<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Topic:technology &#8212; Global Security Review %</title>
	<atom:link href="https://globalsecurityreview.com/subject/technology/feed/" rel="self" type="application/rss+xml" />
	<link>https://globalsecurityreview.com/subject/technology/</link>
	<description>A division of the National Institute for Deterrence Studies (NIDS)</description>
	<lastBuildDate>Tue, 24 Feb 2026 11:40:24 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://globalsecurityreview.com/wp-content/uploads/2023/10/cropped-GSR-Banner-LogoV2-32x32.png</url>
	<title>Topic:technology &#8212; Global Security Review %</title>
	<link>https://globalsecurityreview.com/subject/technology/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Seizing the High Ground: The Case for U.S. Leadership in Space Mining</title>
		<link>https://globalsecurityreview.com/seizing-the-high-ground-the-case-for-u-s-leadership-in-space-mining/</link>
					<comments>https://globalsecurityreview.com/seizing-the-high-ground-the-case-for-u-s-leadership-in-space-mining/#respond</comments>
		
		<dc:creator><![CDATA[Rachel Butler]]></dc:creator>
		<pubDate>Tue, 24 Feb 2026 13:30:10 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Economics & Trade]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Government & Politics]]></category>
		<category><![CDATA[Space Deterrence & Conflict]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Artemis Accords]]></category>
		<category><![CDATA[asteroid]]></category>
		<category><![CDATA[capabilities]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[competition]]></category>
		<category><![CDATA[development]]></category>
		<category><![CDATA[economic]]></category>
		<category><![CDATA[Energy]]></category>
		<category><![CDATA[extraction]]></category>
		<category><![CDATA[framework ​]]></category>
		<category><![CDATA[geopolitical]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[intellectual property]]></category>
		<category><![CDATA[Leadership]]></category>
		<category><![CDATA[lunar]]></category>
		<category><![CDATA[mining]]></category>
		<category><![CDATA[NASA]]></category>
		<category><![CDATA[outer space treaty]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[R&D]]></category>
		<category><![CDATA[research]]></category>
		<category><![CDATA[resources]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Space]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[U.S.]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32356</guid>

					<description><![CDATA[<p>Since the Cold War, space has served as a powerful symbol of American identity. It is an arena where national pride, technological daring, and the spirit of exploration converge. It has embodied the same frontier ethos that once drove the settling of the West, while simultaneously showcasing the unity and resolve that defined U.S. competition [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/seizing-the-high-ground-the-case-for-u-s-leadership-in-space-mining/">Seizing the High Ground: The Case for U.S. Leadership in Space Mining</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Since the Cold War, space has served as a powerful symbol of American identity. It is an arena where national pride, technological daring, and the spirit of exploration converge. It has embodied the same frontier ethos that once drove the settling of the West, while simultaneously showcasing the unity and resolve that defined U.S. competition against rival powers. Yet as space becomes increasingly contested, that legacy of exploration and resolve must now address a new challenge: the rise of space mining.</p>
<p>Advances in space technology are making the extraction of lunar and asteroid materials increasingly feasible. These capabilities promise the potential for significant economic gains, greater energy security, and new avenues of geopolitical influence for any spacefaring nation capable of developing and sustaining resource-extraction operations. As competition accelerates, the question is no longer whether space mining will occur, but who will shape the rules, norms, and capabilities that govern it.</p>
<p>To preserve American power in space, the United States must take formative policy action and protective research and development (R&amp;D) measures to define the future of space mining before rival nations do. Building on the strategic momentum established in the space domain during the first Trump Administration, namely the creation of the U.S. Space Force, securing an early foothold in space mining will help counter adversarial efforts to undermine American leadership and preserve space as a key frontier for American power.</p>
<p><strong>Formative Policy Action in Space Mining</strong></p>
<p>In emerging domains, the first actors often leave a legacy that serves as a reference point for subsequent laws and behavior, such as the <a href="https://www.unoosa.org/oosa/en/ourwork/spacelaw/treaties/introouterspacetreaty.html">Outer Space Treaty (OST) of 1967</a>. During the Cold War, the U.S. and the Soviet Union pushed outer space beyond its initial symbolic and scientific uses. Concerns over nuclear escalation prompted the creation of a legal framework that addressed non-weaponization and restrictions on national sovereignty. Despite approaching its 60th anniversary, the OST remains a foundational pillar of outer space governance, demonstrating how proactive U.S. leadership defined the rules of engagement and established operational precedents in an emerging domain. Sustaining this proactive approach is critical if the U.S. is to seize the strategic opportunities in outer space.</p>
<p>Space mining is among the more recent technical opportunities to emerge, alongside <a href="https://www.lockheedmartin.com/en-us/news/features/2024/space-technology-trends-2025.html.">satellite constellations, orbital maneuvering, and AI-enabled platforms</a>. Yet space mining is unique in that it offers potential energy security and trillions of dollars in economic value to those possessing return-to-Earth capabilities (currently limited, forcing a focus on <a href="https://www.nasa.gov/overview-in-situ-resource-utilization/">in-situ resource utilization</a> (ISR) for propulsion and life support). According to <a href="https://hir.harvard.edu/economics-of-the-stars/">NASA’s Asterank database</a>, extracting resources from the ten most cost-effective asteroids could yield profits exceeding $1.5 trillion. The promise of energy resilience and economic gain has captured the attention of global powers and middle-state actors alike, leading to a growing number of spacefaring nations and sparking geopolitical friction.</p>
<p>The <a href="https://www.congress.gov/bill/114th-congress/house-bill/2262">U.S.</a> and <a href="https://space-agency.public.lu/en/agency/legal-framework/law_space_resources_english_translation.html.">Luxembourg</a> were among the first to formalize space mining in their legal frameworks, recognizing outer space resources as property subject to ownership and commercial trade. Conversely, Russia cites the Outer Space Treaty’s designation of space as the <a href="https://www.unoosa.org/oosa/en/ourwork/spacelaw/treaties/introouterspacetreaty.html">“province of all mankind”</a> as a basis for prohibiting resource extraction and ownership. In response to the Trump Administration’s proposed lunar mining initiatives, Russian officials went so far as to accuse the U.S. of orchestrating an “<a href="https://theweek.com/106954/russia-accuses-us-of-moon-invasion">invasion</a>” of the Moon, likening it to “<a href="https://theweek.com/106954/russia-accuses-us-of-moon-invasion">another Afghanistan or Iraq</a>.” Russia&#8217;s actions, however, contrast sharply with its public stance, given its willingness to explore an <a href="https://www.reuters.com/article/technology/russia-wants-to-join-luxembourg-in-space-mining-idUSKCN1QN1OQ/">agreement on space mining with Luxembourg in 2019</a>.</p>
<p>Yet American space mining laws have been relatively insulated from further international criticism because they align with formative international frameworks. For example, the <a href="https://www.congress.gov/bill/114th-congress/house-bill/2262">U.S. Commercial Space Launch Competitiveness Act of 2015</a> reflects <a href="https://www.unoosa.org/pdf/publications/STSPACE11E.pdf">Article II</a> of the OST, which prohibits national appropriation of celestial bodies. Additionally, the <a href="https://trumpwhitehouse.archives.gov/wp-content/uploads/2020/12/National-Space-Policy.pdf">2020 National Space Policy</a> aligns with the <a href="https://www.nasa.gov/wp-content/uploads/2022/11/Artemis-Accords-signed-13Oct2020.pdf?emrc=695ad3f569640">Artemis Accords</a> by emphasizing transparency in national space policies and space exploration plans, as well as the sharing of scientific information. The legitimacy of U.S. legal principles has been strengthened by demonstrating its commitment to sharing the space domain as a collaborative partner while advancing its own interests and strategic advantages.</p>
<p>Critical questions about access to mining sites, extraction limits, and fair participation remain unanswered because frameworks such as the OST predate the concept of space mining. Addressing these questions and providing certainty before capabilities mature or competing nations establish their own frameworks is essential to preserving a U.S. strategic advantage in space.</p>
<p><strong>Protective R&amp;D Measures for Space Mining Capabilities </strong></p>
<p>As the future of space mining and its economic potential threaten to catalyze geopolitical tensions, it is crucial for the U.S. not only to be among the first to establish governance frameworks but also to develop tangible space mining capabilities. Yet space is no longer a domain of uncontested U.S. dominance, as China has evolved from a near-peer to a peer competitor. Initiatives such as the Tiangong Space Station and the International Lunar Research Station underscore <a href="https://www.space.com/the-universe/moon/chinas-change-6-lunar-samples-suggest-our-moon-is-debris-from-an-ancient-giant-earth-impact">China&#8217;s growing space capabilities</a> and its ambitions to assume a leadership role.</p>
<p>China’s rapid rise may be attributed in part to its exposure to U.S. space technologies, as bilateral cooperation agreements have provided avenues for interaction with U.S. research and development efforts. Despite the <a href="https://www.congress.gov/112/plaws/publ10/PLAW-112publ10.htm">Wolf Amendment</a>, which prohibits bilateral cooperation with China without explicit authorization from Congress and the FBI, numerous violations of the provision have likely conferred strategic benefits on China, eroding the competitive edge the U.S. seeks to maintain. In 2024, the Office of the Inspector General investigated a state <a href="https://oig.nasa.gov/news/nasa-investigators-safeguard-scientific-integrity-by-exposing-university-grant-fraud/">University for violations of the Wolf Amendment</a> and announced in December that the University <a href="https://www.justice.gov/usao-de/pr/university-delaware-failed-disclose-professors-foreign-government-ties">agreed to pay $715,580</a> to resolve civil allegations. When applying for and receiving NASA research grants, the University failed to disclose a professor’s affiliations with and support from the Chinese government. Similarly, according to <a href="https://selectcommitteeontheccp.house.gov/sites/evo-subsites/selectcommitteeontheccp.house.gov/files/evo-media-document/Appendix%20B.pdf">a report</a> published by the Select Committee on the Strategic Competition Between the U.S. and the Chinese Communist Party (CCP), hundreds of articles crediting NASA funding were identified that were jointly published by U.S. researchers (including public universities and federal research entities) and CCP institutions. In early February 2026, <a href="https://www.justice.gov/usao-sdtx/pr/texas-university-pays-resolve-claims-it-defrauded-grant-program">the University of Texas at San Antonio agreed to pay nearly $130,000 in penalties</a> after federal investigators alleged that the lead principal investigator for a NASA-funded Center for Advanced Measurements in Extreme Environments failed to disclose affiliations with researchers in China.</p>
<p><a href="https://saisreview.sais.jhu.edu/how-chinas-political-system-discourages-innovation-and-encourages-ip-theft/">China’s sustained intellectual property theft </a>is eroding U.S. dominance in space and diminishing the impact of formative U.S. space mining policy measures. Prioritizing R&amp;D for space mining, particularly return-to-Earth capabilities, is a central focus for spacefaring nations and must be a priority for the United States. However, R&amp;D initiatives must be paired with enforceable oversight structures that protect intellectual property from adversarial appropriation. Enforcement entities should also demonstrate a clear commitment to implementing protective measures and punishing violators. Without such protections, any research investments risk benefiting adversarial states as much as the U.S., as evidenced by instances in which China has capitalized on U.S.-funded advancements.</p>
<p><strong>Conclusion </strong></p>
<p>Although the U.S. is facing increasing demands across emerging warfighting domains, with numerous competing national security concerns, space resource governance and capability development can no longer be sidelined. The U.S. must act decisively and with strategic clarity to build the legal and behavioral foundations for space mining, and to enact protections for space mining R&amp;D, as competitors advance their own initiatives. Space mining has become a strategic imperative, one that this Administration must seize to ensure that American values, interests, and leadership define this emerging domain, resource governance and capability development resource governance and capability development.</p>
<p><em>Rachel Butler is a doctoral student in the Department of Defense and Strategic Studies at Missouri State University. She holds master’s degrees in history and strategic studies, with research interests focused on ethical and cognitive warfare. Views expressed in this article are the author&#8217;s own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/02/Seizing-the-High-Ground-The-Case-for-U.S.-Leadership-in-Space-Mining2.pdf"><img decoding="async" class="alignnone wp-image-32091" src="http://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png" alt="" width="212" height="59" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button-300x83.png 300w" sizes="(max-width: 212px) 100vw, 212px" /></a></p>
<p><a href="https://globalsecurityreview.com/seizing-the-high-ground-the-case-for-u-s-leadership-in-space-mining/">Seizing the High Ground: The Case for U.S. Leadership in Space Mining</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/seizing-the-high-ground-the-case-for-u-s-leadership-in-space-mining/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ghosts in the Skies: How Ukraine’s Drone Tactics Recast Modern Deterrence</title>
		<link>https://globalsecurityreview.com/ghosts-in-the-skies-how-ukraines-drone-tactics-recast-modern-deterrence/</link>
					<comments>https://globalsecurityreview.com/ghosts-in-the-skies-how-ukraines-drone-tactics-recast-modern-deterrence/#comments</comments>
		
		<dc:creator><![CDATA[Brandon Toliver]]></dc:creator>
		<pubDate>Tue, 24 Jun 2025 12:35:23 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[autonomous systems]]></category>
		<category><![CDATA[Defense Spending]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[drones]]></category>
		<category><![CDATA[escalation]]></category>
		<category><![CDATA[escalation management]]></category>
		<category><![CDATA[global security]]></category>
		<category><![CDATA[homeland defense]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[Military Strategy]]></category>
		<category><![CDATA[multidomain conflicts]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[non-nuclear options]]></category>
		<category><![CDATA[nuclear strategy]]></category>
		<category><![CDATA[precision strikes]]></category>
		<category><![CDATA[signaling frameworks]]></category>
		<category><![CDATA[strategic agility]]></category>
		<category><![CDATA[strategic impact]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[warfare]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31040</guid>

