proliferation while making accountability less relative and paves the way for a fragmented world order with little or no hope for future arms control.</p>
<p>Moreover, it increases the chances future administrations face a backlash for rolling back policies that demand equitable treatment of American trade goods, fearing internal backlash for being soft on China. This will permanently lock both states into an adversarial stance, reducing any flexibility in arms control. Moreover, if the US wants to reconsider any future arms control discussion, political costs may prove too high, leaving fewer options to prevent an arms race.</p>
<p>In 2019, President Donald Trump <a href="https://trumpwhitehouse.archives.gov/briefings-statements/president-donald-j-trump-withdraw-united-states-intermediate-range-nuclear-forces-inf-treaty/">withdrew</a> the United States from the Intermediate-Range Nuclear Forces (INF) Treaty, after Russian cheating became too hard to ignore.  Meanwhile, the future of <a href="https://www.armscontrol.org/act/2025-01/features/life-after-new-start-navigating-new-period-nuclear-arms-control">New START</a> remains uncertain and fragile.</p>
<p>At such a critical juncture, President Trump’s demand that American exports sent to foreign markets receive equal treatment to those foreign imports entering the United States, penalizing both allies and adversaries who enact punitive tariffs, may be unsettling for recipients of increased tariffs, but it should come as no surprise that an American president elected to stop the outflow of American wealth would seek equal treatment for American exports.</p>
<p>Many Americans are willing to see the subsidies to foreign nations—that are brought about by high tariffs on American exports and American extended deterrence—come to an end. This may lead to an erosion of confidence in American benevolence by some states.</p>
<p><a href="https://www.orfonline.org/expert-speak/south-korea-s-quest-for-nuclear-weapons">South Korea</a>, for example, was shocked that the United States took offense to the very protectionist policies that allowed South Korea to become the third largest auto producer in the United States, all while effectively preventing American automobile sales in South Korea. Thus, South Korea is reconsidering their non-nuclear status and exploring an independent nuclear deterrent. As President Trump seeks to level the playing field by forcing down the tariffs of trade partners, under the threat of higher tariffs on imported goods, allies should come to understand that the United States is increasingly unwilling to subsidize others. While this may be a jarring fact, it is not a purposeful effort to destabilize arms control.</p>
<p>Thus, trade disputes may cause allies and adversaries to reconsider American willingness to accept unequal trade and disproportionate burden sharing. In the long run, equilibrium will return. It is just a matter of what that equilibrium may look like.</p>
<p><em>Muhammad Shahzad Akram </em><em>is a Research Officer at the Center for International Strategic Studies, Azad Jammu Kashmir. He holds an MPhil in International Relations from Quaid-i-Azam University, Islamabad. He is an alumnus of the Near East South Asia (NESA) Center for Strategic Studies, National Defense University (NDU), Washington, DC. His expertise includes cyber warfare and strategy, arms control, and disarmament.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/06/How-Trade-war-Threatens-the-Future-of-Arms-Control.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="238" height="66" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 238px) 100vw, 238px" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/how-trade-disputes-threaten-the-future-of-arms-control/">How Trade Disputes Threaten the Future of Arms Control</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/how-trade-disputes-threaten-the-future-of-arms-control/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI Paris Summit and Emerging Paradox of AI Haves and Have-Nots</title>
		<link>https://globalsecurityreview.com/ai-paris-summit-and-emerging-paradox-of-ai-haves-and-have-nots/</link>
					<comments>https://globalsecurityreview.com/ai-paris-summit-and-emerging-paradox-of-ai-haves-and-have-nots/#respond</comments>
		
		<dc:creator><![CDATA[Huma Rehman]]></dc:creator>
		<pubDate>Thu, 10 Apr 2025 11:54:22 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[agentic AI]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Act]]></category>
		<category><![CDATA[AI have-nots]]></category>
		<category><![CDATA[AI haves]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[collaboration]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[deregulation]]></category>
		<category><![CDATA[digital divide]]></category>
		<category><![CDATA[digital technology]]></category>
		<category><![CDATA[economic empowerment]]></category>
		<category><![CDATA[ethical AI]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[geopolitical power]]></category>
		<category><![CDATA[global commons]]></category>
		<category><![CDATA[Global Partnership on Artificial Intelligence ​]]></category>
		<category><![CDATA[human development]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[international cooperation]]></category>
		<category><![CDATA[Paris Summit]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[regulation]]></category>
		<category><![CDATA[social empowerment]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[tech race]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30505</guid>

					<description><![CDATA[<p> The rapid advancement of artificial intelligence (AI) is transforming industries, economies, societies, and global politics. However, this artificial intelligence and technological revolution also exacerbates existing competitions, creating a stark divide between states that are AI haves and AI have-nots. This digital divide is not just about access to technology but also about the ability to [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/ai-paris-summit-and-emerging-paradox-of-ai-haves-and-have-nots/">AI Paris Summit and Emerging Paradox of AI Haves and Have-Nots</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong> </strong>The rapid advancement of artificial intelligence (AI) is transforming industries, economies, societies, and global politics. However, this artificial intelligence and technological revolution also exacerbates existing competitions, creating a stark divide between states that are AI haves and AI have-nots.</p>
<p>This digital divide is not just about access to technology but also about the ability to harness AI’s potential for economic, social, and global political empowerment. The implications of the AI divide are leading to a tech race that impact geopolitical power dynamics, exacerbating competition major powers like the US, China, France, and India. Depending on how the race ends, it could swing the balance of power in a negative direction.</p>
<p><strong>AI Paris Summit</strong></p>
<p>The recent <a href="https://www.elysee.fr/en/sommet-pour-l-action-sur-l-ia">AI Action Summit</a> held in Paris emerged as a pivotal event that highlights both the opportunities and challenges associated with this evolving AI tech race. This summit serves as a beacon of innovation, encouraging <a href="https://tribune.com.pk/story/2527932/frances-macron-calls-for-equal-access-to-ai-for-all-nations">France</a> and India to collaborate more closely, while also exposing the complex interplay of international reactions, particularly from major powers like the United States, United Kingdom (UK), and China.</p>
