<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Topic:Terrorism &#8212; Global Security Review %</title>
	<atom:link href="https://globalsecurityreview.com/subject/terrorism/feed/" rel="self" type="application/rss+xml" />
	<link>https://globalsecurityreview.com/subject/terrorism/</link>
	<description>A division of the National Institute for Deterrence Studies (NIDS)</description>
	<lastBuildDate>Mon, 20 Apr 2026 10:35:01 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://globalsecurityreview.com/wp-content/uploads/2023/10/cropped-GSR-Banner-LogoV2-32x32.png</url>
	<title>Topic:Terrorism &#8212; Global Security Review %</title>
	<link>https://globalsecurityreview.com/subject/terrorism/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Rising Security Threats in West Africa and Regional Responses</title>
		<link>https://globalsecurityreview.com/rising-security-threats-in-west-africa-and-regional-responses/</link>
					<comments>https://globalsecurityreview.com/rising-security-threats-in-west-africa-and-regional-responses/#comments</comments>
		
		<dc:creator><![CDATA[Huseini Kamara]]></dc:creator>
		<pubDate>Mon, 20 Apr 2026 12:12:34 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[arms smuggling]]></category>
		<category><![CDATA[Boko Haram]]></category>
		<category><![CDATA[climate change]]></category>
		<category><![CDATA[desertification]]></category>
		<category><![CDATA[development strategies]]></category>
		<category><![CDATA[drug trafficking]]></category>
		<category><![CDATA[Economic Community of West African States]]></category>
		<category><![CDATA[economic development]]></category>
		<category><![CDATA[education]]></category>
		<category><![CDATA[governance]]></category>
		<category><![CDATA[Gulf of Guinea]]></category>
		<category><![CDATA[Here is a comma-separated list of keywords from the paper:West Africa]]></category>
		<category><![CDATA[human trafficking]]></category>
		<category><![CDATA[infrastructure]]></category>
		<category><![CDATA[intelligence-sharing]]></category>
		<category><![CDATA[job creation]]></category>
		<category><![CDATA[maritime insecurity]]></category>
		<category><![CDATA[military coups]]></category>
		<category><![CDATA[peacekeeping]]></category>
		<category><![CDATA[piracy]]></category>
		<category><![CDATA[political instability]]></category>
		<category><![CDATA[poverty]]></category>
		<category><![CDATA[regional cooperation]]></category>
		<category><![CDATA[resource conflict]]></category>
		<category><![CDATA[Sahel]]></category>
		<category><![CDATA[security threats]]></category>
		<category><![CDATA[socio-economic marginalization]]></category>
		<category><![CDATA[stability]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[transnational organized crime]]></category>
		<category><![CDATA[violent extremism]]></category>
		<category><![CDATA[youth unemployment]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32593</guid>

					<description><![CDATA[<p>Published: April 20, 2026 West Africa has experienced an increasing number of national security challenges over the past two decades. Violent extremism, political instability, transnational organized crime, and maritime insecurity have created complex threats that undermine governance, economic development, and regional stability. According to the United Nations Africa Renewal, instability in the Sahel has become [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/rising-security-threats-in-west-africa-and-regional-responses/">Rising Security Threats in West Africa and Regional Responses</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Published: April 20, 2026</em></p>
<p>West Africa has experienced an increasing number of national security challenges over the past two decades. Violent extremism, political instability, transnational organized crime, and maritime insecurity have created complex threats that undermine governance, economic development, and regional stability. According to the <a href="https://www.un.org/africarenewal/magazine/august-2023/security-crisis-sahel">United Nations Africa Renewal</a>, instability in the Sahel has become one of the most pressing security concerns on the African continent, with escalating violence and growing humanitarian consequences. Countries such as Nigeria, Mali, Burkina Faso, and Niger have faced persistent security crises that require coordinated responses at both national and regional levels; issues that the world should be paying attention to.</p>
<p>One of the most serious security challenges in the region is the rise of violent extremist organizations operating in the Sahel. Groups affiliated with global jihadist movements have expanded their activities across national borders, transforming local conflicts into regional security threats. The Boko Haram insurgency in northeastern Nigeria is a prominent example. Since its emergence in the early 2000s, Boko Haram has conducted numerous attacks targeting civilians, government institutions, and security forces. The conflict has resulted in thousands of deaths and the displacement of millions of people. The insurgency has <a href="https://www.cfr.org/backgrounder/what-boko-haram">destabilized</a> large parts of the Lake Chad Basin and continues to pose a significant threat to regional stability.</p>
<p>The spread of extremist violence is not limited to Nigeria. Countries such as Mali and Burkina Faso have experienced rapid increases in militant attacks over the past decade. Armed groups have exploited weak state presence in rural areas, limited economic opportunities, and political grievances among marginalized communities. In many cases, extremist organizations present themselves as alternative authorities capable of providing protection and financial support to local populations. Militant organizations in the Sahel increasingly <a href="https://www.crisisgroup.org/africa/sahel">operate</a> across national borders, making regional coordination essential for effective counterterrorism responses.</p>
<p>Political instability has further complicated the security environment in West Africa. In recent years, several countries in the region have experienced military coups, including Mali, Guinea, Burkina Faso, and Niger. These political disruptions often occur in contexts where governments struggle to address security threats and economic challenges. Military interventions in politics can weaken democratic institutions and create governance gaps that extremist groups may exploit. Governance failures and security crises have <a href="https://www.brookings.edu/articles/why-coups-are-returning-to-africa/">contributed</a> significantly to the resurgence of military coups in parts of Africa.</p>
<p>Another important dimension of insecurity in West Africa involves organized transnational crime. Criminal networks operating across the region engage in activities such as drug trafficking, human trafficking, and arms smuggling. West Africa has become a major transit hub for cocaine shipments traveling from Latin America to European markets. Weak border controls and limited law enforcement capacity make it difficult for governments to combat these illicit networks effectively. Organized criminal networks in the region <a href="https://www.unodc.org/unodc/en/data-and-analysis/west-africa.html">frequently</a> intersect with extremist groups, enabling the trafficking of weapons and illicit commodities across borders.</p>
<p>Maritime insecurity also represents a growing challenge for coastal states in West Africa. The Gulf of Guinea has become one of the most dangerous maritime regions in the world due to piracy and armed robbery at sea. Criminal groups often target oil tankers and commercial vessels, stealing valuable cargo, and disrupting international shipping routes. These activities have significant economic consequences for regional trade and energy production. The <a href="https://www.imo.org/en/OurWork/Security/Pages/Gulf-of-Guinea.aspx">International Maritime Organization</a> has identified the Gulf of Guinea as a major global hotspot for maritime piracy and maritime crime.</p>
<p>Several structural factors contribute to the persistence of security threats in West Africa. Elevated levels of poverty and youth unemployment create conditions that extremist groups and criminal networks can exploit for recruitment. Many young people lack access to education and stable employment opportunities, making them vulnerable to financial incentives offered by militant organizations. The United Nations Development Program <a href="https://hdr.undp.org/">highlights</a> how socio-economic marginalization and limited state services contribute to instability in fragile regions.</p>
<p>Climate change has also intensified competition over natural resources in the Sahel region. Desertification and declining rainfall have reduced agricultural productivity, leading to conflicts between farming and pastoralist communities. These local disputes can escalate into broader security challenges when armed groups become involved. The World Bank has <a href="https://www.worldbank.org/en/topic/climatechange">emphasized</a> that environmental pressures and climate variability are increasingly linked to conflict dynamics in the Sahel.</p>
<p>Addressing national security threats in West Africa requires a comprehensive strategy that combines military responses with governance reforms and socio-economic development. Governments must strengthen democratic institutions and improve transparency to build public trust and reduce political instability. Effective governance is essential for preventing the conditions that allow extremist groups to expand their influence.</p>
<p>Regional cooperation is also critical for managing transnational threats. Organizations such as the <a href="https://www.ecowas.int">Economic Community of West African States</a> play a key role in coordinating peacekeeping missions and promoting political stability. Joint military operations and intelligence-sharing initiatives can improve the ability of governments to respond to cross-border insurgencies.</p>
<p>Economic development programs should be prioritized in regions most affected by insecurity. Investments in education, infrastructure, and job creation can help address the underlying socio-economic drivers of violence. Providing young people with economic opportunities reduces the likelihood that they will join extremist groups or criminal networks.</p>
<p>West Africa’s security challenges are complex and interconnected. However, through stronger governance, regional cooperation, and sustainable economic development, governments and regional organizations can significantly improve the prospects for long-term peace and stability in the region.</p>
<p><em>Huseini Kamara is a researcher with academic interests in national security, terrorism studies, and regional security dynamics in West Africa. His previous publication examined the role of artificial intelligence in ECG interpretation. The views expressed in this article are the author’s own<strong>.</strong></em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/04/Rising-Security-Threats-in-West-Africa-and-Regional-Responses.pdf"><img decoding="async" class="alignnone wp-image-32091" src="http://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png" alt="" width="212" height="59" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button-300x83.png 300w" sizes="(max-width: 212px) 100vw, 212px" /></a></p>
<p><a href="https://globalsecurityreview.com/rising-security-threats-in-west-africa-and-regional-responses/">Rising Security Threats in West Africa and Regional Responses</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/rising-security-threats-in-west-africa-and-regional-responses/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>The Intelligence Illusion: How AI is Exposing Strategic Vulnerabilities in the Developing World</title>
		<link>https://globalsecurityreview.com/the-intelligence-illusion-how-ai-is-exposing-strategic-vulnerabilities-in-the-developing-world/</link>
					<comments>https://globalsecurityreview.com/the-intelligence-illusion-how-ai-is-exposing-strategic-vulnerabilities-in-the-developing-world/#respond</comments>
		
		<dc:creator><![CDATA[Tahir Mahmood Azad]]></dc:creator>
		<pubDate>Thu, 05 Feb 2026 13:15:13 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Deterrence & Foreign Policy]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI–HUMINT fusion]]></category>
		<category><![CDATA[automated analysis]]></category>
		<category><![CDATA[big data]]></category>
		<category><![CDATA[CMS]]></category>
		<category><![CDATA[cyber technologies]]></category>
		<category><![CDATA[cyber-attacks]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[false information]]></category>
		<category><![CDATA[HUMINT]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[ISI]]></category>
		<category><![CDATA[NADRA]]></category>
		<category><![CDATA[NATGRID]]></category>
		<category><![CDATA[nuclearized]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Pegasus spyware]]></category>
		<category><![CDATA[political profiling]]></category>
		<category><![CDATA[RAW]]></category>
		<category><![CDATA[Safe City projects]]></category>
		<category><![CDATA[South Asia]]></category>
		<category><![CDATA[strategic vulnerabilities]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32261</guid>

					<description><![CDATA[<p>For decades, intelligence agencies in developing countries, especially in South Asia, have been portrayed as all-knowing, all-seeing, and deeply involved in every part of politics and security. Pakistan’s Inter-Services Intelligence (ISI) and India’s Research and Analysis Wing (RAW) are often mythologized as all-powerful institutions capable of shaping domestic politics and manipulating regional events. However, this [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-intelligence-illusion-how-ai-is-exposing-strategic-vulnerabilities-in-the-developing-world/">The Intelligence Illusion: How AI is Exposing Strategic Vulnerabilities in the Developing World</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>For decades, intelligence agencies in developing countries, especially in South Asia, have been portrayed as all-knowing, all-seeing, and deeply involved in every part of politics and security. Pakistan’s Inter-Services Intelligence <a href="https://ciaotest.cc.columbia.edu/olj/sa/sa-feb00-2.html">(ISI)</a> and India’s Research and Analysis Wing <a href="https://www.cfr.org/backgrounder/raw-indias-external-intelligence-agency">(RAW)</a> are often mythologized as all-powerful institutions capable of shaping domestic politics and manipulating regional events. However, this description disguises a basic reality: the traditional human intelligence <a href="https://www.dhs.gov/sites/default/files/2024-09/2024aepimpactofaiontraditionalhumananalysis.pdf">(HUMINT)</a>–centered model that sustained these agencies is being fundamentally disrupted by artificial intelligence (AI), big-data surveillance, and automated analysis. The actual picture today is not the strength of these institutions but the growing mismatch between their legacy intelligence cultures and the demands of the AI era.</p>
<p>AI has improved intelligence operations in developing nations, but it has also created a new intelligence gap due to disjointed technological implementation, political exploitation of surveillance, reliance on foreign suppliers, and insufficient integration between HUMINT and AI-driven systems. Pakistan and India have large human resources and developing technological ecosystems, but institutional fragmentation and political agendas prevent the development of integrated, modern intelligence frameworks.</p>
<p>The problems that South Asian intelligence services are having are part of a larger global transformation. AI is now a segment of intelligence operation in the US, China, Israel, and some <a href="https://rejolut.com/blog/13-top-ai-countries/#:~:text=Conclusion,and%20interact%20with%20the%20world.">European countries</a>. This includes automated translation, pattern-of-life analysis, algorithmic triage of intercepted data, commercial satellite imagery analytics, and cyber-enabled anomaly detection. <a href="https://bigdatachina.csis.org/the-ai-surveillance-symbiosis-in-china/">China’s surveillance</a> state uses AI-powered facial recognition, behavior prediction, and nationwide data fusion to show what a fully integrated intelligence model looks like. <a href="https://academic.oup.com/jogss/article/8/2/ogad005/7128314?login=false">The U.S.</a> is pushing for automated signals intelligence (SIGINT) processing and predictive analysis in all its intelligence agencies in the Office of the Director of National Intelligence (ODNI). As shown in studies of its military AI systems, <a href="https://media.setav.org/en/file/2025/02/deadly-algorithms-destructive-role-of-artificial-intelligence-in-gaza-war.pdf">Israel uses</a> AI in real-time targeting and ISR fusion.</p>
<p><a href="https://www.lesswrong.com/posts/cM7sR7seBRwtxctGY/the-ai-governance-gaps-in-developing-countries">Developing countries</a> are just as vulnerable to cyber-attacks, terrorism, and false information, but they do not have the institutional frameworks that let AI grow. This global gap is what makes the changes in intelligence in Pakistan and India so important for strategy. <a href="https://www.csohate.org/2025/09/15/advanced-surveillance-in-pakistan/#:~:text=On%209%20September%2C%20Amnesty%20International,regime%20of%20surveillance%20and%20censorship.">Pakistan</a> and <a href="https://ohrh.law.ox.ac.uk/ai-surveillance-and-privacy-in-india-human-rights-in-the-age-of-technology/#:~:text=This%20permissiveness%20undermines%20the%20Supreme,on%20getting%20that%20balance%20right.">India</a> have both spent resources on AI-enabled surveillance systems like ID databases, CCTV networks, predictive policing tools, interception systems, and cyber technologies that come from other countries. <a href="https://genderit.org/articles/between-privacy-and-power-fine-line-pakistans-data-protection-bill">The NADRA</a> database and <a href="https://www.biometricupdate.com/202402/pakistan-executes-ai-powered-criminal-identification-system#:~:text=Pakistan%20is%20rapidly%20advancing%20into,biometric%20criminal%20identification%20and%20detention.">Safe City</a> projects in Pakistan give a lot of biometric and real-time data. <a href="https://compass.rauias.com/current-affairs/surveillance-india/">India has made</a> the Central Monitoring System (CMS) and the National Intelligence Grid (NATGRID) to connect databases between state agencies. The ministry, military, police, and intelligence systems are separate. Legacy bureaucracies promote compartmentalization over integration. AI needs centralized databases, clean data, agency cooperation, and agreed <a href="https://link.springer.com/chapter/10.1007/3-540-48317-9_10">analysis criteria</a>. These requirements are missing; hence, AI systems exhibit limited and inconsistent intelligence. Agencies are collecting more data than ever but lack the framework to analyze it.</p>
<p>Pakistan and India still value HUMINT for intelligence. It is crucial for counterterrorism, political spying, and regional operations. HUMINT alone can&#8217;t compete with hybrid enemies who use AI-driven processing. Strategically, China’s integrated military and civilian AI ecosystem is advantageous. <a href="https://moderndiplomacy.eu/2024/10/17/ai-adoption-in-developing-countries-opportunities-challenges-and-policy-pathways/">Developing states</a> are stuck between two sources of intelligence: First is a legacy HUMINT system with deep networks and second is an AI ecosystem that is fragmented and not fully developed, so it cannot support strategic analysis. In cross-border threat assessments, cyber invasions, and emerging non-traditional security issues like information warfare, this mismatch causes delays, blind spots, and analytical distortions.</p>
<p>In both Pakistan and India, AI-enabled surveillance has been used more for political purposes than for improving strategic intelligence. <a href="https://www.amnesty.org/en/latest/news/2023/12/india-damning-new-forensic-investigation-reveals-repeated-use-of-pegasus-spyware-to-target-high-profile-journalists/#:~:text=In%202020%2C%20Amnesty%20International%20and,us%20for%20digital%20forensics%20support.">Amnesty International</a> reported that India’s use of Pegasus spyware targeted journalists, activists, and political opponents. <a href="https://ianslive.in/pakistan-deploys-digital-technology-to-spy-on-citizens--20251002183604#:~:text=The%20authorities%20have%20also%20repeatedly,been%20prevalent%20in%20Pakistani%20politics.">Pakistan</a> has been criticized for using automated social media monitoring and political profiling, which often focuses on threats from within the country rather than threats from other countries. When surveillance tools are used to control political competition within a party, two things happen. First, institutional resources prioritize domestic control over strategic analysis. Second, technology investments strengthen policing instead of updating intelligence. This challenges national security by making it harder for the intelligence system to predict cyberattacks, regional crises, and threats from outside the country.</p>
<p>South Asia has a lot of foreign AI and cyber infrastructure. Pakistan employs Chinese surveillance equipment (<a href="https://www.dailymirror.lk/amp/international/Pakistan-adopts-Chinas-surveillance-model-Amnesty-warns/107-319168">Hikvision, Huawei</a>), while India uses <a href="https://ijhssm.org/issue_dcp/Cybersecurity%20Synergy%20How%20India%20and%20Israel%20Are%20Teaming%20Up.pdf">Israeli,</a> <a href="https://www.business-standard.com/economy/news/india-s-reliance-on-us-software-cloud-services-poses-economic-risks-gtri-125091400281_1.html">US,</a> and European and American forensics platforms. This increases structural risks, including <a href="https://www.paloaltonetworks.co.uk/cyberpedia/data-exfiltration">data exfiltration</a> and espionage due to entrenched vulnerabilities, strategic reliance on foreign updates, and weakened sovereignty over vital intelligence activities.</p>
<p>Two traditional rivals, nuclear-weapon states, are weakened by this reliance. AI-powered surveillance systems increase digital access points for assault. Big national data repositories attract attackers. Pakistan has had multiple government system hacks, and India has had large breaches that compromised critical infrastructure and government information.  Failures in the past were largely caused by human error, but in the AI era, bias in algorithms, data manipulation, hostile and automated cyberattacks, and misclassification can lead to erroneous operational decisions. These dangers make the strategy unstable.</p>
<p>Increasing intelligence gaps between <a href="https://www.cloudsek.com/blog/brief-disruptions-bold-claims-the-tactical-reality-behind-the-india-pakistan-hacktivist-surge">Pakistan</a> and <a href="https://www.cloudsek.com/blog/brief-disruptions-bold-claims-the-tactical-reality-behind-the-india-pakistan-hacktivist-surge">India</a> jeopardize national and regional security. More likely to misjudge opponents: In fast-moving crises, agencies may miss signals, misjudge threats, or misread trends without AI–HUMINT fusion. Cross-border escalation risks rise; poor intelligence integration in nuclearized environments may aggravate misperceptions during crises like the 2019 Pulwama–Balakot incident or the May 2025 standoff. Cyber attacks expose national secrets. Easy-to-get digital network intelligence can have fatal repercussions. China-asymmetric strategic competition: China is decades ahead in intelligence upgrading, and Pakistan and India may fall further. Domestic AI reduces institutional capacity: political survival trumps strategic intelligence.</p>
<p>In summary, countries that do not update their intelligence risk being caught off guard, making mistakes, and becoming more vulnerable. The myths of shadows, secrecy, and huge people networks that fueled emerging country intelligence organizations are gone. AI has highlighted bureaucratic opacity’s long-hidden structural flaws: dysfunctional systems, politicized surveillance, reliance on foreign technology, and a lack of HUMINT-AI integration. Thus, Pakistan and India’s new intelligence divide is not about data or resources. It is about institutions’ failure to transition from analogue intelligence to AI-connected ecosystems. State and non-state adversaries that accelerate this transformation will benefit.</p>
<p>In nuclearized, crisis-prone South Asia, small misunderstandings could lead to massive wars. Pakistan and India need more than AI tools to stay competitive strategically. They need data architectures that work together, technical specialists, protocols to prevent politicians from abusing their authority, and strategic AI–HUMINT fusion.</p>
<p><em>Dr. Tahir Mahmood Azad is currently a research scholar at the Department of Politics &amp; International Relations, the University of Reading, UK.  Views expressed in this article are the author&#8217;s own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/02/The-Intelligence-Illusion-How-AI-is-Exposing-Strategic-Vulnerabilities-in-the-Developing-World.pdf"><img decoding="async" class="alignnone wp-image-32091" src="http://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png" alt="" width="245" height="68" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button-300x83.png 300w" sizes="(max-width: 245px) 100vw, 245px" /></a></p>
<p><a href="https://globalsecurityreview.com/the-intelligence-illusion-how-ai-is-exposing-strategic-vulnerabilities-in-the-developing-world/">The Intelligence Illusion: How AI is Exposing Strategic Vulnerabilities in the Developing World</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-intelligence-illusion-how-ai-is-exposing-strategic-vulnerabilities-in-the-developing-world/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Deterring Nuclear Terrorism in the Era of Great Power Competition</title>
		<link>https://globalsecurityreview.com/deterring-nuclear-terrorism-in-the-era-of-great-power-competition/</link>
					<comments>https://globalsecurityreview.com/deterring-nuclear-terrorism-in-the-era-of-great-power-competition/#respond</comments>
		
		<dc:creator><![CDATA[Alexis Schlotterback]]></dc:creator>
		<pubDate>Thu, 11 Sep 2025 12:10:13 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Deterrence & Foreign Policy]]></category>
		<category><![CDATA[Diplomacy]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[Arms Control]]></category>
		<category><![CDATA[Atomic]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cold war]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[global security]]></category>
		<category><![CDATA[Hezbollah]]></category>
		<category><![CDATA[ICBM]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[Taliban]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[Title 22]]></category>
		<category><![CDATA[UN]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31498</guid>

					<description><![CDATA[<p>As the Cold War ended and new counterterrorism priorities took root in the 2000s, the threat of nuclear terrorism cemented itself as the ultimate catastrophic scenario. Dick Cheney famously stated shortly after September 11, 2001, “If there was even a [one] percent chance of terrorists getting a weapon of mass destruction, and there has been [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/deterring-nuclear-terrorism-in-the-era-of-great-power-competition/">Deterring Nuclear Terrorism in the Era of Great Power Competition</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As the Cold War ended and new counterterrorism priorities took root in the 2000s, the threat of nuclear terrorism cemented itself as the ultimate catastrophic scenario. Dick Cheney famously <a href="https://www.rutlandherald.com/news/a-dangerous-new-doctrine/article_d3f0ec56-ed87-578c-b2ae-db58c7929d9c.html">stated</a> shortly after September 11, 2001, “If there was even a [one] percent chance of terrorists getting a weapon of mass destruction, and there has been a small probability of such an occurrence for some time, the United States must now act as if it were a certainty.”</p>
<p>Great care was taken to <a href="https://armscontrolcenter.org/fact-sheet-the-nunn-lugar-cooperative-threat-reduction-program-2/">secure</a> the Soviet Union’s nuclear weapons following the collapse of the state for this very purpose. The Obama administration later <a href="https://obamawhitehouse.archives.gov/the-press-office/2016/03/29/fact-sheet-nuclear-security-summits-securing-world-nuclear-terrorism">held </a>four nuclear security summits to inspire international cooperation for increasing physical security at nuclear facilities. Today, the National Nuclear Security Administration’s (NNSA) Office of Material Management and Minimization leads the effort to <a href="https://www.energy.gov/nnsa/qualification-new-leu-fuels-research-reactors">convert</a> the fuel in various international civilian reactors from weapons-usable highly enriched uranium (HEU) to less risky low enriched uranium (LEU).</p>
<p>Despite these successes, it remains difficult to definitively discern whether specific action prevented and deterred nuclear terrorism or if other factors are at play for why such an event never materialized. It is a fact that no terrorist group has yet successfully pursued a strategy to develop a nuclear device. Yet, it may very well be the case that no group has ever legitimately tried. Terrorism as a strategy of targeted political violence may be largely incompatible with the consequences of acquiring and detonating an improvised nuclear device.</p>
<p>In 2004, US President George W. Bush received unanimous support from the UN for a resolution calling on countries to enact stronger controls to block terrorists from acquiring biological, chemical, and nuclear weapons. Since then, American policy turned away from the global war on terror and back to the strategic competition found in the Cold War. The fourth International Conference on Nuclear Security (<a href="https://www.armscontrol.org/act/2024-06/news/states-discuss-nuclear-security-iaea">ICONS</a>) held in May 2024 was the first of its kind to conclude without a ministerial declaration. Yet, the risk of nuclear terrorism has arguably not grown despite a shift in national security priorities.</p>
<p>In a 2019 <a href="https://thebulletin.org/2019/11/would-terrorists-set-off-a-nuclear-weapon-if-they-had-one-we-shouldnt-assume-so/">piece</a> written for the <em>Bulletin of Atomic Scientists</em>, authors Christopher McIntosh and Ian Storey argue that there are four main options for a terrorist group that acquires a nuclear weapon: blackmail, opacity, latency, and dormancy. These options fall on a spectrum from overt threats of nuclear use to keeping the existence of a nuclear device a secret until its detonation. In all of these strategies, however, deterring a nuclear attack is possible as the outcome for use is the same: guaranteed massive retaliation from state governments.</p>
<p>As outlined by Keith Payne in a National Institute of Public Policy <a href="https://www.tandfonline.com/doi/pdf/10.1080/01495933.2012.647528">report</a>, some scholars incorrectly assume that terrorist groups are undeterrable because they are irrational and possess no territory to hold at risk for assured retaliation. Terrorism is a fundamentally <a href="https://thesoufancenter.org/intelbrief-the-state-of-global-terrorism-remains-intensely-local/">local</a> endeavor and maintaining the <a href="https://www.pewresearch.org/global/2006/05/23/where-terrorism-finds-support-in-the-muslim-world/">support</a> from the surrounding populations is key to preserving the cause. A deterrence by punishment scenario therefore also involves inciting local communities to turn on the terrorists they harbor.</p>
<p>Title 22 of the United States Code, Section 2656f(d) defines terrorism as “premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups or clandestine agents, usually intended to influence an audience.” The key word is “premeditated” and supports the argument that groups employing terrorism are indeed rational actors, with their decisions about <a href="https://www.journals.uchicago.edu/doi/abs/10.1017/S0022381608080419?journalCode=jop">organizational structure</a>, <a href="https://financialservices.house.gov/news/documentsingle.aspx?DocumentID=403893">monitoring of funds</a>, and <a href="https://www.washingtoninstitute.org/policy-analysis/digital-battlefield-how-terrorists-use-internet-and-online-networks-recruitment-and">selection of recruits</a> providing evidence to support this statement. As with any rational actor, deterrence is possible.</p>
<p>A deterrence-by-denial strategy, although more difficult, is also legitimate. Ensuring states make it as difficult as possible for groups to acquire material aims to deter groups from even trying. Convincing states to do this may then require assured retaliation from other states. Perhaps there is a reason why former Secretary of Defense William Perry’s <a href="https://www.brookings.edu/events/crisis-on-the-korean-peninsula-implications-for-u-s-policy-in-northeast-asia/">fears</a> of North Korea selling plutonium to the highest bidder never materialized. For a regime already well-familiar with the international community’s condemnation of its nuclear program, giving others another reason to take out its nuclear facilities by selling material to a group would be strategically unwise.</p>
<p>However, for a nuclear peer of the United States, such as Russia, holding it responsible for lax security is more difficult. In 2011, a Moldovan lawyer was <a href="https://www.vice.com/en/article/an-unknown-black-marketeer-from-russia-may-have-the-fuel-for-a-nuclear-bomb/">caught</a> attempting to sell HEU on the black market. Forensic analysis confirmed the material very likely originated from Russia. This is not the first time weapon-usable nuclear material has gone <a href="https://bellona.org/news/nuclear-issues/radioactive-waste-and-spent-nuclear-fuel/2002-11-gan-says-nuclear-materials-have-been-disappearing-from-russian-plants-for-10-years">missing</a> from Russia. Still, Russia, like any other state, is motivated to prevent nuclear terrorism within its borders; the likeliest place for such an attack to happen is near the facility where material goes missing.</p>
<p>In physicist Michael Levi’s <a href="https://issues.org/levi-2/">opinion</a>, deterrence credibility is better served with certain attribution following an attack. Going further than assessing a relationship between a state program and a terrorist group, nuclear forensics attempts to identify exactly which country interdicted material originated. At best, a state would be forced to admit poor security practices that led to the theft of material. If used in a terror device, this excuse may not hold up to international scrutiny with any community affected still demanding its pound of flesh.</p>
<p>Neither a strategy of deterrence by punishment or by denial requires the level of explicit policy that was seen in the early 2000s. While not unhelpful, it is rather the continued existence of nuclear-armed states with massive conventional superiority over terror groups that may be the most successful tool in combating the risk of nuclear terrorism. Deterrence against nuclear terrorism, for now, is holding.</p>
<p><em>Alexis Schlotterback is a Senior Analyst at the National Institute for Deterrence Studies. Views expressed are the author&#8217;s own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/09/Nuclear-Terrorism-Deterrence.pdf"><img decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="263" height="73" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 263px) 100vw, 263px" /></a></p>
<p><a href="https://globalsecurityreview.com/deterring-nuclear-terrorism-in-the-era-of-great-power-competition/">Deterring Nuclear Terrorism in the Era of Great Power Competition</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/deterring-nuclear-terrorism-in-the-era-of-great-power-competition/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Deterring Iran: The Art of No Deal</title>
		<link>https://globalsecurityreview.com/deterring-iran-the-art-of-no-deal/</link>
					<comments>https://globalsecurityreview.com/deterring-iran-the-art-of-no-deal/#respond</comments>
		