					<description><![CDATA[<p>What happens to nuclear deterrence when a non-nuclear state strikes deep into a nuclear-armed adversary? The stark reality is that the world does not collapse, but the era of conventional deterrence is rapidly evolving. Ukraine’s long-range drone strikes, penetrating deep into Russian territory, upended traditional deterrence theory. These unmanned and precision attacks targeted strategic locations, [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/ghosts-in-the-skies-how-ukraines-drone-tactics-recast-modern-deterrence/">Ghosts in the Skies: How Ukraine’s Drone Tactics Recast Modern Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>What happens to nuclear deterrence when a non-nuclear state strikes deep into a nuclear-armed adversary? The stark reality is that the world does not collapse, but the era of conventional deterrence is rapidly evolving. <a href="https://copilot.microsoft.com/chats/sF4qQ3JxwBAucoaty1PUV#:~:text=Ukraine%E2%80%99s%20Drone%20Ecosystem%20and%20the%20Defence%20of%20Europe%E2%80%9D">Ukraine’s long-range drone strikes</a>, penetrating deep into Russian territory, upended traditional deterrence theory.</p>
<p>These unmanned and precision attacks targeted strategic locations, ranging from early warning radar sites to critical military installations. They did not provoke the feared nuclear response. Instead, these operations exposed a new threat calculus where persistence, precision, and the power of perception are paramount.</p>
<p>Recent analyses suggest that such <a href="https://researchcentre.army.gov.au/sites/default/files/241022-Occasional-Paper-29-Lessons-Learnt-from-Ukraine_2.pdf">drone operations</a> contributed to shifting risk assessments within adversary states, where even a 10 percent to 15 percent error in perception could lead to miscalculation. American nuclear strategists now contend with an urgent need to rethink deterrence as the boundary between conventional and nuclear erodes.</p>
<p><strong>Spectral Shifts: Rethinking Strategic Assumptions</strong></p>
<p>For decades, American nuclear strategy hinged on the assumption that any conventional attack on nuclear command and control assets would inevitably trigger a nuclear counter-response. Data from Cold War–era exercises and subsequent real-world incidents reinforced this mindset among defense planners. Ukraine’s repeated drone strikes on sensitive Russian assets, including radar installations integral to Russia’s early warning systems, force a <a href="https://doi.org/10.1162/isec_a_00320">reconsideration of long-held assumptions</a>.</p>
<p>The Kremlin’s response is notably restrained, treating these incursions as manageable costs rather than triggers for nuclear escalation. This strategic restraint, observed in multiple public and classified communications from Moscow, signals that deterrence may now rely less on the brute force of nuclear capability and more on the sophistication of targeting and intent. The takeaway for modern policymakers is that deterrence must now incorporate a broader array of factors, including technology-driven precision and the adversary’s threshold for escalation.</p>
<p><strong>Phantom Impact: Redefining Strategy Beyond Nuclear Might</strong></p>
<p>The era when the primary measure of strategic impact was synonymous with nuclear firepower is ending. Ukraine’s innovative use of low-cost, high-precision drones demonstrates that small platforms can disrupt traditional security calculations. Recent reports from defense think tanks estimate that the unit cost of drone operations is less than 1 percent of what a conventional fighter aircraft mission might cost, yet their operational impact in terms of intelligence and tactical disruption is comparable in key areas.</p>
<p>These drones infiltrate deep into adversary territory and strike high-value military and economic assets once presumed invulnerable. Such operational dynamics challenge the long-standing monopoly of nuclear-armed states over credible homeland threats. American planners must now <a href="https://copilot.microsoft.com/chats/sF4qQ3JxwBAucoaty1PUV#:~:text=The%20Implications%20of%20Drone%20Proliferation%20for%20US%20Grand%20Strategy%E2%80%9D">recalibrate</a> their threat models to integrate non-nuclear options, recognizing that the future of strategic impact is both more economical and more technologically complex than ever before.</p>
<p><strong>Haunted Homelands: The Crumbling Illusion of Sanctuary</strong></p>
<p>During the Cold War, vast distances, natural barriers, and the geographic isolation provided by oceans created the comforting illusion that major powers could enjoy an impenetrable sanctuary. Today, that illusion is crumbling. Ukraine’s drone operations are a vivid demonstration that even regions thought to be well-protected can be penetrated. Attacks targeting Russia’s early warning networks, critical oil infrastructure, and military bases reveal that no area can rest on its laurels.</p>
<p>American infrastructure, ranging from energy grids to communication systems and early warning radars, face elevated risks in an age of highly agile autonomous systems. Consider that the global market for unmanned aerial vehicles is projected to reach nearly $50 billion by 2030. Considering this, there is an immediate imperative to overhaul homeland defense strategies. Rapid response protocols, increased situational awareness, and investment in counter-drone technologies are no longer optional. They are emerging as essential components of modern deterrence.</p>
<p><strong>Phantom Signals: How Optics and Intent Drive Escalation</strong></p>
<p>One of the most remarkable aspects of Ukraine’s campaign is its ability to secure tactical advantages without spiraling into uncontrolled escalation. The success of these drone strikes lies in their careful timing, precision, and measured execution. Ukrainian forces consistently space out operations and meticulously choose targets that convey national resolve without risking mass casualties. This dual messaging, delivering a tangible operational effect while sending a clear political signal, underscores a critical evolution in deterrence thinking.</p>
<p>Today, the optics and perceived intent behind an action can be as decisive as the physical impact. One analysis points out that misinterpretations of strategic intent now pose as much risk of inadvertent escalation as traditional force-on-force scenarios. For the United States, this means that <a href="https://copilot.microsoft.com/chats/sF4qQ3JxwBAucoaty1PUV#:~:text=%E2%80%9CDefending%20U.S.%20Military%20Bases%20Against%20Drones%3F%20A%20Recent%20Tabletop%20Exercise%20Explores%20How%E2%80%9D">developing clear, well-articulated signaling frameworks</a> is crucial. Such frameworks must enable policymakers and military leaders to assert credible force while avoiding actions that might be misread as provocative by adversaries. In a world where every action is scrutinized and the margins for error are thinning, clarity in communication becomes a cornerstone of modern deterrence.</p>
<p><strong>Ghosts in the Arsenal: Integrating Drones into Deterrence</strong></p>
<p>Drones are transcending their traditional role on the battlefield and are emerging as indispensable strategic assets. Modern unmanned systems serve multiple roles, from surveillance and intelligence gathering to direct precision strikes against key targets. Their integration is revolutionizing how <a href="https://www.rand.org/pubs/research_reports/RRA2215-1.html">military operations</a> are conducted without risking human life. Moreover, these systems have the added benefit of being less politically charged than manned strike platforms. However, their growing prominence also introduces the potential for miscalculation.</p>
<p>With investments in drone technology doubling over the past decade in many leading militaries, the United States must swiftly incorporate these assets into its overarching deterrence framework. This requires the formulation of robust policies that define the operational limits and acceptable contexts for drone employment, comprehensive training programs for commanders in escalation management, and public messaging that reinforces strategic resolve without escalating tensions. The rapid pace of technological adoption means that the window for effective integration is short, and strategic agility is paramount.</p>
<p><strong>Phantoms of the Future: Recasting Deterrence in the Drone Age</strong></p>
<p>Retaining U.S. strategic credibility in the coming decades will demand an evolution beyond a <a href="https://csbaonline.org/research/publications/extending-deterrence-by-detection-the-case-for-integrating-unmanned-aircraft-systems-into-the-indo-pacific-partnership-for-maritime-domain-awareness">deterrence model</a> solely anchored in nuclear might. Although nuclear forces remain critical, they are no longer the exclusive instruments that shape adversary behavior in today’s multidomain conflicts. The future of deterrence depends on a seamless strategy where nuclear and non-nuclear capabilities are coherently integrated. This entails developing a comprehensive national doctrine for drone utilization that explicitly defines clear thresholds for action, acceptable target sets, and robust escalation-management protocols. In parallel, efforts must focus on modernizing homeland defenses to counter the threat of long-range, autonomous drone attacks, especially in sectors such as space-based assets, energy, and telecommunications. Data from defense budget analyses show that if every NATO member met the 2 percent gross domestic product defense spending target, the alliance’s budget would increase by over $100 billion annually. Such investments, along with analogous U.S. initiatives to enhance technological resilience, are crucial if deterrence is to remain credible and effective in this <a href="https://www.academia.edu/41364115/Artificial_Intelligence_Drone_Swarming_and_Escalation_Risks_in_Future_Warfare">new operational environment</a>.</p>
<p><strong>Final Haunting: Embracing the Ghostly Evolution of Deterrence</strong></p>
<p>“Ghosts in the Skies” is not just a metaphor; it encapsulates the profound transformation underway in <a href="https://c2coe.org/seminar-read-ahead-hybrid-warfare-operating-on-multi-domain-battlefields/">modern deterrence</a>. Ukraine’s innovative use of drone technology is forcefully redefining the conventional wisdom that has long informed global security policy. This paradigm shift challenges entrenched assumptions and demands a rapid evolution of U.S. military strategy. In an era of hybrid threats and rapid technological change, our global security environment is more complex and interdependent than ever before. The future of deterrence will rely on the capacity to adapt swiftly, integrate non-linear threat responses, and build flexible defense systems that are as agile as the adversaries they are designed to deter. The message for policymakers is clear: embrace this ghostly evolution now, for in the emerging multidomain battlefield every misstep carries the risk of destabilizing not only regional security but also global order.</p>
<p>The transformation in deterrence prompted by Ukraine’s drone operations is a stark reminder that innovation in warfare can render old paradigms obsolete. As nations invest in cost-effective, high-precision autonomous systems, the calculus of deterrence will continue to shift, compelling the United States and its allies to rethink both doctrine and defense spending. In this new era, where even the faintest ghost can upend strategic balance, the ability to adapt and respond with agility will be the true measure of national security.</p>
<p><em>Brandon Toliver, PhD, serves on the A4 staff of Headquarters Air Force. The views expressed are those of the author alone.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/06/Ghosts-in-the-Skies.pdf"><img decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="248" height="69" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 248px) 100vw, 248px" /></a></p>
<p><a href="https://globalsecurityreview.com/ghosts-in-the-skies-how-ukraines-drone-tactics-recast-modern-deterrence/">Ghosts in the Skies: How Ukraine’s Drone Tactics Recast Modern Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/ghosts-in-the-skies-how-ukraines-drone-tactics-recast-modern-deterrence/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
		<item>
		<title>The 5GW Playbook: Silent Wars and Invisible Battlefields</title>
		<link>https://globalsecurityreview.com/the-5gw-playbook-silent-wars-and-invisible-battlefields/</link>
					<comments>https://globalsecurityreview.com/the-5gw-playbook-silent-wars-and-invisible-battlefields/#respond</comments>
		
		<dc:creator><![CDATA[Syeda Fizzah Shuja]]></dc:creator>
		<pubDate>Mon, 19 May 2025 12:06:36 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[5GW]]></category>
		<category><![CDATA[5th-generation warfare]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[Alouk water station]]></category>
		<category><![CDATA[ambition]]></category>
		<category><![CDATA[anti-satellite weapons]]></category>
		<category><![CDATA[ASAT]]></category>
		<category><![CDATA[autonomous drone strike]]></category>
		<category><![CDATA[Beijing]]></category>
		<category><![CDATA[Berlin Wall]]></category>
		<category><![CDATA[biological warfare]]></category>
		<category><![CDATA[Bollywood]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[CIPS]]></category>
		<category><![CDATA[cold war]]></category>
		<category><![CDATA[cyber networks]]></category>
		<category><![CDATA[cyber sabotage]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[deepfake propaganda]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[drought]]></category>
		<category><![CDATA[economic coercion]]></category>
		<category><![CDATA[economic manipulation]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[false news]]></category>
		<category><![CDATA[finance]]></category>
		<category><![CDATA[financial system]]></category>
		<category><![CDATA[food control]]></category>
		<category><![CDATA[Hollywood]]></category>
		<category><![CDATA[Huawei]]></category>
		<category><![CDATA[hybrid influence operations]]></category>
		<category><![CDATA[Hybrid Warfare]]></category>
		<category><![CDATA[information dominance]]></category>
		<category><![CDATA[K-pop]]></category>
		<category><![CDATA[Libya]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[manipulation]]></category>
		<category><![CDATA[maritime terrorism. ​]]></category>
		<category><![CDATA[military satellite market]]></category>
		<category><![CDATA[narratives]]></category>
		<category><![CDATA[One China Policy]]></category>
		<category><![CDATA[Palau]]></category>
		<category><![CDATA[pentagon]]></category>
		<category><![CDATA[perception battle]]></category>
		<category><![CDATA[quantum computing]]></category>
		<category><![CDATA[Ren Zhengfei]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[sabotage]]></category>
		<category><![CDATA[seabed]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[South Korea]]></category>
		<category><![CDATA[space dominance]]></category>
		<category><![CDATA[subsea communication cables]]></category>
		<category><![CDATA[SWIFT banking system]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[telecom networks]]></category>
		<category><![CDATA[THAAD missile defense system]]></category>
		<category><![CDATA[US dollar]]></category>
		<category><![CDATA[US sanctions]]></category>
		<category><![CDATA[Venezuela]]></category>
		<category><![CDATA[water scarcity]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30754</guid>

