<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Topic:safety &#8212; Global Security Review %</title>
	<atom:link href="https://globalsecurityreview.com/subject/safety/feed/" rel="self" type="application/rss+xml" />
	<link>https://globalsecurityreview.com/subject/safety/</link>
	<description>A division of the National Institute for Deterrence Studies (NIDS)</description>
	<lastBuildDate>Mon, 15 Dec 2025 14:10:27 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://globalsecurityreview.com/wp-content/uploads/2023/10/cropped-GSR-Banner-LogoV2-32x32.png</url>
	<title>Topic:safety &#8212; Global Security Review %</title>
	<link>https://globalsecurityreview.com/subject/safety/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Beyond the Next Administration: Building Enduring Tech–Government Alliances for National Power</title>
		<link>https://globalsecurityreview.com/beyond-the-next-administration-building-enduring-tech-government-alliances-for-national-power/</link>
					<comments>https://globalsecurityreview.com/beyond-the-next-administration-building-enduring-tech-government-alliances-for-national-power/#respond</comments>
		
		<dc:creator><![CDATA[Greg Sharpe]]></dc:creator>
		<pubDate>Mon, 15 Dec 2025 13:14:00 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[accountability]]></category>
		<category><![CDATA[advanced analytics]]></category>
		<category><![CDATA[advisory councils]]></category>
		<category><![CDATA[AI safety frameworks]]></category>
		<category><![CDATA[AI-enabled national preparedness]]></category>
		<category><![CDATA[Air Force Research Laboratory (AFRL)]]></category>
		<category><![CDATA[biosecurity infrastructure]]></category>
		<category><![CDATA[bipartisan engagement]]></category>
		<category><![CDATA[co-stewardship of national resilience]]></category>
		<category><![CDATA[codifying capabilities in law]]></category>
		<category><![CDATA[Congress as strategic partner]]></category>
		<category><![CDATA[continuity across administrations]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[defense planning ​]]></category>
		<category><![CDATA[democratic oversight]]></category>
		<category><![CDATA[Department of Energy (DOE) quantum networks]]></category>
		<category><![CDATA[disaster response]]></category>
		<category><![CDATA[distributed quantum networking testbed]]></category>
		<category><![CDATA[economic competitiveness]]></category>
		<category><![CDATA[Economic Security]]></category>
		<category><![CDATA[entanglement distribution]]></category>
		<category><![CDATA[ethics]]></category>
		<category><![CDATA[experimental infrastructure]]></category>
		<category><![CDATA[federal guidance]]></category>
		<category><![CDATA[intellectual property protections]]></category>
		<category><![CDATA[international norms]]></category>
		<category><![CDATA[ion-trap quantum computer]]></category>
		<category><![CDATA[mission-driven portfolios]]></category>
		<category><![CDATA[multi-stakeholder governance]]></category>
		<category><![CDATA[multi-year funding]]></category>
		<category><![CDATA[National Defense Authorization Act (NDAA)]]></category>
		<category><![CDATA[national power]]></category>
		<category><![CDATA[National Quantum Initiative (NQI)]]></category>
		<category><![CDATA[national resilience]]></category>
		<category><![CDATA[Navy quantum RDT&E]]></category>
		<category><![CDATA[near-term use cases]]></category>
		<category><![CDATA[nontraditional vendors]]></category>
		<category><![CDATA[Other Transaction Authority (OTA)]]></category>
		<category><![CDATA[oversight boards]]></category>
		<category><![CDATA[pilot programs]]></category>
		<category><![CDATA[public trust]]></category>
		<category><![CDATA[public-private partnerships]]></category>
		<category><![CDATA[quantum communications]]></category>
		<category><![CDATA[quantum communications corridor]]></category>
		<category><![CDATA[quantum networking testbeds]]></category>
		<category><![CDATA[quantum-resilient communications]]></category>
		<category><![CDATA[quantum-resistant secure transmission]]></category>
		<category><![CDATA[RDT&E portfolio]]></category>
		<category><![CDATA[responsible technology use]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[stable appropriations]]></category>
		<category><![CDATA[statutory roles for key technologies]]></category>
		<category><![CDATA[strategic competitiveness]]></category>
		<category><![CDATA[streamlined oversight]]></category>
		<category><![CDATA[supply-chain monitoring]]></category>
		<category><![CDATA[supply-chain security]]></category>
		<category><![CDATA[tech–government alliances]]></category>
		<category><![CDATA[threat detection]]></category>
		<category><![CDATA[transparency]]></category>
		<category><![CDATA[Trust in government]]></category>
		<category><![CDATA[workforce opportunity]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31969</guid>

					<description><![CDATA[<p>The tech industry can increase the nation’s trust in government by becoming a reliable and visibly accountable partner for securing America’s technological edge. Specifically, the tech industry can help Congress codify critical capabilities in law and funding provisions that outlast political cycles. Doing so successfully will require long-term relationships with legislators, bipartisan support, and clear [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/beyond-the-next-administration-building-enduring-tech-government-alliances-for-national-power/">Beyond the Next Administration: Building Enduring Tech–Government Alliances for National Power</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The tech industry can increase the nation’s trust in government by becoming a reliable and visibly accountable partner for securing America’s technological edge. Specifically, the tech industry can help Congress codify critical capabilities in law and funding provisions that outlast political cycles. Doing so successfully will require long-term relationships with legislators, bipartisan support, and clear safeguards that reassure the public that powerful technologies are used in the best interest of the nation.<a href="https://www.edelman.com/trust/2025/trust-barometer">[1</a>]​</p>
<p><strong>Why Trust and Continuity Matter</strong></p>
<p>Recent trust surveys show that public confidence in both government and business has declined, with many people believing institutional leaders are not honest with them. The 2025 Edelman Trust Barometer, for example, highlights a “crisis of grievance,” in which large segments of the population feel left behind and are more inclined to distrust complex policy and technology initiatives.<a href="https://cooleypubco.com/2025/02/11/2025-edelman-trust-barometer-grievance/">[2</a>]​</p>