<p>The summit focused on expanding AI’s boundaries while respecting environmental and ethical obligations. France’s President Emmanuel <a href="https://www.elysee.fr/en/emmanuel-macron/2025/02/11/statement-on-inclusive-and-sustainable-artificial-intelligence-for-people-and-the-planet">Macron</a> reaffirmed his nation’s commitment to AI innovation, while maintaining high regulatory standards that draw parallels to Notre Dame Cathedral’s restoration. Such a strategy will likely accelerate AI ventures and foster innovation.</p>
<p>However, the regulation proposed was also a noose around the neck of the summit’s emphasis—deregulation. It is worth considering whether drastic deregulation will lead to genuine advances or the weakening of certain crucial safety nets as the world grapples with how to handle ever expanding data and the fragmentation that result from the intersection of geopolitical interests and the private ownership of data and capability. The US and China approach the issue differently than Europe, whose <a href="https://digital-strategy.ec.europa.eu/en/policies/regulatory-framework-ai">adoption of the AI Act</a> (2023) will see the first comprehensive AI regulation in the world.</p>
<p>Many wondered how agentic AI will impact the balance of power. Whether AI will have a net positive or negative effect is uncertain. The rate at which agentic AI is developed and adopted in the three main economic blocs of China, Europe, and the United States will determine much.</p>
<p><strong>India-France AI Alliance </strong></p>
<p>India and France are forming a partnership to leverage AI’s full potential globally, sharing knowledge, resources, and best practices to create a robust framework for AI initiatives and global dialogue. <a href="https://www.csis.org/analysis/frances-ai-action-summit">During the summit</a>, leaders from both countries addressed how their alliance could facilitate joint ventures, research collaborations, and talent exchange programs. <a href="https://in.ambafrance.org/India-France-will-harness-AI-s-potential-for-global-good">Prime Minister Narendra Modi and President Macron foresaw</a> great potential for future cooperation in 2019 when they endorsed the <em>Indo-French Roadmap on Cybersecurity and Digital Technology</em>. India and France, founding members of the Global Partnership on Artificial Intelligence, aim to develop a safe, open, secure, and ethical AI for human development and global commons.</p>
<p><strong>Global Reactions</strong></p>
<p>As the world watches the developments in Paris, reactions from other global powers, notably <a href="https://www.newamerica.org/cybersecurity-initiative/reports/essay-reframing-the-us-china-ai-arms-race/why-us-china-ai-competition-matters/">China and the United States</a>, added another layer of complexity to the conversation around AI regulation and collaboration. In recent years, both states have invested heavily in AI research and development, seeing it as critical to their national security and economic competitiveness.</p>
<p>China’s approach to AI governance contrasts significantly with that of France and India. While the <a href="http://fi.china-embassy.gov.cn/eng/kxjs/201710/P020210628714286134479.pdf">Chinese government</a> prioritizes rapid innovation with minimal regulatory oversight, this led to concerns about privacy, surveillance, and ethical implications. The US, on the other hand, grapples with debates around data privacy, corporate responsibility, and the potential for AI misuse. As a result, the responses from these two states illustrate differing philosophies about how best to harness AI’s potential while safeguarding public interests.</p>
<p><a href="https://www.theguardian.com/technology/2025/feb/11/us-uk-paris-ai-summit-artificial-intelligence-declaration">The US and UK declined</a> to sign a declaration on “inclusive and sustainable” artificial intelligence at the Paris summit, in a blow to hopes for a concerted approach to developing and regulating the technology. The document was backed by 60 other signatories on February 11, 2025, including France, <a href="https://www.theguardian.com/world/china">China</a>, India, Japan, Australia, and Canada.</p>
<p>The reactions from the relevant stakeholders highlight the urgent need for international cooperation and dialogue. As AI transcends borders, creating harmonized standards and frameworks could mitigate risks associated with its deployment.</p>
<p><strong>Opportunities and Challenges Ahead</strong></p>
<p>The summit concluded by emphasizing the need for proactive state engagement in AI regulation, prioritizing innovation while protecting individual rights and societal values. This, participants believed, would allow the world to fully capitalize on AI’s benefits.</p>
<p>As the world grapples with the realities of increasingly AI-driven technology, <a href="https://www.innovationaus.com/is-the-paris-ai-declaration-as-vulnerable-as-the-climate-accord/">the voices of diverse stakeholders</a>, including technologists, ethicists, policymakers, and civil society must be heard in shaping the future of AI. Under the flag of the AI Paris Summit, the India-France AI alliance is entering into a new and more unpredictable phase. By defying red tape and cultivating a spirit of cooperation, states are setting the pace for unlocking unprecedented opportunities while highlighting the inherent challenges of this transformative technology.</p>
<p><em>Huma Rehman is a project consultant, consultant, and defense and foreign affairs analyst. She can be reached at X @HumaRehman1.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/04/AI-Paris-Summit-and-Emerging-Paradox-of-AI-Haves-and-Have-Nots.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29601" src="http://globalsecurityreview.com/wp-content/uploads/2024/12/2025-Download-Button.png" alt="Download here." width="302" height="84" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/12/2025-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2024/12/2025-Download-Button-300x83.png 300w" sizes="(max-width: 302px) 100vw, 302px" /></a></p>
<p><a href="https://globalsecurityreview.com/ai-paris-summit-and-emerging-paradox-of-ai-haves-and-have-nots/">AI Paris Summit and Emerging Paradox of AI Haves and Have-Nots</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/ai-paris-summit-and-emerging-paradox-of-ai-haves-and-have-nots/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>More Political Uncertainties Affecting Europe’s Defense Build-up</title>
		<link>https://globalsecurityreview.com/more-political-uncertainties-affecting-europes-defense-build-up/</link>
					<comments>https://globalsecurityreview.com/more-political-uncertainties-affecting-europes-defense-build-up/#respond</comments>
		
		<dc:creator><![CDATA[Christophe Bosquillon]]></dc:creator>
		<pubDate>Thu, 16 Jan 2025 12:47:18 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Diplomacy]]></category>
		<category><![CDATA[Government & Politics]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Alternative for Germany]]></category>