		<dc:creator><![CDATA[Christophe Bosquillon]]></dc:creator>
		<pubDate>Mon, 28 Jul 2025 11:09:42 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Arrow-2]]></category>
		<category><![CDATA[Arrow-3]]></category>
		<category><![CDATA[ballistic missiles]]></category>
		<category><![CDATA[bombing raid]]></category>
		<category><![CDATA[C4ISR]]></category>
		<category><![CDATA[cyber intelligence]]></category>
		<category><![CDATA[David’s Sling]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[Donald Trump]]></category>
		<category><![CDATA[electronic warfare]]></category>
		<category><![CDATA[Friedrich Merz]]></category>
		<category><![CDATA[Gulf States]]></category>
		<category><![CDATA[Hezbollah]]></category>
		<category><![CDATA[houthis]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[IRGC]]></category>
		<category><![CDATA[Iron Beam]]></category>
		<category><![CDATA[Iron Dome]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[maritime security]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[missile defense]]></category>
		<category><![CDATA[Mission Delta 4]]></category>
		<category><![CDATA[nuclear facilities]]></category>
		<category><![CDATA[oil markets]]></category>
		<category><![CDATA[Patriot]]></category>
		<category><![CDATA[regime change]]></category>
		<category><![CDATA[Shia hegemony]]></category>
		<category><![CDATA[SIGINT]]></category>
		<category><![CDATA[situational awareness]]></category>
		<category><![CDATA[Syrian leadership.]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[THAAD]]></category>
		<category><![CDATA[Türkiye]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[US Space Force]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31265</guid>

					<description><![CDATA[<p>Since its inception, the Iranian regime (1979) has terrorized and subjugated the Middle East and killed far too many Americans. For nearly 50 years, Iran successfully used a combination of proxies and agents of influence within the US and Europe to deter the West. The regime also built a credible missile program with thousands of [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/deterring-iran-the-art-of-no-deal/">Deterring Iran: The Art of No Deal</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Since its <a href="https://www.britannica.com/event/Iranian-Revolution">inception</a>, the Iranian regime (1979) has terrorized and subjugated the Middle East <a href="https://www.fdd.org/analysis/2025/06/19/iranian-and-iranian-backed-attacks-against-americans-1979-present/">and killed far too many Americans</a>. For nearly 50 years, Iran successfully used a combination of proxies and agents of influence within the US and Europe to deter the West. The regime also built a credible missile program with thousands of ballistic missiles, useful for blackmail. Iran’s effort to deceive the West about its nuclear ambitions was not allowed to last indefinitely.</p>
<p>By mid-June 2025, after years of preparation, the Israelis, in one fell swoop, destroyed half of Iran’s ballistic missile capabilities, destroyed some nuclear facilities, and assassinated Iran’s leading nuclear scientists and the leadership of the <a href="https://www.wsj.com/world/middle-east/irans-islamic-revolutionary-guard-poised-for-more-power-7ed0ba63">Islamic Revolutionary Guard Corps</a> (IRGC). Then on June 23, 2025, a pre-dawn bombing raid <a href="https://www.youtube.com/watch?v=LSfs58cGx1U">ordered by US President Donald Trump</a> took out of commission the hard-to-crack nuclear facilities of Fordow, Natanz, and Esfahan.</p>
<p>Beyond adding to Israel’s capabilities with American B2 bombers loaded with GBU-57 massive ordnance penetrators, <a href="https://www.bbc.com/news/articles/cvg9r4q99g4o">bunkers busters</a>, the bombing cemented American leadership in dealing with the Iran problem. A review of joint Israel-US capabilities helps explain how deterrence in the region is returning and what to expect next.</p>
<p>Since the October 7, 2023, massacre of Israelis by Hamas, an Iranian proxy, Israeli intelligence and military units, all backed by superior defense technology, methodically destroyed Iranian capabilities and supporters. Iran’s “<a href="https://jiss.org.il/en/amidror-irans-ring-of-fire/">Ring of Fire</a>” utterly failed to achieve Iran’s strategic aims.</p>
<p>Israeli and American <a href="https://jinsa.org/jinsa_report/us-should-leverage-middle-east-partners-to-boost-space-capabilities/">space-based intelligence, surveillance, and reconnaissance</a> enabled early warning, target verification, and battle damage assessment. Israel relied on a precision-strike doctrine that is supported by systems like the <a href="https://www.gov.il/en/pages/ofek-13-satellite-successfully-launched-into-space-29-mar-2023">Ofek</a>, <a href="https://ts2.tech/en/inside-israels-space-power-satellites-services-and-the-secret-strength-of-the-israel-space-agency/">AMOS</a>, and <a href="https://www.eoportal.org/satellite-missions/eros-b">Eros-B</a> space assets. Israel maintained surveillance for dominance above Iranian military and nuclear infrastructures. Iran merely <a href="https://globalsecurityreview.com/irans-quest-for-middle-east-hegemony/">linked its space program</a> to the <a href="https://www.cfr.org/backgrounder/irans-revolutionary-guards">IRGC</a>.</p>
<p>With multi-layer sensor fusion, Israel integrates <a href="https://www.timesofisrael.com/topic/eitan-uav/">Eitan unmanned aerial vehicles</a> (UAV), <a href="https://www.iai.co.il/p/elw-2090">ELW-2090 airborne warning and control systems</a>, and ground-based radars like the <a href="https://armyrecognition.com/military-products/army/radars/air-defense-radars/green-pine-elm-2080-elm-2080s">EL/M-2080 Green Pine</a> with satellite data into a national and regional situational awareness (SA) web, shaping strikes and missile defense prioritization. Space-derived situational awareness enables real-time assessment of missile launches, UAV swarm attacks, or asymmetric maritime threats by Iran and proxies operating from the Red Sea or Persian Gulf.</p>
<p>Cyber intelligence, signal intelligence (<a href="https://www.elbitsystems.com/land/land-ew-sigint">SIGINT</a>), and electronic warfare form another layer. In the conflict, Israel <a href="https://www.idf.il/en/mini-sites/directorates/c4i-and-cyber-defense-directorate/c4i-and-cyber-defense-directorate/">command, control, communications, and computer (C4) systems</a> pit <a href="https://www.jpost.com/israel-news/defense-news/article-820689">Unit 8200</a> against <a href="https://ir.usembassy.gov/designating-iranian-cyber-officials/">IRGC</a> affiliated cyber units.</p>
<p>Israel’s missile shield includes <a href="https://www.rafael.co.il/system/iron-dome/">Iron Dome</a>, <a href="https://www.rafael.co.il/system/medium-long-range-defense-davids-sling/">David’s Sling</a>, and <a href="https://www.timesofisrael.com/israel-running-low-on-arrow-interceptors-us-burning-through-its-systems-too-wsj/">Arrow-2/Arrow-3</a>. They combine to create a web of coverage. Arrow’s high-altitude, long-range interceptors tackle <a href="https://news.usni.org/2025/06/18/report-to-congress-on-irans-ballistic-missile-programs">Iranian ballistic missiles</a> such as <a href="https://militarywatchmagazine.com/article/iran-launches-first-strike-isreal-mach-13-fattah-hypersonic">Fattah</a>, <a href="https://missilethreat.csis.org/missile/shahab-3/">Shahab</a>, and <a href="https://www.euronews.com/2025/06/20/new-missile-enters-israel-iran-conflict-what-we-know-about-tehrans-sejil">Sejil</a>. <a href="https://www.rafael.co.il/system/iron-beam/">Iron Beam</a> laser defense, under development, aims to address low-cost, high-volume threats like UAVs and small rockets.</p>
<p>Israeli capabilities for missile defense, early warning, C4, and interoperability are integrated with US <a href="https://www.centcom.mil/">Central Command</a> and the systems of the Gulf States. The US supports Arrow and David’s Sling. <a href="https://www.lockheedmartin.com/en-us/products/aegis-combat-system.html">Aegis</a> ballistic missile defense and terminal high altitude area defense (<a href="https://www.lockheedmartin.com/en-us/products/thaad.html">THAAD</a>) systems in the region share radar feeds. <a href="https://www.spaceforce.mil/about-us/fact-sheets/article/2197746/space-based-infrared-system/">American space-based infra-red system satellites</a> provide missile-launch detection.</p>
<p><a href="https://cnreurafcent.cnic.navy.mil/Installations/NSA-Bahrain/">Bahrain hosts the US Navy</a> and supports regional <a href="https://www.defenseone.com/insights/cards/c4isr-military-nervous-system/">C4ISR</a>, and has growing maritime security ties with Israel. The US expanded its Saudi Arabian basing in <a href="https://www.middleeasteye.net/news/us-exploring-new-bases-saudi-arabia-counter-iran">Tabuk</a> to feed into the regional missile defense picture. The United Arab Emirates <a href="https://armyrecognition.com/news/army-news/2025/exclusive-united-arab-emirates-boosts-air-defense-capabilities-with-m-sam-ii-integrating-with-us-pac-3-and-thaad">enables THAAD, Patriot (PAC-3), radar integration, and air picture sharing</a> with the US and <a href="https://www.crisisgroup.org/middle-east-north-africa/gulf-and-arabian-peninsula/united-arab-emirates-israelpalestine/uae-israel">Israel</a>. Jordan, the United Kingdom, and France also contribute to defensive actions during missile and drone attacks.</p>
<p>Iranian targets and their proxies have nowhere to hide. The <a href="https://www.spoc.spaceforce.mil/About-Us/Fact-Sheets/Display/Article/3878161/mission-delta-4-missile-warning">US Space Force’s Space Operations Command Mission Delta 4</a> identifies and tracks threats. It did so during the <a href="https://www.airandspaceforces.com/space-force-guardians-missile-warning-iran-israel/">April 2024 </a>and <a href="https://www.airandspaceforces.com/space-force-guardians-second-iranian-missile-attack/">October 2024</a> Iranian missile and drone attacks on Israel. Operating 24 hours a day, 365 days a year to share intelligence, Mission Delta 4 ensures no missile launch ever catches America or her allies and partners by surprise.</p>
<p><a href="https://www.fdd.org/analysis/2023/03/16/israel-super-capabilities-in-space/">A space-enabled Israel</a>, integrated with Gulf State operations, eliminated Iranian air defenses, triggered covert operations inside Iran, and launched targeted bombings and assassinations. The American bombing topped these other efforts. Israel, as the military strong horse, irreversibly altered the regional balance of power, possibly ushering in the demise of a threatening Iranian Shia hegemony—an objective shared by Sunni Arab Gulf States.</p>
<p>Regime change was never a stated war aim but was an anticipated consequence if it occurred. It did not. The surviving Shia Islamist leadership and IRGC are now engaged in repression and remain capable of inflicting much suffering on both the region and Iranians.</p>
<p>It is unclear to which extent proxies such as Hezbollah, the Houthis, and Shia militias can still attack Israel and American assets in the region. Military outcomes, though, are not the sole factors defining the Iranian endgame. The Iranian <a href="https://globalsecurityreview.com/us-iran-talks-unlikely-to-succeed-absent-a-military-strike/">taqiyya-driven regime</a> and its Shia hegemony ideology are down, but not out. Their nefarious ideological influence can persist <a href="https://globalsecurityreview.com/the-geostrategic-mind-of-iran/">around the Gulf, as far as Yemen and Africa, and beyond</a>.</p>
<p>Considering the cost of inaction and a failure to reinstate deterrence, eradicating a threat to the homeland, Middle East bases, and Gulf allies means the effort was worth it. If the conflict drags on, the costs will rise. Disruption of maritime traffic and oil markets could bring its predictable cohort of economic disruptions. Terrorism around the globe is <em>déjà vu</em>.</p>
<p>In the words of German Chancellor Friedrich Merz, “<a href="https://www.timesofisrael.com/liveblog_entry/germanys-merz-says-israel-is-doing-the-dirty-work-for-all-of-us-by-countering-iran/">Israel is doing the dirty work for all of us</a>.” Depending on the roles the new Syrian leadership and a resurgent Türkiye play, <a href="https://globalsecurityreview.com/is-this-the-right-moment-to-act-against-iran-on-all-fronts/">the Iranian endgame</a> may take different forms.</p>
<p>Yes, President Trump decisively <a href="https://globalsecurityreview.com/who-truly-benefits-from-a-us-iran-new-nukes-deal/">played the hand he was dealt</a>. But there are many more moves left in this game. The best moves may be still to come.</p>
<p><em>Christophe Bosquillon is a senior fellow at the National Institute for Deterrence Studies. He has over 30 years of international experience in general management, foreign direct investment, and private equity and fund management across various industries in Europe and the Pacific Basin. The views expressed are the author’s own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/07/DETERRING_IRAN_ChrisB_2025_0621_.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="248" height="69" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 248px) 100vw, 248px" /></a></p>
<p><a href="https://globalsecurityreview.com/deterring-iran-the-art-of-no-deal/">Deterring Iran: The Art of No Deal</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/deterring-iran-the-art-of-no-deal/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Pakistan Is Not Building an ICBM to Attack America</title>
		<link>https://globalsecurityreview.com/pakistan-is-not-building-an-icbm-to-attack-america/</link>
					<comments>https://globalsecurityreview.com/pakistan-is-not-building-an-icbm-to-attack-america/#respond</comments>
		
		<dc:creator><![CDATA[Anum A. Khan]]></dc:creator>
		<pubDate>Thu, 10 Jul 2025 11:28:53 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Deterrence & Foreign Policy]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Ababeel]]></category>
		<category><![CDATA[Afghanistan conflict]]></category>
		<category><![CDATA[Agni-V]]></category>
		<category><![CDATA[Agni-VI]]></category>
		<category><![CDATA[Arms Control]]></category>
		<category><![CDATA[ASAT]]></category>
		<category><![CDATA[blue-water Navy]]></category>
		<category><![CDATA[China-India crisis]]></category>
		<category><![CDATA[CMD]]></category>
		<category><![CDATA[cold war]]></category>
		<category><![CDATA[democracy]]></category>
		<category><![CDATA[economic trade]]></category>
		<category><![CDATA[freedom]]></category>
		<category><![CDATA[FSD]]></category>
		<category><![CDATA[geostrategic fears]]></category>
		<category><![CDATA[ICBM]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[ISR]]></category>
		<category><![CDATA[K-5 SLBM]]></category>
		<category><![CDATA[military satellites]]></category>
		<category><![CDATA[MIRV]]></category>
		<category><![CDATA[MRBM]]></category>
		<category><![CDATA[nuclear doctrine]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Shaheen III]]></category>
		<category><![CDATA[South Asia stability]]></category>
		<category><![CDATA[stability]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[US-Pakistan relations]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=31143</guid>

					<description><![CDATA[<p>Misperceptions are circulating that Pakistan is an intercontinental ballistic missile (ICBM) threat to the United States despite the fact that none of its missiles have a range beyond 2,750 kilometers (km)—the distance needed to cover India. There is no credible official or open-source intelligence that explains why Pakistan would seek to build an ICBM to [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/pakistan-is-not-building-an-icbm-to-attack-america/">Pakistan Is Not Building an ICBM to Attack America</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.foreignaffairs.com/united-states/how-survive-new-nuclear-age-narang-vaddi">Misperceptions</a> are circulating that Pakistan is an intercontinental ballistic missile (ICBM) <a href="https://www.business-standard.com/article/pti-stories/china-helping-pak-with-icbm-us-congressman-116042900380_1.html">threat</a> to the United States despite the fact that none of its missiles have a range beyond 2,750 kilometers (km)—the distance needed to cover India. There is no credible official or open-source intelligence that explains why Pakistan would seek to build an ICBM to attack the US.</p>
<p>One thing is clear: Pakistan’s nuclear capability is solely focused on India. Claims to the contrary misrepresent Pakistan’s doctrinal posture while creating unfounded geostrategic fears.</p>
<p>Unlike North Korea or Russia, Pakistan’s nuclear doctrine is India-focused and regionally confined. Even when it became a nuclear power, it was not the first country to introduce nuclear weapons in South Asia. Pakistan’s missile inventory includes the Shaheen, Ghauri, Ababeel, and other series of missiles. They are all short- or medium-range missile systems to counter Indian nuclear capabilities. Even Pakistan’s multiple independently targetable reentry vehicle (MIRV)–capable medium-range ballistic missile (MRBM), the Ababeel, has a range of 2,200 km and is <a href="https://defencesecurityasia.com/en/pakistan-ababeel-missile-mirv/">a response to</a> India’s ballistic missile defense system.</p>
<p>Moreover, Pakistan’s Shaheen III land-based MRBM has a range of 2,750 to <a href="https://carnegie-production-assets.s3.amazonaws.com/static/files/03-230315carnegieKIDWAI.pdf">cover</a> Indian far-off strategic bases in the Andaman and Nicobar Islands. These missile ranges are not even close to the ICBM <a href="https://missilethreat.csis.org/missile/ababeel/">threshold</a> of at least 5,500 km.</p>
<p>Unlike nuclear weapon states that have ICBMs, Pakistan does not possess the intelligence, surveillance, and reconnaissance (ISR) capability, terrestrial or space-based, needed to accurately launch nuclear weapons half-way across the planet. India, not Pakistan, is working on not just ICBMs, but also the global ISR infrastructure to effectively employ such weapons. India <a href="https://cissajk.org.pk/2025/04/16/the-k-5-conundrum-indias-rising-missile-reach-and-the-global-blind-spot/">has</a> not only tested the Agni-V, which has a range of 8,000+ km but is also <a href="https://x.com/zahirhkazmi/status/1938311654472880368">developing</a> the Agni-VI with a 12,000 km range. The K-5 submarine-launched ballistic missile (SLBM), with intercontinental strike capability, is also in development.</p>
<p>It is alarming to note that the deployment of K-5 SLBMs on expansive ocean patrols can enable India to target Europe, Russia, Israel, and American Pacific territories. Such Indian military and nuclear buildup are not consistent with India’s policy of credible minimum deterrence (CMD).</p>
<p>Currently, India is accelerating the <a href="https://m.economictimes.com/news/defence/operation-sindoor-triggers-indias-space-shield-push-with-52-defence-satellites-by-2029/articleshow/122151610.cms">deployment</a> of 52 military satellites for ISR. These satellites will support ICBM employment and anti-satellite (ASAT) weapons capabilities.</p>
<p>Indian naval nuclear projection also indicates that it will develop military bases abroad in accord with its <a href="https://jmss.org/article/download/57675/43345#:~:text=This%20push%20for%20a%20'blue,establish%20'blue%20water'%20capability.">ambitions</a> to be a blue-water navy. India is developing overseas military facilities across the Indian Ocean region, <a href="https://deshwale.com/india-military-bases-mauritius-maldives-seychelles/">including</a> in the Seychelles, Tajikistan, Oman, the Maldives, and Mauritius. India also has signed logistic support agreements (LSAs) with states for mutual logistic support at ports and bases. These agreements also include ISR agreements <a href="https://journals.carc.com.pk/index.php/CRISS/article/view/32">with</a> Australia, France, Russia, Singapore, South Korea, the United Kingdom, the US, and Vietnam.</p>
<p>Pakistan’s strategic culture and historic interests reflect a deep concern with losing a conflict against India. This is because Pakistan does not have the geography that allows for a defense in depth against an attacking Indian Army. Thus, both conventional and nuclear forces are designed to deter and defeat that specific threat.</p>
<p>Pakistan’s nuclear doctrine is defined by the logic of CMD. Its full-spectrum deterrence (FSD) posture also falls under CMD at all levels of threat, including tactical, operational, and strategic. The development of an ICBM is inconsistent with every aspect of Pakistani military thinking and action.</p>
<p>Pakistan already fields the capabilities needed to strike any target in India. Pakistan has no ambitions regarding global power projection. From a Pakistani perspective, building nuclear weapons for the sake of coercing or striking the United States only makes the relationship with the United States worse and invites American intervention in Pakistan.</p>
<p>When Vipin Narang and Pranay Vaddi, Indian Americans, <a href="https://www.foreignaffairs.com/united-states/how-survive-new-nuclear-age-narang-vaddi">published</a> an article in <em>Foreign Affairs</em> in which they suggested Pakistan is building an ICBM whose target is the United States, they engaged in blatant information warfare. Their assertion is unfounded.</p>
<p>India’s shift from deterrence-by-denial to a more aggressive nuclear posture, <a href="https://thefridaytimes.com/26-Jun-2025/rebuttal-pakistan-in-the-new-nuclear-age">including</a> deterrence by compellence and punishment, certainly has Pakistan concerned. This change is tolerated by the United States because India is seen as a counterweight to China in Asia.</p>
<p>It is important for Americans to learn a critical lesson from the 2020 China-India crisis; India is unlikely to <a href="https://www.dawn.com/news/1796320">fight</a> with the US against China if a war comes. China is the second-largest trade partner of India after the US with <a href="https://www.nextias.com/ca/current-affairs/18-04-2025/india-trade-deficit-with-china-widened?utm_source=chatgpt.com">total</a> trade reaching $127.7 billion in 2024–2025. There is ample reason for India to do what it has always done, play both sides.</p>
<p>Admittedly, Pakistan has a problem with terrorism and a difficult time effectively controlling terrorists operating from the Afghan border region, which grew worse when Pakistan partnered with the US to fight the War on Terror. Pakistan is now the <a href="https://www.arabnews.com/node/2592624/pakistan">second</a> most negatively affected country when it comes to terrorism.</p>
<p>Over recent years, Islamabad alone lost 80,000 civilian and security personnel to the menace of terrorism. India has also been involved in terror activities in Pakistan, <a href="https://issi.org.pk/wp-content/uploads/2017/10/7-SS_Mir_sherbaz_Khetran_No-3_2017.pdf">irrefutable</a> evidence of Indian involvement was provided to UN Secretary-General.</p>
<p>Keep in mind, the vast majority of Pakistanis want to live in a country that looks like the United States, not one that looks like Afghanistan or China—when it comes to democracy, economic prosperity, freedom, and stability. Pakistanis want increased economic trade and development with the United States, not nuclear war.</p>
<p>As India expands its capabilities, Pakistan is likely to follow India’s lead. This is, however, done for the purpose of ensuring India cannot launch a disarming strike against Pakistan. Platforms like SSBNs may be necessary as Pakistan is <a href="https://tdhj.org/blog/post/nuclear-weapons-sea-based-platforms-south-asia/">compelled</a> to diversify, not globalize, its range of nuclear weapons.</p>
<p>If the US is sincere in its desire to create stability in South Asia, encouraging India to cease building nuclear weapons that are a direct threat to Pakistan would be helpful. The US can also invest in arms control dialogue and crisis communication in South Asia. President Trump played a key role in ending the most recent conflict. He also ended the Twelve Day War between Iran and Israel. Given his concern for preventing war, President Trump can play a critical role in South Asia.</p>
<p>Pakistan has partnered with the United States since its independence from India. It was a partner during the Cold War when India was not and worked closely with the United States for two decades during the conflict in Afghanistan. Admittedly, Pakistan faces some internal challenges, but educated Pakistanis want nothing more than a good relationship with the United States.</p>
<p><em>Anum A. Khan is an Associate Director at the Centre for International Strategic Studies (CISS), Islamabad, a Youth Leader Fund (YLF) Mentor with the United Nations Office for Disarmament Affairs (UNODA), and Project Associate of The Third Nuclear Age Project</em>.</p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/07/Pakistan-is-Not-Building-an-ICBM.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="259" height="72" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 259px) 100vw, 259px" /></a></p>
<p><a href="https://globalsecurityreview.com/pakistan-is-not-building-an-icbm-to-attack-america/">Pakistan Is Not Building an ICBM to Attack America</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/pakistan-is-not-building-an-icbm-to-attack-america/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>FYI to the GOP on NATO</title>
		<link>https://globalsecurityreview.com/fyi-to-the-gop-on-nato/</link>
					<comments>https://globalsecurityreview.com/fyi-to-the-gop-on-nato/#comments</comments>
		
		<dc:creator><![CDATA[Alan Dowd]]></dc:creator>
		<pubDate>Thu, 01 May 2025 12:05:25 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[alliance]]></category>
		<category><![CDATA[allies]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[cold war]]></category>
		<category><![CDATA[defense]]></category>
		<category><![CDATA[democracy]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[freedom]]></category>
		<category><![CDATA[history]]></category>
		<category><![CDATA[interoperability]]></category>
		<category><![CDATA[Iraq]]></category>
		<category><![CDATA[military]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[peace]]></category>
		<category><![CDATA[Putin]]></category>
		<category><![CDATA[Reagan]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[strength]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[transatlantic]]></category>
		<category><![CDATA[Trump]]></category>
		<category><![CDATA[Ukraine]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30655</guid>

