<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Topic:RAW &#8212; Global Security Review %</title>
	<atom:link href="https://globalsecurityreview.com/subject/raw/feed/" rel="self" type="application/rss+xml" />
	<link>https://globalsecurityreview.com/subject/raw/</link>
	<description>A division of the National Institute for Deterrence Studies (NIDS)</description>
	<lastBuildDate>Thu, 05 Feb 2026 11:49:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://globalsecurityreview.com/wp-content/uploads/2023/10/cropped-GSR-Banner-LogoV2-32x32.png</url>
	<title>Topic:RAW &#8212; Global Security Review %</title>
	<link>https://globalsecurityreview.com/subject/raw/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Intelligence Illusion: How AI is Exposing Strategic Vulnerabilities in the Developing World</title>
		<link>https://globalsecurityreview.com/the-intelligence-illusion-how-ai-is-exposing-strategic-vulnerabilities-in-the-developing-world/</link>
					<comments>https://globalsecurityreview.com/the-intelligence-illusion-how-ai-is-exposing-strategic-vulnerabilities-in-the-developing-world/#respond</comments>
		
		<dc:creator><![CDATA[Tahir Mahmood Azad]]></dc:creator>
		<pubDate>Thu, 05 Feb 2026 13:15:13 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Deterrence & Foreign Policy]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI–HUMINT fusion]]></category>
		<category><![CDATA[automated analysis]]></category>
		<category><![CDATA[big data]]></category>
		<category><![CDATA[CMS]]></category>
		<category><![CDATA[cyber technologies]]></category>
		<category><![CDATA[cyber-attacks]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[false information]]></category>
		<category><![CDATA[HUMINT]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[ISI]]></category>
		<category><![CDATA[NADRA]]></category>
		<category><![CDATA[NATGRID]]></category>
		<category><![CDATA[nuclearized]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Pegasus spyware]]></category>
		<category><![CDATA[political profiling]]></category>
		<category><![CDATA[RAW]]></category>
		<category><![CDATA[Safe City projects]]></category>
		<category><![CDATA[South Asia]]></category>
		<category><![CDATA[strategic vulnerabilities]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32261</guid>

					<description><![CDATA[<p>For decades, intelligence agencies in developing countries, especially in South Asia, have been portrayed as all-knowing, all-seeing, and deeply involved in every part of politics and security. Pakistan’s Inter-Services Intelligence (ISI) and India’s Research and Analysis Wing (RAW) are often mythologized as all-powerful institutions capable of shaping domestic politics and manipulating regional events. However, this [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-intelligence-illusion-how-ai-is-exposing-strategic-vulnerabilities-in-the-developing-world/">The Intelligence Illusion: How AI is Exposing Strategic Vulnerabilities in the Developing World</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>For decades, intelligence agencies in developing countries, especially in South Asia, have been portrayed as all-knowing, all-seeing, and deeply involved in every part of politics and security. Pakistan’s Inter-Services Intelligence <a href="https://ciaotest.cc.columbia.edu/olj/sa/sa-feb00-2.html">(ISI)</a> and India’s Research and Analysis Wing <a href="https://www.cfr.org/backgrounder/raw-indias-external-intelligence-agency">(RAW)</a> are often mythologized as all-powerful institutions capable of shaping domestic politics and manipulating regional events. However, this description disguises a basic reality: the traditional human intelligence <a href="https://www.dhs.gov/sites/default/files/2024-09/2024aepimpactofaiontraditionalhumananalysis.pdf">(HUMINT)</a>–centered model that sustained these agencies is being fundamentally disrupted by artificial intelligence (AI), big-data surveillance, and automated analysis. The actual picture today is not the strength of these institutions but the growing mismatch between their legacy intelligence cultures and the demands of the AI era.</p>
<p>AI has improved intelligence operations in developing nations, but it has also created a new intelligence gap due to disjointed technological implementation, political exploitation of surveillance, reliance on foreign suppliers, and insufficient integration between HUMINT and AI-driven systems. Pakistan and India have large human resources and developing technological ecosystems, but institutional fragmentation and political agendas prevent the development of integrated, modern intelligence frameworks.</p>