<p>This erosion of trust is particularly dangerous at a time when artificial intelligence, quantum technologies, and advanced biotechnologies are central to economic and military competition. A report submitted to Congress by U.S.–China policy experts emphasizes that both countries now treat these technologies as strategic industries, tying them directly to national power and long-term security.[<u>4]</u>​</p>
<p><strong>Building Durable Relationships with Legislators</strong></p>
<p>For technology companies, increasing national trust starts with treating Congress as a long‑term strategic partner, not simply as an annual budget gatekeeper.<a href="https://www.uscc.gov/sites/default/files/2024-11/2024_Annual_Report_to_Congress.pdf">[4]</a>​</p>
<ul>
<li>Institutionalize bipartisan technology engagement: Firms can create recurring, nonpartisan briefings and workshops with relevant committees to explain how artificial intelligence (AI), quantum, cyber, and bio tools affect national resilience, economic competitiveness, and workforce opportunity. By engaging members and staff from both parties, companies reduce the perception that emerging technologies are aligned with a single political faction.<a href="https://www.uscc.gov/sites/default/files/2024-11/2024_Annual_Report_to_Congress.pdf">[5]</a>​</li>
<li>Lead with ethics, safety, and security: Research on public attitudes toward AI suggests people are more supportive when they see clear safeguards, transparency, and accountability mechanisms within the tech industry. Companies can build trust by proactively presenting their AI safety frameworks, data-protection policies, and supply‑chain security measures, aligning them with federal guidance and international norms on responsible technology use.<a href="https://www.edelman.com/sites/g/files/aatuss191/files/2025-01/Global%20Top%2010%202025%20Trust%20Barometer.pdf">[6]</a>​</li>
</ul>
<p><strong>Securing Sustained Funding for Critical Technology</strong></p>
<p>Trust is reinforced when technology programs are clearly tied to enduring strategic missions and supported through stable, multi‑year funding rather than fragile pilots.<a href="https://www.uscc.gov/sites/default/files/2024-11/2024_Annual_Report_to_Congress.pdf">[5]</a>​</p>
<ul>
<li>Connect capabilities to mission portfolios: Instead of scattered line items, technology programs can be organized into mission‑driven portfolios—such as quantum‑resilient communications, AI‑enabled national preparedness, or biosecurity infrastructure—that span research, prototyping, and deployment over several years. Multi‑year authorizations and appropriations make it harder for any single administration to abruptly cancel essential capabilities.<a href="https://www.uscc.gov/sites/default/files/2024-11/Chapter_3--U.S.-China_Competition_in_Emerging_Technologies.pdf">[4]</a>​</li>
<li>Use innovation tools that protect both government and industry: Policy analyses highlight the value of mechanisms like Other Transaction Authority and structured public‑private partnerships to bring nontraditional vendors into national security and infrastructure work more quickly. By pairing these tools with clearer intellectual property protections and streamlined oversight, legislators can encourage top-tier tech firms to stay engaged in sensitive missions over the long term.<a href="https://ptacts.uspto.gov/ptacts/public-informations/petitions/1558121/download-documents?artifactId=z4DLuAiI8FBq5qxTCRlq-VPk-yx0lU4p_Mou2oSkOWL2OdIfZr8DAG4">[8]</a>​</li>
</ul>
<p><strong>Embedding Technology in Law, Not Just Budgets</strong></p>
<p>To prevent critical technologies from being swapped out with each political shift, their roles must be written into statute and tied to democratic oversight.<a href="https://www.jdsupra.com/legalnews/white-house-releases-2025-national-7517228/">[9]</a>​</p>
<ul>
<li>Statutory roles for key technologies: Laws governing defense planning, critical infrastructure, and economic security should explicitly call for the use of AI, secure digital infrastructure, and advanced analytics in defined mission areas, such as threat detection, disaster response, and supply‑chain monitoring. Once these roles are codified, dismantling them requires visible legislative action rather than quiet executive changes.<a href="https://www.jdsupra.com/legalnews/white-house-releases-2025-national-7517228/">[9]</a>​</li>
<li>Multi-stakeholder governance in legislation: Legislated advisory councils and oversight boards that include government, industry, academia, and civil society should supervise high-impact technologies and publish regular reports. This structure signals that powerful tools are subject to ongoing, pluralistic scrutiny rather than being controlled solely by political appointees or corporate executives.<a href="https://www.biotech.senate.gov/wp-content/uploads/2025/04/NSCEB-Full-Report-%E2%80%93-Digital-%E2%80%934.28.pdf">[10]</a>​</li>
</ul>
<p><strong>Quantum Networking Testbed Infrastructure</strong></p>
<p>The National Defense Authorization Act (NDAA) put forth by Congress each year does not typically use a single, generic phrase like “quantum networking testbeds” in isolation; instead, it authorizes and directs specific programs and experiments that collectively constitute quantum networking testbed infrastructure. Several provisions and related authoritative documents are especially relevant to the future of quantum technology growth.</p>
<p>A Senate Armed Services Committee fact sheet on the fiscal year 2024 NDAA highlights language that “authorizes increased funding for a distributed quantum networking testbed” and the development of a next-generation ion‑trap quantum computer at the Air Force Research Laboratory (AFRL). While the fact sheet summarizes rather than reproduces the statutory text, it makes clear that Congress explicitly authorized a distributed quantum networking testbed as part of the defense Research, Development, Test, and Evaluation (RDT&amp;E) portfolio.<a href="https://defensescoop.com/2024/01/08/ndaa-2024-quantum-provisions/">[12]</a>​</p>
<p>Within the fiscal year 2025 NDAA, Congress, “authorizes funding to create a ‘quantum communications corridor’ as part of Navy research, development, test, and evaluation.” This is an explicit description of support for a testbed or network to advance quantum communication research so the Navy and the Department of Defense (DoD) can securely transmit information resistant to quantum computer decryption.<a href="https://www.emergingtechnologiesinstitute.org/publications/insights/fy2025ndaa">[15]</a>​</p>