					<description><![CDATA[<p>By wielding his rhetorical skills and executive powers to revive America’s political and economic institutions, President Franklin Roosevelt (FDR) transformed the first 100 days of a president’s administration into a benchmark of success for presidents that followed. President Donald Trump used the first hundred days of his second term to great effect—though not to revive [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/fyi-to-the-gop-on-nato/">FYI to the GOP on NATO</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>By wielding his rhetorical skills and executive powers to revive America’s political and economic institutions, President Franklin Roosevelt (FDR) transformed the first 100 days of a president’s administration into a benchmark of success for presidents that followed. President Donald Trump used the first hundred days of his second term to great effect—though not to revive a key institution, but rather to dismantle it.</p>
<p>Since January 20, Trump administration officials have <a href="https://www.telegraph.co.uk/us/politics/2025/03/08/us-to-cease-all-future-military-exercises-in-europe-reports/">announced</a> an end to US participation in NATO military exercises; <a href="https://www.nbcnews.com/news/amp/rcna196503">floated</a> plans to relinquish NATO’s Supreme Allied Commander post (held by an American since NATO’s founding); <a href="https://www.nbcnews.com/politics/national-security/pentagon-considering-proposal-cut-thousands-troops-europe-officials-sa-rcna199603">proposed</a> withdrawing 10,000 troops from Eastern Europe; <a href="https://www.nbcnews.com/politics/donald-trump/trump-suggests-use-military-force-acquire-panama-canal-greenland-econo-rcna186610">threatened</a> the sovereignty of NATO ally Canada; <a href="https://www.nbcnews.com/politics/donald-trump/trump-takes-aim-canada-greenland-panama-canal-christmas-day-posts-rcna185416">raised</a> the prospect of using <a href="https://www.npr.org/2025/03/30/nx-s1-5344942/trump-military-force-not-off-the-table-for-greenland">force</a> to seize Greenland (a territory of NATO ally Denmark); <a href="https://thehill.com/homenews/administration/5220442-signal-chat-vance-trump/">derided</a> “freeloading” Europeans; <a href="https://www.newsweek.com/steve-witkoff-ire-takes-vladimir-putin-word-2049307">said</a> of Vladimir Putin that America “should take him at his word”; <a href="https://www.axios.com/2025/04/22/trump-russia-ukraine-peace-plan-crimea-donbas">torpedoed</a> NATO’s unanimous <a href="https://www.nato.int/cps/cn/natohq/official_texts_227678.htm">declaration</a> to “never recognize Russia’s illegal annexations of Ukrainian territory, including Crimea”; and <a href="https://abcnews.go.com/amp/Politics/trump-questions-nato-defend-us-1000-allies-killed/story?id=119529187">suggested</a> America’s NATO allies would not “come and protect us” in a time of crisis. This follows Trump’s 2024 <a href="https://www.cnn.com/2024/02/10/politics/trump-russia-nato/index.html">invitation</a> to Putin’s henchmen to “do whatever the hell they want” to allies failing to meet NATO’s defense-spending requirements; 2018 <a href="https://www.cnn.com/2019/01/15/politics/trump-nato-us-withdraw/index.html">threat</a> to withdraw from NATO; and a 2016 declaration that he would defend NATO members <a href="https://www.nytimes.com/2016/07/21/us/politics/donald-trump-issues.html">under attack</a> only if they had “fulfilled their obligations to us.” Add it all up, and Trump’s view of NATO diverges dramatically from that of what was once known as the “Grand Old Party.”</p>
<p>For instance, as he took the reins as NATO’s first military commander, General Dwight Eisenhower—a future Republican president—called NATO “the last remaining chance for the survival of Western civilization.” President Richard Nixon viewed NATO as “a moral force.” President Gerald Ford believed NATO “protected the free world from the threat of aggression.”</p>
<p>President George H. W. Bush <a href="https://www.presidency.ucsb.edu/documents/the-presidents-news-conference-with-foreign-journalists">called</a> NATO “an insurance policy.” Indeed, for America, NATO insures against the worst scenario: another European conflict triggering another global war. For the rest of NATO, the alliance is a security guarantee backed by the United States. Without that guarantee, there is no security in Europe, as history has a way of reminding those on the outside looking in, from Cold War Hungary to post–Cold War Ukraine.</p>
<p>President George W. Bush called NATO “the essential foundation of transatlantic security.” This essay did not forget President Ronald Reagan. However, many of those who <a href="https://thehill.com/blogs/ballot-box/presidential-races/252483-trump-compares-himself-to-reagan/">claim</a> Reagan’s mantle forget that he was an unwavering NATO advocate—during and after the Cold War. Rather than dismissing NATO as “<a href="https://archive.nytimes.com/www.nytimes.com/politics/first-draft/2016/04/02/donald-trump-tells-crowd-hed-be-fine-if-nato-broke-up/">obsolete</a>,” Reagan <a href="https://www.reaganlibrary.gov/archives/speech/address-citizens-western-europe-0">called</a> NATO “the core of America’s foreign policy and of America’s own security.” Rather than alarming NATO allies, Reagan reassured them by echoing the words of the <a href="https://www.nato.int/cps/en/natohq/official_texts_17120.htm">North Atlantic Treaty</a>: “If you are threatened, we’re threatened…. An attack on you is an attack on us.”</p>
<p>Rather than distorting NATO into a transactional protection racket, Reagan <a href="https://www.presidency.ucsb.edu/documents/joint-statement-issued-the-conclusion-meetings-with-chancellor-helmut-kohl-the-federal">championed</a> NATO as a “community of democratic states” and “a <a href="https://www.reaganlibrary.gov/archives/speech/proclamation-5158-35th-anniversary-nato">bond</a> which has served us so well.”</p>
<p>Reagan never questioned NATO’s relevance, never browbeat NATO laggards, never threatened withdrawing from NATO, and never raised doubts about America’s commitment to NATO. Instead, Reagan <a href="https://www.reaganlibrary.gov/archives/speech/proclamation-5158-35th-anniversary-nato">championed</a> NATO as “an antidote to chaos,” “a living commitment of the nations of the West to the defense of democracy and individual liberty.”</p>
<p>Importantly, Reagan did not think NATO’s mission was over when the Berlin Wall fell. In fact, he <a href="https://legal.un.org/avl/pdf/ls/Urquhart_RelDoc3.pdf">endorsed</a> NATO’s continued growth. “Room must be made in NATO for the democracies of Central and Eastern Europe,” he declared after the Cold War thawed. And even after Moscow began walking the path of reform, Reagan <a href="https://www.reaganlibrary.gov/archives/speech/address-citizens-western-europe-0">cautioned</a>, “We cannot afford to forget that we are dealing with a political system, a political culture and a political history going back many decades, even centuries…. We must stick with the strategy of strength.” In short, Reagan shrewdly saw NATO as a hedge against a Russia that might revert to revanchism—which is exactly what has happened.</p>
<p>Putin’s Russia violated <a href="https://sk.usembassy.gov/the-truth-about-russian-violation-of-inf-treaty/">nuclear</a> <a href="https://www.state.gov/u-s-countermeasures-in-response-to-russias-violations-of-the-new-start-treaty/">treaties</a>, conventional-weapons <a href="https://www.rferl.org/a/united-states-russia-arms-treaties-/26736623.html">treaties</a>, and its own <a href="https://www.brookings.edu/articles/the-budapest-memorandum-and-u-s-obligations/">pledge</a> to “respect the independence…sovereignty and existing borders of Ukraine”; <a href="https://notesfrompoland.com/2023/07/21/poland-must-be-reminded-its-western-territories-were-gift-from-stalin-says-putin/">warned</a> NATO member Poland that its western territories were “a gift from Stalin”; dismembered NATO aspirants Georgia and Ukraine; countenanced and/or conducted cyberattacks against American <a href="https://nordvpn.com/blog/us-pipeline-hack/">energy infrastructure</a>; interfered in <a href="https://www.csis.org/blogs/strategic-technologies-blog/russia-ramps-global-elections-interference-lessons-united-states">elections</a> throughout <a href="https://www.washingtonpost.com/world/national-security/russian-government-hackers-penetrated-dnc-stole-opposition-research-on-trump/2016/06/14/cf006cb4-316e-11e6-8ff7-7b6c1998b7a0_story.html">NATO’s membership roster</a>; conducted <a href="https://www.politico.eu/article/russia-berlin-fire-diehl-behind-arson-attack-on-factory/">sabotage operations</a> across <a href="https://www.reuters.com/world/russias-suspected-sabotage-campaign-steps-up-europe-2024-10-21/">NATO’s footprint</a> (including American <a href="https://www.wsj.com/world/russia-plot-us-planes-incendiary-devices-de3b8c0a">targets</a>); <a href="https://researchbriefings.files.parliament.uk/documents/CBP-9825/CBP-9825.pdf">threatened</a> use of nuclear weapons; <a href="https://www.bbc.com/news/world-asia-43500299">aided</a> and <a href="https://www.washingtonpost.com/national-security/russian-bounties-to-taliban-linked-militants-resulted-in-deaths-of-us-troops-according-to-intelligence-assessments/2020/06/28/74ffaec2-b96a-11ea-80b9-40ece9a701dc_story.html">funded</a> attacks against American forces; provided <a href="https://www.wsj.com/world/russia-provided-targeting-data-for-houthi-assault-on-global-shipping-eabc2c2b?mod=middle-east_news_article_pos2">targeting data</a> to support Houthi attacks against allied ships; and made “massive investments in its defense sector” (according to Trump’s own <a href="https://www.dni.gov/files/ODNI/documents/assessments/ATA-2025-Unclassified-Report.pdf">intelligence officials</a>). In light of all of that—and the Kremlin’s long history of deceit—<a href="https://www.reaganlibrary.gov/archives/speech/remarks-signing-intermediate-range-nuclear-forces-treaty">Reagan</a> would never “take Putin at his word.”</p>
<p>GOP presidents, and their democrat counterparts, supported NATO because they recognized that NATO serves America’s interests. For 40 years, NATO helped deter Moscow and prevent the Cold War from turning hot. But that is just a fraction of how NATO has served America’s interests.</p>
<p><a href="https://koreanwarlegacy.org/search-by-country/">Thirteen current NATO allies</a> deployed troops to assist America in defending South Korea. NATO militaries, infrastructure, and decades of interoperability served as the nucleus for the coalition that ejected Iraq from Kuwait, with NATO allies <a href="https://apps.dtic.mil/sti/tr/pdf/ADA234743.pdf">deploying</a> thousands of troops to assist America.</p>
<p>The only time NATO’s all-for-one <a href="https://www.nato.int/cps/bu/natohq/topics_110496.htm">collective-defense clause</a> was invoked was after September 11, 2001, when <a href="https://www.nato.int/cps/en/natohq/declassified_137124.htm">NATO allies</a> rushed aircraft and personnel to this side of the Atlantic to guard America’s skies. NATO then bled with America in the Sisyphean campaign that followed, with 455 Brits, 158 Canadians, 86 French, 54 Germans, 48 Italians, 43 Danes, and 40 Poles dying in Afghanistan. When America withdrew from Afghanistan—20 years after the attacks on America’s capital, America’s military headquarters, America’s largest city—<a href="https://www.nato.int/nato_static_fl2014/assets/pdf/2021/2/pdf/2021-02-RSM-Placemat.pdf">74 percent</a> of the foreign troops deployed in the country that spawned 9/11 were not Americans. The vast majority were NATO allies. Trump is apparently unaware of this history.</p>
<p>In <a href="https://history.army.mil/Portals/143/Images/Publications/Publication%20By%20Title%20Images/A%20Titles%20PDF/CMH_59-3-1.pdf?ver=LYrbz6U86-ABpsS03ZeVDA%3d%3d">Operation Iraqi Freedom</a>, 16 NATO allies sent troops when America asked for help. <a href="https://web.archive.org/web/20090418134050/http:/icasualties.org/Iraq/DeathsByCountry.aspx">Hundreds</a> of NATO troops—Brits, Italians, Poles, Bulgarians, Latvians, Danes, Dutch, Romanians, Hungarians, Czechs—died in Iraq, as did <a href="https://www.army.mil/article/15056/ukrainians_complete_mission_in_iraq">18 soldiers from Ukraine</a>, a country that is not a NATO ally but certainly <a href="https://www.nato.int/cps/en/natohq/topics_37750.htm#nato-operations-missions">acts</a> like one.</p>
<p>In the post Iraqi freedom years, seven NATO members conducted airstrikes against the ISIS caliphate. Again, NATO was there.</p>
<p>Far from “freeloading,” NATO allies Britain, Canada, <a href="https://x.com/frenchforces/status/1913131993593749848">France</a>, Italy, the Netherlands, Norway, and Spain are supporting operations in the Red Sea. Likewise, <a href="https://www.royalnavy.mod.uk/news/2023/september/12/20230912-pacific-patrol-ships-begin-third-year-deployed-broadening-their-mission">British</a>, <a href="https://www.navalnews.com/naval-news/2024/08/u-s-french-naval-forces-conduct-bilateral-operations-in-indo-pacific/">French</a>, <a href="https://news.usni.org/2024/08/22/italian-carrier-strike-group-uss-dewey-drill-in-philippine-sea">Italian</a>, <a href="https://www.defence.gov.au/news-events/releases/2024-08-02/exercise-pitch-black-2024-concludes">Spanish, and Canadian</a> <a href="https://www.diplomatie.gouv.fr/IMG/pdf/en_a4_indopacifique_synthese_rvb_cle068e51.pdf">assets</a> are promoting <a href="https://www.reuters.com/world/french-naval-vessel-passes-through-sensitive-taiwan-strait-2024-10-29/">freedom of navigation</a> in the Indo-Pacific.</p>
<p>European nations sent more <a href="https://www.ifw-kiel.de/topics/war-against-ukraine/ukraine-support-tracker/">aid</a> to Ukraine than the US. <a href="https://www.dw.com/en/uk-france-lead-future-ukraine-force-meeting/live-72199709">Britain and France</a> are organizing a peacekeeping force for postwar Ukraine.</p>
<p>NATO has eight <a href="https://www.nato.int/nato_static_fl2014/assets/pdf/2022/6/pdf/2206-factsheet_efp_en.pdf">battlegroups</a> defending its most at-risk members along the eastern flank. Only one is American-led.</p>
<p>Britain leads the battlegroup in Estonia, supported by Denmark, France, and Iceland. <a href="https://www.reuters.com/world/europe/britain-boost-military-presence-northern-europe-2023-10-13/">Britain</a> is committing resources to defend NATO’s northern flank. And the aircraft carrier HMS Prince of Wales just commenced a globe-spanning <a href="https://www.youtube.com/watch?v=iGTQ6LiCjtE">mission</a>—the largest deployment of British naval airpower in a quarter-century.</p>
<p>Germany leads the battlegroup in Lithuania, backed by Belgium, Czechia, Iceland, Luxembourg, the Netherlands, and Norway. Germany is building <a href="https://www.defensenews.com/global/europe/2024/08/22/work-begins-on-germanys-5000-strong-military-base-in-lithuania/">permanent bases</a> in Lithuania for 4,800 German troops. Germany is spearheading a continentwide <a href="https://www.nato.int/cps/en/natohq/news_219119.htm">missile shield</a>. And Germany’s parliament recently approved a massive defense-infrastructure <a href="https://www.wsj.com/world/europe/germany-set-for-trillion-euro-defense-and-infrastructure-splurge-3cce7723">fund</a>.</p>
<p>Canada leads the battlegroup in Latvia, supported by 10 other NATO allies. France leads NATO’s battlegroup in Romania. Pouring almost 5 percent of GDP into defense, Poland fields NATO’s third-largest military. Sweden is <a href="https://en.defence-ua.com/industries/saab_doubles_nlaw_production_for_the_second_time_will_make_400000_weapons_yearly-5714.html#:~:text=Weapon%2Dmaking%20companies%20have%20started,NLAW%20to%20400%2C000%20systems%20yearly">quadrupling</a> production of anti-tank weapons.</p>
<p>What NATO is doing and deterring underscores something General James Mattis <a href="https://www.militarytimes.com/news/2017/01/15/in-his-own-words-mattis-on-the-challenges-facing-the-military/">observed</a> almost a decade ago, “If we did not have NATO today, we would need to create it.”</p>
<p>This begs the questions: what if we did not have NATO? What if these first hundred days mark the last days of history’s greatest alliance for peace?</p>
<p>NATO is designed not to wage war, but to deter war. If there is any doubt about NATO’s <a href="https://www.nato.int/cps/en/natohq/topics_110496.htm">collective-defense guarantee</a>—and these first hundred days have created enormous doubts—Putin could be tempted to do in the Baltics what he has done in Ukraine. That would force NATO to blink or fire back. And that would lead to terrible outcomes. The former means the collapse of NATO—and with it, the entire US-led alliance system. The latter means great power war.</p>
<p>The best way to prevent such dire outcomes is through deterrent military strength, clarity of intent, and certainty of cause and effect. Trump’s words and actions have undermined all of these.</p>
<p>What the transactional Trump administration fails to recognize is that by undermining NATO, it is undermining America’s security. If a cyberattack or EMP blast or bioweapon paralyzes America; if ISIS or al Qaeda or some other terror group unleashes something worse than 9/11 or <a href="https://apnews.com/article/israel-palestinians-gaza-hamas-rockets-airstrikes-tel-aviv-11fb98655c256d54ecb5329284fc37d2">10/7</a>; if Moscow blinds America’s constellation of satellites; if Beijing moves against Taiwan; or if Pyongyang restarts the long-paused Korean War, America will call for help.</p>
<p>A post-NATO Europe may be unable or unwilling to answer.</p>
<p><em>Alan Dowd leads the Sagamore Institute</em> <em>Center for America’s Purpose.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/05/FYI-on-NATO.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="284" height="79" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 284px) 100vw, 284px" /></a></p>
<p><a href="https://globalsecurityreview.com/fyi-to-the-gop-on-nato/">FYI to the GOP on NATO</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/fyi-to-the-gop-on-nato/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>ICBM EAR Report for 22 Feb 2025</title>
		<link>https://globalsecurityreview.com/icbm-ear-report-for-22-feb-2025/</link>
					<comments>https://globalsecurityreview.com/icbm-ear-report-for-22-feb-2025/#respond</comments>
		
		<dc:creator><![CDATA[Peter Huessy]]></dc:creator>
		<pubDate>Wed, 26 Feb 2025 13:23:04 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[EAR Report]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Arms Control]]></category>
		<category><![CDATA[arms control agreements]]></category>
		<category><![CDATA[Biden administration]]></category>
		<category><![CDATA[Budapest Memorandum]]></category>
		<category><![CDATA[CBM]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Christian Science Monitor]]></category>
		<category><![CDATA[cold war]]></category>
		<category><![CDATA[conventional-nuclear integration]]></category>
		<category><![CDATA[defense budget]]></category>
		<category><![CDATA[Defense Spending]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[Elbridge Colby]]></category>
		<category><![CDATA[escalation]]></category>
		<category><![CDATA[Estonia intelligence]]></category>
		<category><![CDATA[ethical dilemmas]]></category>
		<category><![CDATA[extended deterrence]]></category>
		<category><![CDATA[geopolitical shifts]]></category>
		<category><![CDATA[INF Treaty]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Iron Dome]]></category>
		<category><![CDATA[MAD]]></category>
		<category><![CDATA[military buildup]]></category>
		<category><![CDATA[military competition]]></category>
		<category><![CDATA[Minuteman III]]></category>
		<category><![CDATA[missile defense]]></category>
		<category><![CDATA[missile defense capabilities]]></category>
		<category><![CDATA[missileers]]></category>
		<category><![CDATA[mutual assured destruction]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[NATO alliance]]></category>
		<category><![CDATA[New START]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Nuclear arms control]]></category>
		<category><![CDATA[nuclear arms race]]></category>
		<category><![CDATA[nuclear command and control]]></category>
		<category><![CDATA[nuclear conflict]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[nuclear deterrence credibility]]></category>
		<category><![CDATA[nuclear deterrence system]]></category>
		<category><![CDATA[nuclear doctrine]]></category>
		<category><![CDATA[nuclear escalation]]></category>
		<category><![CDATA[nuclear escalation ladder]]></category>
		<category><![CDATA[Nuclear force]]></category>
		<category><![CDATA[nuclear force execution policies]]></category>
		<category><![CDATA[nuclear modernization]]></category>
		<category><![CDATA[nuclear policy]]></category>
		<category><![CDATA[nuclear proliferation]]></category>
		<category><![CDATA[nuclear stability]]></category>
		<category><![CDATA[nuclear strategy]]></category>
		<category><![CDATA[nuclear threats]]></category>
		<category><![CDATA[nuclear triad]]></category>
		<category><![CDATA[nuclear umbrella]]></category>
		<category><![CDATA[nuclear war]]></category>
		<category><![CDATA[nuclear warfare]]></category>
		<category><![CDATA[nuclear warfighting force]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[nuclear weapons development]]></category>
		<category><![CDATA[nuclear winter]]></category>
		<category><![CDATA[nuclear winter propaganda]]></category>
		<category><![CDATA[Posture Commission]]></category>
		<category><![CDATA[Reagan]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Russian threat]]></category>
		<category><![CDATA[SDI]]></category>
		<category><![CDATA[SecDef Hegseth]]></category>
		<category><![CDATA[self-reliance]]></category>
		<category><![CDATA[Senator McConnell]]></category>
		<category><![CDATA[Sentinel program]]></category>
		<category><![CDATA[Space Development Agency]]></category>
		<category><![CDATA[strategic deterrence]]></category>
		<category><![CDATA[tax legislation]]></category>
		<category><![CDATA[Ted Postol]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[US security policy]]></category>
		<category><![CDATA[US-ROK deterrent]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30161</guid>

					<description><![CDATA[<p>This report, prepared by Peter Huessy for the week of February 22, 2025, covers various aspects of nuclear deterrence, defense budget developments, and geopolitical threats. Key topics include the Biden administration&#8217;s approach to nuclear escalation, Senator McConnell&#8217;s retirement and his views on restoring deterrence, and Russian official Medvedev&#8217;s nuclear threats. The House and Senate have [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/icbm-ear-report-for-22-feb-2025/">ICBM EAR Report for 22 Feb 2025</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="answer_copyable_21811e0e-71c9-41c9-9188-3b92cf83bbe7" class="copyable_answers" data-testid="qna_answer">
<div class="QnABodyStyle__markdown___oYf6O">
<p>This report, prepared by Peter Huessy for the week of February 22, 2025, covers various aspects of nuclear deterrence, defense budget developments, and geopolitical threats.</p>
<div class="QnABodyStyle__markdownText___b9_I4">
<p>Key topics include the Biden administration&#8217;s approach to nuclear escalation, Senator McConnell&#8217;s retirement and his views on restoring deterrence, and Russian official Medvedev&#8217;s nuclear threats.</p>
</div>
<div class="QnABodyStyle__markdownText___b9_I4">The House and Senate have added $100-150 billion over ten years to defense, focusing on expanding the Navy, strengthening the defense industrial base, and modernizing strategic nuclear forces.</div>
<p>​<br />
SecDef Hegseth seeks an additional $50 billion for top priorities, excluding nuclear deterrence from budget cuts.</p>
<p>The report highlights the importance of concurrent modernization work at the three ICBM bases, which could save billions.</p>
<div class="QnABodyStyle__markdownText___b9_I4">
<p>It also discusses the U.S. Air Force missileers&#8217; critical role in nuclear deterrence, the ethical and psychological aspects of their job, and the challenges of retaining diverse personnel.</p>
</div>
<div class="QnABodyStyle__markdownText___b9_I4">The Christian Science Monitor provides an in-depth look at the missileers&#8217; responsibilities and the evolving nuclear landscape.</div>
<div class="QnABodyStyle__markdownText___b9_I4">
<p>Regarding North Korea, USAF General Jason Armagost emphasized that the U.S. can respond overwhelmingly to a North Korean ICBM attack, underscoring the strength of the U.S. nuclear deterrence system.</p>
</div>
<div class="QnABodyStyle__markdownText___b9_I4">
<p>The report also touches on the potential for arms control negotiations with Russia and China, with President Trump expressing a desire for &#8220;denuclearization.&#8221;</p>
</div>
<div class="QnABodyStyle__markdownText___b9_I4">
<p>However, the feasibility of such agreements remains uncertain, given the geopolitical complexities and the need for the U.S. to maintain a competitive edge in military capabilities.</p>
</div>
</div>
<div>
<p><strong>MUST READ: </strong> The most awe-inspiring piece of the report is about  &#8220;RESPONSIBILITY&#8221; from the Christian Science Monitor, dated February 14, 2025, which provides an in-depth look at the lives and duties of U.S. Air Force missileers stationed at F.E. Warren Air Force Base.</p>
</div>
</div>
<div>
<div id="answer_copyable_ba69641a-49fa-483c-9f2d-eeba74404026" class="copyable_answers" data-testid="qna_answer">
<div class="QnABodyStyle__markdown___oYf6O">
<p><img loading="lazy" decoding="async" class="alignnone wp-image-30165" src="http://globalsecurityreview.com/wp-content/uploads/2025/02/ICBM-Launch-Panel.png" alt="" width="341" height="228" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/02/ICBM-Launch-Panel.png 470w, https://globalsecurityreview.com/wp-content/uploads/2025/02/ICBM-Launch-Panel-300x200.png 300w, https://globalsecurityreview.com/wp-content/uploads/2025/02/ICBM-Launch-Panel-360x240.png 360w" sizes="(max-width: 341px) 100vw, 341px" /></p>
<ul>
<li class="QnABodyStyle__markdownText___b9_I4">It highlights their critical role in nuclear deterrence, the gravity of their mission, and the personal and ethical complexities they face.</li>
<li class="QnABodyStyle__markdownText___b9_I4">The article follows missileers during their 24-hour shifts, emphasizing their readiness and strict operational protocols.</li>
<li class="QnABodyStyle__markdownText___b9_I4">It also explores the mental burden and moral dilemmas they encounter, particularly in the context of faith.</li>
<li class="QnABodyStyle__markdownText___b9_I4">The piece touches on the historical context of missileers, their continued relevance, and the growing nuclear threats from Russia, China, and Iran.</li>
<li class="QnABodyStyle__markdownText___b9_I4">Additionally, it discusses the challenges of attracting and retaining personnel, especially women and minorities, within this demanding career field.</li>
<li class="QnABodyStyle__markdownText___b9_I4">The article underscores the human element of nuclear deterrence, the operational challenges of aging systems, and the evolving nuclear landscape.</li>
</ul>
<p>Overall, the report underscores the need for robust defense investments, the challenges of modernizing nuclear forces, and the geopolitical threats posed by adversaries like Russia, China, and North Korea.</p>
</div>
</div>
</div>
<div id="answer_copyable_21811e0e-71c9-41c9-9188-3b92cf83bbe7" class="copyable_answers" data-testid="qna_answer">
<div class="QnABodyStyle__markdown___oYf6O">
<div></div>
</div>
</div>
<div><a href="http://globalsecurityreview.com/wp-content/uploads/2025/02/ICBM-EAR-of-Week-of-2-17^^.Prepared-by-Peter-Huessy.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29877" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/ICBM-EAR-REPORT.png" alt="" width="346" height="96" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/ICBM-EAR-REPORT.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/ICBM-EAR-REPORT-300x83.png 300w" sizes="(max-width: 346px) 100vw, 346px" /></a></div>
<div></div>
<div id="answer_copyable_21811e0e-71c9-41c9-9188-3b92cf83bbe7" class="copyable_answers" data-testid="qna_answer">
<div class="QnABodyStyle__markdown___oYf6O">
<p>​</p>
</div>
</div>
<p><a href="https://globalsecurityreview.com/icbm-ear-report-for-22-feb-2025/">ICBM EAR Report for 22 Feb 2025</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/icbm-ear-report-for-22-feb-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Future of US-Pakistan Relations</title>
		<link>https://globalsecurityreview.com/the-future-of-us-pakistan-relations/</link>
					<comments>https://globalsecurityreview.com/the-future-of-us-pakistan-relations/#respond</comments>
		
		<dc:creator><![CDATA[Muhammad Haseeb Riaz]]></dc:creator>
		<pubDate>Thu, 23 Jan 2025 12:55:32 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[America First]]></category>
		<category><![CDATA[bilateral trade]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[climate change]]></category>
		<category><![CDATA[counterterrorism]]></category>
		<category><![CDATA[diplomatic bridge]]></category>
		<category><![CDATA[Donald Trump]]></category>
		<category><![CDATA[economic aid]]></category>
		<category><![CDATA[economic issues]]></category>
		<category><![CDATA[Foreign Policy]]></category>
		<category><![CDATA[geopolitical chessboard]]></category>
		<category><![CDATA[Global South]]></category>
		<category><![CDATA[Imran Khan]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[minilateralism]]></category>
		<category><![CDATA[Muhammad Haseeb Riaz]]></category>
		<category><![CDATA[Pakistan Tehreek-e-Insaf]]></category>
		<category><![CDATA[pentagon]]></category>
		<category><![CDATA[Quad]]></category>
		<category><![CDATA[security concerns]]></category>
		<category><![CDATA[South Asia]]></category>
		<category><![CDATA[state department]]></category>
		<category><![CDATA[strategic divergence]]></category>
		<category><![CDATA[strategic stability]]></category>
		<category><![CDATA[Taliban]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[trade wars]]></category>
		<category><![CDATA[US-Pakistan relations]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29892</guid>

					<description><![CDATA[<p>President Donald Trump’s return to the White House may or may not prove auspicious for Pakistan. Trump’s victory will certainly have wide-ranging ramifications for the geopolitical chessboard because of existing challenges to international order. It could potentially transform the fabric of international cooperation. No region will remain untouched. South Asia will be no exception. Most [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-future-of-us-pakistan-relations/">The Future of US-Pakistan Relations</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>President Donald Trump’s return to the White House may or may not prove auspicious for Pakistan. Trump’s victory will certainly have wide-ranging ramifications for the geopolitical chessboard because of existing challenges to international order. It could potentially transform the fabric of international cooperation. No region will remain untouched.<br />
South Asia will be no exception. Most South Asian nations are betting their hopes on greater American engagement in the region despite Donald Trump’s “America First” approach to trade and foreign and security policy.</p>
<p>President Trump’s foreign policy will primarily focus outside South Asia and engage countries with a lens toward their relationship with China. Drawing on his known foreign policy orientation, Trump 2.0 is poised to keep India on a high strategic pedestal in the broader framework of Indo-Pacific strategy.</p>
<p>Pakistan is unlikely to play a major foreign policy role for the Trump administration. Thus, it is pertinent for the Pakistani diplomatic community to find areas of convergence with the Trump administration. Policy options must be exercised in a way to constructively approach strategic divergencies between the two states.</p>
<p>America’s engagement with the Global South is likely going to decline as an “America First” approach calls for reducing international engagement towards all but a handful of countries. Critics may characterize President Trump’s foreign policy approach as short term and transactional, but this sells the president short. A policy of “minilateralism” is not shortsighted but may allow him to focus on more pressing domestic issues in the United States. This redirection of focus is, however, bad news for global agendas like climate change and multilateral cooperation.</p>
<p>There is a broader consensus in the Trump team, based on a strategic imperative to counter China in the Asia-Pacific, that leaves less room for lower priorities. Thus, the trade and tariff wars between China and the US may have second-order effects for countries like Pakistan.</p>
<p>President Trump’s advisers are likely to approach China as an adversary and will view Pakistan with some caution, perceiving it as an ally of Beijing. The Trump administration may seek to intensify the competition with China and up the ante for countries who are onboard with Chinese infrastructure and development projects, such as Pakistan, which could be a potential victim of a new Great Game.</p>
<p>An era of conditional trade agreements between Pakistan and the United States appears imminent and is characterized by a departure from preferential trade practices. Instead, the US is likely to prioritize market-driven agreements, emphasizing economic pragmatism over diplomatic goodwill. To enhance bilateral trade relations, Pakistan could strategically leverage its geopolitical significance and pursue a proactive approach to addressing American concerns, without compromising its national strategic interests.</p>
<p>This would necessitate credible efforts to combat terrorism and contribute to stabilizing the situation in Afghanistan. Such measures could foster greater mutual confidence and pave the way for more constructive economic engagement between the two nations.</p>
<p>American attempts to make India its strategic surrogate in the Asia-Pacific will embolden Indian hegemonic ambitions. Intense security collaboration between the US and India at bilateral and multilateral defense groups like the Quad could disrupt the regional strategic stability calculus in South Asia.</p>
<p>Pakistan’s economic woes may not allow it to sustain the brunt of a growing Indian strategic modernization in the long run. This will impact strategic stability in the region.<br />
Retrospective analysis of the first Trump administration suggests that American cooperation with Pakistan, in the realms of climate change and clean energy, will be relegated as more pressing geostrategic issues take precedence. Moreover, the dwindling economy of Pakistan may find the Trump administration far less sympathetic as far as economic aid and loan packages are concerned. The first Trump administration was less sensitive to Pakistan’s core interest, like Kashmir, and more demanding of Pakistan in its Afghanistan conundrum.<br />
The US State Department under Trump will likely pursue a limited set of priorities, especially in the security and counterterrorism realms. US-Pakistan relations are traditionally marked by events in Afghanistan. This was true from the Soviet invasion of Afghanistan to the war on terror. With the reduction of American engagement in Afghanistan, Pakistan finds itself entangled in an increasingly intricate security matrix amid deteriorating relations with the Taliban and increasing terrorism in Pakistan.</p>
<p>Shifting the onus onto Pakistan for an American policy debacle was a convenient strategy of the Biden administration. Pakistan may find the new administration more aggressive in its demands for stabilizing Afghanistan. The “do more” mantra will not go over well with Pakistan anymore and will require a more practical approach on the part of the US.<br />
On the flip side, President Trump’s personality-centered diplomatic overtures, rather than institutionalized mechanisms, are not good for Pakistan. President Trump engaged with Imran Khan constructively, but he is no longer in office. Criticism could come from Trump’s team regarding the crackdown on Khan’s Pakistan Tehreek-e-Insaf (PTI) movement. State Department and Pentagon engagement with Pakistan’s diplomatic corps and security establishment will depend on the whims of Trump rather than an ongoing policy framework. The absence of mutual interests between the US and Pakistan remains a hurdle.</p>
<p>These are interesting times for the diplomats of Pakistan. On the one hand, they will try to resist President Trump’s pressure-based strategy toward Pakistan. On the other hand, they will try to convince State Department officials to pursue more practical approaches to the US-Pakistan relationship. How hard this proves is yet to be determined.<br />
Either way, Pakistan will face a more conditional and transactional relationship with the US. It will hinge on security concerns rather than economic issues. Being close to China diplomatically and strategically opens a unique window of opportunity for Pakistan. It can play the role of a bridge between China and the US, as it has done historically, should the Trump administration seek it out.</p>
<p><em>Muhammad Haseeb Riaz is a Research Assistant at Center for International Strategic Studies, Islamabad. Views expressed in this article are the author’s own.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/01/Future-of-Pak-US-Relations-under-Trump-2.0.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29852 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/the-future-of-us-pakistan-relations/">The Future of US-Pakistan Relations</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-future-of-us-pakistan-relations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ICBM EAR Report Jan, 3 2025</title>
		<link>https://globalsecurityreview.com/icbm-ear-report-jan-3-2025/</link>
					<comments>https://globalsecurityreview.com/icbm-ear-report-jan-3-2025/#respond</comments>
		