					<description><![CDATA[<p>War no longer announces itself with the roar of fighter jets or the march of soldiers. It now lurks in the shadows where the front line is undefined. The recent sabotage of Estlink 2 power cables, disruptions to Taiwan’s undersea communication lines, and the increasing presence of unidentified commercial vessels near critical infrastructure are signs [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-5gw-playbook-silent-wars-and-invisible-battlefields/">The 5GW Playbook: Silent Wars and Invisible Battlefields</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>War no longer announces itself with the roar of fighter jets or the march of soldiers. It now lurks in the shadows where the front line is undefined. </strong>The recent sabotage of <strong>Estlink 2 power cables</strong>, disruptions to <strong>Taiwan’s undersea communication lines</strong>, and the increasing presence of <strong>unidentified commercial vessels near critical infrastructure</strong> are <a href="https://www.dailysabah.com/opinion/op-ed/beneath-the-surface-the-strategic-implications-of-seabed-warfare">signs</a> <strong>of 5th-generation warfare (5GW). Moreover, a high spike in emerging incidents like Russian hybrid tactics in Europe, artificial intelligence (AI)-powered cyberattacks on maritime infrastructure, and the weaponization of social media for disinformation</strong> suggests the evolving nature of contemporary warfare.</p>
<p><a href="https://moderndiplomacy.eu/2024/11/25/5th-generation-war-a-war-without-borders-and-its-impact-on-global-security/">5GW</a><strong> includes </strong>information dominance and manipulation, social engineering, economic coercion, cyber sabotage, and hybrid influence operations. It thrives on ambiguity, exploiting vulnerabilities without traditional combat. In 5GW, the lines between war and peace are blurred. No declarations, no clear enemies, just a relentless assault on stability. The goal is not to conquer land or destroy armies, but to cripple a nation’s spirit, economy, and infrastructure from within.</p>
<p>One of the most potent asymmetric tools of 5GW is economic manipulation. <a href="https://www.fdd.org/analysis/2024/11/02/palau-is-under-attack-from-prc/">Palau</a>, a serene archipelago of over <strong>500 islands</strong>, were untouched by war <strong>until 2017.</strong> Palau dared to reject <strong>Beijing’s “One China Policy.”</strong> This move sent shockwaves through its fragile economy in the form of economic strangulation. In a masterstroke of economic coercion, <strong>China’s state-backed tour operators erased Palau from the Web.</strong></p>
<p>Travel agencies stopped selling trips. Online searches yielded no results. <strong>Palau’s tourism industry, which accounted for </strong><a href="https://www.theguardian.com/global-development/2018/sep/08/palau-against-china-the-tiny-island-defying-the-worlds-biggest-country">45 percent of gross domestic product</a> (GDP)<strong>, collapsed.</strong> Hotels emptied, airlines shut down, and the once-thriving economy suffocated.</p>
<p>This was not an anomaly, but a pattern<strong>.</strong> In <strong>2016, South Korea agreed to facilitate the American </strong><a href="https://www.theguardian.com/world/2016/jul/08/south-korea-and-us-agree-to-deploy-thaad-missile-defence-system">THAAD missile defense system</a><strong>.</strong> China retaliated not with weapons but with <strong>economic muscle.</strong> Mysterious “fire and safety” violations suddenly appeared in South Korean businesses across China. <strong>A </strong><a href="https://www.forbes.com/sites/augustrick/2017/12/21/how-beijing-played-hardball-with-south-korea-using-the-2018-olympic-ticket-sales/">nine-month ban</a><strong> on Chinese tourism cost Seoul $6.5 billion.</strong> <strong>Retail giants like Lotte crumbled, thousands lost jobs, and yet, no war was declared.</strong></p>
<p>The more interconnected the world economy becomes, <strong>the more vulnerable nations are to economic blackmail.</strong> Even <strong>Venezuela, despite its fiery anti-American rhetoric,</strong> was bound to the US economy. In 2018, despite Washington branding <strong>Nicolás Maduro a dictator</strong> and Caracas calling the US a <strong>“white supremacist regime,”</strong> the two nations still had <strong>$24 billion in trade, </strong>a quarter of <a href="https://www.aljazeera.com/economy/2018/9/13/venezuelas-crisis-in-numbers">Venezuela’s GDP</a>.</p>
<p>Yet, when Washington imposed <strong>sweeping financial sanctions,</strong> Venezuela’s <a href="https://www.wsj.com/articles/the-tragedy-of-venezuela-1527177202">economy shrunk</a><strong> by 35 percent in a single year.</strong> After all, the United States does not just impose sanctions; <strong>it controls the very financial system that runs the world.</strong> The US dollar is the bloodline of global trade, and those who defy it <strong>find themselves cut off from international markets, unable to access capital or even conduct basic transactions. However, </strong>economic warfare breeds resistance.</p>
<p><strong>Russia and China saw the writing on the wall.</strong> Between 2017 and 2020, <strong>Moscow </strong><a href="https://www.rferl.org/a/russia-cuts-holdings-us-bonds-may-end-dollar-payments/29429653.html">slashed its holdings</a><strong> of US Treasury securities from $105 billion to just $3.8 billion</strong> and shifted towards China’s <strong>Cross-Border Interbank Payment System (</strong><a href="https://www.cnas.org/publications/commentary/why-chinas-cips-matters-and-not-for-the-reasons-you-think">CIPS</a><strong>),</strong> sidestepping American financial hegemony.</p>
<p>The true <strong>commanding heights of global dominance</strong> lie at the intersection of <strong>technology, finance, and unchecked ambition. China is not just selling 5G networks, it is embedding itself into the nervous system of global communication. On the other hand, the US does not just dominate finance, it controls the SWIFT banking system, ensuring economic warfare is just a sanction away. Similarly, corporations do not just innovate, they monopolize, influence, and quietly dictate policy behind closed doors.</strong></p>
<p><em>“Surge forward, killing as you go, to blaze us a trail of blood.”</em> A battle cry? <strong>Indeed.</strong> Not from a general on the battlefield, but from <strong>Ren Zhengfei, the founder of Huawei</strong>, a company waging a war not just against competitors but against entire nations. Britain’s telecom networks are suspected to have <a href="https://www.bbc.com/news/uk-53329005">Chinese backdoors</a>.</p>
<p>I<strong>nformation is now what oil was in the 1970s, a critical commodity to be controlled.</strong> Today, <strong>data is the new crude</strong>, and the battle to monopolize its flow has already begun. <strong>Quantum computing, AI, and machine learning</strong> are the new oil rigs, and the nations that dominate these technologies will dictate the future. Unlike oil, <strong>information is easily stolen, manipulated, or even weaponized in ways no physical resource ever could. </strong></p>
<p>The first lethal autonomous drone strike in Libya, recorded in <strong>March 2020</strong>, was a grim reminder of what is to come. <strong>A suicide drone, powered by AI, needed no human command—just a target. </strong><a href="https://journal.ciss.org.pk/index.php/ciss-insight/article/view/361">Fire and forget</a><strong> was the name of the game. </strong>Imagine the next phase: <strong>terrorist organizations deploying AI-powered swarms, able to strike with precision, invulnerability, and zero risk to human operatives.</strong> They would not negotiate, would not retreat, and would prove hard to stop. <strong> </strong></p>
<p>In a world where biological warfare is outlawed, <strong>the selective control of food, aid, and healthcare has replaced mass destruction with slow, calculated suffocation.</strong> Nations can now <strong>deny access to the very essentials of life</strong> to break their adversaries in a <strong>siege without walls and a war without battlefields. </strong>Over <a href="https://www.wri.org/insights/highest-water-stressed-countries">40 percent</a><strong> of the world’s population</strong> faces water scarcity, and by 2030, <a href="https://www.who.int/health-topics/drought#tab=tab_1">drought</a> could displace <strong>700 million people.</strong> The <strong>Turkish-backed militias that had control over the Alouk water station in Syria</strong> in 2020 was a stark reminder—<strong>when resources are weaponized, suffering becomes policy.</strong></p>
<p><strong>Interestingly, the battle of perception is gaining momentum more than ever. </strong>In an era of <strong>clickbait headlines and disinformation campaigns, lies travel faster than truth. The </strong><a href="https://news.mit.edu/2018/study-twitter-false-news-travels-faster-true-stories-0308">Massachusetts Institute of Technology</a> found that <strong>false news spreads 70 percent faster than real news.</strong> From <strong>the Soviet KGB planting the rumor in the 1980s that the US government created AIDS </strong>to modern <strong>deepfake propaganda,</strong> deception is the new artillery.</p>
<p>Even culture is not immune. <strong>Hollywood exported American ideals, Bollywood spread Indian influence, and K-pop turned South Korea into a global powerhouse. For instance,</strong> the Cold War was not just won by missiles, it was won when a <strong>West German band sang “Wind of Change,” which then became the anthem of the Berlin Wall’s collapse.</strong></p>
<p>If <strong>hunger, water, and financial systems</strong> hare already weaponized, the next battlefield is clear—space and the seabed<strong>.</strong> <strong>Subsea communication cables are responsible for carrying 97 percent of global data traffic and are the arteries of the modern economy. They enable over $10 trillion in financial transactions every single day.</strong> Yet, these vital lifelines remain <strong>shockingly unprotected and are vulnerable to sabotage, espionage, and strategic disruption.</strong> A targeted attack on just a handful of these cables could <a href="https://www.dailysabah.com/opinion/op-ed/beneath-the-surface-the-strategic-implications-of-seabed-warfare">cripple stock markets</a><strong>, paralyze banking systems, and sever military command structures—all without a single warship being deployed.</strong></p>
<p>Meanwhile, the <strong>race for space dominance is accelerating.</strong> From <strong>$63.66 billion in 2024 to an estimated $74.4 billion by 2028,</strong> the <a href="https://www.researchandmarkets.com/reports/5735299/military-satellites-market-report#:~:text=It%20will%20grow%20from%20$60.92%20billion%20in,compound%20annual%20growth%20rate%20(CAGR)%20of%204.5%.">global military satellite </a>market is growing, fueled by the realization that <strong>power no longer lies in boots on the ground, but in eyes in the sky.</strong> Satellites provide <strong>precision-strike capabilities, secure communication, and real-time battlefield intelligence.</strong> The <strong>Pentagon warns</strong> that the US is already vulnerable, with <strong>China and Russia developing anti-satellite (ASAT) weapons.</strong></p>
<p>In this realm, one can say that modern states wage wars without battlefields, where the goal is not to destroy but to <strong>subdue</strong>—crippling economies, infiltrating cyber networks, and manipulating narratives <strong>without a single shot fired.</strong> What is never openly begun is rarely officially ended. <strong>In 5th-generation warfare, silence is a weapon, perception is the battlefield, and survival means accepting that war never truly ends.</strong></p>
<p><em>Syeda Fizzah Shuja is a Research Associate at Pakistan Navy War College and an Mphil scholar in Peace and Counter Terrorism. Her work focuses on hybrid warfare and maritime terrorism. She can be contacted at fizzasyed2k@gmail.com.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/05/The-5GW-Playbook.pdf"><img decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="245" height="68" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 245px) 100vw, 245px" /></a></p>
<p><a href="https://globalsecurityreview.com/the-5gw-playbook-silent-wars-and-invisible-battlefields/">The 5GW Playbook: Silent Wars and Invisible Battlefields</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-5gw-playbook-silent-wars-and-invisible-battlefields/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI Paris Summit and Emerging Paradox of AI Haves and Have-Nots</title>
		<link>https://globalsecurityreview.com/ai-paris-summit-and-emerging-paradox-of-ai-haves-and-have-nots/</link>
					<comments>https://globalsecurityreview.com/ai-paris-summit-and-emerging-paradox-of-ai-haves-and-have-nots/#respond</comments>
		
		<dc:creator><![CDATA[Huma Rehman]]></dc:creator>
		<pubDate>Thu, 10 Apr 2025 11:54:22 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[agentic AI]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI Act]]></category>
		<category><![CDATA[AI have-nots]]></category>
		<category><![CDATA[AI haves]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[collaboration]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[deregulation]]></category>
		<category><![CDATA[digital divide]]></category>
		<category><![CDATA[digital technology]]></category>
		<category><![CDATA[economic empowerment]]></category>
		<category><![CDATA[ethical AI]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[geopolitical power]]></category>
		<category><![CDATA[global commons]]></category>
		<category><![CDATA[Global Partnership on Artificial Intelligence ​]]></category>
		<category><![CDATA[human development]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[international cooperation]]></category>
		<category><![CDATA[Paris Summit]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[regulation]]></category>
		<category><![CDATA[social empowerment]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[tech race]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30505</guid>