		<category><![CDATA[budget deficit]]></category>
		<category><![CDATA[Christophe Bosquillon ​]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[Elections]]></category>
		<category><![CDATA[Emmanuel Macron]]></category>
		<category><![CDATA[entrepreneurship]]></category>
		<category><![CDATA[EU]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[François Bayrou]]></category>
		<category><![CDATA[Friedrich Merz]]></category>
		<category><![CDATA[GDP]]></category>
		<category><![CDATA[Gerhard Scholz]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[immigration]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[Keir Starmer]]></category>
		<category><![CDATA[Michel Barnier]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[political instability]]></category>
		<category><![CDATA[Romania]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[social disruption]]></category>
		<category><![CDATA[socialism]]></category>
		<category><![CDATA[UK]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[Vladimir Putin]]></category>
		<category><![CDATA[wealth gap]]></category>
		<category><![CDATA[welfare state]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29829</guid>

					<description><![CDATA[<p>Politics in Europe are growing increasingly unstable. The Starmer government in the United Kingdom (UK) is stalled and the German coalition of Gerhard Scholz dissolved, with elections coming. Under French President Emmanuel Macron, the government of Prime Minister Michel Barnier lasted barely three months, as it recently collapsed upon a no-confidence vote by a parliament [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/more-political-uncertainties-affecting-europes-defense-build-up/">More Political Uncertainties Affecting Europe’s Defense Build-up</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Politics in Europe are growing increasingly unstable. The Starmer government in the United Kingdom (UK) is stalled and the German coalition of Gerhard Scholz dissolved, with elections coming. Under French President Emmanuel Macron, the government of Prime Minister Michel Barnier lasted barely three months, as it recently collapsed upon a no-confidence vote by a parliament where Macron lacks a majority.</p>
<p>In the UK, under Prime Minister Keir Starmer, gross domestic product (GDP) <a href="https://www.taxresearch.org.uk/Blog/2024/11/15/failure-is-now-hard-wired-into-all-that-labour-is-doing/">growth</a> has stalled. PM Starmer committed to spending at least 2.5 percent of GDP on defense. However, funding has not materialized. A clear plan for future UK defense <a href="https://www.theguardian.com/politics/2024/nov/09/uk-defence-spending-gdp-trump-britain-military-budget-gdp">may not emerge</a> until the Summer of 2025.</p>
<p>In Germany, left-of-center Chancellor Scholz dissolved his coalition, and the Christian Democratic Union’s Friedrich Merz is expected to take over with a right-of-center coalition after <a href="https://www.politico.eu/article/germany-chancellor-olaf-scholz-social-democratic-party-spd-leadership-german-election-politics/">snap elections</a> in the first quarter of 2025. However, the rise of the Alternative for Germany (AfD) party, whose leader recently <a href="https://www.youtube.com/watch?v=kT08v9rBez0">chatted</a> with Elon Musk, remains a wild card. Germany has yet to define and fund its <a href="https://www.atlanticcouncil.org/blogs/new-atlanticist/germany-has-committed-to-improving-its-defense-its-budget-needs-to-reflect-this/">defense budget</a> at the 2 percent of GDP threshold.</p>
<p>Chancellor Scholz, who paid a last visit to Ukraine in <a href="https://www.reuters.com/world/europe/germanys-scholz-arrives-kyiv-surprise-visit-zdf-reports-2024-12-02/">early December 2024</a>, committed to deliver <a href="https://www.lemonde.fr/en/international/article/2024/12/06/in-germany-chancellor-olaf-scholz-and-his-conservative-rival-friedrich-merz-clash-over-military-aid-to-ukraine_6735313_4.html">Patriot systems</a> in 2025. Merz wants to up the ante with the delivery of Taurus medium-range missiles to Kyiv. While the Ukraine dossier is being used as a political football, a root cause of the problem is that NATO’s <a href="https://globalsecurityreview.com/natos-defense-math-does-not-add-up/">defense math</a> just does not add up.</p>
<p>In France, the downfall of the Barnier government stems from rejection of his budget. The new centrist prime minister François Bayrou now faces the same budgetary dead-end and parliamentary gridlock. Barnier was punished for trying to reduce the French deficit to 5 percent of GDP in 2025. The European Union (EU) rule is 3 percent as the maximum.</p>
<p>France’s current deficit is over 6 percent of GDP and might end up closer to 7 percent. France is in third place for debt-to-GDP ratio at 111 percent. Only Greece and Italy have a worse situation.</p>
<p>The EU average is 82 percent, with Germany maintaining a healthy 62 percent. There is a looming debt crisis, and it will not be possible to kick the can down the road forever. France already passed its 2024–2030 <a href="https://euro-sd.com/2024/01/articles/36190/examining-the-french-military-programming-act-2024-2030/">Military Programming Act</a> (<em>Loi de Programmation Militaire</em>).</p>
<p>President Macron is committed to seeing it through until the 2027 presidential election. Yet the funding needs to be in place for France to remain the top European spender in <a href="https://globalsecurityreview.com/france-doubles-down-on-space-defense-tech/">civilian and military space</a>.</p>
<p>At the other end of the spectrum is Denmark, Estonia, Finland, Iceland, Latvia, Lithuania, Norway, and Sweden. These Nordic and Baltic states clearly lead the way, as they are all <a href="https://www.atlanticcouncil.org/blogs/new-atlanticist/how-the-nordic-baltic-states-are-leading-the-way-on-european-security/">becoming increasingly significant</a> players in European security. In particular, Sweden and Finland’s membership in NATO plays a <a href="https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/how-sweden-and-finlands-membership-in-nato-affects-the-high-north/">central role</a> in securing the High North and deterring Russia, as these two countries continue to <a href="https://globalsecurityreview.com/nordic-countries-supercharge-natos-deterrence/">supercharge NATO’s deterrence</a>.</p>
<p>Meanwhile, Russian President Vladimir Putin placed his economy on a war footing. His defense budget <a href="https://edition.cnn.com/2024/12/02/europe/putin-russia-defense-budget-ukraine-intl-hnk/index.html">steadily increased</a> over the past two years. Of course, this <a href="https://www.ifri.org/en/studies/russian-military-manpower-after-two-and-half-years-war-ukraine">strains society’s resources</a> and patience after nearly three years of war. The vast majority of Russian society is wired to bite the bullet and take the pain for as long as necessary until an <a href="https://globalsecurityreview.com/an-endgame-in-ukraine/">endgame</a> pans out. And for good measure, Putin will maintain his <a href="https://globalsecurityreview.com/putins-nuclear-swagger/">nuclear swagger</a> at the highest level.</p>
<p>For the West, it is time to think deeply about deterring the use of low-yield theater nuclear weapons. This is a capability that not only Russia but China has deployed in great numbers and is in the process of augmenting.</p>