		<dc:creator><![CDATA[Peter Huessy]]></dc:creator>
		<pubDate>Wed, 08 Jan 2025 13:16:27 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Bonus Reads]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[EAR Report]]></category>
		<category><![CDATA[Government & Politics]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[anti-American policy]]></category>
		<category><![CDATA[Arms Race]]></category>
		<category><![CDATA[Beijing]]></category>
		<category><![CDATA[Biden]]></category>
		<category><![CDATA[Brilliant Pebbles]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[China threat report]]></category>
		<category><![CDATA[Chinese nuclear threat]]></category>
		<category><![CDATA[coercion]]></category>
		<category><![CDATA[congress]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[EAR]]></category>
		<category><![CDATA[economic news]]></category>
		<category><![CDATA[European defense]]></category>
		<category><![CDATA[Geostrategic Analysis]]></category>
		<category><![CDATA[Hoover Institute]]></category>
		<category><![CDATA[ICBM]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[intermediate-range ballistic missile]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Iranian nuclear threat]]></category>
		<category><![CDATA[Kim Jong Un]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[Mike Johnson]]></category>
		<category><![CDATA[missile defense]]></category>
		<category><![CDATA[Moscow]]></category>
		<category><![CDATA[National Institute of Deterrent Studies]]></category>
		<category><![CDATA[NATO]]></category>
		<category><![CDATA[NDAA]]></category>
		<category><![CDATA[next generation interceptor]]></category>
		<category><![CDATA[NGI]]></category>
		<category><![CDATA[NIDS]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[nuclear assets]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[nuclear funding]]></category>
		<category><![CDATA[nuclear modernization]]></category>
		<category><![CDATA[nuclear stability]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Peter Huessy]]></category>
		<category><![CDATA[Reagan]]></category>
		<category><![CDATA[ROK]]></category>
		<category><![CDATA[Royal United Services Institute]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Russian nuclear forces]]></category>
		<category><![CDATA[seminar series]]></category>
		<category><![CDATA[Senate Appropriations Committee]]></category>
		<category><![CDATA[Senate Armed Services Committee]]></category>
		<category><![CDATA[space technology]]></category>
		<category><![CDATA[space-based systems]]></category>
		<category><![CDATA[Speaker of the House]]></category>
		<category><![CDATA[strategic developments]]></category>
		<category><![CDATA[Taiwan]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[Trump]]></category>
		<category><![CDATA[U.S. defense manufacturing]]></category>
		<category><![CDATA[U.S. Navy]]></category>
		<category><![CDATA[U.S. security]]></category>
		<category><![CDATA[U.S. Senate]]></category>
		<category><![CDATA[U.S.-South Korean Alliance]]></category>
		<category><![CDATA[Ukraine]]></category>
		<category><![CDATA[Union of Concerned Scientists]]></category>
		<category><![CDATA[ussr]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29765</guid>

					<description><![CDATA[<p>ICBM EAR Report Executive Summary Based on the latest EAR Report, these are the critical points on global security, upcoming events, and the ongoing discourse on nuclear deterrence, modernization, and geopolitical strategy for 2025. Quotes of the Week Xi Jinping (China): &#8220;No one can stop the historical trend” of China’s “reunification” with Taiwan.&#8221; U.S. Ambassador [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/icbm-ear-report-jan-3-2025/">ICBM EAR Report Jan, 3 2025</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>ICBM EAR Report</strong> <strong><br />
Executive Summary</strong></p>
<p>Based on the latest EAR Report, these are the critical points on global security, upcoming events, and the ongoing discourse on nuclear deterrence, modernization, and geopolitical strategy for 2025.</p>
<p><strong>Quotes of the Week</strong></p>
<ul>
<li><strong>Xi Jinping (China):</strong> &#8220;No one can stop the historical trend” of China’s “reunification” with Taiwan.&#8221;</li>
<li><strong>U.S. Ambassador Philip Goldberg (South Korea):</strong> Reaffirmed the U.S.-South Korean alliance amidst geopolitical tensions.</li>
<li><strong>DPRK Kim Jong Un:</strong> Committed to implementing the &#8220;toughest&#8221; anti-American policy while criticizing the U.S.-South Korea-Japan security partnership.</li>
<li><strong>Antony Blinken (U.S. Secretary of State):</strong> Highlighted Russia&#8217;s intentions to share advanced space technology with North Korea.</li>
<li><strong>NATO Official:</strong> Warned of unconventional Russian attacks causing substantial casualties.</li>
</ul>
<p><strong>Upcoming 2025 Seminar Events</strong></p>
<ol>
<li><strong>January 10, 2025, 10:00 AM:</strong> Robert Soofer &amp; Mark Massa on &#8220;The Case for Homeland Missile Defense.&#8221;</li>
<li><strong>January 31, 2025, 10:00 AM:</strong> Shoshana Bryen &amp; Ilan Berman on &#8220;Middle East Update and the Iranian Nuclear Threat.&#8221;</li>
<li><strong>February 14, 2025, 10:00 AM:</strong> Stephen Blank &amp; Mark Schneider on &#8220;Russian Intentions with Its Growing Nuclear Forces.&#8221;</li>
<li><strong>February 28, 2025, 10:00 AM:</strong> Hon. Madelyn Creedon &amp; Hon. Frank Miller on &#8220;Assessment and Update of the Posture Commission.&#8221;</li>
<li><strong>March 14, 2025, 10:00 AM:</strong> Gordon Chang &amp; Rick Fisher on &#8220;The Chinese Nuclear Threat &amp; Implications for US Security.&#8221;</li>
</ol>
<p><strong>Nuclear Derangement Syndrome</strong></p>
<ul>
<li>Criticism of nuclear deterrence is gaining momentum, focusing on framing nuclear weapons as both unnecessary and dangerous.</li>
<li>The Union of Concerned Scientists highlights essays opposing nuclear modernization, which are countered with arguments emphasizing deterrence as essential for stability.</li>
<li>The critique overlooks the strategic necessity of nuclear weapons in preventing large-scale conflicts and ensuring global security.</li>
</ul>
<p><strong>The Biden-Trump Arms Race</strong></p>
<ul>
<li><strong>Criticism:</strong> The Biden and Trump administrations&#8217; claims of an arms race are exaggerated. They focus on necessary modernization within New START limits.</li>
<li><strong>Reality:</strong> Modernization efforts (Columbia submarines, Sentinel ICBMs, B21 bombers) align with treaty commitments, aiming for readiness by 2042.</li>
<li><strong>Key Concern:</strong> Rising nuclear capabilities of Russia and China surpass New START limits, demanding U.S. responses to maintain strategic balance.</li>
<li><strong>Counterarguments:</strong> Opponents argue modernization fuels an arms race, while proponents emphasize deterrence and technological edge against adversaries.</li>
</ul>
<p><span style="color: #000080;"><strong>Download the full report.</strong></span></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/01/ICBM-EAR-week-of-January-3.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-29719 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/icbm-ear-report-jan-3-2025/">ICBM EAR Report Jan, 3 2025</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/icbm-ear-report-jan-3-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Why a Joint US-Pakistan Counterterrorism Task Force Is Necessary</title>
		<link>https://globalsecurityreview.com/why-a-joint-us-pakistan-counterterrorism-task-force-is-necessary/</link>
					<comments>https://globalsecurityreview.com/why-a-joint-us-pakistan-counterterrorism-task-force-is-necessary/#respond</comments>
		
		<dc:creator><![CDATA[Timor Nawabi]]></dc:creator>
		<pubDate>Tue, 29 Oct 2024 12:16:36 +0000</pubDate>
				<category><![CDATA[Allies & Extended Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[counterterrorism]]></category>
		<category><![CDATA[cross-border terrorism]]></category>
		<category><![CDATA[cyber defense]]></category>
		<category><![CDATA[Deterrence]]></category>
		<category><![CDATA[global security]]></category>
		<category><![CDATA[intelligence collaboration]]></category>
		<category><![CDATA[ISI]]></category>
		<category><![CDATA[Kashmir]]></category>
		<category><![CDATA[nuclear catastrophe]]></category>
		<category><![CDATA[nuclear facility sabotage]]></category>
		<category><![CDATA[nuclear order]]></category>
		<category><![CDATA[nuclear safeguard]]></category>
		<category><![CDATA[nuclear security]]></category>
		<category><![CDATA[nuclear security drills]]></category>
		<category><![CDATA[nuclear sites]]></category>
		<category><![CDATA[nuclear theft]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[Pakistan military]]></category>
		<category><![CDATA[Pakistan nuclear arsenal]]></category>
		<category><![CDATA[regional stability]]></category>
		<category><![CDATA[regional tensions]]></category>
		<category><![CDATA[sovereignty]]></category>
		<category><![CDATA[Strategic Plans Division]]></category>
		<category><![CDATA[Taliban]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[terrorist organizations]]></category>
		<category><![CDATA[Timor Nawabi]]></category>
		<category><![CDATA[US military aid]]></category>
		<category><![CDATA[US-Pakistan task force]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29231</guid>

					<description><![CDATA[<p>For more than 70 years, the world has avoided nuclear war. However, the nuclear order is changing dramatically. Pakistan’s growing nuclear capabilities and ties to terrorist groups present an especially dangerous combination that the United States cannot afford to overlook. It is the world’s fastest-growing nuclear state—with an estimated 170 nuclear weapons. Its military and intelligence service [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/why-a-joint-us-pakistan-counterterrorism-task-force-is-necessary/">Why a Joint US-Pakistan Counterterrorism Task Force Is Necessary</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>For more than 70 years, the world has avoided nuclear war. However, the nuclear order is changing dramatically. Pakistan’s growing nuclear capabilities and ties to terrorist groups present an especially dangerous combination that the United States cannot afford to overlook. It is the world’s fastest-growing nuclear state—with an estimated 170 nuclear weapons. Its military and intelligence service (ISI) maintain close connections to terrorist groups. Pakistan presents a complex challenge that demands urgent action. To address this challenge, the United States should establish a joint US-Pakistan counterterrorism task force to secure Pakistan’s nuclear assets.</p>
<p><strong>Instability and American Aid </strong></p>
<p>Pakistan is not a stable country. There are concerns that the state may disintegrate. Its military and ISI are infiltrated by individuals linked to terrorist groups. Without focused American engagement, Pakistan’s instability could lead to either the theft of a nuclear weapon by terrorists or the sabotage of a nuclear facility. Moreover, a long-running territorial dispute over Kashmir and cross-border terrorism could easily escalate into a conflict or nuclear war between India and Pakistan.</p>
<p>Pakistan gets a free ride. Between 1948 and 2016, it received over $78.3 billion in US military and economic support. In return, it is duplicitous. Over half of this aid was allocated to counterterrorism efforts, yet Pakistan’s military and the ISI continue supporting the Taliban and other extremists. The US annually provides Pakistan $2 billion in military and economic aid without proper oversight. Of this amount, $100 million is allocated to the Strategic Plans Division to help Pakistan secure its nuclear arsenal. Despite this assistance, Pakistan provides safe haven to dozens of terrorist organizations and their leadership. Its military’s continued support for them increases the risk of a catastrophic nuclear attack by a proxy.</p>
<p><strong>The Case for a Joint US-Pakistan Task Force</strong></p>
<p>A joint US-Pakistan task force is necessary to enforce oversight, strengthen strategic ties, and provide a direct US role in securing Pakistan’s nuclear arsenal. A formal framework will mitigate the risks of mismanagement or unauthorized access and maintain control over critical aspects of nuclear security. It will enhance collaboration between military and intelligence agencies, enabling both sides to identify and respond to emerging threats while leveraging their combined expertise in human intelligence and counterterrorism.</p>
<p>A joint task force will also enhance nuclear security through specialized training. American experts in nuclear security and cyber defense can provide essential training to Pakistani forces, strengthening their operational readiness and capability to protect nuclear sites. Both nations conduct regular nuclear security drills—often referred to as “Armageddon tests” to assess vulnerabilities at nuclear sites. These drills help identify personnel weaknesses and prevent potential security breaches.</p>
<p><strong>Deterrence, Sovereignty, and Regional Tensions</strong></p>
<p>The presence of US military personnel in Pakistan will also serve as a powerful deterrent to terrorist organizations. US support in securing nuclear facilities reduces the probability of terrorist attempts to infiltrate and breach nuclear facilities or execute large-scale attacks. This cooperation also signals the seriousness of nuclear security in the region to potential adversaries.</p>
<p>Establishing an American military presence in Pakistan could be perceived as a violation of Pakistan’s sovereignty. However, US involvement would be limited to advisory, intelligence, and technical support roles. This role would enable Pakistan to retain full control over its nuclear assets and security operations.</p>
<p>A US military presence in Pakistan could also escalate regional tensions—particularly with India. The two states have irreconcilable differences when it comes to Kashmir, and both sides believe they should control all of Kashmir, not just one part of it. An attack on civilians or military forces on either side of the line of control in Kashmir could easily escalate into a major conflict. However, the US can use diplomatic channels to ensure regional actors, including India, are aware of the task force’s defensive nature. The task force aims to secure nuclear sites and combat terrorism, not alter the region’s strategic balance.</p>
<p><strong>Preventing Nuclear Catastrophe</strong></p>
<p>The world cannot afford nuclear weapons falling into the wrong hands. By establishing a Joint US-Pakistan task force, the US both protects global security and reaffirms its leadership in the fight against nuclear terrorism. This partnership strengthens nuclear safeguard, prevents nuclear theft, and stabilizes the region. The US must act now to ensure Pakistan’s nuclear weapons are protected. Together, we can turn a potential crisis into a collaborative success. The time to act is now for a safer and more stable world.</p>
<p><em>Timor Nawabi is currently pursuing a master’s degree in security policy studies with a concentration in Science and Technology, focusing mainly on cybersecurity and artificial intelligence, at the Elliott School of International Affairs, George Washington University.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/10/Why-a-Joint-US-Pakistan-Counterterrorism-Task-Force-is-Necessary.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-28926 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/why-a-joint-us-pakistan-counterterrorism-task-force-is-necessary/">Why a Joint US-Pakistan Counterterrorism Task Force Is Necessary</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/why-a-joint-us-pakistan-counterterrorism-task-force-is-necessary/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Counter Terror’s High-tech to Low-tech Backfire</title>
		<link>https://globalsecurityreview.com/counter-terrors-high-tech-to-low-tech-backfire/</link>
					<comments>https://globalsecurityreview.com/counter-terrors-high-tech-to-low-tech-backfire/#respond</comments>
		
		<dc:creator><![CDATA[Justin Leopold-Cohen]]></dc:creator>
		<pubDate>Mon, 28 Oct 2024 12:15:51 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA["Counter-terrorism]]></category>
		<category><![CDATA[analog communications]]></category>
		<category><![CDATA[armed assaults]]></category>
		<category><![CDATA[Aum Shinrikyo]]></category>
		<category><![CDATA[bombings]]></category>
		<category><![CDATA[cellular detection]]></category>
		<category><![CDATA[Center for Strategic and International Studies]]></category>
		<category><![CDATA[chemical weapons]]></category>
		<category><![CDATA[commercial drones]]></category>
		<category><![CDATA[couriers]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[dead drops]]></category>
		<category><![CDATA[dynamite]]></category>
		<category><![CDATA[economic impact]]></category>
		<category><![CDATA[gasoline]]></category>
		<category><![CDATA[Global Terrorism Index]]></category>
		<category><![CDATA[ground operation]]></category>
		<category><![CDATA[gunpowder]]></category>
		<category><![CDATA[hamas]]></category>
		<category><![CDATA[handwritten notes]]></category>
		<category><![CDATA[Hezbollah]]></category>
		<category><![CDATA[high-tech]]></category>
		<category><![CDATA[homeland security]]></category>
		<category><![CDATA[IDF]]></category>
		<category><![CDATA[incendiary balloons]]></category>
		<category><![CDATA[inexpensive methods]]></category>
		<category><![CDATA[International Security]]></category>
		<category><![CDATA[Iranian missile attack]]></category>
		<category><![CDATA[Israel]]></category>
		<category><![CDATA[low-tech]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[pagers]]></category>
		<category><![CDATA[power plant attack]]></category>
		<category><![CDATA[Sarin gas attack]]></category>
		<category><![CDATA[technology in warfare]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[terrorism statistics]]></category>
		<category><![CDATA[UAVs]]></category>
		<category><![CDATA[walkie-talkies]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29212</guid>

					<description><![CDATA[<p>As the media ponders how Israel will respond to Iranian missile attack, many remain awestruck by the September 17, 2024, Israeli pager attack and subsequent walkie-talkie detonations that killed or injured Lebanon-based Hezbollah fighters. While the legality of such an attack is debatable, some are considering this a next step in using technology in warfare. [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/counter-terrors-high-tech-to-low-tech-backfire/">Counter Terror’s High-tech to Low-tech Backfire</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As the media ponders how Israel will respond to <a href="https://www.cnn.com/2024/10/01/politics/iran-missile-attack-israel/index.html">Iranian missile </a>attack, many remain awestruck by the September 17, 2024, Israeli <a href="https://www.cnn.com/2024/09/17/middleeast/lebanon-pager-attack-explosions-hezbollah-explainer-intl-latam/index.html">pager attack</a> and subsequent <a href="https://www.bbc.com/news/articles/cz04m913m49o">walkie-talkie </a>detonations that killed or injured Lebanon-based Hezbollah fighters. While the legality of such an attack is debatable, some are considering this a next step in using <a href="https://www.nytimes.com/2024/09/19/us/politics/israel-hezbollah-pager-attacks.html">technology in warfare</a>. Some are concerned that terrorists may copy the method.</p>
<p>Hezbollah, now attempting to fend off Israel’s <a href="https://www.nytimes.com/2024/09/30/world/middleeast/israel-hezbollah-lebanon-ground-invasion.html#:~:text=Sept.%2030,%202024.%20The%20Israeli%20military">September 30 ground operation</a>, is simultaneously working to adapt its own approach to technology, and, if history is any indicator of the future, the terror group will likely continue as it has, answering Israel’s high-tech efforts with ironically harder to trace low-tech options. That Hezbollah was even using pagers was to <a href="https://www.cnn.com/2024/09/17/middleeast/lebanon-pager-attack-explosions-hezbollah-explainer-intl-latam/index.html">avoid cellular detection</a>. And as they adapt, their communications will likely go even more analog, perhaps communicating only through <a href="https://www.nbcnews.com/id/wbna42853221">couriers</a><u>,</u> as Osama Bin Laden was known to do, or using physical handwritten <a href="https://www.bbc.com/news/world-europe-12068534">notes and dead drops</a>, as militant Italian anarchist groups did in the early 2000s.</p>
<p>While the idea of a terrorist group obtaining a more technologically advanced arsenal, such as nuclear or chemical weapons, or instituting a mass cyberattack is daunting, it is not exactly uncommon due to expense and required expertise. What is far more likely is that Hezbollah and other terrorist groups will downgrade methods, opting for cheaper and easier to implement weapons and methods which are more than capable of lethal outcomes.</p>
<p>Time and time again, society has seen heavy damage wrought on person and property via methods that seem relatively primitive.</p>
<p>In 2021, the Gaza-based terrorist group Hamas increased their use of <a href="https://www.cnn.com/2021/06/16/middleeast/israel-gaza-incendiary-balloons-cmd-intl/index.html">incendiary balloons</a> when attacking Israel, causing more than 20 fires in southern Israel, straining civilian and IDF emergency service resources, and burning upward of 10,000 acres of farmland over the preceding three years. These “balloons are easily constructed and require little setup to launch compared to rockets, which are expensive and time-consuming to produce” but are still incredibly effective.</p>
<p>In 2013, a US power plant in California was victim of an as yet unsolved <a href="https://www.npr.org/sections/thetwo-way/2014/02/05/272015606/sniper-attack-on-calif-power-station-raises-terrorism-fears">shooting attack</a>, damaging multiple transformers. Surprisingly set up with little to no security, the plant’s perimeter was breached and approximately 100 rounds of high-powered rifle ammunition were fired into 17 transformers before police arrived. The damage was severe enough that to avoid blackouts across Silicon Valley power had to be diverted from other areas during the months-long repair.</p>
<p>While these incidents are high profile, given the critical infrastructure connections, they did not result in any fatalities. However, that is not always the goal of terrorists and is hardly the reality for other common low-tech methods. Shootings, bombings, and melee attacks continue to make up the <a href="https://www.csis.org/analysis/tactics-and-targets-domestic-terrorists">overwhelming majority</a> of terrorist attacks. Research from the <a href="https://www.csis.org/analysis/tactics-and-targets-domestic-terrorists">Center for Strategic and International Studies</a> shows that from 2015 to 2020,  85 percent of terror attacks employed one of these methods, with 12 percent being unrealized threats, 2 percent other, and 1 percent vehicle ramming.</p>
<p>The numbers are remarkably similar for lethal attacks in 2023 according to the <a href="https://www.visionofhumanity.org/wp-content/uploads/2024/02/GTI-2024-web-290224.pdf">2024 Global Terrorism Index</a> published by Vision of Humanity. Out of the 50 most lethal terrorist attacks, only one, an incident in the Homs Province of Syria, featuring an explosive-laden unmanned aerial vehicle (UAV) targeting a military graduation ceremony which killed 89 people, could be thought of as a high-tech weapon. The other 49 were made up of 43 armed assaults, five bombings, and one explosive projectile.</p>
<p>As terrorist groups get backed into a corner by high-tech counter methods like the Israeli pager attack, it is increasingly likely they will rely on time-proven simple methods. The world may even see them adapting and learning from accidents such as the September 2024 <a href="https://www.usatoday.com/story/news/nation/2024/09/17/texas-pipeline-fire-deer-park/75266574007/">car crash into a gas pipeline</a> in Texas which caused an explosion or the 2017 Hamburg, Germany, airport evacuation which resulted from the accidental discharge of a simple, lipstick-sized can of <a href="https://www.washingtonpost.com/world/europe/hamburg-airport-briefly-closed-after-dozens-injured-by-unidentified-substance/2017/02/12/7371809c-f129-11e6-a9b0-ecee7ce475fc_story.html">pepper spray</a>. While these were both accidents, one can imagine the economic and fear-induced impact if a terrorist group were to try to replicate the outcomes.</p>
<p>There are, of course, outliers to the terrorist use of low-tech methods. There is the terrorist cult Aum Shinrikyo’s launch of the notorious <a href="https://www.bbc.com/news/world-asia-35975069">Tokyo Sarin gas attack</a> in 1995 or drone attacks along the lines of  2023’s drone attack in Syria, as well as other groups’ potential use of <a href="https://www.nbcnews.com/tech/security/flip-side-drone-boom-airports-stadiums-power-plants-need-defending-rcna128248">commercial drones</a>. But today’s would-be terrorist is likely not resorting to high-tech weapon or communication devices, and more often than not, going for something easy and/or available. To borrow from Chistopher Nolan’s Joker in the <a href="https://www.imdb.com/title/tt0468569/quotes/?item=qt0484253&amp;ref_=ext_shr_lnk"><em>Dark Knight</em></a>, items like “dynamite, and gunpowder, and gasoline [are] cheap” and are going to comprise the bulk of the future threats from terrorist groups.</p>
<p><em>Justin Leopold-Cohen is a homeland security analyst in Washington, DC. He has written widely on national and international security issues for outlets including </em>Small Wars Journal<em>, the Wavell Room, and Inkstick Media. Any views expressed in the article are his own and not representative of, or endorsed by, any organization or government.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/10/Counter-Terrors-High-tech-to-Low-tech-Backfire.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-28926 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/counter-terrors-high-tech-to-low-tech-backfire/">Counter Terror’s High-tech to Low-tech Backfire</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/counter-terrors-high-tech-to-low-tech-backfire/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Coming Disaster in Afghanistan</title>
		<link>https://globalsecurityreview.com/the-coming-disaster-in-afghanistan/</link>
					<comments>https://globalsecurityreview.com/the-coming-disaster-in-afghanistan/#respond</comments>
		
		<dc:creator><![CDATA[Unnamed Afghan]]></dc:creator>
		<pubDate>Mon, 07 Oct 2024 11:41:02 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[Al Qaeda]]></category>
		<category><![CDATA[drug monopoly]]></category>
		<category><![CDATA[Ghazni]]></category>
		<category><![CDATA[global terrorist groups]]></category>
		<category><![CDATA[illicit trade]]></category>
		<category><![CDATA[ISIS]]></category>
		<category><![CDATA[islamic jihad]]></category>
		<category><![CDATA[Islamic Terrorists]]></category>
		<category><![CDATA[madrasa]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Taliban]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[UN Security Council]]></category>
		<category><![CDATA[UNAMA]]></category>
		<category><![CDATA[West]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=29026</guid>

					<description><![CDATA[<p>Afghanistan, under Taliban control, is a powder keg ready to erupt with consequences that will ripple throughout the region and the world. The driving forces of this impending disaster are deeply rooted in the Taliban’s ideological, strategic, and operational maneuvers, which intensified after the American exit. The brainwashing of youths, monopoly over illicit drug production, [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-coming-disaster-in-afghanistan/">The Coming Disaster in Afghanistan</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Afghanistan, under Taliban control, is a powder keg ready to erupt with consequences that will ripple throughout the region and the world. The driving forces of this impending disaster are deeply rooted in the Taliban’s ideological, strategic, and operational maneuvers, which intensified after the American exit.</p>
<p>The brainwashing of youths, monopoly over illicit drug production, sheltering and supporting global terrorist groups, weaponization of poverty, and recruitment of refugees has brought Afghanistan to the verge of an imminent explosion, with consequences that may prove more consequential than those of September 11, 2001. Understanding what the Taliban is doing deserves further explanation.</p>
<p><strong>Brainwashing the Youth</strong></p>
<p>The Taliban’s focus on educating Afghan youth in religious schools (madrasa), which serve as training centers for militants and suicide bombers, poses an immediate and long-term threat to the region and the West. Through relentless brainwashing, these madrasas create a generation of children and teenagers steeped in radicalism. Young recruits are taught that martyrdom and suicide attacks are not only honorable but also necessary.</p>
<p>What makes this particularly worrisome is the sheer scale. Tens of thousands of young minds are being primed for violence, and this army of youths will be deployed somewhere. The consequences for neighboring countries and the West, which are already struggling with radicalization, could be catastrophic. As Roza Otenbayeva, head of the United Nations Assistance Mission in Afghanistan (UNAMA), <a href="https://8am.media/fa/deadly-poverty-and-cost-of-resources-for-the-growth-of-terrorism-world-bank-the-future-of-afghanistans-economy-is-dark/">said</a> to the UN Security Council, “The Taliban do not allow any monitoring of these schools and we don’t know what they teach there.”</p>
<p>According to the Taliban Ministry of Education, at least <a href="https://www.etilaatroz.com/208655/%D9%85%D8%AF%D8%B1%D8%B3%D9%87-%D8%A7%D8%B2-%D8%AA%D9%84%D9%82%DB%8C%D9%86-%D8%AE%D8%B4%D9%88%D9%86%D8%AA/">17,300 madrasas</a> are officially active across Afghanistan. Meanwhile, <a href="https://www.etilaatroz.com/208655/%D9%85%D8%AF%D8%B1%D8%B3%D9%87-%D8%A7%D8%B2-%D8%AA%D9%84%D9%82%DB%8C%D9%86-%D8%AE%D8%B4%D9%88%D9%86%D8%AA/">according to an order</a> issued by the Taliban on June 20, 2022, three to 10 jihadi schools, with a capacity of 500–1,000 students each, are being built in every district of Afghanistan. Afghanistan has 408 districts, and the construction of three to 10 new jihadi schools per district could quickly turn the country into the center of global terrorism.</p>
<p><strong>Safe Haven for Terrorist Groups</strong></p>
<p>Afghanistan, under Taliban rule, is once again a haven for international terrorist groups. The Taliban’s victory emboldened and empowered extremist groups, providing them with the space to reorganize, train, and plan. Groups such as al-Qaeda, the Islamic Movement of Uzbekistan, and the Tehrik-e-Taliban Pakistan (TTP) now operate freely inside Afghanistan. Taliban ties with these terrorist groups are not superficial. They are rooted in common ideology, long-term political interests, and, most importantly, many Taliban leaders have long-standing family ties with the leaders of these groups.</p>
<p>According to a <a href="https://8am.media/fa/taliban-hosting-terrorist-groups-building-four-settlements-for-al-qaeda-and-ttp">report</a> in <em>Hasht-e-Subh</em>, the Taliban are building well-equipped bases with residential houses for the Al-Qaeda network and Tehrik-e Taliban Pakistan in Ghazni province. Likewise, UN reports, especially the July 2024 report, are proof of this claim. The United Nations says Afghanistan, under Taliban rule, is a “<a href="https://digitallibrary.un.org/record/4053880?ln=en&amp;_gl=1*jziwl9*_ga*MTg4MTg3MTYwMy4xNjkzMTIwNjQx*_ga_TK9BQL5X7Z*MTcyMDc2Mzg2Mi42OC4xLjE3MjA3NjM5MjguMC4wLjA.&amp;v=pdf#files">safe haven</a>” for groups such as Al-Qaeda and ISIS. This network of relationships ensures that the Taliban will continue to cooperate with these groups in their collective efforts to destabilize the region, expand influence, and export terror globally, creating a security disaster with devastating global consequences.</p>
<p><strong>Drug Monopoly</strong></p>
<p>Although the Taliban officially banned the cultivation and trafficking of narcotics, it has monopolized the industry. By limiting the supply, the Taliban is driving up the price of drugs, making the trade more profitable for themselves and their affiliates. As noted in the July 2024 UN Security Council report, it is still too early to assess the full impact of the poppy cultivation ban. However, senior Taliban officials oppose the ban. Poppy farmers lose while the Taliban profits. The report states, “Due to poppy stockpiles, the drug trade in Afghanistan remains significant.”</p>
<p>The world’s lack of attention to this development risks creating an underground drug economy, further empowering the Taliban and their allied terrorist groups—undermining security and stability in Afghanistan and the region. As the Taliban’s drug empire expands, terrorist groups will increasingly benefit.</p>
<p><strong>Weaponization of Poverty</strong></p>
<p>One of the most dangerous strategies used by the Taliban is the deliberate impoverishment of the Afghan people. By doing this, they pursue two goals.</p>
<p>First, they plunge a large portion of the population into extreme poverty and eliminate opportunities for education, employment, and basic survival. This makes it easier to recruit people into their ranks and allied terrorist groups.</p>
<p>Second, the Taliban’s control over local resources and their monopoly on illicit trade provides ample financial incentives for those willing to fight for them. In this way, poverty becomes a weapon and fuels rebellion and radicalism.</p>
<p><strong>Recruitm</strong><strong>ent of Deported Asylum Seekers</strong></p>
<p>The Taliban encourages the deportation of Afghan refugees by secretly cooperating with some countries, particularly those in the region. This is a policy that is of strategic importance to the regime.</p>
<p>Many deported Afghans, returning to the land where they find no means of survival, are easily recruited by the Taliban and allied terrorist groups. Deportation is vital for the Taliban, as it ensures a steady stream of disillusioned and frustrated individuals who become pawns in their larger scheme.</p>
<p>Many countries fail to grasp the significance of this issue and view it superficially. Deporting immigrants, especially from Western countries, fuels anti-Western sentiments among the population, making them susceptible to serving terrorist groups.</p>
<p><strong>Time Is Running Out</strong></p>
<p>If the world continues to ignore the dire situation in Afghanistan, the consequences will soon prove irreparable. The brainwashing of the nation’s youth, Taliban drug running, safe havens for terrorists, the weaponization of poverty, and the recruitment of refugees will soon impact Afghanistan’s neighbors and the West. Afghanistan’s neighbors, Pakistan, Iran, Central Asia, and India, will suffer the most, but the impact will not be limited to the region. Countries far beyond, especially in the West, will be in the crosshairs of these repercussions.</p>
<p>The American withdrawal from Afghanistan was a serious miscalculation. The Biden administration, particularly Jake Sullivan, believes that drones and aerial surveillance can control the situation. This reflects a strategic mistake reminiscent of America’s approach during the Cold War. Ultimately, that mistaken view contributed to the rise of international terrorism and the attacks of September 11, 2001. Abandoning the Afghan people once again will prove catastrophic, especially the West.</p>
<p>As an Afghan, I urge the West to pay attention and ensure that the Afghanistan that led to 9/11 does not become the same Afghanistan of the near future. It may be a landlocked country in Central Asia, but Afghanistan has already proved that it can cause great harm when left to its own devises.</p>
<p><em>The author is an Afghan who, for reasons of safety, is unnamed.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/10/The-Coming-Disaster-in-Afghanistan.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-28926 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/09/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>&nbsp;</p>
<p><a href="https://globalsecurityreview.com/the-coming-disaster-in-afghanistan/">The Coming Disaster in Afghanistan</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-coming-disaster-in-afghanistan/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Operational Logic of Nuclear Weapons Use by an Adversary</title>
		<link>https://globalsecurityreview.com/the-operational-logic-of-nuclear-weapons-use-by-an-adversary/</link>
					<comments>https://globalsecurityreview.com/the-operational-logic-of-nuclear-weapons-use-by-an-adversary/#comments</comments>
		