					<description><![CDATA[<p> The rapid advancement of artificial intelligence (AI) is transforming industries, economies, societies, and global politics. However, this artificial intelligence and technological revolution also exacerbates existing competitions, creating a stark divide between states that are AI haves and AI have-nots. This digital divide is not just about access to technology but also about the ability to [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/ai-paris-summit-and-emerging-paradox-of-ai-haves-and-have-nots/">AI Paris Summit and Emerging Paradox of AI Haves and Have-Nots</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong> </strong>The rapid advancement of artificial intelligence (AI) is transforming industries, economies, societies, and global politics. However, this artificial intelligence and technological revolution also exacerbates existing competitions, creating a stark divide between states that are AI haves and AI have-nots.</p>
<p>This digital divide is not just about access to technology but also about the ability to harness AI’s potential for economic, social, and global political empowerment. The implications of the AI divide are leading to a tech race that impact geopolitical power dynamics, exacerbating competition major powers like the US, China, France, and India. Depending on how the race ends, it could swing the balance of power in a negative direction.</p>
<p><strong>AI Paris Summit</strong></p>
<p>The recent <a href="https://www.elysee.fr/en/sommet-pour-l-action-sur-l-ia">AI Action Summit</a> held in Paris emerged as a pivotal event that highlights both the opportunities and challenges associated with this evolving AI tech race. This summit serves as a beacon of innovation, encouraging <a href="https://tribune.com.pk/story/2527932/frances-macron-calls-for-equal-access-to-ai-for-all-nations">France</a> and India to collaborate more closely, while also exposing the complex interplay of international reactions, particularly from major powers like the United States, United Kingdom (UK), and China.</p>
<p>The summit focused on expanding AI’s boundaries while respecting environmental and ethical obligations. France’s President Emmanuel <a href="https://www.elysee.fr/en/emmanuel-macron/2025/02/11/statement-on-inclusive-and-sustainable-artificial-intelligence-for-people-and-the-planet">Macron</a> reaffirmed his nation’s commitment to AI innovation, while maintaining high regulatory standards that draw parallels to Notre Dame Cathedral’s restoration. Such a strategy will likely accelerate AI ventures and foster innovation.</p>
<p>However, the regulation proposed was also a noose around the neck of the summit’s emphasis—deregulation. It is worth considering whether drastic deregulation will lead to genuine advances or the weakening of certain crucial safety nets as the world grapples with how to handle ever expanding data and the fragmentation that result from the intersection of geopolitical interests and the private ownership of data and capability. The US and China approach the issue differently than Europe, whose <a href="https://digital-strategy.ec.europa.eu/en/policies/regulatory-framework-ai">adoption of the AI Act</a> (2023) will see the first comprehensive AI regulation in the world.</p>
<p>Many wondered how agentic AI will impact the balance of power. Whether AI will have a net positive or negative effect is uncertain. The rate at which agentic AI is developed and adopted in the three main economic blocs of China, Europe, and the United States will determine much.</p>
<p><strong>India-France AI Alliance </strong></p>
<p>India and France are forming a partnership to leverage AI’s full potential globally, sharing knowledge, resources, and best practices to create a robust framework for AI initiatives and global dialogue. <a href="https://www.csis.org/analysis/frances-ai-action-summit">During the summit</a>, leaders from both countries addressed how their alliance could facilitate joint ventures, research collaborations, and talent exchange programs. <a href="https://in.ambafrance.org/India-France-will-harness-AI-s-potential-for-global-good">Prime Minister Narendra Modi and President Macron foresaw</a> great potential for future cooperation in 2019 when they endorsed the <em>Indo-French Roadmap on Cybersecurity and Digital Technology</em>. India and France, founding members of the Global Partnership on Artificial Intelligence, aim to develop a safe, open, secure, and ethical AI for human development and global commons.</p>
<p><strong>Global Reactions</strong></p>
<p>As the world watches the developments in Paris, reactions from other global powers, notably <a href="https://www.newamerica.org/cybersecurity-initiative/reports/essay-reframing-the-us-china-ai-arms-race/why-us-china-ai-competition-matters/">China and the United States</a>, added another layer of complexity to the conversation around AI regulation and collaboration. In recent years, both states have invested heavily in AI research and development, seeing it as critical to their national security and economic competitiveness.</p>
<p>China’s approach to AI governance contrasts significantly with that of France and India. While the <a href="http://fi.china-embassy.gov.cn/eng/kxjs/201710/P020210628714286134479.pdf">Chinese government</a> prioritizes rapid innovation with minimal regulatory oversight, this led to concerns about privacy, surveillance, and ethical implications. The US, on the other hand, grapples with debates around data privacy, corporate responsibility, and the potential for AI misuse. As a result, the responses from these two states illustrate differing philosophies about how best to harness AI’s potential while safeguarding public interests.</p>
<p><a href="https://www.theguardian.com/technology/2025/feb/11/us-uk-paris-ai-summit-artificial-intelligence-declaration">The US and UK declined</a> to sign a declaration on “inclusive and sustainable” artificial intelligence at the Paris summit, in a blow to hopes for a concerted approach to developing and regulating the technology. The document was backed by 60 other signatories on February 11, 2025, including France, <a href="https://www.theguardian.com/world/china">China</a>, India, Japan, Australia, and Canada.</p>
<p>The reactions from the relevant stakeholders highlight the urgent need for international cooperation and dialogue. As AI transcends borders, creating harmonized standards and frameworks could mitigate risks associated with its deployment.</p>
<p><strong>Opportunities and Challenges Ahead</strong></p>
<p>The summit concluded by emphasizing the need for proactive state engagement in AI regulation, prioritizing innovation while protecting individual rights and societal values. This, participants believed, would allow the world to fully capitalize on AI’s benefits.</p>
<p>As the world grapples with the realities of increasingly AI-driven technology, <a href="https://www.innovationaus.com/is-the-paris-ai-declaration-as-vulnerable-as-the-climate-accord/">the voices of diverse stakeholders</a>, including technologists, ethicists, policymakers, and civil society must be heard in shaping the future of AI. Under the flag of the AI Paris Summit, the India-France AI alliance is entering into a new and more unpredictable phase. By defying red tape and cultivating a spirit of cooperation, states are setting the pace for unlocking unprecedented opportunities while highlighting the inherent challenges of this transformative technology.</p>
<p><em>Huma Rehman is a project consultant, consultant, and defense and foreign affairs analyst. She can be reached at X @HumaRehman1.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/04/AI-Paris-Summit-and-Emerging-Paradox-of-AI-Haves-and-Have-Nots.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29601" src="http://globalsecurityreview.com/wp-content/uploads/2024/12/2025-Download-Button.png" alt="Download here." width="302" height="84" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/12/2025-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2024/12/2025-Download-Button-300x83.png 300w" sizes="(max-width: 302px) 100vw, 302px" /></a></p>
<p><a href="https://globalsecurityreview.com/ai-paris-summit-and-emerging-paradox-of-ai-haves-and-have-nots/">AI Paris Summit and Emerging Paradox of AI Haves and Have-Nots</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/ai-paris-summit-and-emerging-paradox-of-ai-haves-and-have-nots/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How Diplomacy Can Save GPS</title>
		<link>https://globalsecurityreview.com/how-diplomacy-can-save-gps/</link>
					<comments>https://globalsecurityreview.com/how-diplomacy-can-save-gps/#respond</comments>
		
		<dc:creator><![CDATA[Dana Goward]]></dc:creator>
		<pubDate>Mon, 16 Dec 2024 13:14:33 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[aircraft]]></category>
		<category><![CDATA[aviation safety]]></category>
		<category><![CDATA[Dana Goward ​]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[disruption]]></category>
		<category><![CDATA[drones]]></category>
		<category><![CDATA[electrical grids]]></category>
		<category><![CDATA[fiber cable]]></category>
		<category><![CDATA[GNSS]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[interference]]></category>
		<category><![CDATA[international diplomacy]]></category>
		<category><![CDATA[international standards]]></category>
		<category><![CDATA[ITU]]></category>
		<category><![CDATA[jamming]]></category>
		<category><![CDATA[maritime navigation]]></category>
		<category><![CDATA[navigation]]></category>
		<category><![CDATA[PNT]]></category>
		<category><![CDATA[resilient navigation]]></category>
		<category><![CDATA[resilient PNT]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[rockets]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[satellite signals]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[sovereignty]]></category>
		<category><![CDATA[spoofing]]></category>
		<category><![CDATA[technical assistance]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[telecommunications]]></category>
		<category><![CDATA[terrestrial broadcast]]></category>
		<category><![CDATA[terrestrial systems]]></category>
		<category><![CDATA[timing]]></category>
		<category><![CDATA[timing foundation]]></category>
		<category><![CDATA[transportation systems]]></category>
		<category><![CDATA[United Nations]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29615</guid>

					<description><![CDATA[<p>Imagine drones are forced to land. Rockets are deflected. Electrical grids, telecommunications, and transportation systems are degraded. Airliners are driven off course. Interference with Global Positioning System (GPS) signals is a fact of everyday life, and things are only getting worse. One example is instructive. The rate at which aircraft locations are electronically manipulated, “spoofed,” [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/how-diplomacy-can-save-gps/">How Diplomacy Can Save GPS</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Imagine drones are forced to land. Rockets are deflected. Electrical grids, telecommunications, and transportation systems are degraded. Airliners are driven off course. Interference with Global Positioning System (GPS) signals is a fact of everyday life, and things are only getting worse.</p>
<p>One example is instructive. The rate at which aircraft locations are electronically manipulated, “spoofed,” increased 500 percent in the first three quarters of 2024. An average of 1,500 flights a day were impacted by the beginning of September. In a <a href="https://ops.group/blog/gps-spoofing-final-report/">recent survey of almost 2,000 flight crew members</a>, 70 percent described their concerns about the impact on aviation safety as either “very high” or “extreme.”</p>
<p>The world depends upon signals from GPS and other global navigation satellite systems (GNSS) to underpin virtually every technology. Yet the essential positioning, navigation, and timing (PNT) service they provide is incredibly vulnerable.</p>
<p><strong>Weak and Vulnerable Signals</strong></p>
<p>These signals from space are, of necessity, very weak. The sun shining produces stronger radio signals than a GPS satellite. Yet, through a miracle of technology, receivers on earth can find coded signals in the radio noise floor, decipher them, and tell Americans where they are and the exact time.</p>
<p>Exceptionally weak signals mean that almost any interference on the right frequency can prevent them from getting through. For less than ten dollars, delivery drivers looking to electronically hide from their employers, people worried about being tracked by their spouse or the government, and bad actors wanting to disable receivers can buy a GPS “jammer” from any number of internet vendors. Such sales are illegal in most countries, as is the use of such devices. However, enforcement is almost always lax or nonexistent.</p>
<p>Keep in mind, signal specifications were made public as part of GPS becoming America’s “gift to the world,” with the US government encouraging GPS’s broad use. Other GNSS operators did the same.</p>
<p>While incredibly successful in promoting the wide adoption of signals, it has also facilitated spoofing. Compounding the problem, advances in digital technology brought inexpensive software-defined transmitters into the world. Now, for a few hundred dollars, a reasonably sophisticated hobbyist can easily imitate GPS and other satellite navigation signals.</p>
<p>The necessity of PNT services for everyday life and over-reliance on GPS/GNSS for PNT makes the vulnerability of signals to denial and imitation a primary weapon in conflicts around the globe.</p>
<p>This impacts millions of those not involved in these conflicts because any receiver within line-of-sight of the interfering transmitter can be affected. Thus, cell phone systems in Finland are degraded by drone defenses in St. Petersburg. First responders across the Middle East must use paper maps because of ongoing conflicts. Ships and aircraft, hundreds of miles from military actions, lose their navigation and collision avoidance systems. Given the number of conflicts around the planet, many regions of the world are adversely affected.</p>
<p>To date, appeals by international maritime and aviation professional organizations have failed to make an impact on the problem. The same is true for resolutions by the United Nation’s International Maritime Organization and International Civil Aviation Organization. The International Telecommunications Union (ITU), which seems to have the principal jurisdiction for this, is proving similarly ineffective.</p>
<p>At its World Radio Conference in December 2023, ITU delegates approved what, at first glance, appears to be a strong<a href="https://www.itu.int/dms_pub/itu-r/opb/act/R-ACT-WRC.16-2024-PDF-E.pdf"> resolution enjoining member states to refrain from interfering with GNSS</a> signals. The only way the resolution could pass was with an exception allowing interference “for security or defense purposes.” It is hard to imagine any other reason for which a state would disrupt signals.</p>
<p>Despite the failures of international diplomacy to mitigate this growing problem, there is likely a path for it to be much more successful. Attacks on GPS and other GNSS signals are useful only because most nations and systems over-depend on them with few alternatives.</p>
<p>Fortunately, many countries are actively considering establishing robust and resilient terrestrial PNT systems to complement signals from space. These can provide GPS-like information, but do not have common vulnerabilities and failure modes with GNSS.</p>
<p>The US Department of Transportation, the lead in America for civil PNT issues, said that intelligently using a combination of independent signals from space, terrestrial broadcast, and fiber cable can be the foundation of a resilient national PNT architecture.</p>
<p>Establishing such a system of systems will not make the services invulnerable. However, it will make them hard enough to disrupt so that antagonists will look elsewhere for opportunities to create mischief. Some nations are already taking significant steps toward achieving such resilience.</p>
<p>South Korea and Saudi Arabia field high-power terrestrial systems that provide PNT. The United Kingdom fields a partial system and seems poised to expand it, as well as a deployable capability. Much of Russia is also served by such a system.</p>
<p>China has the world’s most complete and advanced resilient PNT architecture. It includes three constellations of satellites in different orbital planes, an extensive terrestrial broadcast system, and a 20,000-kilometer fiber timing network with 295 “timing stations.”</p>
<p>Yet much of the world remains vulnerable to disruption. Those who interfere are therefore incentivized.</p>
<p>International diplomacy, in the form of the United Nations, can help improve the inevitable transition to resilient PNT by encouraging states to implement sovereign terrestrial systems. These systems will complement and cooperate with GNSS, while also operating independently.</p>
<p>As part of this effort, international standards can be developed to ensure aircraft, ships, and vehicles are able to seamlessly transit between nations. Technical assistance can be provided to nations with little local expertise in the field.</p>
<p>These efforts will greatly reduce the incentive to interfere with GNSS, thereby making it safer and more reliable. It will also reinforce the sovereignty and security of every involved nation.</p>
<p>The alternative is to continue down the path of increasing interference and increasing risk to life and property. Safety margins are already impacted. Ships are already colliding, and passenger aircraft are nearly straying, unannounced, into hostile airspace, all because of spoofing. It is only a matter of time before the world witnesses an avoidable tragedy.</p>
<p>The international community, perhaps in the form of a United Nations task force, must intervene to protect these fragile signals from space and disincentivize future disruptions.</p>
<p>Safer and more reliable signals from space and resilient sovereign terrestrial PNT are in the long-term interest of every nation. Diplomatic efforts must illuminate that shared interest bring parties together and nurture progress for everyone’s benefit.</p>
<p><em>Dana A. Goward is President of the Resilient Navigation and Timing Foundation, www.RNTFnd.org, an educational and scientific charity. He is a member of the president’s National Space-based Positioning, Navigation, and Timing Advisory Board and formerly served as the maritime navigation authority for the United States. Views expressed in this article are the author&#8217;s own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/12/How-Diplomacy-Can-Save-GPS.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-28926 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/how-diplomacy-can-save-gps/">How Diplomacy Can Save GPS</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/how-diplomacy-can-save-gps/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Wrong Agenda for Political Debates</title>
		<link>https://globalsecurityreview.com/the-wrong-agenda-for-political-debates/</link>
					<comments>https://globalsecurityreview.com/the-wrong-agenda-for-political-debates/#comments</comments>
		