<p>Other recent NDAA cycles also include broader direction that reinforces these testbed authorizations, such as requirements for DoD to establish pilot programs for promising quantum computing capabilities and to identify near‑term use cases that can be fielded within two years. These provisions do not always use the word “testbed” in the operative clause, but they direct the department to stand up experimental infrastructure and pilots that, in practice, operate as quantum networking and computing testbeds for defense applications.<a href="https://www.nextgov.com/emerging-tech/2024/12/fy2025-ndaa-angles-enhance-dods-ai-and-quantum-sciences-capabilities/401545/">[16]</a>​</p>
<p>In parallel, the National Quantum Initiative framework and associated Department of Energy (DOE) efforts describe quantum networking testbeds as shared infrastructure for entanglement distribution and quantum communications, and Congressional action has repeatedly referenced these federal testbeds and network efforts as part of the broader quantum information science ecosystem that the DoD can leverage.<a href="https://www.quantum.gov/wp-content/uploads/2022/08/NQIA2018-NDAA2022-CHIPS2022.pdf">[13]</a>​</p>
<p>Ensuring key technologies not only protect the nation but are also provided with substantial investment and economic promise is a necessity for companies to further their developmental efforts. Demonstrating that quantum technologies are viable for multiple applications—within internal defense and external partnerships—is one possible solution as tech companies become increasingly concerned with the long-term payoff of their test bed programs. For now, defense authorization bills appear to be the most forward leaning avenue supported by government, but the long-term stability of this method has yet to be validated.</p>
<p><strong>How This Approach Builds Public Trust</strong></p>
<p>When the tech industry engages both parties and chambers in Congress, supports multi-year statutory programs, and accepts meaningful oversight, it demonstrates that emerging technologies are being developed within a framework of law, ethics, and long-term national interest. In such a system, citizens can see that AI, quantum computing, and other advanced capabilities are not partisan experiments or purely profit-driven ventures, but part of a durable national strategy subject to democratic control.<a href="https://www.edelman.com/news-awards/2025-edelman-trust-barometer-reveals-high-level-grievance">[2]</a>​</p>
<p>The tech sector can both strengthen U.S. strategic competitiveness and contribute tangibly to rebuilding public trust in government by positioning itself as a co-steward of national resilience, helping design governance mechanisms, committing to transparency, and working with legislators to hard‑wire critical technologies into law and funding.<a href="https://www.uscc.gov/sites/default/files/2024-11/Chapter_3--U.S.-China_Competition_in_Emerging_Technologies.pdf">[5]</a>​</p>
<p>Sources:</p>
<ol>
<li><a href="https://www.edelman.com/trust/2025/trust-barometer">https://www.edelman.com/trust/2025/trust-barometer</a></li>
<li><a href="https://cooleypubco.com/2025/02/11/2025-edelman-trust-barometer-grievance/">https://cooleypubco.com/2025/02/11/2025-edelman-trust-barometer-grievance/</a></li>
<li><a href="https://www.edelman.com/news-awards/2025-edelman-trust-barometer-reveals-high-level-grievance">https://www.edelman.com/news-awards/2025-edelman-trust-barometer-reveals-high-level-grievance</a></li>
<li><a href="https://www.uscc.gov/sites/default/files/2024-11/Chapter_3--U.S.-China_Competition_in_Emerging_Technologies.pdf">https://www.uscc.gov/sites/default/files/2024-11/Chapter_3&#8211;U.S.-China_Competition_in_Emerging_Technologies.pdf</a></li>
<li><a href="https://www.uscc.gov/sites/default/files/2024-11/2024_Annual_Report_to_Congress.pdf">https://www.uscc.gov/sites/default/files/2024-11/2024_Annual_Report_to_Congress.pdf</a></li>
<li><a href="https://www.edelman.com/sites/g/files/aatuss191/files/2025-01/Global%20Top%2010%202025%20Trust%20Barometer.pdf">https://www.edelman.com/sites/g/files/aatuss191/files/2025-01/Global%20Top%2010%202025%20Trust%20Barometer.pdf</a></li>
<li><a href="https://www.nationalsecurity.ai/chapter/executive-summary">https://www.nationalsecurity.ai/chapter/executive-summary</a></li>
<li><a href="https://ptacts.uspto.gov/ptacts/public-informations/petitions/1558121/download-documents?artifactId=z4DLuAiI8FBq5qxTCRlq-VPk-yx0lU4p_Mou2oSkOWL2OdIfZr8DAG4">https://ptacts.uspto.gov/ptacts/public-informations/petitions/1558121/download-documents?artifactId=z4DLuAiI8FBq5qxTCRlq-VPk-yx0lU4p_Mou2oSkOWL2OdIfZr8DAG4</a></li>
<li><a href="https://www.jdsupra.com/legalnews/white-house-releases-2025-national-7517228/">https://www.jdsupra.com/legalnews/white-house-releases-2025-national-7517228/</a></li>
<li><a href="https://www.biotech.senate.gov/wp-content/uploads/2025/04/NSCEB-Full-Report-%E2%80%93-Digital-%E2%80%934.28.pdf">https://www.biotech.senate.gov/wp-content/uploads/2025/04/NSCEB-Full-Report-%E2%80%93-Digital-%E2%80%934.28.pdf</a></li>
<li><a href="https://www.imd.org/ibyimd/audio-articles/restoring-faith-in-leadership-in-the-age-of-grievance/">https://www.imd.org/ibyimd/audio-articles/restoring-faith-in-leadership-in-the-age-of-grievance/</a></li>
<li><a href="https://defensescoop.com/2024/01/08/ndaa-2024-quantum-provisions/">https://defensescoop.com/2024/01/08/ndaa-2024-quantum-provisions/</a></li>
<li><a href="https://www.quantum.gov/wp-content/uploads/2022/08/NQIA2018-NDAA2022-CHIPS2022.pdf">https://www.quantum.gov/wp-content/uploads/2022/08/NQIA2018-NDAA2022-CHIPS2022.pdf</a></li>
<li><a href="https://www.quantum.gov/wp-content/uploads/2024/12/NQI-Annual-Report-FY2025.pdf">https://www.quantum.gov/wp-content/uploads/2024/12/NQI-Annual-Report-FY2025.pdf</a></li>
<li><a href="https://www.emergingtechnologiesinstitute.org/publications/insights/fy2025ndaa">https://www.emergingtechnologiesinstitute.org/publications/insights/fy2025ndaa</a></li>
<li><a href="https://www.nextgov.com/emerging-tech/2024/12/fy2025-ndaa-angles-enhance-dods-ai-and-quantum-sciences-capabilities/401545/">https://www.nextgov.com/emerging-tech/2024/12/fy2025-ndaa-angles-enhance-dods-ai-and-quantum-sciences-capabilities/401545/</a></li>