		<dc:creator><![CDATA[Bradley Gericke]]></dc:creator>
		<pubDate>Mon, 08 Jan 2024 13:49:10 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Deterrence & Foreign Policy]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Asia]]></category>
		<category><![CDATA[damage]]></category>
		<category><![CDATA[denied access]]></category>
		<category><![CDATA[dirty bomb]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[Middle East]]></category>
		<category><![CDATA[nuclear attack]]></category>
		<category><![CDATA[Nuclear Deterrence]]></category>
		<category><![CDATA[nuclear operations]]></category>
		<category><![CDATA[Nuclear Weapons]]></category>
		<category><![CDATA[planning]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[targeting]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=26690</guid>

					<description><![CDATA[<p>The employment of nuclear weapons by adversaries of the United States is, logically, not only a possibility, but a likelihood. Americans want deterrence to hold. Decision-makers are obligated to seek ways to sustain stability without the employment of strategic weapons. Yet, malevolent powers are a fact and given the presence of nuclear weapons, it is [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-operational-logic-of-nuclear-weapons-use-by-an-adversary/">The Operational Logic of Nuclear Weapons Use by an Adversary</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The employment of nuclear weapons by adversaries of the United States is, logically, not only a possibility, but a likelihood. Americans want deterrence to hold. Decision-makers are obligated to seek ways to sustain stability without the employment of strategic weapons. Yet, malevolent powers are a fact and given the presence of nuclear weapons, it is only prudent that American decision-makers think as creatively as any adversary about how nuclear weapons may be employed by those who are hostile to peace and the interests of the United States and its allies.</p>
<p>It is straightforward to see that beyond the deterrent or “last defense” aspect of possessing a nuclear arsenal these weapons are one tool among other strategic options. It is the duty of a military planner to plan for outcomes with the instruments that adversaries possess, however distasteful those weapons (nuclear weapons). It does not require reams of classified intelligence nor deep policy experience to recognize the appeal of a nuclear weapon to achieve winning outcomes. Even the technical specifications of specific weapons, their delivery method, and the effects achieved by their use can take a second seat to the appealing utility of their use in the mind of a foe.</p>
<p>A brief look at two kinds of adversary is instructive. First, there is the ideologically driven actor who seeks to remake the international state system and its associated norms, behaviors, and morals. Second, there is a leader or state-party that seeks to climb politically, economically, and cultural-informationally within the extant Western-built international system.</p>
<p>For the antagonist motivated by an ideology whose primary ambition is the destruction of contemporary norms or who desires to trigger a millenarian kind of resorting, whether secular or religious, a nuclear weapon heralds to fellow adherents the breaking of the status quo by the offer of a new, radicalized future. To achieve such an outcome a nuclear weapon targeted at a populated area, especially a political capital or major religious center, would offer the radical damage and chaos sought.</p>
<p>The size of the nuclear device need not be large. The purpose is to tear down a targeted society by inflicting as many casualties as possible and to wreck the symbols and sinews that symbolized the victims’ way of life and station in the international order. There is no doubt many terrorist organizations that would leap at the chance to exploit a nuclear weapon in this fashion. And there are state challengers who no doubt see the same appeal. The only risk to such leaders is the repercussions they may face. But to the radicalized actor, the repercussions are just another aspect of martyrdom—religious or ideological. One imagines that such a scenario has not occurred more due to lack of opportunity than to a lack of desire.</p>
<p>A nuclear weapon fired by a state’s armed forces is even more likely to occur if for no other reason than governments possess the world’s nuclear arms. State arsenals and their delivery systems continue to proliferate in both number and capability, thus expanding the scenarios for weapons use. The danger of the “mutually assured destruction” problem that occupied many deterrence thinkers during the Cold War is still a threat, but the logic of employment success points towards battlefield use.</p>
<p>A nuclear weapon that struck a key military target could decisively alter the course of a battle and a campaign by inflicting damage at a scale that conventional weapons can only achieve over much longer periods of time. The historical record informs us that winning quickly is a tremendous advantage for an adversary.</p>
<p>The one sure way to suffer a military defeat by the US and any American-led coalition is to wait for American joint and combined forces to deploy, assemble, and wage a maneuver campaign. If the Normandy landings of World War II are too distant, then the overwhelming success of the United States in the Gulf War (1991) is a more recent reminder of the fate of any adversary that simply waits for the United States to come to them. The war in Ukraine is an ongoing example of the grinding, almost interminable, result of fighting when early wins do not occur. Despite the many technological advances that modern armed forces possess, speed in multi-domain operations is still decisive, and elusive.</p>
<p>America’s adversaries are certainly aware that speed matters. Alongside the imperatives of increasing range and the convergence of lethal effects, the rapid way a nuclear weapon can alter battlefield geometries and the correlation of forces gives so called “battlefield nukes” tremendous appeal. There are many creative ways to benefit from a nuclear weapon, not just on land, but also in the maritime and air domains. Sealing an area off from maneuver; denying communications, targeting, and surveillance systems; destroying logistical nodes and stockpiles; damaging vehicles and equipment; and inflicting casualties on the adversary are all additional ways nuclear weapons are useful. This is not to mention the escalatory advantage of skipping rungs on the escalation ladder, thereby intimidating America’s partners and neutral states—foreclosing incremental steps from American policymakers.</p>
<p>Simply put, nuclear weapons present an urgent operational challenge to the joint force of the United States and its military partners. Whether the scenario is in Asia, Eastern Europe, the Middle East, or globally, the United States must imagine that adversaries are thinking about, and at least gaming if not planning, nuclear weapons use to achieve their objectives.</p>
<p>Americans must admit that there is a problem and stop hiding behind sincere wishes that nuclear weapons are never used again. The logic of their employment demands that the nation act on the facts as they are. Nuclear weapons are present. They are plentiful. It is also almost certainly only a matter of time before an adversary exploits American reticence to prepare for their use. It is time to prepare for that day.</p>
<p><em>Major General (Ret.) <a href="https://www.linkedin.com/in/bradleytgericke/">Bradley T. Gericke,</a> PhD, is a Senior Fellow at the National Institute for Deterrence Studies.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/01/The-Operational-Logic-of-Nuclear-Weapons-Use-by-an-Adversary.pdf"><img loading="lazy" decoding="async" class="alignnone wp-image-26665 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/01/Download-This-Publication-300x83.png" alt="Get this publication" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/01/Download-This-Publication-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/01/Download-This-Publication.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/the-operational-logic-of-nuclear-weapons-use-by-an-adversary/">The Operational Logic of Nuclear Weapons Use by an Adversary</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-operational-logic-of-nuclear-weapons-use-by-an-adversary/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Emerging U.S.-U.K. Tensions May Jeopardize Counterterrorism Efforts</title>
		<link>https://globalsecurityreview.com/emerging-us-uk-tensions-may-jeopardize-counterterrorism-efforts/</link>
		
		<dc:creator><![CDATA[Col. Rob Maness]]></dc:creator>
		<pubDate>Fri, 28 Apr 2023 15:54:59 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=25461</guid>

					<description><![CDATA[<p>The media firestorm that has arisen in the wake of Russia’s detention of Wall Street Journal reporter Evan Gershkovich has brought newfound attention to the issues of extradition and the legal treatment of foreign nationals accused of crimes. Unfortunately, this is but one example of a growing trend of authoritarian regimes taking high-profile American detainees [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/emerging-us-uk-tensions-may-jeopardize-counterterrorism-efforts/">Emerging U.S.-U.K. Tensions May Jeopardize Counterterrorism Efforts</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 style="font-weight: 400;">The media firestorm that has arisen in the wake of Russia’s detention of Wall Street Journal reporter Evan Gershkovich has brought newfound attention to the issues of extradition and the legal treatment of foreign nationals accused of crimes.</h2>
<p style="font-weight: 400;">Unfortunately, this is but one example of a growing trend of authoritarian regimes taking high-profile American detainees to achieve diplomatic ends, as it is an increasingly utilized approach by countries like Iran and China as well. But while this is a foreign policy reality that Americans may increasingly need to come to grips with, many may not be aware that there are also emerging tensions between the United States and United Kingdom over extradition related matters. A key treaty that assists in battling terrorism may hang in the balance.</p>
<p style="font-weight: 400;">The U.S.-U.K. Extradition Treaty of 2003 in many ways represents a culmination of the mutual respect and cooperation that exists between these two great nations. Established in the wake of the September 11<sup>th</sup>terrorist attacks, it has proven invaluable in ensuring that terrorists and other dangerous criminals are brought to justice and has been effective in protecting national security interests on both sides of the Atlantic.</p>
<p style="font-weight: 400;">However, recent attempts by the United States to expand the treaty&#8217;s scope to include white-collar criminal matters have raised concerns about its potential misuse and the broader national security implications. The ongoing legal battle over the extradition of Dr. Mike Lynch to the United States, in particular, highlights the potential risks of misusing the treaty in ways that could ultimately undermine this productive working relationship.</p>
<p style="font-weight: 400;">Dr. Lynch, a British citizen and tech entrepreneur known by some as ‘<a href="https://www.cnbc.com/2022/02/01/mike-lynch-the-british-tech-mogul-facing-extradition-to-the-us.html" data-saferedirecturl="https://www.google.com/url?q=https://www.cnbc.com/2022/02/01/mike-lynch-the-british-tech-mogul-facing-extradition-to-the-us.html&amp;source=gmail&amp;ust=1682774732124000&amp;usg=AOvVaw26pRW2C5MKepzvAN0ViFc4">Britain’s Bill Gates</a>,’ is the former CEO of the British software company Autonomy. Subject to a years-long fraud investigation by the United States Department of Justice (DOJ), Dr. Lynch and other executives at Autonomy have been accused of artificially inflating the company’s revenues prior to its acquisition by Hewlett-Packard (HP). However, the case against Dr. Lynch is far from clear-cut.</p>
<p style="font-weight: 400;">A British civil court reviewed the corporate dispute and ruled in favor of HP in its claims against Lynch in January 2022. But the UK&#8217;s Serious Fraud Office (SFO) previously conducted a lengthy investigation into the matter and ultimately decided not to pursue criminal charges concluding that there was &#8220;insufficient evidence&#8221; to prosecute. Moreover, there are serious concerns about the DOJ&#8217;s case. Specifically, the DOJ&#8217;s indictment of Dr. Lynch relies heavily on the testimony of former Autonomy executives who have themselves been charged with fraud and on disputed accounting practices that were approved by Autonomy&#8217;s auditors at the time.</p>
<p style="font-weight: 400;">Despite these discrepancies and the fact that this case has been litigated extensively in the British judicial system, the DOJ is still seeking to try Dr. Lynch for his alleged crimes in the United States. This has renewed calls for change by some in the U.K. that are concerned about imbalances in the extradition treaty in favor of the U.S., and who believe it is inappropriate for the U.S. to override the U.K.&#8217;s judgment.</p>
<p style="font-weight: 400;">In 2020 then-Prime Minister Boris Johnson <a href="https://www.businessinsider.com/boris-johnson-slams-unbalanced-us-extradition-deal-assange-harry-dunn-2020-2" data-saferedirecturl="https://www.google.com/url?q=https://www.businessinsider.com/boris-johnson-slams-unbalanced-us-extradition-deal-assange-harry-dunn-2020-2&amp;source=gmail&amp;ust=1682774732125000&amp;usg=AOvVaw1MVFiTY_iA-ZJ3M_-Bd0DL">said</a> of the treaty, “I do think there are elements of that relationship that are unbalanced and I certainly think that it is worth looking at.” More recently, Tom Tugendhat, the current UK Minister for State Security, has called for the treaty to be “<a href="https://www.economist.com/britain/2022/02/05/mike-lynch-has-lost-britains-biggest-fraud-case" data-saferedirecturl="https://www.google.com/url?q=https://www.economist.com/britain/2022/02/05/mike-lynch-has-lost-britains-biggest-fraud-case&amp;source=gmail&amp;ust=1682774732125000&amp;usg=AOvVaw3_KGdpDOc1NejZJS07S5j6">rebalanced</a>.”</p>
<p style="font-weight: 400;">It is worth noting that such changes would not be unprecedented. The U.K. has already amended the treaty once, in 2013, to include a “<a href="https://www.lbkmlaw.com/news-events-238.html" data-saferedirecturl="https://www.google.com/url?q=https://www.lbkmlaw.com/news-events-238.html&amp;source=gmail&amp;ust=1682774732125000&amp;usg=AOvVaw1moQSw179ei7aJub-MLzZL">forum provision</a>” that has provided the U.K. with a greater license to refuse extradition requests. Diplomats and national security officials of all stripes should therefore be concerned about the lasting negative impacts that could come if the United States continues to push the limits of the treaty.</p>
<p style="font-weight: 400;">The fact of the matter is, this dispute is at its essence a civil dispute and not a matter of national security. Using the treaty to aid in the prosecution of executives involved in an international business transaction is well outside the original intent of this treaty. This could in turn undermine British willingness to cooperate with other, more serious cases such as when the treaty was successfully used in the past to extradite the likes of Babar Ahmad and Syed Talha Ahsan for providing material support to terrorists, and Abu Hamza al-Masri for conspiring to establish a terrorist training camp and supporting jihad.</p>
<p style="font-weight: 400;">The United Kingdom and the United States have long enjoyed a close relationship that has been critical in maintaining global stability and promoting democratic values. With regards to such matters of international law, especially involving cases without any direct impact on national security, it is imperative that officials on both sides of the Atlantic avoid taking measures that would make it more difficult for the two countries to combat terrorism and other serious crimes.</p>
<p><a href="https://globalsecurityreview.com/emerging-us-uk-tensions-may-jeopardize-counterterrorism-efforts/">Emerging U.S.-U.K. Tensions May Jeopardize Counterterrorism Efforts</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>From Missiles to Microchips</title>
		<link>https://globalsecurityreview.com/from-missiles-to-microchips/</link>
		
		<dc:creator><![CDATA[Joshua E. Duke]]></dc:creator>
		<pubDate>Wed, 06 Jul 2022 17:10:01 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=15665</guid>

					<description><![CDATA[<p>This article was originally published on June 30, 2020. Efforts by the United States Intelligence Community (IC) to apply Cold War strategies to new age threats and non-state actors have largely failed, leading to adaptations and evolutions within the IC to understand and address new threats in new ways. The Soviet Union and the Islamic [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/from-missiles-to-microchips/">From Missiles to Microchips</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>This article was originally published on June 30, 2020.</em></p>
<p>Efforts by the United States Intelligence Community (IC) to apply Cold War strategies to new age threats and non-state actors have largely failed, leading to adaptations and evolutions within the IC to understand and address new threats in new ways. The Soviet Union and the Islamic State terror organization pose very different problems for intelligence professionals to solve. As the world moves further into the information age, the IC as a whole is evolving to meet new threats with analytical, technical, and ideological developments designed to foster the flow of information, rather than compartmentalize it into Cold War-era boxes and stovepipes.</p>
<p>This article outlines the differences between nation-states and non-state actors, including their structures, threats posed by them, and IC adaptations necessary for global social progress. The first step in this process is to define and differentiate nation-states and non-state actors, followed by an outline of IC approaches to each type of threat, intelligence paradigm developments, and potential enhancements to future U.S. intelligence operations.</p>
<h3>Nation-States vs. Non-State Actors</h3>
<p>Nation-states need structure to function in the world, while non-state actors do not. Foreign intelligence organizations of nation-states are designed to function as parts of their nation&#8217;s governmental structure in some form or way, which makes identifying them and addressing potential threats from them a verifiable process. Nation-states are also generally held accountable for the actions taken by government associated organizations and departments, which in part dictates the field of activity that any given nation-state can and will be willing to conduct at any time. International repercussions from the global community—including sanctions and/or military retaliation—are a strong deterrent for most national governments that prevents them from taking certain courses of action and from many forms of conduct.</p>
<p>The Russian Federation, for instance, took control of Crimea in a deception-based maneuver that resulted in virtually no combat, intentionally avoiding any conventional military retaliation from the West.<sup>1</sup> Chinese military expansion into the South China Sea, while creating tension in the region, does not involve war or international conflict either.<sup>2</sup> Still, when faced with being charged with cyber-attacks on the United States, the Chinese Government remains unwilling to admit that it was even conducting cyber operations,<sup>3</sup> for fear of international repercussions—including the potential for conventional war. These examples show that while nations are willing to act, they are generally unwilling to engage in major conflict or start a war. Non-state actors do not have this problem. Instead, many thrive on the prospects of international conflict and warfare.</p>
<p>Non-state actors are generally defined by their lack of structure, asymmetric tactics, and unique operational procedures. Any entity not acting on behalf of or directed by a nation-state is a non-state actor, including drug cartels, terrorist organizations, hackers, sex trafficking organizations, international corporations, vigilantes, bounty hunters, and even basic criminals and individual citizens of the world. They can, therefore, only be defined in the category of not being a nation-state or directed by a nation-state, and not defined in respect to what they actually are.<sup>4</sup> Some non-state actors have an organizational structure, such as corporations, and can be addressed like that of a nation-state, or targeted similarly for espionage or protection purposes. However, most non-state actors that pose threats to nation-states do not have a structure that is easily identifiable, definable, or targetable.</p>
<p>Operational procedures and tactics of non-state actor threats also tend to be less symmetrical than nation-states, and almost every non-state actor is unique in its specific operational procedures and techniques. Each threat must be evaluated and addressed individually for threat mitigation and/or intelligence operations because of this uniqueness. Conducting counterterrorism operations against the Islamic State, for example, cannot be based on counterterrorism operations against Hezbollah, simply due to the differences in each organization&#8217;s unique strategies, culture, location, and patterns, despite both of them being terrorist organizations. Non-state actors require a higher degree of analysis to understand each threat completely before actions are taken, unlike nation-states where threats posed are understood, partly based on comparable historical analyses, international law, the economic prosperity of the nation, and regional stability.</p>
<h3>Nation-States and Non-State Actors: Similarities and Differences</h3>
<p>Nation-states and non-state actors are similar in the respect that they are mainly people led by other people, so understanding the behavioral psychology of people is a useful approach to understanding either type of threat. Both require resources, including people, to present a threat. Terrorist organizations like the Islamic State rely primarily on weapons and recruiting to grow in numbers and capabilities—the larger they are, and the more weapons they have, the more significant of a threat they can potentially pose. Nation-states like Russia and China rely heavily on other resources, such as energy, food, water, and other types of wealth-creating capital. Organizational utilization of those resources also differs, as a nation-state&#8217;s resources are used mostly for ensuring economic stability for its citizens and creating capital wealth to raise international prestige and rapport. At the same time, terrorist organizations have somewhat different concerns.</p>
<p>Terrorist organizations&#8217; primary concern for resource utilization is being able to kill as many people as possible with as much media attention as possible, to boost recruiting efforts, and spread their ideology across the world for purposes of regional or global domination.<sup>5</sup> Public support matters to both nation-states and non-state actors as well, since increasing one&#8217;s reputation, both locally and around the world, can increase the range of actions that are acceptable to conduct. Russia&#8217;s invasion of Crimea was not retaliated against, mainly because of the way the issue was presented to the public,<sup>6</sup> just as media manipulation by the Islamic State was primarily responsible for its swift expansion and success in recruiting.<sup>7</sup> Both of these entities swayed public support in their favor to help achieve their goals.</p>
<p>Despite several similarities between nation-states and non-state actors, there are many factors that simply only apply to one or the other. International law does not regulate or affect non-state actors or their actions since they inherently cannot be a party to any international agreement or treaty for any reason. Nation-states, on the other hand, face severe repercussions by openly violating any international laws or signed treaties, or if they are caught violating either of these clandestinely. Nation-states also have massive infrastructures for large scale weaponry and economic operations as well. In contrast, hostile non-state actors do not have access to the required materials and/or facilities needed to establish such features. There are no terrorist organizations with a space program, for example.</p>
<p>This means that any satellite operations conducted by terrorists, be it for cell phone communications or cyber operations, must go through a nation-state&#8217;s infrastructure. Nation-states like Iran who are state sponsors of terrorism and also have a space program, therefore, create a very unique problem.<sup>8</sup> Non-state actors cannot by definition have a ballistic missile program either, since this also requires an infrastructure that only a Nation-State can achieve, but they can still acquire and use such weapons through allies, theft, or the black market. If the Pakistani Taliban or the Haqqani Network, for instance, were to seize Pakistan&#8217;s missile facilities, they would immediately become the world&#8217;s first terrorist organization with nuclear Inter-Continental Ballistic Missiles,<sup>9</sup> which makes potential instability within the Pakistani Government of paramount international concern.<sup>10</sup></p>
<p>Technological innovations generally also require a Nation-State&#8217;s infrastructure with research facilities, scientific education programs, and a lot of money, limiting this combat multiplying factor to nation-states as well. Just as with missiles, however, non-state actors may still acquire technological innovations, including medical devices, weapons, computer hardware/software, communications equipment, or espionage devices by other means. In free societies like the United States, this problem is multiplied by readily available technological innovations to the public. It has resulted in the evolution of technologically based non-state actors like the hacktivist collective, Anonymous, presenting new and unique threats to nation-states and the world.<sup>11</sup></p>
<p>Free societies have also provided other non-state actors, like terrorist organizations, with technological infrastructures that can be used for cyber operations and tactical social media coordination for paramilitary operations, including terrorist attacks, such as happened in Chattanooga, Tennessee, and Paris, France. The fact remains that non-state actors, while very different in nature from nation-states, have overlapping features, and unique features, and each threat must be approached by intelligence professionals uniquely and individually to achieve success. Intelligence methods and operational tactics must evolve continuously in the face of perpetual technological and ideological evolutions around the world to maintain global stability and human freedom, and the American intelligence infrastructure represents the best hope for achieving this goal in today&#8217;s world.</p>
<h3>Intelligence Community Adaptations: Killing the Cold War Mindset</h3>
<p>Intelligence operations and focuses throughout the Cold War were primarily concerned with threats posed by nation-states, and in particular, the Soviet Union and its Communist allies. The intelligence infrastructure of the United States that was created and grown during this era of Nation-State threat priorities stimulated the creation of extensive analytical techniques and operations explicitly designed to counter threats from foreign nations and their organizations. While terrorism and other non-state actors existed, they were not prevalent and did not receive enough attention to warrant extensive development of Non-State Actor threat mitigation techniques until relatively recently.</p>
<p>Intelligence representatives developing the intelligence infrastructure that exists today can target specific organizations within specific Governments for intelligence and counterintelligence operations. The ability to understand a structured organization made this possible and facilitated expansive espionage operations, including penetration operations and counterintelligence missions, to deceive the enemy and/or deny them information. The ability to identify the enemy and define it is the primary reason this type of analysis and intelligence operation targeting nation-states is so successful. The Soviet Union was an obvious target. Its intelligence, political, economic, and military organs also were definable, and therefore targetable. Even the tactics and procedures used by the Soviet Union could be documented over time, providing a standard analytical framework to base decisions on, with known variables regarding how specific parts of the Soviet Union&#8217;s organizations function and operate. Traditional threats posed by nation-states and individuals, before the onset of the information age, pale in comparison to the threats that exist today, threats that cannot be defined, controlled, and some that simply cannot be defeated, only mitigated.</p>
<p>Moving from the Cold War era into the information age has changed everything and created a large number of asymmetrical threats, not just from asymmetrical non-state actors, but from nation-states as well, transforming the entire global threat landscape forever. Intelligence professionals in today&#8217;s world must deal with issues and threats that have never existed, and therefore without historical data to reference when attempting to analyze them. Technological proliferation is the primary cause of this new threat landscape, technology in nearly every area of human life that is causing third world threats to be armed with first world weapons and technologies to aid their cause.</p>
<p>Transnational terrorist networks conducting cyberspace operations and coordinated paramilitary attacks on civilian populations have created global fear in addition to the physical threats that exist in the world, multiplying the overall effect of any attack they conduct. Many nation-states have also adopted non-traditional techniques and weapons, creating entirely new potential combat zones in space and cyberspace. The United States IC in today&#8217;s world must address a more significant number of potential and real threats, simultaneously, than have ever existed at one time in human history, and the freedom of the entire human race is at risk.</p>
<p>Intelligence professionals in the information age are no longer only trying to discover the number of tanks or missiles that an adversarial foreign nation has operational at a given time. They are instead assessing a multitude of threats without historical precedence that change the entire analysis and many which act as force multipliers, including but not limited to:</p>
<ul>
<li>The number of supercomputers any potential adversary has access to</li>
<li>The speed of an adversary&#8217;s most advanced processor</li>
<li>Whether or not terrorist organizations have access to weapons of mass destruction, how they might use them, and where they could turn to get them</li>
<li>Regional and global economic stability</li>
<li>Human rights violations by nation-states and non-state actors</li>
<li>Weaponized space assets, potential and known, and their impact(s)</li>
<li>Prospects for human expansion into space, including colonization, celestial militarization, and planetary resource exploitation</li>
<li>Robotics technology proliferation</li>
<li>Military and intelligence-related nano-science applications</li>
<li>Global and regional drug and sex trafficking operations</li>
<li>Human impacts on the Earth&#8217;s natural cycles</li>
<li>The radicalization of violent homicidal terrorists who gain a foothold in failed states and spread their ideology throughout cyberspace</li>
</ul>
<p>These are just some of the things that occupy the focus of the IC today, and each one has its own unique properties and operational requirements. Individual entities and organizations within each classification also contain their own unique features and operational tactics. The evolution apparent in the IC is as complex and expansive as the evolution from a paper letter to a personal computer hard drive with a terabyte of data storage. Growth does not make something inherently more effective; however, so another focus—on intelligence procedures themselves—is also necessary for the IC to appropriately adapt to current and future threats in the world.</p>
<h3>Intelligence Evolution in the Information Age</h3>
<p>Many of the challenges of today have not been addressed before in history and must be analyzed and understood before they can be addressed. Some threats are similar to threats of the past, however, and understanding history can help analysts learn to analyze more effectively, through the study of human nature, warfare, and intelligence operations throughout history. Communism is an ideology, and the Kharijite ideology that spurs the majority of radical Islamic terrorists into action is also an ideology. While there are few similarities between the ideologies themselves, the practice of combating an ideology on a global scale is not new to the United States or the IC. The Soviet Union eventually collapsed from economic and social disparity. The Communist ideology lost popularity, however, due to disillusionment within its believers, not the Soviet Union&#8217;s collapse.</p>
<p>Even Communist China does not follow the original Marxist philosophies of early communism. It has adapted to a Capitalistic type of communism in the face of widespread disillusionment with the Communist ideology. The Kharijite ideology can be fought the same way – through intentional and extensive operations aimed at disillusioning the believers and potential believers of radical Islamism. Cyberspace and economically challenged regions in the world are the primary recruiting grounds for radical terrorist organizations, which means the IC can target these same areas to eliminate the potential for recruitment, with aggressive, offensive counterintelligence operations in cyberspace in addition to economic interventions to educate and elevate the populations of regions with economic and social disparity. Ironically, eliminating social and economic inequality in critical areas of the world could collapse radical Islamic terrorist ideologies in much the same way that increasing economic and social disparity collapsed the Soviet Union and led to the disillusionment of Communism.</p>
<p>Lack of education and the censorship of information are significant factors that contribute to social disparities in the world, and therefore need to be countered with information proliferation and education. Part of this requires technological proliferation to increase the ease of access for societies to information through the internet, and potentially even Government sponsorship of satellite communications and internet capabilities for nation-states that lack the potential for such a technological infrastructure by themselves. Because this increases the risk of these technological assets being used by non-state actors for other purposes, increased intelligence operations, specifically in cyberspace, must accompany these information expansions.</p>
<p>In addition to these longer-term strategic economic and social methods to tear down the radical Kharijite ideology that fuels the majority of global Islamic terror, enhanced paramilitary operations and covert actions are needed to simultaneously combat physical terrorist elements already established around the world. With combined international cybersecurity efforts to ensure cyberspace as a place for global information proliferation and education, along with robust offensive counterintelligence, covert action, and paramilitary efforts to combat global terrorism and other physical Non-State Actor threats, world peace has its first opportunity in recorded history to be achievable and maintained. The challenge now is for Governments and people to realize this, and act accordingly to secure the future for humanity and the world.</p>
<p><em>The views and opinions expressed in this article are those of the author and do not necessarily reflect the official policy or position of any U.S. government agency, including but not limited to the Department of Defense, the Department of the Army, the Department of the Navy, or the Marine Corps. Assumptions made within the analysis are not reflective of the position of any U.S. government entity.</em></p>
<hr />
<p><sup>1</sup> Kristin Ven Bruusgaard, &#8220;Crimea and Russia&#8217;s Strategic Overhaul,&#8221; <em>Parameters</em> 44, no. 3 (2014): 81-90.</p>
<p><sup>2</sup> Miroslaw Przygoda, &#8220;China – Russia, a Strategic Political and Economic Axis of the Contemporary World,&#8221; <em>Varazdin Development and Entrepreneurship Agency (VADEA)</em> (2015).</p>
<p><sup>3</sup> Cuihong Cai and Diego Dati, &#8220;Words Mightier than Hacks: Narratives of Cyberwar in the United States and China,&#8221; <em>Asian Perspective</em> 39, no. 3 (2015): 541-553.</p>
<p><sup>4</sup> David Moore, <em>Sensemaking: A Structure for an Intelligence Revolution,</em> (Washington D.C.: NDIC Press, 2011).</p>
<p><sup>5</sup> Andrew Terrill, &#8220;Understanding the Strengths and Vulnerabilities of ISIS.&#8221; <em>Parameters</em> 44, no. 3 (2014): 13-23.</p>
<p><sup>6</sup> Thomas Grant, &#8220;International Dispute Settlement in Response to an Unlawful Seizure of Territory: Three Mechanisms,&#8221; <em>Chicago Journal of International Law</em> 16, no. 1 (2015): 1-42.</p>
<p><sup>7</sup> Rohan Gunaratna, &#8220;A New Threat Landscape in 2015,&#8221; <em>UNISCI Discussion Papers</em> 37 (2015): 9-13.</p>
<p><sup>8</sup> Dan Dickerson, “Iran Would Strike First,” <em>Journal of Counterterrorism and Homeland Security International</em> 16, no. 3 (2010): 30-36.</p>
<p><sup>9</sup> Paul Kerr and Mary Nikitin, &#8220;Pakistan’s Nuclear Weapons: Proliferation and Security Issues,&#8221; <em>Current Politics and Economics of the Middle East</em>3, no. 2 (2012): 313-351.</p>
<p><sup>10</sup> Kerr and Nikitin, “Pakistan’s Nuclear Weapons.”</p>
<p><sup>11</sup> Brian Kelly, &#8220;Investing in a Centralized Cybersecurity Infrastructure: Why “Hacktivism” Can and Should Influence Cybersecurity Reform,&#8221; <em>Boston University Law Review</em> 92, no. 5 (2012): 1663-1711.</p>
<p><a href="https://globalsecurityreview.com/from-missiles-to-microchips/">From Missiles to Microchips</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A New Nuclear Deal with Iran Shouldn’t Be Accompanied by Terrorist Legitimization</title>
		<link>https://globalsecurityreview.com/a-new-nuclear-deal-with-iran-shouldnt-be-accompanied-by-terrorist-legitimization/</link>
		