		<dc:creator><![CDATA[Stephen Cimbala]]></dc:creator>
		<pubDate>Tue, 03 Dec 2024 13:14:43 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[American government]]></category>
		<category><![CDATA[autocrats]]></category>
		<category><![CDATA[belt and road initiative]]></category>
		<category><![CDATA[BRICS]]></category>
		<category><![CDATA[bureaucracy]]></category>
		<category><![CDATA[checks and balances]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Civil-Military Relations]]></category>
		<category><![CDATA[Donald Trump]]></category>
		<category><![CDATA[fascism]]></category>
		<category><![CDATA[hyperbole]]></category>
		<category><![CDATA[Hypersonic Weapons]]></category>
		<category><![CDATA[international politics]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[John F. Kelly]]></category>
		<category><![CDATA[military]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[Nazism]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[policy priorities]]></category>
		<category><![CDATA[political debates]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[space and cyber weapons]]></category>
		<category><![CDATA[Stephen Cimbala]]></category>
		<category><![CDATA[technocrats]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[Ukraine]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29505</guid>

					<description><![CDATA[<p>In the aftermath of President-elect Donald J. Trump’s election, it is time for the national political dialogue to calm down and move away from dysfunctional hyperbole. During the presidential campaign, political activists and media commentators trafficked in exaggerations and misrepresentations of facts that distracted from responsible debates on public policy.  Admittedly, some of this political [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-wrong-agenda-for-political-debates/">The Wrong Agenda for Political Debates</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In the aftermath of President-elect Donald J. Trump’s election, it is time for the national political dialogue to calm down and move away from dysfunctional hyperbole. During the presidential campaign, political activists and media commentators trafficked in exaggerations and misrepresentations of facts that distracted from responsible debates on public policy.  Admittedly, some of this political blather is simply risible on its face and can easily be dismissed by attentive voters. But other examples of misspoken or written malfeasance are more serious.</p>
<p>One example of this malfeasance was the repeated use of the term fascism/fascist or Nazism/Nazi to refer to Donald J. Trump and his supporters. Among those raising this concern were disaffected officials from the first Trump presidency. For example, retired four-star general John F. Kelly, who served as Trump’s White House chief of staff, caught media attention by going public with warnings that Trump would try to govern as a dictator.</p>
<p>In addition, thirteen republicans who served in the first Trump administration released an open letter on October 25 charging that Trump’s disdain for the professional military and his admiration for autocrats would be dangerous for America. They <a href="https://www.nytimes.com/2024/10/25/us/politics/trump-officials-letter-fascist-john-kelly.html">contended</a>, “The American people deserve a leader who won’t threaten to turn armed troops against them, won’t put his quest for power above their needs, and doesn’t idealize the likes of Adolf Hitler.”</p>
<p>The widespread use of the fascist moniker by Trump opponents, as well as the identification of Trump as an admirer of Hitler, substitutes emotional frustration for a nuanced appreciation of history and policy. This is so for at least two reasons.</p>
<p>First, the Nazi and fascist ideologies of the 1920s and 1930s cannot be replicated in 21st- century America. There are too many checks and balances in the American system of government to permit a fascist dictatorship or a similarly authoritarian system from taking root in the United States.</p>
<p>The geniuses who designed the American system of government dispersed power among three branches of the federal government and divided powers between the federal government and the states for a reason. The priority of values in the American political system favors liberty over efficiency. Admittedly the apparent inefficiency of government compared, say, to private business, is sometimes frustrating. But Americans instinctively mistrust centralized power as inimical to freedom, and history validates the prudence of that judgment.</p>
<p>Second, the character and training of the US professional officer corps would preclude the collaboration of the highest-ranking generals and admirals in subverting democracy. The graduates of American war colleges are steeped in the constitutional legitimacy that surrounds civil-military relations. An anti-democratic usurper demanding that the armed forces become partisan subordinates, as opposed to apolitical guardians of democracy, would meet with Pentagon resistance and, if necessary, refusal to carry out illegal orders.</p>
<p>Of course, complacency on the character of civil-military relations is never desirable; democracy must always be safeguarded against imminent dangers. But overstatement of American vulnerability to any single president or administration is distracting from more probable and immediate dangers and challenges.</p>
<p>First among these dangers is the relentless march of technology and its tendency to produce an elite of technocrats who exert indirect or direct control over public choice. When technocrats are in the private sector, they can influence public policy indirectly by leading successful corporations that make desirable consumer goods or other commodities.</p>
<p>On the other hand, when technocrats reside in government bureaucracies, their influence and power are not determined by market forces, but by law and government regulation. For most of the 20th century, the United States successfully balanced the creativity of the private business sector with the regulatory regimes of government bureaucracy. In the twenty-first century, this balance is at risk by bureaucracy in hyperdrive.</p>
<p>Aided by the explosion in new information technology, the federal bureaucracy now resembles Cheops’ pyramid and intrudes into every corner of American life. In turn, a more activist government is demanded by disgruntled interest groups or litigious citizens who take every grievance, real or imagined, into the local, state, or federal judicial system.</p>
<p>The result is a logjam of jurisprudential clutter and a never-ending cascade of regulations that dictate how Americans work, eat, sleep, drive, watch television, cook, and educate their children. A list of things that the government does not regulate would be harder to draw up than a list of things that the government controls directly or indirectly.</p>
<p>In short, mastery of advanced technology is a necessary condition for American national security and defense. On the other hand, technological micro-management of the American body politic can only depress innovation, discourage original thinking, and empower dysfunctional government controls over social and political life.</p>
<p>A second concern that both political parties need to address is the restructuring of the international political and economic system to the detriment of American leadership and security.  Russian President Vladimir Putin recently hosted a conclave of member states of BRICS (originally Brazil, Russia, India, China, and South Africa) plus some thirty other countries interested in joining or otherwise supporting the group. BRICS is explicitly designed to push back against the rules-based international order led by the US and its Western allies.</p>
<p>On the international security front, China, Russia, Iran, and North Korea (the CRINKs) are acting in concert as system disrupters in support of aggression in Europe, the Middle East, and East Asia. Iran and North Korea are providing explicit military assistance to Russia for its war against Ukraine, including ballistic missiles and drones.</p>
<p>North Korea has also begun sending troops to fight under Russian command in Ukraine.  China has moved into a more open military alliance with Russia, that includes joint war games and training exercises, including scenarios with forces that are potentially nuclear-capable.  Russia is confident that it can outlast Ukraine in manpower and war-related resources despite NATO support for Kiev. At the level of high diplomacy and statecraft, no recipe for a negotiated settlement of this war is on offer.</p>
<p>China continues to press forward its Belt and Road Initiative and other measures to dominate global trade and infrastructure development. As well, China apparently aspires to become a third global nuclear superpower, with forces essentially equivalent to those of the United States and Russia by 2035 or sooner.</p>
<p>A third concern that should occupy the attention of the next administration is the matrix of challenges to American and allied conventional and nuclear deterrence. Russia’s war against Ukraine, China’s gathering storm for a future strike against Taiwan, and Iran’s wars against Israel via proxies in Gaza, Lebanon, and Yemen, all point to a decline in respect for American power and a willingness to test American resolve by direct or indirect action.</p>
<p>In addition, Iran is already a threshold nuclear weapons state, and an Iranian bomb could set off a reaction among Middle Eastern countries that would make a serious dent in the nuclear nonproliferation regime. Iran’s Houthi proxies in Yemen have diverted maritime commerce throughout the world and have evolved from a fledgling insurgency into a well-armed terrorist strike force capable of ballistic missile and drone attacks throughout the region.</p>
<p>With respect to nuclear deterrence, the fate of the American strategic nuclear modernization program that was supported by the Obama, Trump, and Biden administrations is now uncertain as to its timing and continuing support from Congress. The intercontinental ballistic missile (ICBM) component (Sentinel) of the nuclear triad faces scrutiny over its rising costs and delayed schedules. The possible collapse of the New START regime in 2026 could presage an open-ended nuclear arms race among China, Russia, and the US.</p>
<p>Other challenges to nuclear deterrence stability include developments in hypersonic offensive weapons, in advanced missile and air defenses, and in space and cyber weapons for deterrence or defense. Kinetic attacks on US space-based assets and cyberattacks against both military and civilian targets can be acts of aggression in themselves; or, on the other hand, they can be precursors for nuclear first strikes or for large-scale conventional offensives against American and allied North Atlantic Treaty Organization (NATO) forces and infrastructure.</p>
<p>In short, (1) managing the balance between governmental and private-sector technology innovation; (2) steering the pivotal role of the United States in a more competitive international system; and (3) supporting credible conventional and nuclear deterrence against more ambitious regional actors and nuclear competitors provides a partial menu of priorities that should receive more attention from policymakers. Demagoguery’s day has passed. It is now time to govern for the betterment of the nation.</p>
<p><em>Stephen Cimbala, PhD, is a senior fellow at the National Institute for Deterrence Studies and Professor of Political Science at Penn State Brandywine.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/12/wrong-agenda-us-pol-debates.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-28497 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/07/Download3-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/07/Download3-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/07/Download3.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/the-wrong-agenda-for-political-debates/">The Wrong Agenda for Political Debates</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-wrong-agenda-for-political-debates/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>AI Overload: Navigating the US Intelligence Community’s Data Deluge</title>
		<link>https://globalsecurityreview.com/ai-overload-navigating-the-us-intelligence-communitys-data-deluge/</link>
					<comments>https://globalsecurityreview.com/ai-overload-navigating-the-us-intelligence-communitys-data-deluge/#respond</comments>
		
		<dc:creator><![CDATA[Joshua Thibert]]></dc:creator>
		<pubDate>Thu, 01 Aug 2024 11:46:03 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[culture]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[HUMINT]]></category>
		<category><![CDATA[industrial base]]></category>
		<category><![CDATA[innovation]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[prototyping]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=28553</guid>