<p>The latest uncertainty comes from NATO member Romania. The courts unexpectedly nullified the results of the first round of presidential elections—deeming them unlawful because of alleged <a href="https://www.ft.com/content/37347819-22ba-4b6d-a815-ec6115a8f5af">Russian interference</a>.</p>
<p>The establishment candidate, who favors EU and NATO, is likely to win. But blaming the surge on an alleged TikTok-driven Russian conspiracy misses the deeper picture: across Europe, from France to Germany to Austria to Hungary to Romania, there is a rising wave of discontent with the current European order. Thus, “extremist” parties are supported in disrupting mainstream left-of-center politics.</p>
<p>The grapes of wrath stem from stalled economies, unwanted immigration from Africa and the Middle East, growing crime and social disruption, and a welfare state that cannot afford both native born citizens and the influx of immigrants. Europe’s wealth level gap with the United States is 30 percent and growing.</p>
<p>By culture, Europe disdains billionaires and even taxes or tries to interdict their free speech, as exemplified in a recent <a href="https://x.com/elonmusk/status/1877948465516257646">exchange on X (Twitter)</a> between former European Commissioner Thierry Breton and Elon Musk. Not wired for animal instinct, creative destruction, freedom of innovation, entrepreneurship, and disruptive capitalism, European socialism loathes wealth creation as a positive value.</p>
<p>Even though history shows that socialism only leads to failure, or, in the words of Lady Thatcher, “running out of other people’s money,” Europeans tend to shrug and call that state of things “Venezuela without the sun.”</p>
<p>As long as this does not change, the best and the brightest will keep flocking to the US, be it from India, Latin America, or South Africa. To say that it is time for Europe to get its act together would be an understatement. Europe needs to understand that it can never develop into an autonomous power without the free creation of wealth, which is required to fund the defenses Europe requires.</p>
<p><em>Christophe Bosquillon is a Senior Fellow at the National Institute for Deterrence Studies. He has over 30 years of international experience in general management, foreign direct investment, and private equity and fund management across various industries in Europe and the Pacific Basin. The views expressed in this article are the author’s own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/01/Further-Uncertainty-Affecting-Europes-Defense-Build-Up_EDIT_Jan_2025_.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29719 " src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button.png" alt="" width="302" height="84" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-300x83.png 300w" sizes="(max-width: 302px) 100vw, 302px" /></a></p>
<p><a href="https://globalsecurityreview.com/more-political-uncertainties-affecting-europes-defense-build-up/">More Political Uncertainties Affecting Europe’s Defense Build-up</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/more-political-uncertainties-affecting-europes-defense-build-up/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Volatility of Cryptocurrency: Barrier or Enabler of Nuclear Escalation?</title>
		<link>https://globalsecurityreview.com/the-volatility-of-cryptocurrency-barrier-or-enabler-of-nuclear-escalation/</link>
					<comments>https://globalsecurityreview.com/the-volatility-of-cryptocurrency-barrier-or-enabler-of-nuclear-escalation/#comments</comments>
		
		<dc:creator><![CDATA[Greg Sharpe]]></dc:creator>
		<pubDate>Thu, 12 Dec 2024 13:14:15 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Economics & Trade]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[accountability]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[conflict escalation]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[darknet]]></category>
		<category><![CDATA[decentralized finance]]></category>
		<category><![CDATA[financial instability]]></category>
		<category><![CDATA[financial resilience]]></category>
		<category><![CDATA[geopolitical shifts]]></category>
		<category><![CDATA[global security]]></category>
		<category><![CDATA[illicit activities]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[regulation]]></category>
		<category><![CDATA[strategic stability]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[verification mechanisms]]></category>
		<category><![CDATA[volatility]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29578</guid>

					<description><![CDATA[<p>The volatility of cryptocurrency markets has been a major topic of discussion since the inception of digital assets like Bitcoin and Ethereum. Its impact extends beyond financial speculation and the promise of decentralized finance. Cryptocurrency’s creation is creating distinct ripples through the global economy, even reaching security and geopolitical affairs. Among the more intriguing dimensions [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-volatility-of-cryptocurrency-barrier-or-enabler-of-nuclear-escalation/">The Volatility of Cryptocurrency: Barrier or Enabler of Nuclear Escalation?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The volatility of cryptocurrency markets has been a major topic of discussion since the inception of digital assets like Bitcoin and Ethereum. Its impact extends beyond financial speculation and the promise of decentralized finance. Cryptocurrency’s creation is creating distinct ripples through the global economy, even reaching security and geopolitical affairs. Among the more intriguing dimensions of this impact is the interplay between <a href="https://www.forbes.com/sites/digital-assets/2024/03/09/more-dangerous-than-nukes-china-and-russia-revealed-to-be-suddenly-abandoning-the-us-dollar-for-a-bitcoin-ethereum-and-xrp-inspired-rival-amid-crypto-price-pump/">cryptocurrency volatility and nuclear deterrence</a>.</p>
<p>Too few Americans contemplate the role of digital currency volatility in acting as a barrier or an <a href="https://elibrary.law.psu.edu/cgi/viewcontent.cgi?article=1369&amp;context=jlia">enabler to nuclear deterrence</a>. The reality is that there are opportunities and risks that volatile cryptocurrency plays in the strategic calculus of nuclear states.</p>
<p><strong>Cryptocurrency and Geopolitical Shifts</strong></p>
<p>Cryptocurrencies are decentralized and borderless, challenging traditional financial systems and reshaping how states interact economically. Their volatility stems from market immaturity, speculative trading, regulatory uncertainties, and evolution of these ever-changing technologies. Essentially created to prevent intermediaries, like banks and financial institutions, cryptocurrencies lay the foundation for trustless transactions for illicit activities.</p>
<p>This volatile mix of person-to-person transactions and zero oversight introduces both unpredictability and opportunity, raising questions about their implications for nuclear deterrence, which now must deal with a domain that includes ungoverned access to financial streams that can be used by state and non-state actors to engage in elicit behavior that undermines deterrence stability.</p>