		<dc:creator><![CDATA[John O&#039;Malley]]></dc:creator>
		<pubDate>Tue, 15 Mar 2022 16:02:18 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=24890</guid>

					<description><![CDATA[<p>Iran has a new demand for U.S. diplomats as they conclude what will hopefully be the final round of negotiations for a new nuclear agreement later this month: Remove the 2019 U.S. foreign terrorist organization (FTO) designation on Iran’s Islamic Revolutionary Guard (IRGC). The United States should reject this demand, even if it risks Iranian [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/a-new-nuclear-deal-with-iran-shouldnt-be-accompanied-by-terrorist-legitimization/">A New Nuclear Deal with Iran Shouldn’t Be Accompanied by Terrorist Legitimization</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Iran has a new demand for U.S. diplomats as they conclude what will hopefully be the final round of negotiations for a new nuclear agreement later this month: <a href="https://www.reuters.com/world/middle-east/iran-says-three-key-issues-remain-unresolved-vienna-nuclear-talks-2022-02-28/">Remove</a> the 2019 U.S. foreign terrorist organization (FTO) designation on Iran’s Islamic Revolutionary Guard (IRGC). The United States should reject this demand, even if it risks Iranian noncompliance with negotiations. Removing the terrorist stigma from the IRGC will embolden Iranian proxies and anger regional allies.</p>
<p>FTO designations can be assigned to groups if they meet three criteria under <a href="https://www.law.cornell.edu/uscode/text/8/1189#:~:text=8%20U.S.%20Code%20%C2%A7%201189%20%2D%20Designation%20of%20foreign%20terrorist%20organizations,-U.S.%20Code&amp;text=the%20terrorist%20activity%20or%20terrorism,security%20of%20the%20United%20States.">U.S. Code §1189</a>—the group must be foreign, engaged in terrorist activity, and threaten U.S. national security. By labeling a group as an FTO, the United States creates extraterritorial criminal and civil liability for parties engaged in providing them with material support. There are currently 73 groups listed, and their status is reviewed every five years by the U.S. State Department.</p>
<p>Maintaining the FTO designation applies political pressure on states that interact with the IRGC—namely Iraq, Syria, and Lebanon—to significantly alter their relationships or risk international pariah status. The Iranian marketplace becomes dangerous for prospective business partners, as any dealings with the country could be perceived as IRGC financing since it is state-sponsored. Designations also clarify U.S. attitudes toward international actors and let Iran know that the actions of its paramilitary organization are not tolerated by the United States, irrespective of any future diplomatic re-engagement.</p>
<p>FTO de-designations are less common, with the United States removing only 15 groups from the list since its inception. In most de-designation cases, the groups have been removed due to their outright disbandment, which would not be the case with a de-designation of the IRGC. Attempts to remove groups still active from the list, such as the Houthis, have had negative consequences for U.S. national security.</p>
<p>In February 2021, the United States <a href="https://www.state.gov/revocation-of-the-terrorist-designations-of-ansarallah/">removed</a> the FTO label from the Houthis, a Yemeni Shi’ite militia group that receives direct funding from the IRGC. The purpose of this de-designation was to better provide Yemeni civilians with humanitarian aid. The designation made it difficult for human rights groups and charitable individuals to donate food, medical supplies, and money while a Saudi-led blockade effectively starved the country. However, the Houthis did not provide any concessions, and less than a year later, the group took advantage of this gesture by <a href="https://www.npr.org/2022/01/25/1075493673/yemens-houthis-have-launched-two-attacks-against-the-u-a-e-heres-why">launching</a> drone strikes on the United Arab Emirates.</p>
<p>The backlash to this attack was swift. Within the month, the Saudis and Emiratis worked together to conduct lethal <a href="https://www.aljazeera.com/news/2022/1/18/yemen-more-than-a-dozen-people-killed-in-saudi-coalition-strike">airstrikes</a> on the Yemeni capital of Sanaa. The Houthis, using Iranian-supplied weapons, responded with strikes on Saudi airports and other civilian locations. The U.S. Treasury Department subsequently crafted new <a href="https://home.treasury.gov/news/press-releases/jy0603">sanctions</a> on the Houthis’ financial network, implicating the IRGC by name. De-designating the IRGC to return to a nuclear deal would send mixed messages from the Biden administration to the Arab world and encourage Iran to spend its newly sanctions-free assets on more excellent militia investment to counter Sunni influence.</p>
<p>Not only will the UAE and the Saudis feel abandoned by the United States if it takes this course of action, but Israel will also question the sincerity of the United States in its stated goal to preserve Israeli sovereignty, which Iran doesn’t recognize. Iranian Supreme Leader Ali Khamenei demands that “all Muslims must fight until the annihilation of Israel,” and easing Tehran’s ability to supply its most extreme fighting force with outside money will get the regime closer to that goal.</p>
<p>Instead of dropping the IRGC’s FTO designation without concessions, the United States should consider publicizing the non-statutory factors involved in assigning such a designation. This action would inform the international community about the objective criteria involved in U.S. counterterrorism strategies and prevent Washington from appearing disorganized on designation issues between presidential administrations.</p>
<p>Iran’s recent <a href="https://www.washingtoninstitute.org/policy-analysis/irans-next-budget-assumes-no-nuclear-deal">budget</a> and presidential cabinet <a href="https://www.fdd.org/analysis/2021/09/30/the-sanctioned-cabinet-of-ebrahim-raisi/">appointments</a> should inform the Biden administration that a nuclear agreement will not change Iran’s priorities to support the IRGC at the expense of the civilian population. Iran is spending more on the Guards than ever before. Removing the red tape around the IRGC as it expands its research and weapons production capacities would betray close relationships that have taken decades to build. No nuclear agreement should impact the FTO de-designation process, and past conduct by the Houthis justifies the hesitancy to cave to Iranian demands. Removing the label of terrorism should take effort on behalf of the offending party, something the Islamic Republic is unwilling to provide.</p>
<p><a href="https://globalsecurityreview.com/a-new-nuclear-deal-with-iran-shouldnt-be-accompanied-by-terrorist-legitimization/">A New Nuclear Deal with Iran Shouldn’t Be Accompanied by Terrorist Legitimization</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>India Should Become The United States Premier South Asian ally</title>
		<link>https://globalsecurityreview.com/india-usa-alliance-south-asia/</link>
		
		<dc:creator><![CDATA[Kimia Hashemi-Nejad]]></dc:creator>
		<pubDate>Wed, 10 Nov 2021 18:02:55 +0000</pubDate>
				<category><![CDATA[Deterrence & Foreign Policy]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[South Asia]]></category>
		<category><![CDATA[Taliban]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=24542</guid>

					<description><![CDATA[<p>For years, CIA officials tried to confront Pakistani intelligence officials about their assistance to the Taliban. Douglas London, who oversaw the CIA’s counterterrorism operations in South Asia until 2018, recalled these encounters. “They (Pakistani intelligence officials) would just say, ‘You just come to my office, tell me where the location is,’” London remembered. “They would [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/india-usa-alliance-south-asia/">India Should Become The United States Premier South Asian ally</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="color: #333333;">For years, CIA officials tried to confront Pakistani intelligence officials about their assistance to the Taliban. Douglas London, who oversaw the CIA’s counterterrorism operations in South Asia until 2018, </span><a href="https://www.cnbc.com/2021/09/25/us-pakistan-face-each-other-again-on-afghanistan-threats.html"><span style="color: #0563c1;">recalled these encounters</span></a><span style="color: #333333;">. “They (Pakistani intelligence officials) would just say, ‘You just come to my office, tell me where the location is,’” London remembered. “They would just usually pay lip service to us and say they couldn’t confirm the intel.”</span></p>
<p>The United States provides substantial diplomatic and economic support to Pakistan. Unfortunately, this policy inadvertently enables Pakistan’s economic, political, and military support for the Taliban and other Islamic militant groups. The U.S. should move from its dubious relationship with Pakistan to a more compatible alliance: India should become America’s premier South Asian ally.</p>
<p>Pakistan is an unreliable and untrustworthy ally. From the Taliban’s inception in the 1990s, The Pakistani Inter-Services Intelligence (ISI) agency has supported them with money, training, and supplying weapons. It continues to be a <a href="https://www.cfr.org/article/pakistans-support-taliban-what-know"><span style="color: #0563c1;">significant source of financial and logistical support</span></a><span style="color: #333333;">. In addition, the Taliban own real estate in Pakistan and receive large donations from private Pakistani citizens. The Taliban also teach their brand of Islam in numerous madrassas (Islamic Schools) all over Pakistan, a valuable tool to influence and recruit new members.</span></p>
<p>Since 2009, the U.S. government has committed over <a href="https://pk.usembassy.gov/our-relationship/policy-history/us-assistance-to-pakistan/"><span style="color: #0563c1;">$5 billion in civilian assistance to Pakistan and over $1 billion in emergency humanitarian response</span></a><span style="color: #333333;">. U.S. assistance includes projects supporting economic growth and bilateral trade; refugees and refugee-housing communities; law enforcement; civil society; and countering infectious diseases. In addition, the</span><a href="https://www.state.gov/u-s-relations-with-pakistan/"><span style="color: #0563c1;"> U.S. is Pakistan’s largest export destination country and has been one of Pakistan’s top investors.</span></a><span style="color: #333333;"> Examples of U.S. investments include consumer goods, energy, chemicals, agriculture, transportation, and communications. Yet, despite all the resources the U.S. has invested in helping Pakistan, Pakistan still harbors and supports the Taliban.</span></p>
<p>The U.S. should shift attention and priority to India as the premier South Asian U.S. ally. This new policy would keep economic and diplomatic ties with Pakistan but lessen them over time as the U.S. builds closer ties to India. It makes more sense for the U.S. to focus on India as the essential South Asian relationship. Both countries share a commitment to freedom, democratic principles, equal treatment of all citizens, human rights, and the rule of law.</p>
<p>India also shares a commitment to counterterrorism. <a href="https://www.aljazeera.com/news/2021/8/29/what-does-the-talibans-takeover-of-afghanistan-mean-for-india"><span style="color: #0563c1;">India actively opposes the Taliban</span></a><span style="color: #333333;">. Unlike Pakistan, India is willing to cooperate with the U.S. in counterterrorism operations against the Taliban and other militant Islamic groups.</span></p>
<p>Lastly, adopting this new policy instead of a more aggressive approach towards Pakistan would prevent a more powerful Taliban. Economic sanctions on Pakistani military and government officials with ties to the Taliban would likely be counterproductive and cause a backlash. Pakistan might even increase monetary and arms support for the Taliban. However, a growing and ever-closer U.S. relationship with India would send Pakistani officials a powerful message.</p>
<p>Critics argue that the U.S. neglect of Pakistan in favor of India will increase tensions in South Asia. However, tensions are already growing because of a Taliban-leaning Pakistani government. India’s relations with Pakistan are always tense. The difference is that a more robust U.S.- India relationship can bring more regional stability than keeping things status quo or pushing towards a more aggressive policy towards Pakistan. India is a more reliable partner.</p>
<p>Current U.S. -Pakistan policy has enabled Pakistan to support and assist the Taliban and other radical Islamic groups for the past two decades. Pakistani intelligence officials deliberately lie to CIA officials regarding Taliban whereabouts, yet still claim they are committed to fighting the War on Terror alongside the U.S. Continuing down this path with Pakistan is a dead end. It is time to chart a new course with India. A U.S. alliance with India would protect U.S. strategic interests and contribute to regional stability and peace.</p>
<p><a href="https://globalsecurityreview.com/india-usa-alliance-south-asia/">India Should Become The United States Premier South Asian ally</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>COVID-19 and the Increasing Risk of Terrorism</title>
		<link>https://globalsecurityreview.com/covid-19-and-the-increasing-risk-of-terrorism/</link>
		
		<dc:creator><![CDATA[Mohamed ELDoh]]></dc:creator>
		<pubDate>Fri, 02 Oct 2020 20:23:00 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Al Qaeda]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[Iraq]]></category>
		<category><![CDATA[ISIS]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=22792</guid>

					<description><![CDATA[<p>There is no doubt that the global COVID-19 pandemic has disrupted nearly every aspect of life. From how we interact with one another to how we commute and work, people now are facing new realities that were not present just six months ago. Though the main concerns for many policymakers, government officials, and business leaders [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/covid-19-and-the-increasing-risk-of-terrorism/">COVID-19 and the Increasing Risk of Terrorism</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There is no doubt that the global COVID-19 pandemic has disrupted nearly every aspect of life. From how we interact with one another to how we commute and work, people now are facing new realities that were not present just six months ago. Though the main concerns for many policymakers, government officials, and business leaders include managing the ongoing global health crisis and its economic ripple effects, other unanticipated risks may already be shaping up. These include a growing threat of extremism and terrorism.</p>
<p>The terms of extremism and terrorism have been used interchangeably. However, there is a crucial distinction between the terms: all terrorists are extremists, but not all extremists are terrorists. Despite the latter, a fine line separates extremists from the turning point of embracing violence—thus becoming terrorists. This is because extremism is generally regarded as <em>&#8220;the vocal or active opposition to our fundamental values, including democracy, the rule of law, individual liberty, and respect and tolerance for different faiths and beliefs&#8221; </em>as per the 2015 UK&#8217;s Counter-Extremism <a href="https://www.gov.uk/government/publications/counter-extremism-strategy">Strategy</a>. Furthermore, extremists may resort to terrorism to coerce governments and the general public to give in to their cause.</p>
<p>Over the past couple of decades, extremism and terrorism were mostly associated with religious causes, especially Islamic extremism, which present a persistent threat to numerous states. Yet, the current pandemic crisis may fuel such a risk and threats from other extremism categories. This includes the right-wing, left-wing, and single-issue extremism. While clearly articulating from now why and how the case is cumbersome, government and national security leaders can relate early warning signs to counter these threats.</p>
<p>Some arguments are claiming that terrorist groups are currently preoccupied with protecting their members against the coronavirus. However, different incidents that took place over April 2020 points to the direct opposite. In fact, in its mid-March al-Naba newsletter, ISIS <a href="https://www.timesofisrael.com/islamic-terror-groups-see-opportunity-in-global-chaos-from-virus/">urged</a> its followers to launch attacks in times of crisis and show no mercy.</p>
<p>Earlier in April, 25 soldiers in Mali were <a href="https://www.france24.com/en/20200407-25-soldiers-killed-suspected-jihadist-attack-in-northern-mali-says-government">killed</a> in a jihadist attack. On the 14th of April, in an operation where one police officer killed, Egyptian security forces exchanged fire. They eliminated <a href="https://egyptianstreets.com/2020/04/15/egypt-police-kill-terrorists-planning-easter-attacks/">seven</a> terrorists who were part of a cell planning to conduct attacks during the Easter holiday in Egypt. Also during mid-April, the Tunisian security authorities <a href="https://www.dailymail.co.uk/news/article-8230393/Jihadist-arrested-plot-followers-infect-Tunisian-police-coronavirus.html">foiled</a> a terrorist plan to spread the coronavirus to Tunisian security forces by coughing, sneezing, and spitting.</p>
<p>On the 21st of April 2020, it was announced that one of Europe&#8217;s most wanted terrorists and ISIS affiliate, Abdel Majed Abdel Bary, was <a href="https://www.dailymail.co.uk/news/article-8253101/British-ISIS-rapper-caught-Spain-identified-EARS-hid-mask.html">recently</a> arrested by the Spanish police in Almeria where he settled in during the coronavirus lockdown. Abdel Bary reached Spain via a boat, and local newspapers indicated that he intended to return to the UK. The return intentions of Abdel Bary – who was arrested with another two persons in his apartment – remains unclear. In France, on the 27th of April, a 29-year-old Frenchman was also arrested. The man, who was not identified, has slammed his car into police cars and motorcycles, injuring three officers. It was found that the man has <a href="https://www.bgdailynews.com/news/international/france-terrorism-probe-into-car-attack-that-hurt-3-police/article_f5e741e5-3abd-5b9d-a96e-25bec7d9662a.html">pledged</a> allegiance to ISIS in a letter found in his car. A couple of days later, in a statement by the Danish authorities on the 30th of April, the police in Denmark <a href="https://www.dw.com/en/danish-police-thwart-plans-for-terror-attack/a-53294963">prevented</a> a terrorist attack with a possible &#8220;militant Islamic motive.&#8221; The arrested man was already suspected of attempting to obtain ammunition and firearms. On the 30th of April, in one of the deadliest attacks that month, ten Egyptian army personnel were killed in a terrorist attack. The incident, which included an officer, a non-commissioned officer, and eight soldiers, had an improvised explosive device (IED) detonated under their armored vehicle in Bir El-Abd in North of Sinai.</p>
<p>Looking at Iraq, we can see a <a href="https://www.ft.com/content/abbdcd29-fe66-4be2-b35e-efcfca536ce1">rise</a> in ISIL (ISIS) operations over the past few months, wherein the first three months of 2020, 566 attacks were conducted by the group in Iraq. Not only that, the group&#8217;s attacks have intensified, but the group appears to be <a href="https://www.ict.org.il/Article/2565/ISIS_Strengthens_in_Iraq#gsc.tab=0">strengthening</a>. Given their recent attacks in Syria and Iraq, it is <a href="https://thesoufancenter.org/intelbrief-recent-islamic-state-attacks-demonstrate-its-durability-and-resilience/">argued</a> that the current pandemic has already demonstrated how durable and resilient ISIS ais In addition to that, other armed extremist groups are scaling up their targeted attacks. This can be evident by the recent <a href="https://www.washingtonpost.com/world/leading-iraqi-researcher-assassinated-outside-his-house-in-baghdad/2020/07/06/aa43942e-bfb7-11ea-8908-68a2b9eae9e0_story.html">assassination</a> of Hisham al Hashimi, 47, who was fatally shot outside his house in Baghdad. Hisham was among the world&#8217;s leading security experts on ISIS and other armed groups. Iraqi officials <a href="https://www.aljazeera.com/news/2020/07/iraq-armed-groups-expert-hisham-al-hashemi-shot-dead-baghdad-200706194213891.html">indicated</a> that Hisham received threats recently from Iran backed militias.</p>
<p>Because of the abovementioned incidents – even if they may appear minor and sporadic to some security strategists – it is worth noting that terrorist groups may take advantage of the global focus of countering the pandemic and launch attacks. Furthermore, terrorist groups may view the global pandemic crisis as an opportunity to win more recruits, supporters, sympathizers, and then strike harder than before should the right moment be presented. In this regards, Al-Qaeda suggested in its <a href="https://www.haaretz.com/middle-east-news/isis-al-qaida-see-global-chaos-from-coronavirus-as-an-opportunity-to-mobilize-1.8734789">statement</a> on the 30th of March, that non-Muslims use their time in quarantine to learn about Islam. In addition, these groups have never failed to exploit social media to advance their cause and propaganda. That said, as the pandemic continues, people are spending more time online, terrorist groups are likely to amplify their utilization of social media to further spread their dangerous rhetoric along with widely used hashtags of the terms: #Coronavirus, #COVID2019 or #COVID19 to ensure a wider audience reach for their social media posts.</p>
<p>Not only that, terrorist groups may use the time of the pandemic crisis to propagate their ideology or launch attacks but also use the time to reinforce their bases to remerge in a more potent form after the pandemic crisis. This can be specifically true given that most terrorist groups are taking some of the African and Middle Eastern countries like Libya, Chad, Mali, Nigeria, Somalia, Syria, Iraq, Afghanistan, and others as their hubs and operational base. Most of these nations are developing countries, so it is possible that while these nations&#8217; authorities and security forces are focusing their capabilities on curbing the coronavirus spread, that terrorist groups would utilize such a window period to harness their abilities. This is particularly evident from the very recent <a href="https://www.express.co.uk/news/world/1277458/coronavirus-isis-news-Iraq-Syria-attacks-terrorists-Baghdad-suicide-bombing-Kirkuk">series</a> of terrorist attacks launched by ISIS in Syria and Iraq, killing dozens of soldiers. The attacks probably took advantage of the local authorities scaling back the number of troops on the ground due to the coronavirus pandemic. A similar expansionary approach is also<a href="https://www.pam.int/welcome.asp?m=news&amp;id=908"> seen</a> by jihadists in the Sahel region. Thus, further confirming the threat resurgence of organized terrorist groups as a result of the pandemic crisis.</p>
<p>Although the terrorism threat appears to be relatively regional, it requires intergovernmental and a multinational collective counterterrorism approach. With many of the terrorist groups and affiliates adopting a horizontal structure, one group in one country might be influencing the actions of other groups in many other different countries. Not to forget lone wolf terrorism, which would only take the individual perpetrator to be radicalized by merely reading and following the propaganda and extremist ideologies widely available online.</p>
<p>While intergovernmental counterterrorism frameworks, cooperation, and efforts already exist, the current pandemic crisis still presents an unprecedented challenge to many countries. This includes the redirection of security forces and militaries&#8217; actions in curbing the pandemic spread, implementing lockdowns, curfews, regulating borders entry, and supporting the national overwhelmed healthcare authorities. Though the latter is important to ensure the general public safety, security bodies mustn&#8217;t lose their focus on countering terrorism, reinforcing border security, and stepping up surveillance and intelligence activities to anticipate any risks or terrorism plots. Additionally, extremist – but nonviolent – groups should be closely monitored during the pandemic and economic crisis to counter how such groups might use the pandemic to <a href="http://nycfpa.org/blog/the-pandemic-crisis-economic-recession-and-the-rise-of-extremism/">advance</a> their propaganda and gain more sympathy from the general public. This includes right-wing, left-wing, and single-issue extremism groups such as <a href="https://www.economist.com/the-world-if/2020/07/04/what-if-climate-activists-turn-to-terrorism">climate</a> activists who turn to terrorism.</p>
<p>Furthermore, as the economic recession builds up, different countries may implement spending cuts and reduce budgets dedicated to national security, intelligence, military, and law enforcement concerning various security programs, including counterterrorism. Accordingly, this should not be the case at all. Even if the economic recession is currently taking its toll on all sectors, government spending, and budgets dedicated to national security, intelligence, military, and law enforcement, counterterrorism efforts should not be reduced. As extremists and terrorist groups are likely to exploit the coronavirus pandemic and post-pandemic economic crisis for their benefit and incite violence, national governments should not undermine such a dormant yet imminent threat while tackling the economic consequences of the pandemic crisis. In this respect, military, national security, intelligence, and law enforcement bodies across the world should increase, and hone their counterterrorism capabilities, intelligence sharing, and international cooperation.</p>
<p><a href="https://globalsecurityreview.com/covid-19-and-the-increasing-risk-of-terrorism/">COVID-19 and the Increasing Risk of Terrorism</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>After Almost Twenty Years, America’s “War on Terrorism” Resembles Insanity</title>
		<link>https://globalsecurityreview.com/after-almost-twenty-years-americas-war-on-terror-resembles-insanity/</link>
		
		<dc:creator><![CDATA[John Arias]]></dc:creator>
		<pubDate>Fri, 17 Jul 2020 15:11:38 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Afghanistan]]></category>
		<category><![CDATA[Iraq]]></category>
		<category><![CDATA[ISIS]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=15777</guid>