<p>The problems that South Asian intelligence services are having are part of a larger global transformation. AI is now a segment of intelligence operation in the US, China, Israel, and some <a href="https://rejolut.com/blog/13-top-ai-countries/#:~:text=Conclusion,and%20interact%20with%20the%20world.">European countries</a>. This includes automated translation, pattern-of-life analysis, algorithmic triage of intercepted data, commercial satellite imagery analytics, and cyber-enabled anomaly detection. <a href="https://bigdatachina.csis.org/the-ai-surveillance-symbiosis-in-china/">China’s surveillance</a> state uses AI-powered facial recognition, behavior prediction, and nationwide data fusion to show what a fully integrated intelligence model looks like. <a href="https://academic.oup.com/jogss/article/8/2/ogad005/7128314?login=false">The U.S.</a> is pushing for automated signals intelligence (SIGINT) processing and predictive analysis in all its intelligence agencies in the Office of the Director of National Intelligence (ODNI). As shown in studies of its military AI systems, <a href="https://media.setav.org/en/file/2025/02/deadly-algorithms-destructive-role-of-artificial-intelligence-in-gaza-war.pdf">Israel uses</a> AI in real-time targeting and ISR fusion.</p>
<p><a href="https://www.lesswrong.com/posts/cM7sR7seBRwtxctGY/the-ai-governance-gaps-in-developing-countries">Developing countries</a> are just as vulnerable to cyber-attacks, terrorism, and false information, but they do not have the institutional frameworks that let AI grow. This global gap is what makes the changes in intelligence in Pakistan and India so important for strategy. <a href="https://www.csohate.org/2025/09/15/advanced-surveillance-in-pakistan/#:~:text=On%209%20September%2C%20Amnesty%20International,regime%20of%20surveillance%20and%20censorship.">Pakistan</a> and <a href="https://ohrh.law.ox.ac.uk/ai-surveillance-and-privacy-in-india-human-rights-in-the-age-of-technology/#:~:text=This%20permissiveness%20undermines%20the%20Supreme,on%20getting%20that%20balance%20right.">India</a> have both spent resources on AI-enabled surveillance systems like ID databases, CCTV networks, predictive policing tools, interception systems, and cyber technologies that come from other countries. <a href="https://genderit.org/articles/between-privacy-and-power-fine-line-pakistans-data-protection-bill">The NADRA</a> database and <a href="https://www.biometricupdate.com/202402/pakistan-executes-ai-powered-criminal-identification-system#:~:text=Pakistan%20is%20rapidly%20advancing%20into,biometric%20criminal%20identification%20and%20detention.">Safe City</a> projects in Pakistan give a lot of biometric and real-time data. <a href="https://compass.rauias.com/current-affairs/surveillance-india/">India has made</a> the Central Monitoring System (CMS) and the National Intelligence Grid (NATGRID) to connect databases between state agencies. The ministry, military, police, and intelligence systems are separate. Legacy bureaucracies promote compartmentalization over integration. AI needs centralized databases, clean data, agency cooperation, and agreed <a href="https://link.springer.com/chapter/10.1007/3-540-48317-9_10">analysis criteria</a>. These requirements are missing; hence, AI systems exhibit limited and inconsistent intelligence. Agencies are collecting more data than ever but lack the framework to analyze it.</p>
<p>Pakistan and India still value HUMINT for intelligence. It is crucial for counterterrorism, political spying, and regional operations. HUMINT alone can&#8217;t compete with hybrid enemies who use AI-driven processing. Strategically, China’s integrated military and civilian AI ecosystem is advantageous. <a href="https://moderndiplomacy.eu/2024/10/17/ai-adoption-in-developing-countries-opportunities-challenges-and-policy-pathways/">Developing states</a> are stuck between two sources of intelligence: First is a legacy HUMINT system with deep networks and second is an AI ecosystem that is fragmented and not fully developed, so it cannot support strategic analysis. In cross-border threat assessments, cyber invasions, and emerging non-traditional security issues like information warfare, this mismatch causes delays, blind spots, and analytical distortions.</p>
<p>In both Pakistan and India, AI-enabled surveillance has been used more for political purposes than for improving strategic intelligence. <a href="https://www.amnesty.org/en/latest/news/2023/12/india-damning-new-forensic-investigation-reveals-repeated-use-of-pegasus-spyware-to-target-high-profile-journalists/#:~:text=In%202020%2C%20Amnesty%20International%20and,us%20for%20digital%20forensics%20support.">Amnesty International</a> reported that India’s use of Pegasus spyware targeted journalists, activists, and political opponents. <a href="https://ianslive.in/pakistan-deploys-digital-technology-to-spy-on-citizens--20251002183604#:~:text=The%20authorities%20have%20also%20repeatedly,been%20prevalent%20in%20Pakistani%20politics.">Pakistan</a> has been criticized for using automated social media monitoring and political profiling, which often focuses on threats from within the country rather than threats from other countries. When surveillance tools are used to control political competition within a party, two things happen. First, institutional resources prioritize domestic control over strategic analysis. Second, technology investments strengthen policing instead of updating intelligence. This challenges national security by making it harder for the intelligence system to predict cyberattacks, regional crises, and threats from outside the country.</p>