<p>Nuclear deterrence relies on a delicate balance of power, with states maintaining assured second-strike capabilities to dissuade adversaries from initiating conflict. This balance hinges on credibility and capability. Cryptocurrencies, with their volatile swings in value, could serve to undermine stability within a country or enable elicit actors to engage in a range of nonnuclear actions that undermine strategic stability.</p>
<p><strong>The Risks of Cryptocurrency Volatility as a Barrier</strong></p>
<p>Cryptocurrency volatility can act as a barrier to nuclear deterrence by creating financial instability and undermining a state’s ability to project economic power. Traditional nuclear powers depend on stable economies to maintain robust defense capabilities, fund deterrence strategies, and support diplomatic efforts. Sharp and unpredictable fluctuations in digital assets can <a href="https://www.trendmicro.com/en_us/research/24/g/crypto-crime-2024-report-part-ii.html">undermine financial stability</a>, weakening a state’s capacity to fund critical defense initiatives.</p>
<p>For the United States, crypto is not a major issue currently. But, for North Korea, who funds its nuclear program through elicit activities, crypto is important. Proliferators also use crypto to conduct activity. Instability in crypto makes illicit activity even more high stakes and unpredictable.</p>
<p>Instability creates advantages for state and non-state actors to exploit cryptocurrency markets for nefarious purposes, such as evading sanctions, financing proliferation, and bypassing traditional financial controls. The decentralized nature of cryptocurrencies complicates efforts to monitor, track, and regulate illicit activities, potentially undermining efforts to prevent the spread of nuclear weapons or restrict financing for state and non-state actors pursuing destabilizing weapons programs.</p>
<p>Cryptocurrency instability also presents a challenge to strategic stability through <a href="https://www.sciencedirect.com/science/article/pii/S1057521924003715">cyber threats</a>. If critical financial systems or exchanges are disrupted, or if adversaries manipulate markets to harm a nation’s economy, it could create economic shocks severe enough to destabilize deterrence relationships, increase miscalculation risks, or fuel insecurity-driven arms build-ups.</p>
<p><strong>The Darknet and Conflict Escalation</strong></p>
<p>Darknet cryptocurrency markets empower bad actors by offering anonymity and decentralized financial tools, enabling a wide range of conflict-escalating activities. These markets facilitate the purchase of illegal arms, military-grade technology, and hacking tools, often used to destabilize regions and target critical infrastructure (command-and-control systems) through cyberattacks.</p>
<p>Terror organizations leverage cryptocurrencies for anonymous funding, allowing them to finance operations, recruit globally, and expand their influence. Sanctioned entities exploit these markets to bypass <a href="https://www.sciencedirect.com/science/article/pii/S240584402309477X">international restrictions</a> and acquire resources that fuel aggressive actions.</p>
<p>The ability to transact anonymously with cryptocurrencies also shields organized crime, including narcotics and human trafficking, whose revenues often fund conflict zones and insurgent groups. Covert exchanges on the darknet can increase espionage, destabilize international relations, and provoke hostilities to serve a radically motivated agenda.</p>
<p>In parallel, extremist groups utilize these platforms to spread propaganda, incite violence, and radicalize populations, further destabilizing fragile regions. The combination of anonymity, decentralized systems, and hidden economies presents a formidable challenge for global security efforts aimed at <a href="https://www.occrp.org/en/news/us-seizes-crypto-mixer-linked-to-north-korean-regime">conflict prevention and stability</a>.</p>
<p><strong>Cryptocurrency as an Enabler of Nuclear Deterrence</strong></p>
<p>On the other hand, cryptocurrency volatility also opens new avenues for strengthening nuclear deterrence through financial resilience and innovation. The decentralized nature of digital assets can enable states to diversify their financial resources and reduce dependency on traditional systems that might be vulnerable to adversarial influence or geopolitical tensions. In times of economic crisis or sanctions, cryptocurrencies <a href="https://www.coinbase.com/blog/national-security-in-the-age-of-digital-innovation-the-critical-role-of-crypto">can provide states with alternative means</a> to maintain fiscal stability, thus supporting their deterrent capabilities. Countering bad activities with good can be as challenging as the reliance on traditional financial stability for positive security assurance.</p>
<p>Furthermore, blockchain technology, which underpins cryptocurrencies, offers potential for transparency, accountability, and verification mechanisms in arms control agreements. By leveraging <a href="https://www.americanbar.org/groups/law_national_security/publications/aba-standing-committee-on-law-and-national-security-60-th-anniversary-an-anthology/what-do-blockchain-and-cryptocurrency-have-to-do-with-national-security/">blockchain</a>, states can create tamper-proof records for tracking nuclear materials, enhancing verification regimes, and building trust between adversaries. The volatility of digital assets may fuel innovation and drive investment into these applications, ultimately strengthening nuclear stability and deterrence structures.</p>
<p><strong>Balancing the Risks and Opportunities</strong></p>
<p>While the volatility of cryptocurrencies poses undeniable risks, it is essential to approach them with a nuanced perspective to find the right balance between risk and reward. <a href="https://itif.org/publications/2019/04/30/policymakers-guide-blockchain/">Policymakers</a> must strike a balance between leveraging the opportunities that digital assets present and mitigating their risks to global security. Collaborative efforts to regulate and stabilize cryptocurrency markets can reduce the likelihood of financial instability while harnessing the potential of decentralized systems.</p>
<p>In addition, enhanced cybersecurity measures must accompany any state or multilateral effort to integrate cryptocurrency into the financial systems that underpin deterrence capabilities. <a href="https://www.chainalysis.com/blog/white-house-crypto-framework/">Protecting digital infrastructure</a> against malicious actors will ensure that the advantages of decentralized assets are not overshadowed by their exploitation for destabilizing purposes.</p>
<p><strong>A New Strategic Frontier</strong></p>
<p>The volatility of cryptocurrency markets is both a challenge and a frontier for instability of nuclear deterrence. While it poses risks through financial instability, illicit use, and cyber threats, it also offers opportunities for financial resilience, innovation, and transparency. In today’s evolving digital environment, nations must adapt to this dual-edged sword, developing strategies that incorporate the volatility of digital assets into a <a href="https://arxiv.org/html/2409.10031v1">comprehensive approach to deterrence</a>.</p>