					<description><![CDATA[<p>September 11th, 2020 will mark the nineteenth year since the attacks in New York and Washington, D.C. For those nineteen years, terrorism underpinned U.S. foreign policy decision making. As a result, the United States and its allies have conceptualized and fought terrorism through a military-focused approach, or a finite strategy. This de facto paradigm has proven [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/after-almost-twenty-years-americas-war-on-terror-resembles-insanity/">After Almost Twenty Years, America’s “War on Terrorism” Resembles Insanity</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>September 11th, 2020 will mark the nineteenth year since the attacks in New York and Washington, D.C. For those nineteen years, terrorism underpinned U.S. foreign policy decision making. As a result, the United States and its allies have conceptualized and fought terrorism through a military-focused approach, or a finite strategy. This de facto paradigm has proven seldomly successful despite its longevity. And as the world returns towards great power competition, terrorism and how to fight it has scaled back in countries’ foreign policy priorities. This presents a momentous opportunity to shift how the United States conceptualizes terrorism and how it fights it, from a finite to an infinite strategy. In the reshuffling of strategic priorities, raising counterterrorism to one of the pillars of U.S. grand strategy will ensure that the U.S. moves away from the erroneous idea that terrorism can be defeated entirely, and enable it to suppress it through an infinite strategy.</p>
<h3>A Finite Strategy</h3>
<p>In game theory, there are finite and infinite games. In a finite game, the objective of the game is to win, thereby ending the game. In the infinite game, the goal is the perpetuation of the game. Since 9/11, the U.S. has implemented a finite approach to fighting terrorism. The “War on Terrorism (WoT)” archetype highlights this finite approach.</p>
<p>Three premises underpinned the WoT archetype: the theoretical idea that terrorism can be <em>completely</em> defeated, the militarization of the response to terrorism, and by extension, the overzealousness to targeted killing, especially of leaders.</p>
<p>As a rhetorical tactic, framing terrorism as a defeatable concept certainly helped galvanize the U.S. population and international community in the wake of the attacks. But as a theoretical approach, it is at best ill-conceived and, at worst futile. First, there is little sense to the idea of defeating terrorism completely. As scholars Arie W. Kruglanski and Shira Fishman have argued, terrorism is merely a tool.<sup>1</sup> As a tool, terrorism has and is <em>used</em> by most non-state actors<sup>2</sup>across the political violence spectrum to achieve their goals.</p>
<p>Therefore, conceptualizing terrorism as something that can be defeated is as illogical as declaring war on a hammer. Second, and as alluded to earlier, the WoT archetype ignores the longevity of terrorism. In other words, it frames or at least creates the perception of terrorism as a sudden and unique phenomenon that rose to prominence <em>only after</em> 9/11. But one can look to terrorism’s history and longevity to dismiss this claim. During the Roman Empire, the Sicarii<sup>3</sup> used terrorism to reject Roman rule over Judea, and the etymology of the word takes us as far back to the French revolution. Moreover, David Rapport, a scholar, demonstrated how terrorism has evolved in different waves through different geopolitical contexts since the late 1800s.<sup>4</sup> The point is that terrorism has been used throughout history and will almost certainly continue to be used by groups around the world for generations to come.</p>
<p>Because the concept has erroneously been conceived as something defeatable, the U.S. foreign policy blob assumed militarizing the response would inherently resolve the problem by overwhelming the adversary. It is not hard to see why they assumed this. The U.S military has demonstrated an ability to fight and win in multiple theatres against a variety of opponents. The U.S has been most comfortable fighting finite games such as in the Second World War, and Korea. And even, erroneously, framing infinite wars like Vietnam into finite approaches.</p>
<p>As such and in response to 9/11, Congress quickly enacted the Authorization for Use of Military Force (AUMF). Three Presidents since Mr. Bush have used the AUMF to start, perpetuate, and expand military-led counterterrorism (CT) operations around the world. In a closer analysis, the AUMF<sup>5</sup> has been loosely interpreted to include almost any terrorist organization. And true to form, today the U.S. leads or is a partner to military-led CT operations in Yemen, Somalia, Iraq, Syria, Afghanistan<sup>6</sup>, and Pakistan. The operations are as global as they are diverse in targets. The U.S. prosecutes a wide range of terrorist groups, including Al Qaeda core, Al Qaeda in the Arabian Peninsula (AQAP), ISIS, and affiliates in North and East Africa, Al Shabab, and others. This expansion and continuation of operations have cost the U.S. approximately 6.4 trillion dollars,<sup>7</sup> according to Brown University estimates. This militarization has led in turn to overzealousness in disrupting terrorist networks through the targeted killing of leaders.</p>
<p>This, by extension has transformed the premise of military-led operations into statically focused campaigns. Since 2004, the U.S. military has conducted approximately 14,040 strikes in various countries, according to Bureau of Investigative Journalism data,<sup>8</sup> and has formed at least two coalitions<sup>9</sup> of countries to fight terrorist groups.</p>
<p>But as it will be demonstrated next, the finite approach has severe limitations that, at a minimum, raise the important question of why it is still the de facto strategy after almost 20 years.</p>
<h3>A Not-So-Effective Finite Strategy</h3>
<p>The finite framework, one built on the premise of completely defeating terrorism, has not worked. The failure of this finite strategy is not an inherent weakness of the U.S. CT capabilities. Thanks to fast innovation, competent intelligence agencies, and superior technology, the U.S. has become overtly good at finding and fixing targets. The most recent example the death of Iranian General Qasem Soleimani in January of this year<sup>10</sup>.</p>
<p>Instead, the failure is symptomatic of a finite player competing with finite methods and goals against infinite players in what is an <em>infinite game.</em> ISIS is the best example of this clash.<sup>11</sup> Since 2003, the U.S. and its allies have led on and off military-led CT operations against ISIS, fervently focusing on killing its top leaders. It is important to note that the U.S also led counterinsurgency operations (COIN) in 2006–2007 and from 2014–2017 — often in parallel to the CT operations — against ISIS in a response to their evolution from terrorist group to insurgency. These were narrowly successful in territorially defeating ISIS but fell short in “defeating” the group altogether. Even during COIN operations, where finite goals such as defeating ISIS territorially were achieved, the infinite strategy of the group was not sufficiently considered. This led to the continued finite approach of killing ISIS leaders. As such, in June 2006, U.S. forces killed Abu Musab al-Zarqawi,<sup>12</sup> the founder of AQI. Subsequent leaders, Abu Ayyub al-Masri, and Abu Omar al-Baghdadi met the same fate in April 2010<a><sup>13</sup></a>, and on 27 October 2019, Abu Bakr al-Baghdadi was killed in Northern Syria.<sup>14</sup></p>
<p>While there should be no sympathy for dead terrorist leaders, the merit of this aspect of the finite approach is questionable when one looks at the resiliency of ISIS’s operational behavior after the death of its leaders. The decapitation approach claims to deal calamitous blows to organizations, ultimately leading to their demise by dismantling the figurehead that holds the organization together. But Audrey Kurth Cronin’s findings raise questions about this premise. Kronin found that the decapitation approach seldom works and arresting rather than killing leaders tends to be more effective in ending terrorist campaigns.<sup>15</sup></p>
<p>Kronin’s findings can certainly be demonstrated when one looks at ISIS after the death of its leaders. Despite their deaths, the killings never achieved their finite goal of dismantling or ending the terrorist group. After the death of its overall founder Zarqawi and despite heavy territorial losses in, during the U.S.-led surge in 2007, ISI<sup>16</sup> rebounded and was able to inflict extraordinary terrorist attacks throughout Iraq. From 2008–2010, the three years after the COIN operations (or Surge), over 200 people were killed per month by terrorism in Iraq.<sup>17</sup> Before and after the death of Omar Al Baghdadi, ISI assassinated over 1345 Awakening leaders according to one estimate, <sup>18</sup> and launched its infamous “Breaking the Walls” campaign where it carried out 24 bombings and eight prison breaks.<sup>19</sup> By the same extension, and since the death of Abu Bakr Al Baghdadi, ISIS has conducted approximately 285 attacks in Iraq, according to a review of the Armed Conflict Location &amp; Event Data Project (ACLED). Even after the death of its top leader and U.S. claims that it had dealt catastrophic and “final” blows to the organization, the organization mustered the necessary capabilities to continue their terror campaigns, remain relevant, and at times outdo what it had done in previous years. This resiliency demonstrates that the finite approach of targeted killings has been futile in its efforts to “defeat” terrorism.</p>
<p>The ISIS example also highlights terrorist organizations’ infinite doctrine. Part of the ability, in this case of ISIS, to continue despite the endless cycle of dead leaders is the infinite framing of its goals. While external factors helped ISIS <sup>20</sup>, the “infiniteness” of ISIS goals allowed it to turn defeats to victories as part of a longer “infinite” struggle. In the aftermath of its Iraqi territorial defeat, Abu Bakr Al Baghdadi stated,</p>
<p>“For the Mujahideen holy warriors, the scale of victory or defeat is not dependent on a city or town being stolen or subject to that who has aerial superiority, intercontinental missiles or smart bombs…… “Oh, Caliphate soldiers… trust in God’s promise and His victory… for with hardship comes relief and a way out.”<sup>21</sup></p>
<p>If one strips away the religiosity, what is evident in Baghdadi’s rhetoric is that deaths and loss of territory do not amount to detrimental finite loses, instead they represent loses as part of a predetermined plan (in this case formulated by God according to Baghdadi) that will “ultimately” lead them to victory. The “ultimately” is worthy of closer analysis. It is this word that represents the infinite mentality ingrained in groups like ISIS. Stated differently, it does not matter how much they lose, insofar as they continue their path, “they will ultimately” be rewarded. In this regard, ISIS is not seeking to achieve finite metrics or goals, they seek an almost abstract infinite goal that might never materialize. By this logic, the U.S. inability to recognize this, and continue with a finite military-led CT approach of maiming and bombing ISIS leaders, only played to what ISIS expected and was/is “comfortable” dealing with.</p>
<h3>Towards an Infinite Approach</h3>
<p>However, insufficient the finite strategy has proven to be, some argue that it has and will continue to work. They point to the lack of 9/11 like attacks, something they attribute to sustained military-led CT pressure in countries that offered haven to terrorist groups.</p>
<p>Indeed, the U.S. has not suffered 9/11-like attacks. But the role of military-led CT operations is surely overestimated while the vast changes to airport security, intelligence capabilities, international law enforcement cooperation, and other safety mechanisms, are underestimated.</p>
<p>Proponents have also not sufficiently explained why the threat of attacks, or attacks that have not materialized continue to exist. In December 2019, an al-Qaeda operative shot eleven people at a U.S. military base in Florida.<sup>22</sup> The December 2019 al-Qaeda attack is just one of many attacks since 9/11 that have been at the lower end of the extraordinary scale, failed to materialize, or were foiled before they occurred. Moreover, al-Qaeda media continues to call for attacks against the United States, including in statements from regional al-Qaeda leaders, reflecting the network’s enduring efforts to pursue or inspire attacks in the West.<sup>23</sup></p>
<p>This is to say that if the premise of the finite approach was to “defeat terrorism,” the evidence in the sheer number of intended attacks since 9/11 dismisses this. The threat is well and alive, and the finite approach has not been sufficient in quelling or even stopping it. The recent statements by the U.S. State Department’s coordinator for counterterrorism, Ambassador Nathan Sales, effectively kills any debate.</p>
<p>When asked by the BBC, “whether this war — as originally conceived by the Bush administration — about the War on Terrorism is over?” He said, “No, the fight is very much ongoing, we’re winning the fight, but we’re continuing to fight against a determined enemy, or I should say a determined group of enemies.”<sup>24</sup></p>
<p>Calls to change how the U.S. conceptualizes and fights terrorism are not new. Analysts, policymakers, and the public generally recognize that a continuation of the finite approach will prolong military-led CT operations with little or no long-term solution to the threat of terrorism. What is new, however, is the shifting tectonic plates of geopolitics. And as the U.S. foreign policy blob construes a grand strategy to answer this shift, the choice presented would be at best to leave the current CT approach intact and at worst drop CT; neither are viable options for U.S. long term security interest.</p>
<p>Despite changing geostrategic priorities, developing and implementing an infinite CT strategy is easier said than done. Terrorism is poorly understood. This leads to criminal acts being incorrectly labeled as terrorism, effectively politicizing it. For example, in late March, the U.S. Department of Justice warned that “people who intentionally spread COVID-19 could be charged with terrorism,” arguably a stretch of interpretation.<sup>25</sup> Moreover, the political clime is such that politicians look strong in supporting military-led CT policies, and weak when they do not. When coupled with the fear terrorism generates, it is easy to see why change will be difficult.</p>
<p>Notwithstanding, the time to course-correct is now. An infinite strategy emphasizes a whole-of-government approach that folds finite metrics within an infinite or abstract vision. It starts with accepting terrorism can never be completely defeated; acknowledging its relatively low threat level; and it particularly means employing all aspects of national power to combat terrorism, including diplomatic, economic, military, and others.</p>
<p>It also means using those elements of national powers towards what the research points to as most effective in ending terrorist campaigns. Research shows that terrorist groups and their terrorism campaigns most often end when they implode from within or when splinter groups challenge the main group’s narrative. They are also particularly weak during generational shifts and when non-violent alternatives are created that facilitate underlying social movement to express their political grievances.<sup>26</sup></p>
<p>As such, an infinite strategy calls for a sustained and prolonged multifaceted approach. It focuses on a strong role for the U.S. Department of State and the U.S. Agency for International Development (U.S.AID) to fund and work with marginalized groups in politically unstable countries. Their work should focus on alternative non-violent social movements. Likewise, the U.S. should increase efforts to bolster intelligence and law enforcement cooperation and create international law enforcement and intelligence task forces that are not under military purview, using military-led CT operations as complementary elements. Equally important is the need to build alternative narratives to the religious interpretations used by religious terrorist groups. An alternative narrative seeks to implode groups from within, loosening the bolts of religious interpretation these groups use to justify their actions. None of these few examples are short-term or finite, easily measured, and tangible. But this is the nature of truly fighting terrorism through an infinite strategy — the actions are not easy to measure and there are no fast wins. Instead, it’s a long, slow, and prolonged approach that will challenge groups’ infinite mentality.</p>
<p>In all, the time is now to change how the U.S fights terrorism. An infinite strategy will ensure the U.S. reduces its dependency on military-led CT operations and starts leveraging all realms of its national power to effectively suppress the threat. If the U.S does not correct course now, then its surely proximus to insanity: continuing to do the same thing, expecting different results.</p>
<hr />
<p><sup>1</sup> Arie W. Kruglanski &amp; Shira Fishman (2006) The Psychology of Terrorism: “Syndrome” Versus “Tool” Perspectives, Terrorism and Political Violence, 18:2, 193–215, DOI: 10.1080/09546550600570119 ;</p>
<p><sup>2</sup> Scholars in the Critical Studies of Terrorism field have argued that States can also and do use terrorism. I take the majority view and focus primarily on non-state actors who employ terrorism.</p>
<p><sup>3</sup> It&#8217;s been widely cited that the Sicarii were considered the first political violent group that used terrorism. See Stewart J. D’Alessio &amp; Lisa Stolzenberg in (1990) Sicarii and the Rise of Terrorism, Terrorism, 13:4–5, 329–335, DOI: 10.1080/10576109008435840; as well as Donathan Taylor, Yannick Gautron. 02 Apr 2015, Pre-Modern Terrorism from The Routledge History of Terrorism Routledge</p>
<p><sup>4</sup> See David Rapport’s <em>Four Waves of Modern Terrorism</em> (2001)</p>
<p><sup>5</sup> The original text of the AUMF authorized the U.S. military to “ that the President is authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, to prevent any future acts of international terrorism against the United States by such nations, organizations or persons.” It was always mostly focused against those responsible for 9/11 i.e. AQ. It has since been broadly interpreted to mean almost any terrorist organization.</p>
<p><sup>6</sup> The U.S. CT operations against ISIS-K and Taliban leaders are different than the NATO-led mission that emulates elements of a counterinsurgency strategy and also of other U.S.-led missions training the ISF.</p>
<p><sup>7</sup> This number includes appropriated and obligated money towards 2020. Afghanistan, which as mentioned above, has three different mission sets. While the article focuses on the CT operations, the numbers account for the COIN, and broader missions.</p>
<p><sup>8</sup> The BIJ started to collect data since 2004, and it includes a wide range of U.S military activity, not just targeted killings. See the full methodology at thebureauinvestigates.com; the numbers are estimative and cannot be independently confirmed.</p>
<p><sup>9</sup> This again accounts for coalitions that were formed to defeat ISIS when it was an insurgency from 2014–2017</p>
<p><sup>10</sup> Iranian General Qasem Soleimani was the leader of Iran’s Quds forces, considered by the U.S. to be a terrorist organization. The designation might be more political than true to what terrorist groups are. Still, the Quds forces do support groups that commit acts of terrorism in line with Iran’s foreign policy objectives.</p>
<p><sup>11</sup> ISIS is the most contemporary example, but the finite vs. infinite clash can also be demonstrated with AQ core and other terrorist groups.</p>
<p><sup>12</sup> <a href="https://www.nytimes.com/2006/06/08/world/middleeast/08cnd-iraq.html">https://www.nytimes.com/2006/06/08/world/middleeast/08cnd-iraq.html</a></p>
<p><sup>13</sup> <a href="https://www.reuters.com/article/us-iraq-violence-alqaeda/al-qaedas-two-top-iraq-leaders-killed-in-raid-idU.S.TRE63I3CL20100419">https://www.reuters.com/article/us-iraq-violence-alqaeda/al-qaedas-two-top-iraq-leaders-killed-in-raid-idU.S.TRE63I3CL20100419</a></p>
<p><sup>14</sup> <a href="https://www.whitehouse.gov/briefings-statements/statement-president-death-abu-bakr-al-baghdadi/">https://www.whitehouse.gov/briefings-statements/statement-president-death-abu-bakr-al-baghdadi/</a></p>
<p><sup>15</sup> See <em>How Terrorism Ends: Understanding the Decline and Demise of Terrorist Campaigns</em></p>
<p><sup>16</sup> AQI became ISIS in 2007.</p>
<p><sup>17</sup> See Brian H. Fishman in <em>The Master Plan: ISIS, al-Qaeda, and the Jihadi Strategy for Final Victory</em></p>
<p><sup>18</sup> This estimate is from retired LTC, Craig Whiteside, cited in # 17.</p>
<p><sup>19</sup> <a href="https://www.wilsoncenter.org/article/timeline-the-rise-spread-and-fall-the-islamic-state">https://www.wilsoncenter.org/article/timeline-the-rise-spread-and-fall-the-islamic-state</a></p>
<p><sup>20</sup> U.S invasion of Iraq in 2003, the subsequent withdrawal in 2011, etc.</p>
<p><sup>21</sup> The audio was released in August 2018 before the <a href="https://www.bbc.com/news/world-middle-east-45277322">https://www.bbc.com/news/world-middle-east-45277322</a></p>
<p><sup>22</sup> <a href="https://www.nytimes.com/2020/05/18/us/politics/justice-department-al-qaeda-florida-naval-base-shooting.html">https://www.nytimes.com/2020/05/18/us/politics/justice-department-al-qaeda-florida-naval-base-shooting.html</a></p>
<p><sup>23</sup> <a href="https://www.dni.gov/files/ODNI/documents/2019-ATA-SFR---SSCI.pdf">https://www.dni.gov/files/ODNI/documents/2019-ATA-SFR&#8212;SSCI.pdf</a></p>
<p><sup>24</sup> Frank Gardner — BBC- <a href="https://www.bbc.com/news/world-53156096">https://www.bbc.com/news/world-53156096</a></p>
<p><sup>25</sup> <a href="https://www.cnn.com/2020/03/25/politics/coronavirus-terrorism-justice-department/index.html">https://www.cnn.com/2020/03/25/politics/coronavirus-terrorism-justice-department/index.html</a></p>
<p><sup>26</sup> See Martha Crenshaw, Audrey Kurth Kronin, and others.</p>
<p><a href="https://globalsecurityreview.com/after-almost-twenty-years-americas-war-on-terror-resembles-insanity/">After Almost Twenty Years, America’s “War on Terrorism” Resembles Insanity</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Social Media&#8217;s Role in Disaster Preparedness &#038; Crisis Management</title>
		<link>https://globalsecurityreview.com/critical-role-social-media-intelligence-defense-law-enforcement-preparedness/</link>
		
		<dc:creator><![CDATA[Mohamed ELDoh]]></dc:creator>
		<pubDate>Thu, 02 Apr 2020 15:47:03 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[Disinformation]]></category>
		<category><![CDATA[International Security]]></category>
		<category><![CDATA[Public Health]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=14879</guid>

					<description><![CDATA[<p>There were over 4.5 billion active internet users around the world as of January 2020—roughly 60 percent of the global population. In an average month, over 3 billion are active on social media platforms. This scale means individuals can disseminate an unprecedented amount of information more efficiently than ever. On Facebook alone, more than 300 [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/critical-role-social-media-intelligence-defense-law-enforcement-preparedness/">Social Media&#8217;s Role in Disaster Preparedness &#038; Crisis Management</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There were over 4.5 billion active internet users around the world as of January <a href="https://www.statista.com/statistics/617136/digital-population-worldwide/">2020</a>—roughly 60 percent of the global population. In an average month, over 3 billion are <a href="https://wearesocial.com/blog/2018/01/global-digital-report-2018">active</a> on social media platforms. This scale means individuals can disseminate an unprecedented amount of information more efficiently than ever. On Facebook alone, <a href="https://www.omnicoreagency.com/facebook-statistics/">more</a> than 300 million photos are uploaded each day—while every 60 seconds, <a href="https://zephoria.com/top-15-valuable-facebook-statistics/">approximately</a> 510,000 comments and 293,000 status updates are posted. On Twitter, an <a href="https://www.dsayce.com/social-media/tweets-day/">average</a> of 350,000 tweets are sent per minute—equivalent to 500 million each day, or 200 billion per year.</p>
<p>The decentralization of the ability to disseminate information at scale poses a challenge in the event of national and global security threats and incidents like terrorism, instability in post-conflict states, natural disasters, and public health crises, such as the pandemic we are currently experiencing. In all the examples above, without exception, individuals use social media to share opinions, news, photos, and videos of the incident and its aftermath. First responders and the relevant authorities—whether defense, intelligence, national security, law enforcement, and public health agencies—require accurate information in real-time, and can use social media as a tool for such information to assist in planning and response.</p>
<p>While social media is already widely used by law enforcement and national security agencies as to gather and disseminate information, this author argues there is an essential need to advance the use of social media in the public sector as a source of real-time information to enhance situational awareness, crisis preparedness, and disaster response efforts.</p>
<p>Social media is already utilized in counter-terrorism, criminal investigations, threat forecasting, and information operations. However, social networks can be even further harnessed by public sector agencies as a continuous, real-time source of intelligence, if leveraged appropriately, particularly given that improvements in technology applications mean that any individual with a basic camera-equipped smartphone can serve as a source of on-the-ground information at the epicenter of a significant incident.</p>
<p>Many would argue that continuous, in-depth analysis of social media content infringes on civil liberties and is invasive to the privacy of individuals, yet such an argument exposes a double standard relating to the use of information on social networks by public sector agencies. Many social media users share content publicly, therefore, analysis of publicly-available social media content by public sector agencies wouldn&#8217;t be a violation of user privacy. In the Intelligence Community, the use of social networks as a source of intelligence falls into the OSINT (Open Source Intelligence) category.</p>
<p>Regardless, whether used by law enforcement, defense agencies, the intelligence community, or the general public, social media is an immeasurably powerful tool for reaching and connecting people at scale. Relevant social media content and &#8220;hashtags&#8221; trend around the globe within minutes of a crisis event—such as an act of terrorism, political violence, a natural disaster, or a public health emergency—particularly when an incident rapidly escalates and is unpredictable in nature.</p>
<p>It&#8217;s therefore critical that defense, intelligence, and law enforcement agencies, as well as first responders, maintain and have access to continuous monitoring of social media trends as they develop in real-time. In high priority incidents, individuals on the scene are likely to share photographs, videos, and text updates—information of great value in a crisis. Intelligence gathered from real-time analysis of social networks would include, but not be limited to, preliminary assessments of the situation&#8217;s complexity and the response required, as well as forecasting future consequences that could arise.</p>
<p>Citizen journalism and &#8220;whistleblowing&#8221; over social media can also serve as a critical indicator and a warning sign of worsening situations. A recent example of this was Dr. Li Wenliang, the Chinese doctor who issued a <a href="https://www.bbc.com/news/world-asia-china-51364382">warning</a> in a message shared on the Chinese social media platform Weibo on December 30th, 2019 about a “strange new virus,” which is now a pandemic impacting nearly <a href="https://coronavirus.jhu.edu/map.html">every</a> country in some way. In hindsight, had his post been viewed by intelligence agencies as an early warning sign, many states may have taken stricter measures earlier on to limit the impact of <a href="https://www.cdc.gov/coronavirus/2019-nCoV/index.html">COVID-19</a>.</p>
<p>In addition to systematic social media monitoring, automated text, and sentiment analysis of publicly shared user posts can provide crucial insights into the attitude of the general public and reactions towards an incident. This would further help first responders and security authorities when communicating with the public in an emergency, such as implementing enhanced security screening, border closures, and evacuations. Moreover, automated analysis of social media posts would assist first responders in their response factoring to avoid contributing to a public panic.</p>
<p>Social media in a crisis is a double-edged sword. As a crisis takes hold, a state&#8217;s adversaries are likely to take advantage of the situation and unleash a barrage of online disinformation and propaganda through social media channels in an attempt to foment public unrest. Such campaigns, usually initiated with a political agenda in mind to use the general public as unwitting proxy actors, present an additional challenge that further emphasizes the importance of maintaining continuous, real-time monitoring of publicly available user-generated social media content. Such a capability would effectively reinforce the efforts of first responders on-the-ground, and allow for public sector authorities to better mitigate the consequences of malicious disinformation campaigns.</p>
<p>Furthermore, continuous monitoring of social media platforms by a state&#8217;s security agencies enables those agencies to anticipate and counter unintentional misinformation. The spread of inaccurate rumors may have an adverse impact on public safety, a possible reason for the Director-General of the World Health Organization (WHO), Tedros Ghrebreysus, <a href="https://theconversation.com/covid19-social-media-both-a-blessing-and-a-curse-during-coronavirus-pandemic-133596">advocated</a> for urgent measures to be taken to mitigate the fallout from the coronavirus &#8220;infodemic.&#8221;</p>
<p><a href="https://globalsecurityreview.com/critical-role-social-media-intelligence-defense-law-enforcement-preparedness/">Social Media&#8217;s Role in Disaster Preparedness &#038; Crisis Management</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Now That Abu Bakr al-Baghdadi is Dead, What Next?</title>
		<link>https://globalsecurityreview.com/abu-bakr-al-baghdadi-death/</link>
		
		<dc:creator><![CDATA[Alan Lis]]></dc:creator>
		<pubDate>Wed, 11 Dec 2019 02:52:39 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Iraq]]></category>
		<category><![CDATA[ISIS]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=13371</guid>

					<description><![CDATA[<p>Abu Bakr al-Baghdadi, the leader of the Islamic State, was killed on the 26th of October in a raid carried out by U.S. Special Forces when he detonated a suicide vest in the Syrian province of Idlib. In a statement the following day, U.S. President Donald Trump acknowledged the role of Iraq, Turkey, Russia, the [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/abu-bakr-al-baghdadi-death/">Now That Abu Bakr al-Baghdadi is Dead, What Next?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Abu Bakr al-Baghdadi, the leader of the Islamic State, was killed on the 26th of October in a raid carried out by U.S. Special Forces when he detonated a suicide vest in the Syrian province of Idlib. In a statement the following day, U.S. President Donald Trump acknowledged the role of Iraq, Turkey, Russia, the Kurds, and the Syrian government in the operation that resulted in killing the ISIS leader.</p>
<p>While this undoubtedly is a major victory for the U.S. in the fight against global jihadism, it cannot be overlooked that this decapitation strike does certainly not mean ISIS that is finished. This organization has proved that it can outlast the loss of its leaders; its founder, Abu Musab al-Zarqawi was killed in 2006; his successors, Abu Ayyub al-Masri and Abu Omar al-Baghdadi, were eliminated in 2010. Following the death of Abu Bakr al-Baghdadi, the Islamic State has now publicly named his successor: Abu Ibrahim al-Hashimi al-Qurayshi.</p>
<h3>Consequences of al-Baghdadi’s Death</h3>
<p><em>Valuable intelligence was obtained during the raid. </em>Similarly to the raid during which Osama bin Laden lost his life, through the operation that resulted in al Baghdad’s death, the U.S. forces got to obtain, presumably exceptionally valuable, intelligence. An additional bonus is that two ISIS fighters were captured alive and then taken to Iraq for interrogation. Having been rather close to al-Baghdadi, it is likely they possess some knowledge regarding the organization’s functioning and its network of sleeper cells, whose activation in the context of staging retaliatory attacks is now one of the major concerns of the anti-IS coalition member states.</p>
<p><em>There&#8217;s a risk that ISIS sleeper cells could be activated to execute retaliatory strikes. </em>Many security experts and analysts have warned about the wave of retaliatory strikes that ISIS will carry out to avenge al-Baghdadi’s death. Though such attacks are extremely likely to happen, it may be some time between the killing and the attacks to take place. ISIS is aware that many countries have put their intelligence and security services on high alert because of the fear of retaliatory strikes. To inflict maximum damage and casualties, it is characteristic for groups like ISIS  to wait out increased protection measures and attack once the security provisions are more relaxed. It&#8217;s almost certain that retaliatory strikes have  been planned and organized even before al-Baghdadi&#8217;s death.</p>
<p><em>The world’s most wanted terrorist was brought to justice</em>. Killing al-Baghdadi is undoubtedly a success in the fight against ISIS, but some analysts argue that its value is rather symbolic, as it is believed that the Caliph’s control over his organization was rather limited in the recent months. While that may be true, it needs to be remembered it was him who led the organization during days of its glory and territorial conquest, and him who was responsible for the death and suffering of millions of people in the process of creating and running the Caliphate. Even though he might not have had in recent months as much power and control as he used to, he was still the most wanted terrorist in the world.</p>
<p><em>President Trump has greater justification for withdrawing U.S. troops from Syria. </em>Killing al-Baghdadi provided Trump with the ammunition to defend his decision of withdrawing the U.S. troops from Syria. He can justifiably claim that the U.S. is still committed to continuing the fight against ISIS despite the withdrawal and that the American forces are not needed there on the ground to carry out effective operations against the IS. However, it must be considered that Trump&#8217;s decision has resulted in a resurgence of ISIS forces as Kurdish forces—who were guarding ISIS fighters—were forced to leave their positions to fight Turkish and Turkey-backed forces as they invaded North-eastern Syria. Reportedly, several hundred ISIS warriors escaped.</p>
<h3>Al-Baghdadi’s death does not mean the end of ISIS</h3>
<p>Many would want to believe that al Baghdadi’s death means the end of the struggle against ISIS and the end of the threat it has posed. This belief is, however, far from being real. Of course, losing a leader is a considerable blow to any terrorist organization, and severe damage to its image, but it needs to be acknowledged that the internal structure of the Islamic State has not been harmed much with al-Baghdadi killed.</p>
<p>There were people ready to take over al-Baghdadi’s role and indeed, as mentioned before, the IS has already claimed its new caliph to be Abu Ibrahim al-Hashemi al-Qurayshi. Though al-Hashemi is likely to continue the work of al-Baghdadi, it is also unclear how strong his position will be and what will be the ISIS’s affiliates’ reaction to the new Caliph. Overall, however, replacing al-Baghdadi sends a message that despite the losses suffered by the terrorist group, it remains in existence and is continuing operations.</p>
<p><a href="https://globalsecurityreview.com/abu-bakr-al-baghdadi-death/">Now That Abu Bakr al-Baghdadi is Dead, What Next?</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Britain&#8217;s Changing Security Perceptions</title>
		<link>https://globalsecurityreview.com/changing-security-perceptions-britain/</link>
		