					<description><![CDATA[<p>Open-Source Intelligence (OSINT) involves collecting, analyzing, and utilizing information from publicly available sources to inform decision-making within the intelligence community. It provides critical insights without the need for clandestine operations, making it a cost-effective and legally compliant method of gathering intelligence. The recent surge in OSINT intake is driven by the exponential growth of digital [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/ai-overload-navigating-the-us-intelligence-communitys-data-deluge/">AI Overload: Navigating the US Intelligence Community’s Data Deluge</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Open-Source Intelligence (OSINT) involves collecting, analyzing, and utilizing information from publicly available sources to inform decision-making within the intelligence community. It provides critical insights without the need for clandestine operations, making it a cost-effective and legally compliant method of gathering intelligence.</p>
<p>The recent <a href="https://breakingdefense.com/2024/05/osint-overdose-intelligence-agencies-seek-new-ways-to-manage-surge-of-open-source-intel/?utm_campaign=Systel&amp;utm_medium=email&amp;_hsenc=p2ANqtz-9IA7_kouL01rOsV2asU9iD7i7ktV-CJwFrGye2RBxBVB86GKrpx9ytcw8g9kgEj0aONw5urTQyr7P5tm2DHiJoBIKJPQ&amp;_hsmi=315235900&amp;utm_content=315235900&amp;utm_source=hs_email">surge</a> in OSINT intake is driven by the exponential growth of digital information, the proliferation of social media, and the increasing availability of online data. These factors have expanded the volume and variety of accessible information, enabling intelligence agencies to glean valuable insights from a vast array of sources, ranging from news articles and social media posts to academic publications and government reports. However, this influx of data necessitates advanced tools and techniques to manage, analyze, and extract actionable intelligence efficiently.</p>
<p>Artificial Intelligence (AI) and Machine Learning (ML) applications are being <a href="https://www.linkedin.com/pulse/intersection-ai-osint-how-artificial-intelligence-open-groeneveld/">implemented</a> across the American intelligence community to enhance capabilities, resulting in a significant increase in OSINT intake. Managing this surge requires leveraging advanced technology, enhancing analytical capabilities, and ensuring efficient collaboration. AI and ML algorithms automate data collection, filtering, and initial analysis. The development of natural language processing (NLP) tools to process large volumes of text data in multiple languages will mature over time with appropriate investment. Additional investment in scalable big data platforms that can handle OSINT data will be critical, utilizing cloud-based solutions for storage and processing to ensure scalability and flexibility.</p>
<p>Human capital enhancement is crucial for any strategic intelligence strategy. There must be an increased focus on recruiting and developing specialized training for intelligence analysts in OSINT techniques, tools, and methodologies. Continuous education programs will keep analysts updated on the latest technologies and trends. Expanding hiring efforts to identify experts in data science, cybersecurity, linguistics, and regional studies will increase the talent pool capable of enhancing the analytical capabilities of the intelligence community. By fostering an environment that promotes continuous learning and expertise in emerging technologies, the intelligence community can stay ahead of adversaries and ensure that their analysts have the necessary skills to leverage advanced tools effectively.</p>
<p>Interagency collaboration within the American intelligence community and with trusted allies is vital. Creating joint OSINT task forces involving multiple agencies fosters collaboration and information sharing, leveraging unique capabilities and expertise. Developing standardized protocols and best practices for OSINT collection and analysis enhances situational awareness and reduces duplication of efforts.</p>
<p>By establishing clear lines of communication and cooperation, intelligence agencies can ensure a more unified approach to addressing emerging threats and challenges. This collaboration also extends to international partners, creating a robust intelligence-sharing network that provides a broader perspective and pools resources to counteract the strategic moves of adversaries.</p>
<p>From a strategic perspective, developing secure and user-friendly platforms for sharing OSINT findings across different agencies is essential. Implementing interoperable systems for seamless data exchange, supported by comprehensive policies and guidelines aligned with legal mandates, builds trust between agencies and the public. Ensuring the security and integrity of data and communication channels is paramount, as it protects classified information from cyber intrusions and ensures the resilience of supply chains and critical infrastructure against cyber threats. Enhanced cybersecurity measures are essential for maintaining the trust and operational effectiveness of intelligence operations.</p>
<p>Reversing concerns about the expanding influence of the technology industry is necessary for the defense industry and intelligence community to embrace a collaborative environment that encourages growth, innovation, and trust. The technology industry already has expertise in these domains, which can be leveraged for public-private partnerships to access cutting-edge innovations. By fostering partnerships, the intelligence community can benefit from rapid advancements in technology and stay ahead of emerging threats. Collaboration with the technology industry also provides access to a pool of highly skilled professionals who can contribute to enhancing the capabilities of intelligence agencies.</p>
<p>The intelligence community must embrace public-private partnerships to foster a collaborative environment that encourages innovation. Establishing feedback mechanisms, conducting regular reviews, and setting up innovation labs within intelligence agencies ensures they stay ahead of emerging threats. Feedback mechanisms can include regular debriefings, user surveys, and performance metrics to assess the effectiveness of OSINT strategies. Review processes might involve periodic audits, peer reviews, and after-action reports to identify gaps and areas for improvement. Innovation labs can foster a culture of experimentation and rapid prototyping of new technologies and methodologies. By creating a space for testing and developing new ideas, innovation labs can drive significant advancements in intelligence operations and ensure that agencies are equipped to handle evolving threats.</p>
<p>Continuous improvement and adaptation will be key to maintaining a competitive edge in a dynamic and ever-changing global threat landscape. Establishing feedback mechanisms to continually assess the effectiveness of OSINT strategies and make necessary adjustments is essential. Conducting regular reviews and audits to identify gaps and areas for improvement will ensure that the intelligence community remains agile and responsive to emerging threats and challenges. Enhancing all-source analytical techniques for integrating OSINT with other intelligence sources (HUMINT, SIGINT, etc.) will provide a comprehensive view of the intelligence landscape, bridging the knowledge and awareness gaps that often plague the intelligence community.</p>
<p>To further support these advancements, the intelligence community must also embrace public-private partnerships to leverage the technology industry’s expertise and foster a collaborative environment that encourages innovation. Establishing feedback mechanisms, conducting regular reviews, and setting up innovation labs within intelligence agencies will ensure they stay ahead of emerging threats and challenges. By fostering a culture of experimentation and rapid prototyping, innovation labs can drive significant advancements in intelligence operations and ensure that agencies are equipped to handle evolving threats.</p>
<p>Managing the surge in OSINT requires a holistic approach that combines technological innovation, enhanced human capital, effective interagency collaboration, and robust policy frameworks. By adopting these strategies, the intelligence community can maintain its edge in an increasingly complex and dynamic world.</p>
<p><em>Joshua Thibert is a Senior Analyst at the</em> <a href="https://thinkdeterrence.com/"><em>National Institute for Deterrence Studies (NIDS)</em></a><em>.</em><em> With nearly 30 years of comprehensive expertise, his background encompasses roles as a former counterintelligence special agent within the Department of Defense and as a practitioner in compliance, security, and risk management in the private sector. Views expressed are his own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/07/AI-Overload_-Navigating-the-US-Intelligence-Communitys-Data-Deluge.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-28497 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/07/Download3-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/07/Download3-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/07/Download3.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/ai-overload-navigating-the-us-intelligence-communitys-data-deluge/">AI Overload: Navigating the US Intelligence Community’s Data Deluge</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/ai-overload-navigating-the-us-intelligence-communitys-data-deluge/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Lockheed Skunk Works KC-Z: Extending the Range of Deterrence</title>
		<link>https://globalsecurityreview.com/lockheed-skunk-works-kc-z-extending-the-range-of-deterrence/</link>
					<comments>https://globalsecurityreview.com/lockheed-skunk-works-kc-z-extending-the-range-of-deterrence/#respond</comments>
		
		<dc:creator><![CDATA[Joshua Thibert]]></dc:creator>
		<pubDate>Thu, 20 Jun 2024 12:03:43 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[Air-Refueling]]></category>
		<category><![CDATA[bridge tanker]]></category>
		<category><![CDATA[contested environment]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[deterrent]]></category>
		<category><![CDATA[global security]]></category>
		<category><![CDATA[KC-Z]]></category>
		<category><![CDATA[Lockheed Martin]]></category>
		<category><![CDATA[Next-Gen]]></category>
		<category><![CDATA[NGAS]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[Refueling]]></category>
		<category><![CDATA[Skunk Works]]></category>
		<category><![CDATA[stealth]]></category>
		<category><![CDATA[Tanker]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[u.s. congress]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=28193</guid>

					<description><![CDATA[<p>The United States Air Force (USAF) is expanding the integration of stealth technology beyond fighters and bombers to encompass aerial refueling. Lockheed Martin’s Skunk Works proposed design for the Next-Generation Air-Refueling System (NGAS), the KC-Z, showcases this critical evolution as it addresses a significant vulnerability—the exposure of low-observable aircraft during mid-air refueling. By incorporating stealth, [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/lockheed-skunk-works-kc-z-extending-the-range-of-deterrence/">Lockheed Skunk Works KC-Z: Extending the Range of Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The United States Air Force (USAF) is expanding the integration of stealth technology beyond fighters and bombers to encompass aerial refueling. <a href="https://www.lockheedmartin.com/en-us/who-we-are/business-areas/aeronautics/skunkworks.html">Lockheed Martin’s Skunk Works</a> proposed design for the <a href="https://www.airandspaceforces.com/air-force-launches-new-stealthy-tanker-program-with-delivery-projected-for-2040/">Next-Generation Air-Refueling System (NGAS)</a><u>,</u> the KC-Z, showcases this critical evolution as it addresses a significant vulnerability—the exposure of low-observable aircraft during mid-air refueling.</p>
<p>By incorporating stealth, the KC-Z can operate discreetly in contested airspace, safeguarding both itself and the aircraft it refuels such as the F-22, F-35, B-2, and B-21. Additionally, the enhanced capabilities of the KC-Z significantly extend operational reach, allowing aircraft to operate farther from their bases and demonstrate a rapid response to global threats, thus serving as a powerful deterrent.</p>
<p>Technical specifications and design details for the KC-Z are still under development. However, Lockheed Martin’s proposed design emphasizes stealth as a core feature, incorporating low-observable materials, shaping, and potentially radar-absorbing coatings. The KC-Z is expected to be larger than existing tankers to accommodate a substantial fuel capacity and potentially integrate advanced mission systems, such as enhanced communication and electronic warfare capabilities. The design will likely include features to reduce its infrared and acoustic signatures, further enhancing its stealth capabilities. Details about the refueling mechanism, boom or drogue system, are yet to be finalized, but it is expected to be compatible with various aircraft types, including fighters, bombers, and, potentially, unmanned aerial vehicles.</p>
<p>The KC-Z’s presumed ability to loiter for extended periods enhances the US military’s persistent presence in critical regions, reinforcing extended deterrence commitments to allies and partners. Although the US Congress has <a href="https://www.flightglobal.com/fixed-wing/us-congress-halts-kc-135-replacement-until-usaf-produces-stealth-tanker-acquisition-plan/156264.article#:~:text=Also%20known%20as%20the%20%E2%80%9Cbridge,under%20the%20KC%2DY%20acquisition.">halted</a> plans to phase out the current fleet of KC-135s until the USAF can submit a formal acquisition strategy for the KC-Z, the acknowledgement of the KC-Z’s importance as a definitive force multiplier that amplifies air combat capabilities through the enablement of longer flight durations, expanded mission support, and overall greater flexibility, further deterring adversaries, highlights the pivotal role the KC-Z will have by integrating with other advanced platforms by enabling coordinated operations across multiple domains.</p>
<p>While the exact timeline and cost of the KC-Z project remain fluid, current projections estimate the first operational aircraft to be fielded by <a href="https://www.airandspaceforces.com/air-force-launches-new-stealthy-tanker-program-with-delivery-projected-for-2040/">2040</a>. The USAF is currently in the initial phases of the acquisition process, with a request for information issued in early 2023. This will be followed by an analysis of alternatives to determine the specific requirements and design of the NGAS, which includes the KC-Z. The development of a stealth aircraft with aerial refueling capabilities is expected to be a complex and costly endeavor, with estimates reaching into the tens of billions of dollars. However, proponents argue that the long-term strategic advantages and enhanced operational capabilities justify the significant investment.</p>
<p>Despite the potential advantages, the development and deployment of the KC-Z faces significant challenges. The high cost associated with developing and maintaining stealth aircraft raises concerns about the project’s overall cost-effectiveness, especially considering the budgetary constraints in the defense budget. Additionally, questions remain about the long-term viability of maintaining the KC-Z’s stealth profile, given the wear and tear of regular operations and potential advancements in radar technology by adversaries. Some argue that investing in alternative refueling solutions, such as unmanned tankers or ground-based refueling systems, might be more practical and cost-efficient. Furthermore, integrating a new, complex platform like the KC-Z into existing air operations could pose logistical and operational challenges, requiring substantial adjustments to training, tactics, and maintenance procedures.</p>
<p>Though the Next-Generation Air-Refueling System (NGAS) includes the KC-Y or “<a href="https://www.defensenews.com/air/2023/08/02/us-air-force-to-issue-new-refueling-tanker-request-in-september/">bridge tanker</a>” that will close capability gaps between the future KC-46 and KC-Z, recognizing the importance of stealth design in aerial refueling airframes to the deterrence mission will strengthen the United States deterrence strategy by expanding operational capabilities in contested environments, projecting power globally, maintaining a persistent presence, multiplying force effectiveness, and fostering integrated operations. The KC-Z represents a critical evolution in air refueling, aligning it with the demands of modern warfare.</p>
<p>The development of the KC-Z places the U.S. at the forefront of aerial refueling technology, potentially sparking a new arms race as other nations seek to maintain parity or develop their own stealth tanker capabilities. This could have significant implications for international relations and global security. While the KC-Z is primarily intended for defensive and deterrence purposes, its potential offensive applications could raise concerns among rival nations, further fueling geopolitical tensions. Conversely, the KC-Z could also act as a deterrent by showcasing American technological prowess and bolstering alliances with countries that benefit from extended airpower projection capabilities. The international community will undoubtedly be watching the development and deployment of the KC-Z closely, assessing its potential impact on the global balance of power and the future of aerial warfare.</p>
<p>The introduction of the KC-Z could significantly reshape the USAF’s strategic posture. By enabling stealth aircraft to operate deeper into contested airspace, the KC-Z would expand the reach and effectiveness of airpower, potentially altering the dynamics of air combat and deterrence. This could lead to new operational concepts and tactics, as commanders leverage the KC-Z’s unique capabilities to project power and maintain air superiority in challenging environments.</p>
<p>The ability to conduct extended missions with fewer refueling stops could also streamline logistics and reduce the vulnerability of support aircraft. Furthermore, the KC-Z could play a crucial role in enabling distributed operations, where aircraft disperse across a wider area to minimize the risk of detection and enhance survivability. This shift towards a more agile and resilient force structure could have far-reaching implications for the future of air warfare.</p>
<p><em>Joshua Thibert is a Contributing Senior Analyst at the National Institute for Deterrence Studies (NIDS). With over 30 years of comprehensive expertise, his background encompasses roles as a former counterintelligence special agent within the Department of Defense and as a practitioner in compliance, security, and risk management in the private sector. The views expressed in this article are his own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/06/Lockeheed-Skunk-Works-KC-Z-Stealth_-Extending-the-Range-of-Deterrence.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-27949 size-full" src="http://globalsecurityreview.com/wp-content/uploads/2024/05/Free-Download.png" alt="Download button" width="197" height="84" /></a></p>
<p><a href="https://globalsecurityreview.com/lockheed-skunk-works-kc-z-extending-the-range-of-deterrence/">Lockheed Skunk Works KC-Z: Extending the Range of Deterrence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/lockheed-skunk-works-kc-z-extending-the-range-of-deterrence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Double-edged Sword of Artificial Intelligence</title>
		<link>https://globalsecurityreview.com/the-double-edged-sword-of-artificial-intelligence/</link>
					<comments>https://globalsecurityreview.com/the-double-edged-sword-of-artificial-intelligence/#comments</comments>
		
		<dc:creator><![CDATA[Joshua Thibert]]></dc:creator>
		<pubDate>Tue, 11 Jun 2024 12:15:57 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[algorithms]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[counter-AI]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[decision-making]]></category>
		<category><![CDATA[human-machine teaming]]></category>
		<category><![CDATA[machine learning]]></category>
		<category><![CDATA[military operations]]></category>
		<category><![CDATA[ML]]></category>
		<category><![CDATA[radar]]></category>
		<category><![CDATA[stealth]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=28092</guid>