</ol>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/12/Beyond-the-Next-Administration-Building-Enduring-TechGovernment-Alliances-for-National-Power.pdf"><img decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="256" height="71" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 256px) 100vw, 256px" /></a></p>
<p><a href="https://globalsecurityreview.com/beyond-the-next-administration-building-enduring-tech-government-alliances-for-national-power/">Beyond the Next Administration: Building Enduring Tech–Government Alliances for National Power</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/beyond-the-next-administration-building-enduring-tech-government-alliances-for-national-power/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>It Is Time to Test Again</title>
		<link>https://globalsecurityreview.com/it-is-time-to-test-again/</link>
					<comments>https://globalsecurityreview.com/it-is-time-to-test-again/#respond</comments>
		
		<dc:creator><![CDATA[James Ragland&nbsp;&&nbsp;Joel Karasik]]></dc:creator>
		<pubDate>Thu, 21 Aug 2025 12:12:26 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[adversary behavior]]></category>
		<category><![CDATA[Arms Control]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[deeply buried targets]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[firing systems]]></category>
		<category><![CDATA[geopolitical developments]]></category>
		<category><![CDATA[high explosives]]></category>
		<category><![CDATA[hypersonic delivery]]></category>
		<category><![CDATA[life-extension programs]]></category>
		<category><![CDATA[Limited Test Ban Treaty]]></category>
		<category><![CDATA[low-yield test]]></category>
		<category><![CDATA[moratorium]]></category>
		<category><![CDATA[Nevada test sites]]></category>
		<category><![CDATA[new warhead designs]]></category>
		<category><![CDATA[nonproliferation norms]]></category>
		<category><![CDATA[novel nuclear systems]]></category>
		<category><![CDATA[nuclear arsenal]]></category>
		<category><![CDATA[nuclear testing]]></category>
		<category><![CDATA[nuclear-armed adversary]]></category>
		<category><![CDATA[plutonium pits]]></category>
		<category><![CDATA[policy shift]]></category>
		<category><![CDATA[radioactive containment]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[Stockpile Stewardship Program]]></category>
		<category><![CDATA[strategic behavior]]></category>
		<category><![CDATA[strategic surprise]]></category>
		<category><![CDATA[technical challenges]]></category>
		<category><![CDATA[testing infrastructure]]></category>
		<category><![CDATA[Threshold Test Ban Treaty]]></category>
		<category><![CDATA[warhead reliability]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31415</guid>

					<description><![CDATA[<p>The United States has observed a moratorium on nuclear explosive testing since 1992, relying instead on the Stockpile Stewardship Program in place of full-scale detonations to ensure the safety, security, and effectiveness of its nuclear arsenal. It is a mistake to assume that explosive testing is never needed again. The reality is that Americans live [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/it-is-time-to-test-again/">It Is Time to Test Again</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The United States has observed a moratorium on nuclear explosive testing since 1992, relying instead on the Stockpile Stewardship Program in place of full-scale detonations to ensure the safety, security, and effectiveness of its nuclear arsenal. It is a mistake to assume that explosive testing is never needed again.</p>
<p>The reality is that Americans live in an increasingly complex threat environment, and the credibility of the nuclear deterrent ultimately depends on America’s ability to respond to technical or strategic surprise. That includes being ready, if necessary, to conduct a nuclear test.</p>
<p>There are multiple and specific conditions under which the US might be compelled to resume underground nuclear testing, each involving serious strategic or technical concerns that cannot be resolved through non-explosive means as directed by the Stockpile Stewardship Program obligations.</p>
<p>From an American strategic perspective, it is possible that a future administration or Congress could determine that the long-standing moratorium on nuclear testing no longer serves American interests. For example, if credible intelligence revealed that an adversary, such as China or Russia, were conducting yield-producing tests, particularly to develop new capabilities or gain strategic advantage, then confidence in the existing deterrence balance could be undermined.</p>
<p>Adversary behavior is a factor the United States cannot ignore. China and Russia maintain active test sites and appear to be positioned to resume testing on short notice. If either nation were to conduct a low-yield test that altered the strategic balance, the US would need to respond—not necessarily by testing, but by demonstrating that it is able. Detecting and interpreting data from these tests may result in the restoration of confidence in the status quo.</p>
<p>Should a nuclear-armed adversary employ or threaten limited nuclear use, a carefully calibrated test could be used to demonstrate resolve, reassure allies, stabilize the situation, and deter further escalation. Such signaling would carry substantial diplomatic consequences and would only be contemplated under extraordinary circumstances.</p>
<p>In addition to strategic drivers that might lead to the resumption of nuclear testing, various technical issues might force America’s hand. For instance, the inability to certify the stockpile through the Stockpile Stewardship Program, such as technical issues with weapons or their components, might also be a driver to resume full-scale nuclear testing.</p>
<p>One such condition would be the emergence of significant doubt about the reliability or safety of an existing warhead type. As the stockpile ages, performance uncertainties can develop in critical components such as plutonium pits, high explosives, or firing systems. If these concerns cannot be resolved through laboratory experiments, modeling, or subcritical testing, a nuclear test might be required to validate performance or ensure safety margins. Such a step would follow a determination by the Nuclear Weapons Council and the national laboratories that non-testing alternatives are insufficient.</p>