<p>South Asia has a lot of foreign AI and cyber infrastructure. Pakistan employs Chinese surveillance equipment (<a href="https://www.dailymirror.lk/amp/international/Pakistan-adopts-Chinas-surveillance-model-Amnesty-warns/107-319168">Hikvision, Huawei</a>), while India uses <a href="https://ijhssm.org/issue_dcp/Cybersecurity%20Synergy%20How%20India%20and%20Israel%20Are%20Teaming%20Up.pdf">Israeli,</a> <a href="https://www.business-standard.com/economy/news/india-s-reliance-on-us-software-cloud-services-poses-economic-risks-gtri-125091400281_1.html">US,</a> and European and American forensics platforms. This increases structural risks, including <a href="https://www.paloaltonetworks.co.uk/cyberpedia/data-exfiltration">data exfiltration</a> and espionage due to entrenched vulnerabilities, strategic reliance on foreign updates, and weakened sovereignty over vital intelligence activities.</p>
<p>Two traditional rivals, nuclear-weapon states, are weakened by this reliance. AI-powered surveillance systems increase digital access points for assault. Big national data repositories attract attackers. Pakistan has had multiple government system hacks, and India has had large breaches that compromised critical infrastructure and government information.  Failures in the past were largely caused by human error, but in the AI era, bias in algorithms, data manipulation, hostile and automated cyberattacks, and misclassification can lead to erroneous operational decisions. These dangers make the strategy unstable.</p>
<p>Increasing intelligence gaps between <a href="https://www.cloudsek.com/blog/brief-disruptions-bold-claims-the-tactical-reality-behind-the-india-pakistan-hacktivist-surge">Pakistan</a> and <a href="https://www.cloudsek.com/blog/brief-disruptions-bold-claims-the-tactical-reality-behind-the-india-pakistan-hacktivist-surge">India</a> jeopardize national and regional security. More likely to misjudge opponents: In fast-moving crises, agencies may miss signals, misjudge threats, or misread trends without AI–HUMINT fusion. Cross-border escalation risks rise; poor intelligence integration in nuclearized environments may aggravate misperceptions during crises like the 2019 Pulwama–Balakot incident or the May 2025 standoff. Cyber attacks expose national secrets. Easy-to-get digital network intelligence can have fatal repercussions. China-asymmetric strategic competition: China is decades ahead in intelligence upgrading, and Pakistan and India may fall further. Domestic AI reduces institutional capacity: political survival trumps strategic intelligence.</p>
<p>In summary, countries that do not update their intelligence risk being caught off guard, making mistakes, and becoming more vulnerable. The myths of shadows, secrecy, and huge people networks that fueled emerging country intelligence organizations are gone. AI has highlighted bureaucratic opacity’s long-hidden structural flaws: dysfunctional systems, politicized surveillance, reliance on foreign technology, and a lack of HUMINT-AI integration. Thus, Pakistan and India’s new intelligence divide is not about data or resources. It is about institutions’ failure to transition from analogue intelligence to AI-connected ecosystems. State and non-state adversaries that accelerate this transformation will benefit.</p>
<p>In nuclearized, crisis-prone South Asia, small misunderstandings could lead to massive wars. Pakistan and India need more than AI tools to stay competitive strategically. They need data architectures that work together, technical specialists, protocols to prevent politicians from abusing their authority, and strategic AI–HUMINT fusion.</p>
<p><em>Dr. Tahir Mahmood Azad is currently a research scholar at the Department of Politics &amp; International Relations, the University of Reading, UK.  Views expressed in this article are the author&#8217;s own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/02/The-Intelligence-Illusion-How-AI-is-Exposing-Strategic-Vulnerabilities-in-the-Developing-World.pdf"><img decoding="async" class="alignnone wp-image-32091" src="http://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png" alt="" width="245" height="68" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button-300x83.png 300w" sizes="(max-width: 245px) 100vw, 245px" /></a></p>
<p><a href="https://globalsecurityreview.com/the-intelligence-illusion-how-ai-is-exposing-strategic-vulnerabilities-in-the-developing-world/">The Intelligence Illusion: How AI is Exposing Strategic Vulnerabilities in the Developing World</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-intelligence-illusion-how-ai-is-exposing-strategic-vulnerabilities-in-the-developing-world/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