<p>Ultimately, whether cryptocurrencies become a barrier or enabler of nuclear deterrence depends on how nations, regions, and regulators in the broader international community respond to this evolving challenge. By advocating cooperation, innovation, and regulation, cryptocurrencies can strengthen global security architectures and contribute to a stable nuclear order—turning volatility into a force for strategic stability and peace.</p>
<p><em>Greg Sharpe is the Marketing and Communications Director at the National Institute for Deterrence Studies. The views expressed in this article are his own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/12/The-Volatility-of-Cryptocurrency-on-Conflict-Escalation-1.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-28926 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/the-volatility-of-cryptocurrency-barrier-or-enabler-of-nuclear-escalation/">The Volatility of Cryptocurrency: Barrier or Enabler of Nuclear Escalation?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-volatility-of-cryptocurrency-barrier-or-enabler-of-nuclear-escalation/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Paving the Ethical Route for AI</title>
		<link>https://globalsecurityreview.com/paving-the-ethical-route-for-ai/</link>
					<comments>https://globalsecurityreview.com/paving-the-ethical-route-for-ai/#respond</comments>
		
		<dc:creator><![CDATA[Huma Rehman]]></dc:creator>
		<pubDate>Tue, 08 Oct 2024 11:52:07 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[accountability]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Disclosure Act]]></category>
		<category><![CDATA[Algorithmic Accountability Act]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Artificial Intelligence Data Act]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Council of Europe]]></category>
		<category><![CDATA[democracy]]></category>
		<category><![CDATA[Digital Services Oversight and Safety Act]]></category>
		<category><![CDATA[ethical application]]></category>
		<category><![CDATA[ethics]]></category>
		<category><![CDATA[EU Artificial Intelligence Act]]></category>
		<category><![CDATA[European regulation]]></category>
		<category><![CDATA[explainability]]></category>
		<category><![CDATA[fairness]]></category>
		<category><![CDATA[Framework Convention]]></category>
		<category><![CDATA[Global AI Governance Initiative]]></category>
		<category><![CDATA[global governance]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[injustice]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[international cooperation]]></category>
		<category><![CDATA[liberal international order]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[National Defense Authorization Act]]></category>
		<category><![CDATA[openness]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[resource allocation]]></category>
		<category><![CDATA[rule of law]]></category>
		<category><![CDATA[sustainable development]]></category>
		<category><![CDATA[technology advancement. ​]]></category>
		<category><![CDATA[United Nations]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29041</guid>

					<description><![CDATA[<p>The complex landscape of artificial intelligence (AI) is increasingly relevant across all fields and nations. Since AI affects every state, its benefits and drawbacks must be addressed collectively. The recent passage of the Framework Convention on Artificial Intelligence by the Council of Europe marks a significant turning point in the quest for effective and long-lasting [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/paving-the-ethical-route-for-ai/">Paving the Ethical Route for AI</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The complex landscape of artificial intelligence (AI) is increasingly relevant across all fields and nations. Since AI affects every state, its benefits and drawbacks must be addressed collectively.</p>
<p>The <a href="https://digital-strategy.ec.europa.eu/en/news/commission-signed-council-europe-framework-convention-artificial-intelligence-and-human-rights">recent passage</a> of the <a href="https://www.coe.int/en/web/artificial-intelligence/the-framework-convention-on-artificial-intelligence">Framework Convention on Artificial Intelligence</a> by the Council of Europe marks a significant turning point in the quest for effective and long-lasting control of AI. The document is a statement about how European states will harness AI, a relatively new and powerful technology, to empower humanity while limiting its abuses.</p>
<p>The March 2024 adoption of a US-led United Nations General Assembly resolution on seizing the opportunities of safe, secure, and trustworthy artificial intelligence systems for sustainable development also highlights the common ground the United States shares with Europe and democracies around the world. While the US differs in some <a href="https://www.state.gov/remarks-at-the-signing-ceremony-for-the-council-of-europe-framework-convention-on-artificial-intelligence-and-human-rights/">important areas with Europe</a>, the significant agreement is valuable. This convention provides a foundation for others to build on.</p>
<p>Although new technologies often appear benign at first glance, there are many ways AI, in particular, can negatively impact the values held dear by so many around the world. From facial recognition systems interfering with privacy to machine learning that amplifies injustice, the potential cost of AI’s misuse is high.</p>
<p>Until now, there was not an effort at global governance of AI. This fostered a string of national laws that lack the capacity to address the transnational nature of AI adequately. A system of fractured development silos creates a wide gap wherein technological advancement is prioritized over ethics.</p>
<p>There are a few <a href="https://www.spglobal.com/en/research-insights/featured/special-editorial/the-ai-governance-challenge">AI regulatory developments</a>  around the world for AI management worthy of note. First, the US House of Representatives debated the Digital Services Oversight and Safety Act of 2022 (H.R.6796) and the Algorithmic Accountability Act of 2023 (<a href="https://www.govinfo.gov/content/pkg/BILLS-118hr5628ih/pdf/BILLS-118hr5628ih.pdf">H.R. 5628</a>). The AI Disclosure Act of 2023 (<a href="https://www.congress.gov/118/bills/hr3831/BILLS-118hr3831ih.pdf">H.R. 3831</a>) was also introduced before the House of Representatives.</p>
<p>Canada saw the introduction of the Artificial Intelligence Data Act (<a href="https://www.parl.ca/DocumentViewer/en/44-1/bill/C-27/first-reading">AIDA</a>). The European Parliament began discussing the <a href="https://www.europarl.europa.eu/news/en/headlines/society/20230601STO93804/eu-ai-act-first-regulation-on-artificial-intelligence">EU Artificial Intelligence Act</a> in 2023, which represents a shift toward “hard law.” China is also addressing the issue and undertook the Interim Administrative <a href="https://www.pwccn.com/en/industries/telecommunications-media-and-technology/publications/interim-measures-for-generative-ai-services-implemented-aug2023.html">Measures</a> for the Management of Generative AI Services, which was enacted in 2023.</p>