					<description><![CDATA[<p>The integration of artificial intelligence (AI) and machine learning (ML) into stealth and radar technologies represents a key element of the race to the top of defense technologies currently taking place. These offensive and defensive capabilities are constantly evolving with AI/ML serving as the next step in their evolution. Integrating AI/ML into low-observable technology presents [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-double-edged-sword-of-artificial-intelligence/">The Double-edged Sword of Artificial Intelligence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The integration of artificial intelligence (AI) and machine learning (ML) into stealth and radar technologies represents a key element of the race to the top of defense technologies currently taking place. These offensive and defensive capabilities are constantly evolving with AI/ML serving as the next step in their evolution.</p>
<p>Integrating AI/ML into low-observable technology presents a promising avenue for enhancing stealth capabilities, but it also comes with its own set of challenges. ML algorithms rely on large volumes of high-quality data for training and validation. Acquiring such data for low-observable technology is challenging due to the classified nature of military operations and the limited availability of real-world stealth measurements.</p>
<p>ML algorithms analyze vast amounts of radar data to identify patterns and anomalies that were previously undetectable. This includes the ability to track stealth aircraft and missiles with greater accuracy and speed. These advancements have significant implications for deterrence strategies as traditional stealth technology may diminish in its effectiveness as AI/ML-powered radar becomes more sophisticated, potentially undermining the deterrent value of stealth aircraft and missiles.</p>
<p>Stealth technology remains a cornerstone of deterrence, allowing military assets to operate relatively undetected. Radar, on the other hand, is the primary tool for detecting and tracking these assets. However, AI/ML are propelling both technologies into new frontiers. AI algorithms can now design and optimize stealth configurations that were previously impossible. This includes the development of adaptive camouflage that dynamically responds to changing environments, making detection even more challenging.</p>
<p>Furthermore, stealth technology encompasses a multitude of intricately designed principles and trade-offs, including radar cross-section (RCS) reduction, infrared signature management, and reduction of acoustic variables. Developing ML algorithms capable of comprehensively modeling and optimizing these complex interactions poses a significant challenge. Moreover, translating theoretical stealth concepts into practical design solutions that can be effectively learned by ML models requires specialized domain knowledge and expertise.</p>
<p>As ML-based stealth design techniques become more prevalent, adversaries may employ adversarial ML strategies to exploit vulnerabilities and circumvent the defenses afforded to stealth aircraft. Adversarial attacks involve deliberately perturbing input data to deceive ML models and undermine their performance. Mitigating these threats requires the development of robust countermeasures and adversarial training techniques to enhance the resilience of ML-based stealth systems.</p>
<p>Additional complexities are inherent in the fact that ML algorithms often operate as “black boxes,” making it challenging to interpret their decision-making processes and understand the underlying rationale behind their predictions. In the context of stealth technology, where design decisions have significant operational implications, the lack of interpretability and explainability poses a barrier to trust and acceptance. Ensuring transparency and interpretability in ML-based stealth design methodologies is essential for fostering confidence among stakeholders and facilitating informed decision-making.</p>
<p>Implementing ML algorithms for stealth optimization involves computationally intensive tasks, including data preprocessing, model training, and simulation-based optimization. As low-observable technology evolves to encompass increasingly sophisticated designs and multi-domain considerations, the computational demands of ML-based approaches may escalate exponentially. Balancing computational efficiency with modeling accuracy and scalability is essential for practical deployment in real-world military applications.</p>
<p>Integrating AI and ML into military systems raises complex regulatory and ethical considerations, particularly regarding autonomy, accountability, and compliance with international laws and conventions. Ensuring that ML-based stealth technologies adhere to ethical principles, respect human rights, and comply with legal frameworks governing armed conflict is paramount. Moreover, establishing transparent governance mechanisms and robust oversight frameworks is essential to addressing concerns related to the responsible use of AI in military applications.</p>
<p>Addressing these challenges requires a concerted interdisciplinary effort, bringing together expertise from diverse fields such as aerospace engineering, computer science, data science, and ethics. By overcoming these obstacles, AI/ML has the potential to revolutionize low-observable technology, enhancing the stealth capabilities of military aircraft and ensuring their effectiveness in an increasingly contested operational environment. On the other hand, AI/ML has the potential to significantly impact radar technology, posing challenges to conventional low-observable and stealth aircraft designs in the future.</p>
<p>AI/ML algorithms can enhance radar signal processing capabilities by improving target detection, tracking, and classification in cluttered environments. Analyzing complex radar returns and discerning subtle patterns indicative of stealth aircraft, these algorithms can mitigate the challenges posed by low-observable technology, making it more difficult for stealth aircraft to evade detection.</p>
<p>ML algorithms can optimize radar waveforms in real time based on environmental conditions, target characteristics, and mission objectives. Dynamically adjusting waveform parameters such as frequency, amplitude, and modulation, radar systems can exploit vulnerabilities in stealth designs—increasing the probability of detection. This adaptive approach enhances radar performance against evolving threats, including stealth aircraft with sophisticated countermeasures.</p>
<p>Cognitive radar systems leverage AI/ML techniques to autonomously adapt their operation and behavior in response to changing operational environments. These systems learn from past experiences, anticipate future scenarios, and optimize radar performance adaptively. Continuously evolving their tactics and strategies, cognitive radar systems can outmaneuver stealth aircraft and exploit weaknesses in their low-observable characteristics.</p>
<p>AI/ML facilitates the coordination and synchronization of multi-static and distributed radar networks, comprising diverse sensors deployed across different platforms and locations. By fusing information from multiple radar sources and exploiting the principles of spatial diversity, these networks can enhance target detection and localization capabilities. This collaborative approach enables radar systems to overcome the limitations of individual sensors and effectively detect stealth aircraft operating in contested environments.</p>
<p>ML techniques can be employed to develop countermeasures against stealth technology by identifying vulnerabilities and crafting effective detection strategies. By generating adversarial examples and training radar systems to recognize subtle cues indicative of stealth aircraft, researchers can develop robust detection algorithms capable of outperforming traditional radar techniques. ML provides a proactive defense mechanism against stealth threats, potentially rendering conventional low-observable technology obsolete.</p>
<p>AI and ML enable the construction of data-driven models and simulations that accurately capture the electromagnetic signatures and propagation phenomena associated with stealth aircraft. By leveraging large datasets comprising radar measurements, electromagnetic simulations, and physical modeling, researchers can develop comprehensive models of stealth characteristics and devise innovative counter-detection strategies. These data-driven approaches provide valuable insights into the vulnerabilities of stealth technology and inform the design of more effective radar systems.</p>
<p>In the quest for technological superiority in modern warfare, the integration of AI and ML into radar technology holds significant promise with the potential to challenge conventional low-observable and stealth aircraft designs by enhancing radar-detection capabilities. AI and ML algorithms improve radar signal processing, optimize radar waveforms in real time, and enable radar systems to autonomously adapt their operation. By leveraging multi-static and distributed radar networks and employing adversarial ML techniques, researchers can develop robust detection algorithms capable of outperforming traditional radar systems. Moreover, data-driven modeling and simulation provide insights into the vulnerabilities of stealth technology, informing the design of more effective radar systems.</p>
<p>The rapid advancement of AI/ML is revolutionizing both stealth and radar technologies, with profound implications for deterrence strategies. Traditionally, deterrence has relied on the balance of power and the credible threat of retaliation. However, the integration of AI/ML into these technologies is fundamentally altering the dynamics of detection, evasion, and response, thereby challenging the established tenets of deterrence. Of further concern is the consideration that non-stealth assets become increasingly vulnerable to detection and targeting as ML-powered radar systems become more prevalent. This could lead to a greater reliance on stealth technology, further accelerating the arms race.</p>
<p>This rapid development of AI/ML-powered technologies could destabilize the existing balance of power, leading to heightened tensions and miscalculations. The changing technological landscape may necessitate the development of new deterrence strategies that incorporate AI and ML. This could include a greater emphasis on cyber warfare and the development of counter-AI and counter-ML capabilities.</p>
<p>The integration of AI/ML into stealth and radar technologies will be a game-changer for deterrence. To maintain stability and prevent conflict, policymakers and military strategists must adapt to this new reality of a continuous arms race, wherein both offensive and defensive capabilities are constantly evolving in pursuit of technological superiority. Continued investment in AI/ML research is essential to stay ahead of the curve and maintain a credible deterrent posture. International cooperation on the development and use of AI/ML technologies in military applications is crucial to limit the scope of a potential arms race that regularly shifts the balance of power and destabilizes global security.</p>
<p><em>Joshua Thibert is a Contributing Senior Analyst at the </em><a href="https://thinkdeterrence.com/"><em>National Institute for Deterrence Studies (NIDS)</em></a><em> and doctoral candidate at Missouri State University. His extensive academic and practitioner experience spans strategic intelligence, multiple domains within defense and strategic studies, and critical infrastructure protection. The views expressed in this article are the author’s own</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/06/The-Double-Edged-Sword-of-Artificial-Intelligence-Enhancing-Stealth-Sharpening-Detection.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-27949 size-full" src="http://globalsecurityreview.com/wp-content/uploads/2024/05/Free-Download.png" alt="Download button" width="197" height="84" /></a></p>
<p><a href="https://globalsecurityreview.com/the-double-edged-sword-of-artificial-intelligence/">The Double-edged Sword of Artificial Intelligence</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-double-edged-sword-of-artificial-intelligence/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Global Security Review 2023 Article Compendium</title>
		<link>https://globalsecurityreview.com/global-security-review-2023-article-compendium/</link>
					<comments>https://globalsecurityreview.com/global-security-review-2023-article-compendium/#respond</comments>
		
		<dc:creator><![CDATA[GSR Staff]]></dc:creator>
		<pubDate>Wed, 17 Jan 2024 13:24:40 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Deterrence & Foreign Policy]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Space Deterrence & Conflict]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Asia-Pacific]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[democracy]]></category>
		<category><![CDATA[freedom]]></category>
		<category><![CDATA[global security]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[posture]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[Ukraine]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=26799</guid>