<p>A second issue involves the development and certification of new warhead designs. While current policy emphasizes life-extension programs using legacy designs, future geopolitical or technological developments could prompt the US to pursue novel nuclear systems. For example, if the Department of Defense sought a warhead optimized for hypersonic delivery or deeply buried targets, such a design might require full-scale testing for certification—particularly if it deviates from previously tested architectures.</p>
<p>Lastly, there is also the possibility of future weapon development. While current policy focuses on life-extension programs, emerging mission needs may eventually require new designs. If those designs fall outside the range of previously tested systems, the US may have no choice but to test them to certify performance.</p>
<p>Should the United States confront a situation where confidence in warhead reliability or safety can no longer be assured through non-explosive means, or where geopolitical developments erode the credibility of deterrence, a timely and technically sound return to testing may become necessary. However, should the US resume testing for any reason, a great number of challenges will need to be met and overcome.</p>
<p>During the four decades of active nuclear explosive testing, the US developed a strong and thorough testing infrastructure and mindset. As nuclear explosive weapon technology evolved, so did the methods of executing tests and measuring the performance of devices. Facilities, mostly in Nevada, were built and staffed to provide an environment capable of supporting test activities and all the personnel required to perform the tests.</p>
<p>These tests required the expertise of scientists from multiple disciplines, engineers of various specialties, program managers, environmental control technicians, and a wide array of support staff. In addition to the technical workforce, entire teams were responsible for sustaining day-to-day life at remote test sites—providing essential services such as food, water, housing, sanitation, medical support, and logistics.</p>
<p>A rough estimate of the numbers of personnel required to execute an active testing program can be found in a 1981 Department of Energy Nevada Operations Office Newsletter. There were 240 federal employees, 7,100 contractors (laboratory and university personnel), and 11,300 southern Nevada support jobs. Unfortunately, just bringing together the wide variety of personnel needed to execute and support testing is only meeting an obvious challenge. A more subtle challenge is relearning how to keep any explosive test from eaking out of the ground and into the atmosphere.</p>
<p>A resumption of testing would still require the US to meet the obligations of two in-force international treaties; the Threshold Test Ban Treaty (TTBT), which limits the explosive yield of any test to 150 kilotons (kt), and the Limited Test Ban Treaty (LTBT), which bans all above ground and underwater tests. Compliance with the 150 kt limit on explosive yield can be easily maintained because scientists from the national laboratories can confidently ensure the magnitude of the yield will not exceed the limit.</p>
<p>Compliance with the obligations of the Limited Test Ban Treaty presents a different challenge. The cadre of scientific, engineering, and technical experts who would conduct the test are unlikely to have ever faced the challenges of nuclear testing—ensuring the energy and radioactive debris is “contained” in the underground environment.</p>
<p>The cadre of experts who last tested a nuclear weapon, almost 35 years ago, had to “learn” how to meet this unique challenge. Most likely, none of the current cadre has ever been asked to deal with such a large amount of energy released in such a small time increment. Keeping a test contained underground is a vital national interest as a leak of radioactive materials from a nuclear test would cause significant harm to the nuclear enterprise.</p>
<p>Any resumption of nuclear explosive testing would represent a fundamental policy shift with far-reaching implications. A return to testing would affect arms control dynamics, global nonproliferation norms, and the strategic behavior of both allies and adversaries. For these reasons, the threshold for testing remains extraordinarily high, but it is not absolute. Given the challenges facing the United States, dramatic change may come when least expected. A requirement to test a nuclear weapon for strategic or technical reasons may be a part of that change.</p>
<p><em>James Ragland is a Fellow at the National Institute for Deterrence Studies. Joel Karasik</em><em>is a contractor for the Defense Nuclear Weapons School.  The views expressed are their own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/08/It-Is-Time-to-Test-Again.pdf"><img decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="209" height="58" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 209px) 100vw, 209px" /></a></p>
<p><a href="https://globalsecurityreview.com/it-is-time-to-test-again/">It Is Time to Test Again</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/it-is-time-to-test-again/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Proliferation of Small Arms: Impact on Conflict Resolution</title>
		<link>https://globalsecurityreview.com/proliferation-of-small-arms-impact-on-conflict-resolution/</link>
					<comments>https://globalsecurityreview.com/proliferation-of-small-arms-impact-on-conflict-resolution/#respond</comments>
		
		<dc:creator><![CDATA[Kumail Mehdi]]></dc:creator>
		<pubDate>Tue, 01 Jul 2025 12:56:00 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Arms Control]]></category>
		<category><![CDATA[arms proliferation]]></category>
		<category><![CDATA[Arms Trade Treaty]]></category>
		<category><![CDATA[arms traffickers. ​]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[autonomy]]></category>
		<category><![CDATA[conflict resolution]]></category>
		<category><![CDATA[Dinka]]></category>
		<category><![CDATA[ethnic conflict]]></category>
		<category><![CDATA[European Union Programme of Action]]></category>
		<category><![CDATA[Firearms Protocol]]></category>
		<category><![CDATA[identity-based disputes]]></category>
		<category><![CDATA[Kurds]]></category>
		<category><![CDATA[light weapons]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[needs-based approach]]></category>
		<category><![CDATA[Nuer]]></category>
		<category><![CDATA[psychology of guns]]></category>
		<category><![CDATA[regionalism]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[Small arms]]></category>
		<category><![CDATA[smuggling routes]]></category>
		<category><![CDATA[South Sudan]]></category>