<p>Recently, the United States <a href="https://www.defense.gov/News/News-Stories/Article/Article/3618367/congress-passes-fiscal-2024-defense-spending-bill-pay-raise-for-service-members/">passed</a> the 2024 National Defense Authorization Act, which <a href="https://www.congress.gov/117/bills/hr7776/BILLS-117hr7776enr.pdf">include</a>d a five-year implementation plan to adopt AI applications to accelerate decision advantage for both business efficacy as well as warfighting capability.</p>
<p>China also released <a href="http://geneva.china-mission.gov.cn/eng/dbtxwx/202311/t20231121_11184852.htm">the Global AI Governance Initiative</a>, “calling for all countries under the <a href="https://www.mfa.gov.cn/eng/wjdt_665385/2649_665393/202310/t20231020_11164834.html">principles</a> of extensive consultation, joint contribution, and shared benefits to enhance exchanges and cooperation, work together to prevent risks, and develop an AI governance framework based on broad consensus, to make AI technologies more secure, reliable, controllable, and equitable.”</p>
<p>The Council of Europe’s Framework Convention, discussed above, provides a comprehensive legal structure to protect human rights, democracy, and the rule of law, besides promoting innovation. This strikes a balance where the use of technology should not be limited but society must ensure that development is in the right direction—with most of the technologies promoting ethical usage.</p>
<p>The Convention <a href="https://www.reuters.com/technology/artificial-intelligence/us-britain-eu-sign-agreement-ai-standards-ft-reports-2024-09-05/">offers a set of guidelines</a> for the advancement of AI that include respecting human dignity and upholding the idea that one should not infringe upon the rights and liberties of others. There is a significant urge to pursue explainability, which requires an explanation for each decision an AI makes and highlights how these systems have the power to significantly impact people’s lives in fields like criminal justice and healthcare. Additionally, the Convention calls for fairness in the creation of AI by considering prejudice in learning systems.</p>
<p>The Convention clearly aspires to international cooperation, which is important because it is a central element of the liberal international order. Numerous states agreed to the treaty, realizing that artificial intelligence is not a local problem. Such collaboration is required since <a href="https://unidir.org/wp-content/uploads/2023/05/Brief-ResponsibleAI-Final.pdf">artificial intelligence affects all states</a>, and its advantages and disadvantages can only be addressed jointly. The agreement’s openness to other parties is crucial because it enables people from different backgrounds and cultures to voice their thoughts, enhancing and leveling the playing field.</p>
<p>As AI advances, concerns will grow about the agreement’s direction, applicability, and resource allocation. It implies that ethically right deeds now might turn unethical as technology develops, highlighting the necessity of a progressive framework for a code of ethics.</p>
<p>Since the development of AI must be accompanied by its ethical application, the Convention on Artificial Intelligence represents an important accomplishment in European regulation of the technology. Therefore, this treaty serves as a guide for how human rights, accountability, and openness should be upheld when integrating AI into society. The journey has only just begun. However, the political will and spirit to act, observe, and adopt the proper approach to governance can serve to achieve the benefits of AI.</p>
<p>Nevertheless, it will probably be difficult to put these rules and policies into foolproof practice. It will certainly be a work in progress. The European Council is certainly providing a road map for managing global mutual technology advancement concerns.</p>
<p><em>Huma Rehman is Director of Research at the Islamabad Policy Institute (IPI) and a Defense &amp; Foreign Affairs Analyst. The views expressed are her own.   </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/10/Paving-the-Ethical-Route-for-AI-Amid-Challenges.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-28926 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/paving-the-ethical-route-for-ai/">Paving the Ethical Route for AI</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/paving-the-ethical-route-for-ai/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI Overload: Navigating the US Intelligence Community’s Data Deluge</title>
		<link>https://globalsecurityreview.com/ai-overload-navigating-the-us-intelligence-communitys-data-deluge/</link>
					<comments>https://globalsecurityreview.com/ai-overload-navigating-the-us-intelligence-communitys-data-deluge/#respond</comments>
		
		<dc:creator><![CDATA[Joshua Thibert]]></dc:creator>
		<pubDate>Thu, 01 Aug 2024 11:46:03 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[culture]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[HUMINT]]></category>
		<category><![CDATA[industrial base]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[prototyping]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=28553</guid>

					<description><![CDATA[<p>Open-Source Intelligence (OSINT) involves collecting, analyzing, and utilizing information from publicly available sources to inform decision-making within the intelligence community. It provides critical insights without the need for clandestine operations, making it a cost-effective and legally compliant method of gathering intelligence. The recent surge in OSINT intake is driven by the exponential growth of digital [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/ai-overload-navigating-the-us-intelligence-communitys-data-deluge/">AI Overload: Navigating the US Intelligence Community’s Data Deluge</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Open-Source Intelligence (OSINT) involves collecting, analyzing, and utilizing information from publicly available sources to inform decision-making within the intelligence community. It provides critical insights without the need for clandestine operations, making it a cost-effective and legally compliant method of gathering intelligence.</p>
<p>The recent <a href="https://breakingdefense.com/2024/05/osint-overdose-intelligence-agencies-seek-new-ways-to-manage-surge-of-open-source-intel/?utm_campaign=Systel&amp;utm_medium=email&amp;_hsenc=p2ANqtz-9IA7_kouL01rOsV2asU9iD7i7ktV-CJwFrGye2RBxBVB86GKrpx9ytcw8g9kgEj0aONw5urTQyr7P5tm2DHiJoBIKJPQ&amp;_hsmi=315235900&amp;utm_content=315235900&amp;utm_source=hs_email">surge</a> in OSINT intake is driven by the exponential growth of digital information, the proliferation of social media, and the increasing availability of online data. These factors have expanded the volume and variety of accessible information, enabling intelligence agencies to glean valuable insights from a vast array of sources, ranging from news articles and social media posts to academic publications and government reports. However, this influx of data necessitates advanced tools and techniques to manage, analyze, and extract actionable intelligence efficiently.</p>