					<description><![CDATA[<p>The &#8220;Global Security Review 2023 Compendium&#8221; is a comprehensive collection of articles addressing key issues in global security. It includes analysis on topics like American strategic posture, space deterrence, challenges in the Asia-Pacific region, nuclear deterrence, and the implications of emerging threats like satellite cyber-attacks. Each article, authored by our experts, delves into current geopolitical [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/global-security-review-2023-article-compendium/">Global Security Review 2023 Article Compendium</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The &#8220;<em>Global Security Review</em> 2023 Compendium&#8221; is a comprehensive collection of articles addressing key issues in global security. It includes analysis on topics like American strategic posture, space deterrence, challenges in the Asia-Pacific region, nuclear deterrence, and the implications of emerging threats like satellite cyber-attacks. Each article, authored by our experts, delves into current geopolitical dynamics, offering insights into the evolving landscape of international relations and defense strategies. This compendium serves as a critical resource for understanding complex security issues facing the world today.</p>
<p>&#8220;<a href="https://globalsecurityreview.com/americas-strategic-posture-report-get-behind-it/">America’s Strategic Posture Report: Get Behind It</a>&#8221; by Jonathan Trexel highlights the urgent need for the US to revise its strategic posture in response to escalating global threats. It emphasizes the changing international security environment, underscoring the necessity for the US to adapt its defense planning. The report suggests enhancing conventional, nuclear, and strategic defense forces to address these threats, including those from Russia, China, North Korea, and Iran. The recommendations also cover aspects like modernizing nuclear weapons, missile defense systems, and developing offensive and defensive space assets. The author argues for the urgent adoption of these measures to maintain national and global security.</p>
<p>&#8220;<a href="https://globalsecurityreview.com/congressional-dysfunction-impacts-american-defense-in-the-pacific/">Congressional Dysfunction Impacts American Defense in the Pacific</a>&#8221; by Christophe Bosquillon highlights concerns about American defense strategy in the Pacific, specifically due to congressional delays in funding the Compacts of Free Association (COFA) with Pacific island-states. The article underscores the strategic importance of these island-states, such as Palau, for American defense, particularly against China. Bosquillon argues that congressional inaction undermines American commitments in the region, potentially inviting Chinese influence and jeopardizing American security interests in the Pacific.</p>
<p>&#8220;<a href="https://globalsecurityreview.com/deterrence-in-space-its-not-complicated/">Deterrence in Space: It’s Not Complicated</a>&#8221; by Michael J. Listner examines the concept of space deterrence, arguing it&#8217;s a simple yet often over-complicated idea. He discusses the importance of understanding different perspectives on deterrence, especially from adversaries like Russia and China. Listner emphasizes the need for the US to have the capability and will to apply force in space. He critiques the reliance on resilience as a method of deterrence, stating it&#8217;s not a substitute for actual defensive and offensive capabilities in space. The article advocates for a straightforward approach to deterrence in space, stressing the importance of capability, will, and communication.</p>
<p>&#8220;<a href="https://globalsecurityreview.com/japanese-space-strategy-deploying-a-credible-deterrent/">Japanese Space Strategy: Deploying a Credible Deterrent</a>&#8221; by Christophe Bosquillon analyzes Japan&#8217;s evolving space strategy in the context of regional security challenges, particularly threats from North Korea and China. The article discusses Japan&#8217;s shift from pacifist policies to developing credible deterrence in space, including the use of anti-satellite capabilities and enhancing space situational awareness. It underscores the importance of Japan&#8217;s cooperation with the US for security in the Indo-Pacific region and highlights the challenges Japan faces in establishing a credible deterrent in space.</p>
<p>&#8220;<a href="https://globalsecurityreview.com/nano-aquabots-and-the-us-china-science-and-technology-cooperation-agreement/">Nano Aquabots and the US-China Science and Technology Cooperation Agreement</a>&#8221; by Alexis Littlefield explores the dual-use nature of nano aquabots and other advanced technologies, emphasizing the risks and benefits of the US-China Science and Technology Cooperation Agreement. Littlefield discusses how these technologies, while beneficial for society, can also be weaponized. The article critically examines the implications of US government-funded research in collaboration with China, highlighting concerns about intellectual property transfer and national security. The author&#8217;s perspective sheds light on the complexities of international science and technology agreements and their impact on strategic interests.</p>
<p>&#8220;<a href="https://globalsecurityreview.com/russia-and-the-growing-danger-of-satellite-cyberattacks/">Russia and the Growing Danger of Satellite Cyber-Attacks</a>&#8221; by Alexis Schlotterback highlights the increasing threat of Russian cyber operations targeting satellites. The article explores various satellite cyberattack methods such as data interception, data corruption, and seizure of control. It emphasizes Russia&#8217;s advanced capabilities in cyber warfare, including the use of GPS jammers and potential hacking of American satellite control systems. The discussion includes the need for enhanced security measures in satellite infrastructure to protect against these threats.</p>
<p>&#8220;<a href="https://globalsecurityreview.com/the-comprehensive-strategy-for-the-space-force-the-good-and-bad/">The Comprehensive Strategy for the Space Force: The Good and Bad</a>&#8221; by Christopher Stone critically evaluates the US Space Force&#8217;s strategy as outlined in a congressional report. Stone highlights the positives, such as acknowledging the Space Force&#8217;s role in supporting terrestrial forces. However, he points out significant gaps, arguing that the Space Force should focus more on warfighting capabilities to counter growing space threats from China and Russia, rather than merely supporting other forces. He emphasizes the need for combat-credible space forces capable of offensive and defensive operations, asserting that this should be the primary mission of the Space Force.</p>
<p>&#8220;<a href="https://globalsecurityreview.com/the-danger-of-minimum-deterrence/">The Danger of Minimum Deterrence</a>&#8221; by Peter Huessy critiques the concept of minimal deterrence in nuclear strategy. Huessy argues that reducing the US nuclear arsenal to a minimal level undermines the credibility of the U.S. nuclear umbrella, impacts the deterrence of conventional conflict, and ignores the need for strategic stability. He emphasizes that a robust nuclear arsenal is crucial for credible deterrence and argues against the reduction of nuclear forces as part of a path to disarmament.</p>
<p>&#8220;<a href="https://globalsecurityreview.com/the-faux-nuclear-arms-race-that-isnt/">The Faux Nuclear Arms Race that Isn&#8217;t</a>&#8221; by Adam Lowther and Col (Ret) Curtis McGiffin challenges the notion of a new nuclear arms race, arguing that the current situation is not comparable to the Cold War era. They critique the assertion of an arms race, highlighting the significant reduction in nuclear weapons since the Cold War and the lack of expansion in US nuclear capabilities. The authors emphasize the importance of arms control agreements that align with US interests, and they critique the viewpoint that more nuclear weapons are inherently destabilizing, suggesting that strength, not weakness, deters conflict.</p>
<p>&#8220;<a href="https://globalsecurityreview.com/the-pentagons-china-military-report-why-americans-should-be-alarmed/">The Pentagon&#8217;s China Military Report: Why Americans Should Be Alarmed</a>&#8221; by Curtis McGiffin and Adam Lowther is a critical analysis of the Department of Defense&#8217;s 2023 report on China&#8217;s military developments. The authors highlight the significant increase in China&#8217;s nuclear capabilities and potential first-strike aspirations, which contradict its &#8220;No First Use&#8221; policy. They argue that the US needs a coherent strategy to counter this threat, emphasizing the urgency for more robust American deterrence measures in response to China&#8217;s rapid military expansion.</p>
<p>&#8220;<a href="https://globalsecurityreview.com/the-strategic-posture-commission-and-the-china-breakout/">The Strategic Posture Commission and the China Breakout</a>&#8221; by Peter Huessy discusses the rapid expansion of China&#8217;s nuclear capabilities and its implications for US strategic posture. Huessy highlights the significant growth of China&#8217;s nuclear arsenal and the development of advanced delivery systems. He emphasizes the need for the US to enhance its nuclear deterrence and missile defense capabilities in response to China&#8217;s expanding nuclear force. The article urges the US to consider strategic adjustments to maintain a credible deterrent against the evolving threat posed by China.</p>
<p>&#8220;<a href="https://globalsecurityreview.com/the-value-of-panda-diplomacy/">The Value of Panda Diplomacy</a>&#8221; by Alexis Littlefield explores the geopolitical symbolism of pandas in Sino-American relations. The article discusses how pandas leased to zoos, such as Tian Tian and Mei Xiang in Washington DC, represent diplomatic ties between China and the US. The return of these pandas to China signifies a shift in relations, especially in the context of China&#8217;s global influence and the Belt and Road Initiative. Littlefield examines the broader implications of these changes, suggesting pandas as indicators of China&#8217;s international relationships.</p>
<p>&#8220;<a href="https://globalsecurityreview.com/understanding-the-strategic-posture-commission-report/">Understanding the Strategic Posture Commission Report</a>&#8221; by Peter Huessy addresses the Congressional Commission&#8217;s findings on the strategic challenges posed by China and Russia. It highlights the United States&#8217; unpreparedness in nuclear deterrence against these peer adversaries. The report recommends strengthening the nuclear triad, deploying air and missile defense systems, and increasing cooperation with allies. It emphasizes the urgency of these recommendations and the need for phased modernization of US nuclear capabilities, considering the evolving strategic environment and the growing threats from China and Russia.</p>
<p>Download the full compendium here:</p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/01/2023-Compendium-of-Articles.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-26665 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/01/Download-This-Publication-300x83.png" alt="Get this publication" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/01/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/01/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/global-security-review-2023-article-compendium/">Global Security Review 2023 Article Compendium</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/global-security-review-2023-article-compendium/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Nano Aquabots and the US-China Science and Technology Cooperation Agreement</title>
		<link>https://globalsecurityreview.com/nano-aquabots-and-the-us-china-science-and-technology-cooperation-agreement/</link>
					<comments>https://globalsecurityreview.com/nano-aquabots-and-the-us-china-science-and-technology-cooperation-agreement/#respond</comments>
		
		<dc:creator><![CDATA[Alexis Littlefield]]></dc:creator>
		<pubDate>Thu, 14 Dec 2023 00:50:27 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[aquabots]]></category>
		<category><![CDATA[autonomous]]></category>
		<category><![CDATA[biology]]></category>
		<category><![CDATA[bots]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[nano]]></category>
		<category><![CDATA[nano technology]]></category>
		<category><![CDATA[neuroscience]]></category>
		<category><![CDATA[physics]]></category>
		<category><![CDATA[robots]]></category>
		<category><![CDATA[science]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=26519</guid>

					<description><![CDATA[<p>Americans are familiar with China’s rampant industrial espionage program, but they are often unfamiliar with US government–funded cooperation that serves a similar purpose for the Chinese—transferring sensitive intellectual property. This is why it is important that such collaboration receives scrutiny. Take the case of nano aquabots, an overlooked technology. Nano aquabots are a dual-use technology [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/nano-aquabots-and-the-us-china-science-and-technology-cooperation-agreement/">Nano Aquabots and the US-China Science and Technology Cooperation Agreement</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Americans are familiar with China’s rampant industrial espionage program, but they are often unfamiliar with <a href="https://crsreports.congress.gov/product/pdf/IF/IF12510">US government–funded cooperation</a> that serves a similar purpose for the Chinese—transferring sensitive intellectual property. This is why it is important that such collaboration receives scrutiny. Take the case of nano aquabots, an overlooked technology.</p>
<p>Nano aquabots are a dual-use technology that can both serve humanity and cause harm. Research on 3-lamellar morphology of miktoarm terpolymers is also dual-use technology. Manipulating the crystalline morphology in a non-fullerene acceptor (NFA) mixture to improve carrier transport and suppress energetic disorder is itself a dual-use technology. Ignoring all of the scientific language, it is important to understand that these are dual-use technologies.</p>
<p>All these technologies are funded in large part by the US government, in collaboration with the Chinese government and institutions. The dual-use nature of these examples is instructive. First, nano aquabots perform a variety of tasks in aquatic environments, ranging from environmental monitoring to targeted drug delivery within the human body. Weaponizing nano aquabots would lead to new and bizarre sci-fi warfare.</p>
<p>3-lamellar morphology of Miktoarm terpolymers have unique mechanical strength, thermal stability, and chemical resistance, which are pivotal in applications ranging from aerospace because of their lightweight yet strong components to biomedicine potentially revolutionizing certain medical treatments and interventions. The 3-lamellar morphology of these terpolymers paves the way for advancements in nanotechnology.</p>
<p>The primary benefit of manipulating crystalline morphology in NFA mixtures lies in the enhancement of carrier mobility. Energetic disorder refers to the variation in energy levels within a material. For example, this disorder can impede the performance of organic solar cells by trapping charge carriers and reducing their mobility. Suppression of energetic disorder advances stealth technology. It can also be used to harden electronics to withstand extreme temperatures, humidity, and other environmental stressors.</p>
<p>We are at the beginning of a multifaceted quantum revolution in science (MQRS). This multifaceted scientific revolution is fueled by its own discoveries in artificial intelligence, machine learning, quantum mechanics, and quantum computing. Imagine a hypothetical quantum battery that has the capacity to recycle its own energy as it continues to accelerate and deliver sustained power for exponential acceleration. The MQRS will, hypothetically, accelerate scientific discovery exponentially.</p>
<p>What are some of these facets that make this scientific revolution multifaceted? MQRS facets include revolutions in genetics, such as with techniques like CRISPR and gene therapy, biotechnology, nanotechnology, quantum mechanics, quantum computing, robotics, autonomous systems, space exploration, astrophysics, neuroscience, and brain-computer interfaces.</p>
<p>Unclassified research is available in peer reviewed academic journals such as the American Chemical Society’s (ACS) <em>Nano</em>, <em>Synthetic Biology</em>, <em>Macromolecules</em>, <em>Small Science</em>, <em>Emerging Microbes and Infections</em>, <em>Immunological Reviews</em>, <em>Journal of Computational Physics</em>, <em>Advanced Science</em>, <em>Advanced Materials</em>, <em>Advanced Electronic Materials</em>, and many more. Funding research trickles down from the <a href="https://www.energy.gov/science/fes/fusion-energy-sciences">Department of Energy</a> to labs such as the <a href="https://www.ornl.gov/science-area/national-security">Oak Ridge National Laboratory</a>, which, since 2000, is operated by the University of Tennessee and the <a href="https://www.battelle.org/markets/national-security">Battelle Memorial Institute</a>.</p>
<p>Other partners and funding include the Army Research Office, the Air Force Office of Scientific Research and <a href="https://www.energy.gov/science/bes/basic-energy-sciences">Basic Energy Sciences</a>. Partners on the Chinese side include Hong Kong’s <a href="https://www.ugc.edu.hk/eng/ugc/index.html">Research Grants Council, University Grants Committee</a>, <a href="https://croucher.org.hk/">Croucher Foundation</a>, Beijing’s <a href="https://www.nsfc.gov.cn/english/site_1/index.html">National Natural Science Foundation of China</a> directly under the administration of the PRC’s <a href="https://www.most.gov.cn/index.html">Ministry of Science and Technology</a>, and the Foreign Technology Cooperation Plan of Guangzhou, China.</p>
<p>This sensitive and advanced research has the blessing of the US Congress under the US-China Science and Technology Cooperation Agreement (STCA). Under this legislation, Congress requires the Departments of State, Defense, and Commerce and the Central Intelligence Agency to report to Congress biennially on how the US-China STCA benefits the PRC economy, military, and industrial base, including the role of technology transfer and compliance with American export controls.  According to the Congressional Research Service’s (CRS), <a href="https://crsreports.congress.gov/product/details?prodcode=IF12510">Karen M. Sutter and John F. Sargent Jr.</a>, “These reports have not been public; some that have been made public through Freedom of Information Act requests mostly do not provide the required assessments.”</p>
<p>The United States sees this as a tool to foster ties, address climate change, and advance science for overall well-being. According to Sutter and Sargent’s <a href="https://crsreports.congress.gov/product/details?prodcode=IF12510">report</a>, the benefits to American researchers is that they have access to large pools of research subjects and longitudinal health studies from China. This also means that Chinese researchers have access to American medical data, from databases such as those acquired through the 2013 <a href="https://www.asianscientist.com/2013/03/pharma/bgi-shenzhen-acquires-us-based-complete-genomics-117m/">BGI-Shenzhen acquisition of US-based Complete Genomics</a>. Also noted in the CRS report, as China develops domestic scientific competencies, it increasingly seeks to restrict US access. In 2019, China cut off US access to coronavirus research, including US-funded work at the Wuhan Institute of Virology. China withheld avian influenza strains required for American vaccines.</p>
<p>The MQRS will potentially accelerate until it hits an unforeseen black swan of a brick wall. China’s intentions toward the United States are not of the black swan variety; instead, they are of the plain-as-day white swan variety that Americans choose to ignore. And this is at a time when risks and rewards of the MQRS are growing more pronounced.</p>
<p>In short, Congress should remove China from its Science and Technology Cooperation Agreement. Americans should not take part in driving Chinese technical expertise forward. American tax dollars are also assisting China’s AI-driven research in advanced fields such as energy-dissipative evolutionary deep operator neural networks. Such work has application to military purposes. It would be foolish to believe the Chinese will not use all of the technologies discussed here to further their advantage over the United States.</p>
<p>China wants to overturn the liberal international order. American naivete is one way to make sure they succeed.</p>
<p><em>Alex Littlefield, PhD, is the Chief of Staff at the National Institute for Deterrence Studies and a Fellow of the Institute. He spent more than two decades in Taiwan and China.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2023/12/Nano-Aquabots-and-the-US-China-Science-and-Technology-Cooperation-Agreement.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-26183 size-full" src="http://globalsecurityreview.com/wp-content/uploads/2023/11/get-the-full-article.jpg" alt="" width="150" height="43" /></a></p>
<p><a href="https://globalsecurityreview.com/nano-aquabots-and-the-us-china-science-and-technology-cooperation-agreement/">Nano Aquabots and the US-China Science and Technology Cooperation Agreement</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/nano-aquabots-and-the-us-china-science-and-technology-cooperation-agreement/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