		<category><![CDATA[structural reforms]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[survival]]></category>
		<category><![CDATA[tribal conflict]]></category>
		<category><![CDATA[UNROCA]]></category>
		<category><![CDATA[violence]]></category>
		<category><![CDATA[Wassenaar Arrangement]]></category>
		<category><![CDATA[weapon detection]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31087</guid>

					<description><![CDATA[<p>Religious, ethnic, and tribal affiliations often fuel identity-based disputes. The current conflict in South Sudan is a prime example. These hostilities are deadly and challenge the ability to live in peace. What makes them nearly impossible to resolve is an unchecked arms supply. The availability of arms exacerbates the length and severity of identity-based strife. [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/proliferation-of-small-arms-impact-on-conflict-resolution/">Proliferation of Small Arms: Impact on Conflict Resolution</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Religious, ethnic, and tribal affiliations often fuel identity-based disputes. The current conflict in South Sudan is a prime example. These hostilities are deadly and challenge <a href="https://psycnet.apa.org/record/2012-33890-000">the ability to live in peace</a>. What makes them nearly impossible to resolve is an unchecked arms supply.</p>
<p>The availability of arms exacerbates the length and severity of identity-based strife. <a href="https://press.un.org/en/2021/sc14656.doc.htm">The United Nations High Representative for Disarmament Affairs</a> pointed out that the illicit transfer of small arms and light weapons undermine peace and security at the national, regional, and global levels.</p>
<p>Conflict often revolves around identity politics, where one group views another group with hatred, resulting in conflict. Violence often stems from perceptions of who is inside or outside the group, especially when survival is at stake. When a group of people attaches meaning to political and economic forces and considers compromise and disagreement unbearable, it erupts into violence, making conflict resolution a formidable challenge.</p>
<p>In this volatile situation, the presence of light arms and small weapons only worsens the situation. One of the main reasons for having guns is that they bring safety. The existing relationship between safety, survival, and weapons, especially in developing states, makes the differences deadly. <a href="https://www.nature.com/articles/s41599-019-0373-z">According to “The Psychology of Guns</a>,” the availability of weapons can drive aggressive behavior, leading to violence. In this regard, the proliferation of small arms and light weaponry needs to be checked.</p>
<p>Armed conflicts are ubiquitous, and those based on ethnic and tribal lines are often the most brutal. One estimate suggests <a href="https://ourworldindata.org/conflict-deaths-breakdown">that around 3.8 million people</a> died in such conflicts between 1989 and 2023.</p>
<p>For instance, in South Sudan, two groups, Dinka and Nuer, felt threatened by each other and launched into a violent war. It is important to understand the identity-borne roots of this dispute. Land and cattle hold significant prestige in South Sudanese society. With limited resources, achieving political power becomes a top priority.</p>
<p>In a bid to maintain political power and control over resources for one ethnic group, a <a href=".%20https:/www.cfr.org/global-conflict-tracker/conflict/civil-war-south-sudan">political conflict between two leaders</a> turned into an ethnic war, which resulted in the killing of nearly 400,000 people. It is important to note the destructive impacts of the proliferation of small arms and light weapons on the civil war in South Sudan.</p>
<p>Likewise, the ethnic unrest of the Kurds in the Middle East illustrates how the combination of small arms proliferation and ethnic grievances can burst into conflict. <a href="https://uow.edu.pk/ORIC/MDSRIC/Publications/8th%20MDSRIC-147.pdf">The struggle for autonomy</a>, a free Kurdistan, is driving a war against Türkiye, Iraq, Iran, and Syria.</p>
<p>The region has witnessed chaos, with over <a href="https://www.bbc.com/news/articles/czel3ry9x1do">40,000 deaths</a> in an insurgency against Türkiye. The presence of <a href="https://www.aljazeera.com/gallery/2017/8/29/a-dangerous-smuggling-route-across-iraq-iran-border">smuggling routes </a>across the Iran-Iraq and Türkiye -Iraq borders aids in weapon proliferation. <a href="https://www.bbc.com/news/articles/czel3ry9x1do">The recent decision</a> to lay down arms by the Kurdish insurgents in Türkiye is a welcome step towards conflict resolution. The warring parties realised the economic and human cost of the conflict.</p>
<p>Hiruni Alwishewa notes that <a href="https://academic.oup.com/jcsl/article/29/3/331/7909057">the international regime to control the proliferation of small arms exhibits serious dichotomies</a>. For example, the Firearms Protocol and the European Union’s Programme of Action lack regulatory distinction between legal arms exports and illegal transfer of arms, so even legal transfers end up as illicit ones.</p>
<p>Likewise, the <a href="https://www.wassenaar.org/about-us/">Wassenaar Arrangement</a> and the Convention on Small Arms and Light Weapons of the West African States failed to address the proliferation of small arms. It is because both agreements do not scrutinise military aid, which flows undetected, causing arms proliferation. Similarly, the Arms Trade Treaty and United Nations Register of Conventional Arms (UNROCA) lack definitional clarity between small arms and firearms, thus hampering any substantial effort to curb the proliferation of small arms.</p>
<p>In resolving identity-based conflicts, a needs-based approach is an important tool because it works to build trust. It focuses on accepting needs, based on ethnic, religious, and resource-related issues that parties in conflict believe essential to their survival. Repression and tyranny only worsen a conflict.</p>
<p>Unlike other disputes, conflicts sparked by ethnic and religious differences cannot be settled by contractual arrangements. <a href="https://erlanbakiev.weebly.com/uploads/1/0/8/3/10833829/ho-won_jeong-conflict_management_and_resolution___an_introduction-routledge_2010.pdf">They rest on bringing structural reforms that involve</a> either power redistribution or changing the political and economic systems to benefit all parties. Such efforts ensure that understanding and accepting diverse cultures run in tandem with each other.</p>