<p>Artificial Intelligence (AI) and Machine Learning (ML) applications are being <a href="https://www.linkedin.com/pulse/intersection-ai-osint-how-artificial-intelligence-open-groeneveld/">implemented</a> across the American intelligence community to enhance capabilities, resulting in a significant increase in OSINT intake. Managing this surge requires leveraging advanced technology, enhancing analytical capabilities, and ensuring efficient collaboration. AI and ML algorithms automate data collection, filtering, and initial analysis. The development of natural language processing (NLP) tools to process large volumes of text data in multiple languages will mature over time with appropriate investment. Additional investment in scalable big data platforms that can handle OSINT data will be critical, utilizing cloud-based solutions for storage and processing to ensure scalability and flexibility.</p>
<p>Human capital enhancement is crucial for any strategic intelligence strategy. There must be an increased focus on recruiting and developing specialized training for intelligence analysts in OSINT techniques, tools, and methodologies. Continuous education programs will keep analysts updated on the latest technologies and trends. Expanding hiring efforts to identify experts in data science, cybersecurity, linguistics, and regional studies will increase the talent pool capable of enhancing the analytical capabilities of the intelligence community. By fostering an environment that promotes continuous learning and expertise in emerging technologies, the intelligence community can stay ahead of adversaries and ensure that their analysts have the necessary skills to leverage advanced tools effectively.</p>
<p>Interagency collaboration within the American intelligence community and with trusted allies is vital. Creating joint OSINT task forces involving multiple agencies fosters collaboration and information sharing, leveraging unique capabilities and expertise. Developing standardized protocols and best practices for OSINT collection and analysis enhances situational awareness and reduces duplication of efforts.</p>
<p>By establishing clear lines of communication and cooperation, intelligence agencies can ensure a more unified approach to addressing emerging threats and challenges. This collaboration also extends to international partners, creating a robust intelligence-sharing network that provides a broader perspective and pools resources to counteract the strategic moves of adversaries.</p>
<p>From a strategic perspective, developing secure and user-friendly platforms for sharing OSINT findings across different agencies is essential. Implementing interoperable systems for seamless data exchange, supported by comprehensive policies and guidelines aligned with legal mandates, builds trust between agencies and the public. Ensuring the security and integrity of data and communication channels is paramount, as it protects classified information from cyber intrusions and ensures the resilience of supply chains and critical infrastructure against cyber threats. Enhanced cybersecurity measures are essential for maintaining the trust and operational effectiveness of intelligence operations.</p>
<p>Reversing concerns about the expanding influence of the technology industry is necessary for the defense industry and intelligence community to embrace a collaborative environment that encourages growth, innovation, and trust. The technology industry already has expertise in these domains, which can be leveraged for public-private partnerships to access cutting-edge innovations. By fostering partnerships, the intelligence community can benefit from rapid advancements in technology and stay ahead of emerging threats. Collaboration with the technology industry also provides access to a pool of highly skilled professionals who can contribute to enhancing the capabilities of intelligence agencies.</p>
<p>The intelligence community must embrace public-private partnerships to foster a collaborative environment that encourages innovation. Establishing feedback mechanisms, conducting regular reviews, and setting up innovation labs within intelligence agencies ensures they stay ahead of emerging threats. Feedback mechanisms can include regular debriefings, user surveys, and performance metrics to assess the effectiveness of OSINT strategies. Review processes might involve periodic audits, peer reviews, and after-action reports to identify gaps and areas for improvement. Innovation labs can foster a culture of experimentation and rapid prototyping of new technologies and methodologies. By creating a space for testing and developing new ideas, innovation labs can drive significant advancements in intelligence operations and ensure that agencies are equipped to handle evolving threats.</p>
<p>Continuous improvement and adaptation will be key to maintaining a competitive edge in a dynamic and ever-changing global threat landscape. Establishing feedback mechanisms to continually assess the effectiveness of OSINT strategies and make necessary adjustments is essential. Conducting regular reviews and audits to identify gaps and areas for improvement will ensure that the intelligence community remains agile and responsive to emerging threats and challenges. Enhancing all-source analytical techniques for integrating OSINT with other intelligence sources (HUMINT, SIGINT, etc.) will provide a comprehensive view of the intelligence landscape, bridging the knowledge and awareness gaps that often plague the intelligence community.</p>
<p>To further support these advancements, the intelligence community must also embrace public-private partnerships to leverage the technology industry’s expertise and foster a collaborative environment that encourages innovation. Establishing feedback mechanisms, conducting regular reviews, and setting up innovation labs within intelligence agencies will ensure they stay ahead of emerging threats and challenges. By fostering a culture of experimentation and rapid prototyping, innovation labs can drive significant advancements in intelligence operations and ensure that agencies are equipped to handle evolving threats.</p>
<p>Managing the surge in OSINT requires a holistic approach that combines technological innovation, enhanced human capital, effective interagency collaboration, and robust policy frameworks. By adopting these strategies, the intelligence community can maintain its edge in an increasingly complex and dynamic world.</p>
<p><em>Joshua Thibert is a Senior Analyst at the</em> <a href="https://thinkdeterrence.com/"><em>National Institute for Deterrence Studies (NIDS)</em></a><em>.</em><em> With nearly 30 years of comprehensive expertise, his background encompasses roles as a former counterintelligence special agent within the Department of Defense and as a practitioner in compliance, security, and risk management in the private sector. Views expressed are his own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/07/AI-Overload_-Navigating-the-US-Intelligence-Communitys-Data-Deluge.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-28497 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/07/Download3-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/07/Download3-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/07/Download3.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/ai-overload-navigating-the-us-intelligence-communitys-data-deluge/">AI Overload: Navigating the US Intelligence Community’s Data Deluge</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/ai-overload-navigating-the-us-intelligence-communitys-data-deluge/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