<p><a href="https://www.britannica.com/topic/new-regionalism">After the fall of the Soviet Union</a>, regionalism received significant attention in the form of trade agreements, economic integration, and increasing interdependence. Regional initiatives such as coordinating between border states to curb illicit arms transfer, strengthening national laws, and promoting transparency were useful in controlling the proliferation of small and light weapons.</p>
<p>Understandably, effectively controlling small arms is a challenging task. In this regard, significant attention must be given to improving the international structure of arms control. Theoretically, arms control agreements cover all weapons, but, practically, nuclear weapons are the primary focus. In this regard, these agreements must be revisited to fill the existing gaps. This includes removing definitional gaps and bringing military aid under scrutiny.</p>
<p>Similarly, artificial intelligence (AI) can be utilized to effectively trace and detect light weapons. AI’s utility in data analysis, detection, and surveillance makes it useful in controlling arms proliferation.</p>
<p>For example, AI-based weapon detection software combines video analysis, learning, and object recognition. This software can be used to identify and track weapons, which will be useful in controlling the proliferation of small arms.</p>
<p>In the end, the goal is to reduce needless casualties in needless conflicts. It is possible to undertake intelligent measures that deter arms traffickers from providing the weapons sowing so much death in the world today.</p>
<p><em>Kumail Mehdi is a researcher at the Center for International Strategic Studies (CISS), Islamabad</em>.</p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/07/Proliferation-of-Small-Arms-Its-Impact-on-Conflict-Resolution.pdf"><img decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="187" height="52" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 187px) 100vw, 187px" /></a></p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/proliferation-of-small-arms-impact-on-conflict-resolution/">Proliferation of Small Arms: Impact on Conflict Resolution</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/proliferation-of-small-arms-impact-on-conflict-resolution/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How Diplomacy Can Save GPS</title>
		<link>https://globalsecurityreview.com/how-diplomacy-can-save-gps/</link>
					<comments>https://globalsecurityreview.com/how-diplomacy-can-save-gps/#respond</comments>
		
		<dc:creator><![CDATA[Dana Goward]]></dc:creator>
		<pubDate>Mon, 16 Dec 2024 13:14:33 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[aircraft]]></category>
		<category><![CDATA[aviation safety]]></category>
		<category><![CDATA[Dana Goward ​]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[disruption]]></category>
		<category><![CDATA[drones]]></category>
		<category><![CDATA[electrical grids]]></category>
		<category><![CDATA[fiber cable]]></category>
		<category><![CDATA[GNSS]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[interference]]></category>
		<category><![CDATA[international diplomacy]]></category>
		<category><![CDATA[international standards]]></category>
		<category><![CDATA[ITU]]></category>
		<category><![CDATA[jamming]]></category>
		<category><![CDATA[maritime navigation]]></category>
		<category><![CDATA[navigation]]></category>
		<category><![CDATA[PNT]]></category>
		<category><![CDATA[resilient navigation]]></category>
		<category><![CDATA[resilient PNT]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[rockets]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[satellite signals]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[sovereignty]]></category>
		<category><![CDATA[spoofing]]></category>
		<category><![CDATA[technical assistance]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[telecommunications]]></category>
		<category><![CDATA[terrestrial broadcast]]></category>
		<category><![CDATA[terrestrial systems]]></category>
		<category><![CDATA[timing]]></category>
		<category><![CDATA[timing foundation]]></category>
		<category><![CDATA[transportation systems]]></category>
		<category><![CDATA[United Nations]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29615</guid>

					<description><![CDATA[<p>Imagine drones are forced to land. Rockets are deflected. Electrical grids, telecommunications, and transportation systems are degraded. Airliners are driven off course. Interference with Global Positioning System (GPS) signals is a fact of everyday life, and things are only getting worse. One example is instructive. The rate at which aircraft locations are electronically manipulated, “spoofed,” [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/how-diplomacy-can-save-gps/">How Diplomacy Can Save GPS</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Imagine drones are forced to land. Rockets are deflected. Electrical grids, telecommunications, and transportation systems are degraded. Airliners are driven off course. Interference with Global Positioning System (GPS) signals is a fact of everyday life, and things are only getting worse.</p>
<p>One example is instructive. The rate at which aircraft locations are electronically manipulated, “spoofed,” increased 500 percent in the first three quarters of 2024. An average of 1,500 flights a day were impacted by the beginning of September. In a <a href="https://ops.group/blog/gps-spoofing-final-report/">recent survey of almost 2,000 flight crew members</a>, 70 percent described their concerns about the impact on aviation safety as either “very high” or “extreme.”</p>
<p>The world depends upon signals from GPS and other global navigation satellite systems (GNSS) to underpin virtually every technology. Yet the essential positioning, navigation, and timing (PNT) service they provide is incredibly vulnerable.</p>
<p><strong>Weak and Vulnerable Signals</strong></p>
<p>These signals from space are, of necessity, very weak. The sun shining produces stronger radio signals than a GPS satellite. Yet, through a miracle of technology, receivers on earth can find coded signals in the radio noise floor, decipher them, and tell Americans where they are and the exact time.</p>
<p>Exceptionally weak signals mean that almost any interference on the right frequency can prevent them from getting through. For less than ten dollars, delivery drivers looking to electronically hide from their employers, people worried about being tracked by their spouse or the government, and bad actors wanting to disable receivers can buy a GPS “jammer” from any number of internet vendors. Such sales are illegal in most countries, as is the use of such devices. However, enforcement is almost always lax or nonexistent.</p>
<p>Keep in mind, signal specifications were made public as part of GPS becoming America’s “gift to the world,” with the US government encouraging GPS’s broad use. Other GNSS operators did the same.</p>
<p>While incredibly successful in promoting the wide adoption of signals, it has also facilitated spoofing. Compounding the problem, advances in digital technology brought inexpensive software-defined transmitters into the world. Now, for a few hundred dollars, a reasonably sophisticated hobbyist can easily imitate GPS and other satellite navigation signals.</p>
<p>The necessity of PNT services for everyday life and over-reliance on GPS/GNSS for PNT makes the vulnerability of signals to denial and imitation a primary weapon in conflicts around the globe.</p>
<p>This impacts millions of those not involved in these conflicts because any receiver within line-of-sight of the interfering transmitter can be affected. Thus, cell phone systems in Finland are degraded by drone defenses in St. Petersburg. First responders across the Middle East must use paper maps because of ongoing conflicts. Ships and aircraft, hundreds of miles from military actions, lose their navigation and collision avoidance systems. Given the number of conflicts around the planet, many regions of the world are adversely affected.</p>
<p>To date, appeals by international maritime and aviation professional organizations have failed to make an impact on the problem. The same is true for resolutions by the United Nation’s International Maritime Organization and International Civil Aviation Organization. The International Telecommunications Union (ITU), which seems to have the principal jurisdiction for this, is proving similarly ineffective.</p>
<p>At its World Radio Conference in December 2023, ITU delegates approved what, at first glance, appears to be a strong<a href="https://www.itu.int/dms_pub/itu-r/opb/act/R-ACT-WRC.16-2024-PDF-E.pdf"> resolution enjoining member states to refrain from interfering with GNSS</a> signals. The only way the resolution could pass was with an exception allowing interference “for security or defense purposes.” It is hard to imagine any other reason for which a state would disrupt signals.</p>
<p>Despite the failures of international diplomacy to mitigate this growing problem, there is likely a path for it to be much more successful. Attacks on GPS and other GNSS signals are useful only because most nations and systems over-depend on them with few alternatives.</p>
<p>Fortunately, many countries are actively considering establishing robust and resilient terrestrial PNT systems to complement signals from space. These can provide GPS-like information, but do not have common vulnerabilities and failure modes with GNSS.</p>
<p>The US Department of Transportation, the lead in America for civil PNT issues, said that intelligently using a combination of independent signals from space, terrestrial broadcast, and fiber cable can be the foundation of a resilient national PNT architecture.</p>
<p>Establishing such a system of systems will not make the services invulnerable. However, it will make them hard enough to disrupt so that antagonists will look elsewhere for opportunities to create mischief. Some nations are already taking significant steps toward achieving such resilience.</p>
<p>South Korea and Saudi Arabia field high-power terrestrial systems that provide PNT. The United Kingdom fields a partial system and seems poised to expand it, as well as a deployable capability. Much of Russia is also served by such a system.</p>
<p>China has the world’s most complete and advanced resilient PNT architecture. It includes three constellations of satellites in different orbital planes, an extensive terrestrial broadcast system, and a 20,000-kilometer fiber timing network with 295 “timing stations.”</p>
<p>Yet much of the world remains vulnerable to disruption. Those who interfere are therefore incentivized.</p>
<p>International diplomacy, in the form of the United Nations, can help improve the inevitable transition to resilient PNT by encouraging states to implement sovereign terrestrial systems. These systems will complement and cooperate with GNSS, while also operating independently.</p>
<p>As part of this effort, international standards can be developed to ensure aircraft, ships, and vehicles are able to seamlessly transit between nations. Technical assistance can be provided to nations with little local expertise in the field.</p>
<p>These efforts will greatly reduce the incentive to interfere with GNSS, thereby making it safer and more reliable. It will also reinforce the sovereignty and security of every involved nation.</p>
<p>The alternative is to continue down the path of increasing interference and increasing risk to life and property. Safety margins are already impacted. Ships are already colliding, and passenger aircraft are nearly straying, unannounced, into hostile airspace, all because of spoofing. It is only a matter of time before the world witnesses an avoidable tragedy.</p>
<p>The international community, perhaps in the form of a United Nations task force, must intervene to protect these fragile signals from space and disincentivize future disruptions.</p>
<p>Safer and more reliable signals from space and resilient sovereign terrestrial PNT are in the long-term interest of every nation. Diplomatic efforts must illuminate that shared interest bring parties together and nurture progress for everyone’s benefit.</p>
<p><em>Dana A. Goward is President of the Resilient Navigation and Timing Foundation, www.RNTFnd.org, an educational and scientific charity. He is a member of the president’s National Space-based Positioning, Navigation, and Timing Advisory Board and formerly served as the maritime navigation authority for the United States. Views expressed in this article are the author&#8217;s own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/12/How-Diplomacy-Can-Save-GPS.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-28926 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/how-diplomacy-can-save-gps/">How Diplomacy Can Save GPS</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/how-diplomacy-can-save-gps/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