		<dc:creator><![CDATA[Musa Khan Jalalzai]]></dc:creator>
		<pubDate>Thu, 15 Aug 2019 15:47:09 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=12550</guid>

					<description><![CDATA[<p>The United Kingdom&#8217;s national security challenges are amplifying by the day. Existing security measures and strategies are incapable of combating the hydra of extremism, foreign espionage, international terrorism, and serious organized crime. Drug trafficking, immigration, and containerized illegal trade, and their detrimental impact on industry and the market economy create further complexities for policymakers and [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/changing-security-perceptions-britain/">Britain&#8217;s Changing Security Perceptions</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>The United Kingdom&#8217;s national security challenges are amplifying by the day.</h2>
<p>Existing security measures and strategies are incapable of combating the hydra of extremism, foreign espionage, international terrorism, and serious organized crime. Drug trafficking, immigration, and containerized illegal trade, and their detrimental impact on industry and the market economy create further complexities for policymakers and law enforcement agencies.</p>
<p>Exacerbating domestic tensions between communities and the security apparatus has transpired through a range of strategies aimed at countering and reassessing national security threats. CONTEST and other counterterrorism laws have failed to tackle the core issue. This year, the government passed the 2019 Counter-Terrorism and Border Security Act, providing police officers with authorization to stop, question, search, and detain individuals entering the country from abroad. However, a wide range of human trafficking networks both within and outside the U.K. continue to pose significant challenges for British law enforcement agencies.</p>
<p>Britain has been subjected to a series of terrorist attacks for over 18 years. In 2005 and 2009, homegrown extremist groups targeted both government installations and public places in London. In 2013, attacks on mosques in Birmingham generated significant consternation, and in 2014, the Woolwich attack on a British army soldier cast doubt on the government&#8217;s credibility and its law enforcement mechanisms. The three attacks of 2017 increased the public&#8217;s lack of confidence in the authorities for a variety of reasons; police failed to disrupt terrorist plots, as the law and order situation deteriorated, as the media criticized the government&#8217;s lack of a strategic approach to security threats.<span class="Apple-converted-space"> </span></p>
<p>Civil wars in Syria, Afghanistan, and Iraq—along with the British military&#8217;s involvement in those conflicts—contributed to the deterioration of domestic stability. The threat of extremism and terrorism expanded as radicalized elements who had joined the conflicts in the Middle East, the Persian Gulf, and South Asia, returned to the U.K. with new ideas and ways of thinking. Until 2018, there were more than 25,000 registered extremist and radicalized elements representing a range of sectarian groups in British in towns and cities. However, by any reasonable barometer, the level of security of the United Kingdom in 2017 was inauspicious. That year, terrorists carried out three attacks in which several civilians were killed.<span class="Apple-converted-space"> </span></p>
<p>British police and intelligence agencies are undoubtedly well-trained and competent, but their ranks have dwindled.<sup>1</sup> Over the past two decades, police have been a less visible presence in the streets, relying on technology to provide them with visibility in towns and cities. Since 2005, intelligence collection has been mostly dependent on CCTV, mobile phones, and surveillance technology to deal with threats like foreign espionage and international terrorism. Conversely, in a majority of EU member states, human intelligence accompanied by a technical approach to national security challenges was of great importance. In the U.K.,  changes were proposed to improve the professionalism and competence of police intelligence (National Intelligence Model, Ballistic Intelligence, Special Branch, CID, cyber forces) and counter-espionage programs, but political and bureaucratic stakeholders resisted every reform package.<sup>2</sup></p>
<p>The Independent Police Complaints Commission (IPCC) is the only oversight institution designed to improve the competence of the police force, but its efforts went unacknowledged. The commission was established in 2004 to investigate the conduct of police forces.<sup>3</sup> On January 8, 2018, the Independent Police Complains Commission was renamed as the Independent Office for Police Conduct (IOPC).<sup>4<span class="Apple-converted-space">  </span></sup>The Policing and Crime Act 2019 also introduced some changes in the system, but these changes were not implemented.<sup>5  </sup>The Home Office and the British Parliament&#8217;s Intelligence and Security Committee (ISC) remain imperfect with limited capacity for maintaining and conducting oversight over a powerful intelligence infrastructure. Recent reforms notwithstanding, the ISC remains a weak body over which the Prime Minister and government exercise their influence. The editors of <em>The U.K.&#8217;s Changing Democracy</em>  noted some aspects of security sector reforms as they pertain to the ISC and surveillance operations:<span class="Apple-converted-space"> </span></p>
<p>“Choreographed evidence sessions between the committee and the service heads suggest an over-cooperative, too close relationship. So too does the past willingness of the committee to very promptly exonerate the GCHQ petabytes the Snowden revelations and the charges of data collection and surveillance exceeding the agency’s remit—a clearance that occurred while the revelations were still emerging. Although the ISC criticized the lack of privacy safeguards in the Investigatory Power Bill, it did not secure major changes in the final act. Security Sector Reforms (SSR) is a complex process. Narrowly defined, it can encompass institutions and organizations established to deal with external and internal threats to the security of the state and its citizens. At a minimum, therefore, the security sector includes military and paramilitary forces, the intelligence services, national and local police services, border, customs, and coast guards. However, it is increasingly understood that SSR is broader than these institutions.”<sup>6<span class="Apple-converted-space"> </span></sup></p>
<p>British intelligence agencies supported the U.S.-led War on Terror, arresting civilians and handing them over to the CIA and U.S. military for interrogation. There was some degree of public condemnation over this partnership, but neither Parliament nor political parties were in any position to criticize the security services. On 28 June 2018, the UK Parliamentary Intelligence and Security Committee’s torture and rendition report was sharply criticized by human right NGOs: “The report is bound to contain some revelations and criticism about the U.K.’s agencies, but even more worrying is what it won’t contain,&#8221; said Bellah Sankey, Deputy Director of Reprieve. &#8220;The committee only saw what the government allowed it to see, being denied access to individual intelligence agents and could only question senior officers who were not directly involved in alleged torture and rendition,” Sankey continued.<sup>7</sup></p>
<p>On 03 June 2018, the Guardian reported: “Britain’s spies stand accused of continuing to share intelligence obtained under torture, in breach of official guidance. However, the <em>Daily Mail</em> reported Shadow Attorney General Shami Chakraborti’s anger: “The commissioner’s most recent report reveals a doubling of cases considered under the Consolidated Guidance, compared with the last three years, and an unprecedented number of acknowledged failures to apply the Guidance.”<sup>8</sup> MPs found that British spies had seen detainees being mistreated at least 13 times and were told by prisoners on 25 other occasions that they were being mistreated. On another 128 occasions, they were told of mistreatment by foreign agencies.<sup>9</sup> But despite having knowledge of malpractice, British intelligence agencies continued to supply questions for interrogations. The U.K. maintains a robust surveillance apparatus supporting police and security agencies in maintaining law and order.<sup>10</sup> GCHQ—the British signals intelligence agency—operates TEMPORA, a surveillance system designed to identify foreign threats and a competent tool for combating domestic terrorism and radicalization.<sup>11</sup></p>
<p>The role of the Interception Communications Commissioner (IoCC) is widely discussed throughout intellectual forums in the U.K. The IoCC&#8217;s role, and oversight mandate was seen as controversial and serving to alienate citizens from the state and government. The commissioner claimed that, under Part-1, Chapter-1 of the Regulation of Investigatory Power Act 2000, its role was to provide independent statutory oversight over the lawful interception of communication, and also asserted that it also investigates complaints.<sup>12</sup> Civil society and intellectual groups don&#8217;t agree with this assessment. The functions of the Office of Surveillance Commissioners (OSC) are not so different from that of Intelligence Surveillance Commissioner (ISC). The OSC use human intelligence sources under the Police Act of 1997, as well as under Part-11 and Part-111 of the Regulations of Investigatory Power Act of 2000 (RIPA). These institutions help the state to maintain security and stability as well as provide important information to intelligence agencies. Further expanding the functions of the Intelligence Surveillance Commissioner was the Justice and Security Act of 2013.<sup>13</sup></p>
<p>The introduction of mass surveillance programs by British and European intelligence services prompted a nationwide debate on the rights of civilians to be protected from illegitimate or warrantless collection, and analysis of their data and metadata.<sup>14</sup> British newspapers and human rights forums published numerous reports, in which experts expressed concerns about the diminishing privacy of citizens. However, the growing concern of citizens about the right of their privacy has also been reported in print and electronic media, but their voice was never heard.</p>
<p>Google, YouTube, Twitter, and Facebook continue to violate the rights of their users. They operate like intelligence agencies, collecting and noting every aspect of a user&#8217;s interactions and conversations.<sup>15</sup> “Don’t Spy on US,” a coalition of organizations released a policy paper in September 2014 highlighting surveillance and intelligence operations and their impact on the privacy of citizens in the EU and U.K.: “In summer 2013 it was revealed that GCHQ was routinely intercepting submarine fiber-optic cables containing private communication of millions of British residents (the &#8216;TEMPORA’ program). The reported scale of the interception is staggering: each day, GCHQ accesses some 21 petabytes of data—the equivalent of downloading the entire British Library 192 times.”<sup>16</sup></p>
<p>TEMPORA<sup>17</sup> is a surveillance tool used by Government Communication Headquarters (GCHQ). TEMPORA intercepts communications—collecting information from fiber-optic cables.<sup>18</sup> The system is able to access the data of large amounts of internet users, including personal data, regardless of individual suspicion or targeting. Edward Snowden noted in 2016 that TEMPORA maintains two principal components: Mastering the Internet (MTI) and Global Telecoms Exploitation (GTE).<sup>19</sup></p>
<p>Some intelligence experts argue that GCHQ is more effective at mass-surveillance than the U.S. National Security Agency (NSA) because TEMPORA has access to all telephone and internet communications—including Facebook and email—across Europe.<sup>20</sup> TEMPORA is comprised of different components codenamed POKERFACE and the XKEYSCORE. In a 2016 television interview, Edward Snowden revealed that the NSA and GCHQ were using a new surveillance system called MUSCULAR, one of at least four other similar programs that rely on a trusted second party. The programs together are known as WINDSTOP. According to newspaper reports, over a 30-day period from December 2012 to January 2013, MUSCULAR collected 181 million records, while INCENSER, another WINDSTOP program, collected over 14 billion records over the same period. MUSCULAR can collect information without needing warrants, and also supports the NSA&#8217;s PINWALE data collection system.<sup>21</sup></p>
<p>On July 1, 2015, the Investigatory Powers Tribunal (IPT), which investigates complaints of unlawful contact by the UK intelligence agencies, notified Amnesty International that the British government agencies had spied on the organization by intercepting, accessing and storing its communications.<sup>22</sup> The IPT previously identified one of two NGOs which it found had been subjected to unlawful surveillance by the U.K. government as the Egyptian Initiative for Personal Rights (EIPR) when it should have been identified as Amnesty International.<sup>23</sup> The other NGO which was spied on was the Legal Resources Center in South Africa.<sup>24</sup> The Investigatory Powers Tribunal said that until December 2014, GCHQ failed to provide clear enough details of how it shared data collected from mass internet surveillance. It was the IPT&#8217;s first ruling against an intelligence agency in its fifteen-year history.<sup>25</sup></p>
<p>The inquiry was prompted by the revelations from information leaked by former CIA contractor Edward Snowden.<sup>26</sup> The committee concluded that there was no bulk surveillance and gave a lengthy defense on it: “We have established that bulk interception cannot be used to search for and examine the communications of an individual in the U.K. unless GCHQ first obtain a specific authorization naming that individual, signed by a secretary of state.”<sup>27</sup> At the time, the government was attempting to restore control orders,<sup>28</sup> but the very concept of control orders had already failed.<sup>29</sup> Unless extremist returnees are de-radicalized at the community level, no control order can prevent them from joining the ISIS terrorist network.<span class="Apple-converted-space"> </span></p>
<p>Moreover, Britain faces the threat of cyber terrorism.<sup>30</sup> While GCHQ is a top-notch intelligence agency, the U.K. is unable to counter the threat of Chinese or Russian cyber attacks unless it increases the recruitment of young information warriors.<sup>31</sup> Russia maintains strong cyber forces that make use of technology the U.K. doesn&#8217;t have. The U.K. Cyber Security Strategy (2011) noted cyber threats were coming from other states that seek to conduct espionage to spy on or compromise the British government, military, industrial, and economic assets, as well as monitoring opponents of their own regimes.<sup>32</sup> Moreover, cyber-attacks that cause environmental and financial damage will carry a 14-year prison sentence.<sup>33</sup> Ironically, U.K. authorities have failed to arrest a single cyber-terrorist thus far, while professional hackers continue to establish their networks in the U.K. and target state institutions with impunity.<sup>34</sup> The U.K. faces a new form of intelligence war in which its institutions are attacked from a safe distance.</p>
<h4>Notes and references</h4>
<p>[1] Intelligence in Vex: The EU and UK intelligence agencies are in a state of fret. Musa Khan Jalalzai. Vij Publishing, India, 2018</p>
<p>[2] Ibid</p>
<p>[3] The Independent Police Complaints Commission, https://www.gov.uk/government/organisations/independent-police-complaint-commission</p>
<p>[4] Ibid</p>
<p>[5] Ibid</p>
<p>[6] The UK’s Changing Democracy: The 2018 Democratic Audit, edited by: Patrick Dunleavy, Alice Park, and Ros Taylor. LSE Press, 2018</p>
<p>[7] On 28 June 2018, the UK Parliamentary Intelligence and Security Committee released the torture and rendition report.</p>
<p>[8] Daily Mail, 03 June 2018, https://www.dailymail.co.uk/news/article-5800457/British-spies-accused-sharing-intelligence-obtained-torture.html</p>
<p>[9] The Independent, 28 June 2018, https://www.independent.co.uk/news/uk/home-news/uk-torture-rendition-detainees-treatment-isc-mi5-mi6-911-war-terror-a8421856.html</p>
<p>[10] Intelligence in Vex: The EU and UK intelligence agencies are in a state of fret. Musa Khan Jalalzai. Vij Publishing, India, 2018</p>
<p>[11] Ibid</p>
<p>[12] Interception of communication Code of Practice Pursuant to section 71 of the ROPA Act 2000, Interception of Communications Code of Practice Pursuant to section 71 of the Regulation of Investigatory Powers Act 2000 February 2015</p>
<p>[13] Ibid</p>
<p>[14] Intelligence in Vex: The EU and UK intelligence agencies are in a state of fret. Musa Khan Jalalzai. Vij Publishing, India, 2018</p>
<p>[15] Ibid</p>
<p>[16] Ibid</p>
<p>[17] Reforming Surveillance in the UK, The Don’t Spy on US campaign of various organizations that defend privacy report, September 2014, https://www.dontspyonus.org.uk/assets/files/pdfs/reports/DSOU_Reforming_surveillance.pdf</p>
<p>[18] Ibid</p>
<p>[19] Ibid; NSA Report: Liberty and Security in a Changing World, The President&#8217;s Review Group on Intelligence and Communications Technologies, Richard A. Clarke, Michael J. Morell, Geoffrey R. Stone, Cass R. Sunstein, Peter Swire, Princeton University Press, 31 Mar 2014</p>
<p>[20] Intelligence in Vex: The EU and UK intelligence agencies are in a state of fret. Musa Khan Jalalzai. Vij Publishing, India, 2018</p>
<p>[21] Ibid</p>
<p>[22] Press release of Privacy International: UK intelligence agencies admits unlawfully spying on Privacy International, 25 September 2018, https://privacyinternational.org/press-release/2283/press-release-uk-intelligence-agency-admits-unlawfully-spying-privacy</p>
<p>[23] Ibid</p>
<p>[24] Ibid</p>
<p>[25] Ibid</p>
<p>[26] Fact Sheet: Investigatory Power, HO News Team 17 June 2019, https://homeofficemedia.blog.gov.uk/2019/06/17/fact-sheet-what-are-investigatory-powers/. Securing the Insecure States in Britain and Europe. Musa Khan Jalalzai, Algora new York, 2017</p>
<p>[27] Ibid</p>
<p>[28] On February 16, 2015, The Guardian reported that a man from Liverpool had been charged with attempting to obtain a chemical weapon.</p>
<p>[29] Daily Times, 12 September 2014</p>
<p>[30] Ibid, Policy Paper, 04 December 2013</p>
<p>[31] Amnesty International, 03 July 2015<span class="Apple-converted-space"> </span></p>
<p>[32] BBC, 06 February, 2015</p>
<p>[33] The inquiry was prompted by the revelations from documents leaked by former CIA contractor Edward Snowden, The Guardian, 12 March 2015</p>
<p>[34] Ibid</p>
<p><a href="https://globalsecurityreview.com/changing-security-perceptions-britain/">Britain&#8217;s Changing Security Perceptions</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Shifting Dynamics of Britain&#8217;s National Security Threats</title>
		<link>https://globalsecurityreview.com/shifting-dynamics-british-national-security-threats/</link>
		
		<dc:creator><![CDATA[Musa Khan Jalalzai]]></dc:creator>
		<pubDate>Sat, 13 Jul 2019 13:37:52 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=12262</guid>

					<description><![CDATA[<p>With the advent of the twenty-first century came differing classifications of national security threats and a shifting order of strategic preeminence. The risk of extremism and consistent alienation of citizens in European countries have both expanded and diversified. Some European Union member states in the EU require security sector reforms and the replacement of old [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/shifting-dynamics-british-national-security-threats/">The Shifting Dynamics of Britain&#8217;s National Security Threats</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>With the advent of the twenty-first century came differing classifications of national security threats and a shifting order of strategic preeminence.</h2>
<p>The risk of extremism and consistent alienation of citizens in European countries have both expanded and diversified. Some European Union member states in the EU require security sector reforms and the replacement of old communist security and intelligence infrastructure to tackle the hydra of radicalization and extremism.</p>
<p>The British state has abruptly clattered down to “earth with a very hefty collision, thanks to the Brexit hydra.”<sup>1</sup> The country is in a profound social and financial crisis—its machinery and security infrastructure are operating on a long-established streak. Security sector reforms are needed to make the system professionalize and competent. Mr. Tom Winsor&#8217;s police reform paper and the inquiry report into the Justice system both stressed the need for professionalization of police and law enforcement agencies, but no practical implementation has occurred.</p>
<p>The British state is in trouble and is sliding into the unholy-mess of Brexit, and its future is going to become gloomy outside Europe due to its economic and political confrontation with the EU.<sup>2</sup> The culture of racism, hatred, social, and political discrimination intensified after the 2016 Brexit referendum.<sup>3</sup> Second, the Brexit crisis has become a permanent headache of government and civil society, which is going to damage the special relationship between the U.K. and the United States. The 2019 leak of a U.K. National Security Council meeting, in which cooperation on 5G infrastructure with Huawei—a Chinese technology company that is alleged to have close ties with the Chinese Communist Party&#8217;s armed wing, the People&#8217;s Liberation Army—was viewed by security experts as a matter of grave concern. If the company is permitted to operate with free-reign in the U.K., the country’s relationship and intelligence cooperation with the U.S. will be deeply affected.<sup>4</sup></p>
<p>British civil society and the country&#8217;s intelligentsia are, in large part, opposed to Brexit, citing Britain&#8217;s century-long relationship with the continent. On February 13, 2019, the Guardian newspaper reported the concerns of more than forty former Ambassadors and High Commissioners about the entanglement of Brexit and its ramifications. In a written letter to the Prime Minister May, they warned that “British influence in the world will wane if the country leaves Europe’s trading and foreign policy bloc”.<sup>5</sup></p>
<p>These all-embracing developments forced British Intelligence Chiefs to explain the importance of Britain’s intelligence sharing and security cooperation with the EU. On 20 June 2018, in a speech in Brussels, GCHQ Chief Jeremy Fleming’s statement was evident from his irritation about the dilapidating security crisis. He firmly demanded intelligence cooperation with the EU allies. In his speech, Fleming said; “After Brexit, the UK will continue to work with the EU. Fleming stated.<sup>6</sup> On 14 May 2018, Chief of MI5, Mr. Andrew Parker consistently demanded cooperation with the EU intelligence agencies: “In today’s world, we need that shared strength more than ever. I can say confidently that the way we work together has prevented loss of life in the EU.&#8221;<sup>7</sup> These statements were clear signs of irritation.<sup>8<span class="Apple-converted-space"> </span></sup></p>
<p>The Prime Minister did not bring to bear the concerns of intelligence Chiefs about the consequences of Brexit. In the aftermath of these critiques, the government introduced the National Security Capability Review (2018),<sup>9</sup> to tackle national security challenges, but the growing influence of extremist forces across the country<sup>10</sup>, cast doubt on the credibility and highlighted the weak approach of the May government to national security. The first major strategic failure of the review is that it did not elucidate the security road-map: “This lack of strategic clarity has been highlighted by the Joint Committee on the National Security Strategy (JCNSS), the main parliamentary body scrutinizing its implementation.”<sup>11</sup> The country’s National Security Strategy also missed the boat to keep momentum with emerging threats and didn’t adequately respond to the exponentially growing threat of radicalization.<sup>12</sup><span class="Apple-converted-space"> </span></p>
<p>In its 04 June 2018 version, the U.K. Counter-Terrorism Strategy highlighted many vulnerabilities, citing the proliferation of jihadism, and a growing number of terror networks across the country, which prompted negative perceptions about its operational effectiveness, and popularity.<sup>13</sup>, However, several new amendments were added to the National Security Strategy, Strategic Defense and Security Review, and Cyber Security Strategy, to make effective law enforcement and intelligence infrastructure against radicalized forces, lone wolves and foreign espionage, but these amendments are not a proper panacea to the looming security crisis—more work is needed to make police and security agencies effective.<sup>14<span class="Apple-converted-space"> </span></sup></p>
<p>From January to June 2019, more than 100 people in England were killed, and 100 more were injured in different incidents, but the police and law enforcement agencies have no security plan to address the concerns of communities. Interestingly, no single Muslim was found behind these attacks, while British Home Secretary Sajid Javed shamelessly linked terrorism to Islam. His recent verboseness against Islam appeared in a recent report of Christian Today newspaper: “Islam has been responsible for terrorist attacks in Britain&#8230;&#8230;.“it is ‘lazy’ and ‘wrong’ to suggest terror has nothing to do with Islam. But I think it is absolutely fair to say that there is a special burden on Muslim Communities because whether we like or not these terrorists call themselves Muslims, the newspaper reported.<sup>15 </sup>The Home Secretary acted irresponsibly and did not take into account the concerns of Muslim communities.</p>
<p>Adding insult to injury is the country’s Snoopers Charter Surveillance (SCS) and the government&#8217;s war on civilian privacy. Liberty, a British human rights organization recently highlighted the powers of the Snoopers Charter Surveillance and data collection methods that were causing communities irksomeness: “When the U.K. government passed a law allowing the mass collection of data from all U.K. citizens&#8230;..The Investigatory Power Act, more popularly known as the &#8216;Snoopers’ Charter,&#8217; allow for the indiscriminate collection of data”.<sup>16</sup> The police has now practically started using the Snooper Charter Surveillance on a borough-level to monitor communities and their activities day-by-day. <span class="Apple-converted-space"> </span></p>
<p>Recently, Liberty and Privacy International called on local communities to report the negative impacts of this consternating and offensive surveillance of local policing authorities, to the Police and Crime Commissioner. The way local police stations using modern surveillance technologies in streets and markets have put our privacy at risk. From car surveillance to mobile phone and drone technologies, the police forces have an unparalleled view into the lives of ordinary British citizens.</p>
<p>Individual liberty and human rights groups recently warned that excessive and offensive use of surveillance tools by the police might alienate communities from the state and government: “From facial recognition in streets to monitoring social media and mobile phones, the police are not open and honest about what tech they use, where they use it, who they use it against and what laws allow them to do so. However, surveillance tech is being used without the public knowledge or consent, on the ground that 95% percent civilians know nothing about the evolving and changing operational mechanism of police surveillance in cities, towns, and streets”.<sup>17</sup></p>
<p>More worrisome is the unauthorized surveillance in which South Asian intelligence agencies are using their spies against their political opponents. They are cruising in cities and towns with impunity, and receive their salaries through a third person, or from their embassies.</p>
<p>This author has personally experienced eaves-dropping many times in high streets and shopping plazas in London.<sup>18</sup> Foreign terrorist fighters present a significant threat to the national security and critical infrastructure of the country. Since 2014, we have seen large numbers of radicalized individuals traveling to Iraq and Syria, while Joint Terrorism Analysis Centre (JTAC), and Intelligence and Security Committee are showing their performance on papers in their annual reports. In reality, the state&#8217;s response has been feeble since the emergence of the Islamic State (IS) in Syria and Iraq.<sup>19 </sup>Intelligence wars between foreign entities on British soil is making thing worse. The security relationship with the EU community remains in flux, while internal political disagreement and deteriorating law and order are prompting a brain drain within civil society and intellectual forums.<sup>20</sup><span class="Apple-converted-space"> </span></p>
<p>EU resentment towards the U.K. raises several concerns—particularly the attitudes of France and Germany. In a knee-jerk reaction to U.K. electronic surveillance operations on its soil, Germany immediately canceled a Cold-War era agreement with U.K.<sup>21</sup> In 2013, Germany, France, and Spain summoned U.K. Ambassadors to explain the country’s motive behind its intelligence collection practices. To distract from this and in an effort to disguise its own weaknesses, the British government published a security document, underlining the threat of 20 foreign intelligence agencies to the U.K.<sup>22</sup> This was to prove that Germany and France were also spying on Britain.<sup>23</sup><span class="Apple-converted-space"> </span></p>
<p>British counter-extremism and counter-intelligence capabilities are broken. British law enforcement agencies face a multifaceted crisis, including the lack of a common operational mechanism, and a lackluster technical approach to domestic security.<sup>24</sup> The U.K. National Security Council also lacks the professional capacity to implement policy properly. Since the U.K. voted to leave the EU in 2016; huge questions surrounding its place in the international community were left unanswered. Prime Minister Theresa May sacked her Defense Minister, Gavin Williamson over the leaks of security secrets of the discussion of National Security Council about the Chinese Huawei crisis. This act of the Prime Minister proved that many things were not going in the right direction within her government.<sup>25</sup> I<span style="background-color: #f5f6f5;">inar research paper underlining crucial aspects of the NSC and its significance to national security, </span>Institute for Government research associates Dr. Joe Devanny and Josh Harris assert that:</p>
<p style="padding-left: 40px;"><em>“The NSC is a relatively new committee, but it is only the latest iteration of over a century of Prime-Ministerial efforts to coordinate national security issues from the center. To date, there have been few sustained attempts to examine the NSC and its performance. Four and a half years on different Prime Ministers choose to approach the issue, structure, and appointment of senior advisors in different ways. It is important that the center of government can accommodate each Prime Minister’s preferred way of working. Few Prime Ministers now take office with much experience of National Security issues, and National Security coordination is rarely a key them in general election campaign. But no Prime Minister needs to reinvent the wheel once in office; their predecessors have grappled with similar problems of coordination for over a century.”</em><sup>26 </sup></p>
<p>There are a number of national security and law enforcement agencies performing different stabilization roles in the country. However, if one examines their cycle of information, analysis, and operational mechanism, one can conclude that, without the introduction of meaningful security sector reforms, they will be unable to respond to looming national security challenges.<sup>27</sup></p>
<hr />
<p>[1] Britain’s Brexit Armageddon, Tyler Durden, 15 May 2019</p>
<p>[2] Intelligence in Vex, Musa Khan Jalalzai, introduction pages<span class="Apple-converted-space"> </span></p>
<p>[3] Whether it’s Brexit or Bremain, the UK is in long-term economic decline, David Brown, South China Morning Post, 28 May 2018 <a href="https://www.scmp.com/news/world/europe/article/3012428/uk-leadership-race-can-hong-kong-born-rory-stewart-beat-us-born">https://www.scmp.com/news/world/europe/article/3012428/uk-leadership-race-can-hong-kong-born-rory-stewart-beat-us-born</a><span class="Apple-converted-space"> </span></p>
<p>[4] The decline and fall of Britain, Brian Cloughley, 09 December 2016 <a href="https://www.counterpunch.org/2016/12/09/the-decline-and-fall-of-britain/">https://www.counterpunch.org/2016/12/09/the-decline-and-fall-of-britain/</a>, and also, Brexit Is Killing the Special Relationship: Britain’s partnership with the United States always depended on its usefulness—and that’s starting to fall off a cliff. BY STEPHEN PADUANO, Foreign Policy MAY 2, 2019, <a href="https://foreignpolicy.com/2019/05/02/brexit-is-killing-the-special-relationship/">https://foreignpolicy.com/2019/05/02/brexit-is-killing-the-special-relationship/</a></p>
<p>[5] National Security Capability Review another missed opportunity? Celia Mckeon Open Democracy 23 March 2018 <span class="Apple-converted-space">   </span></p>
<p>[6] National Security Capability Review: A changing security environment: Government response to the committee’s first report, 2017-19</p>
<p>[7] Intelligence in Vex, Musa Khan Jalalzai, introduction pages</p>
<p>[8] Brexit, BBC News, 20 June 2018.<span class="Apple-converted-space"> </span></p>
<p>[9] Sajid Javed: What has the new home secretary said about faith? Harry Farley, Christian Today, 30 April 2018</p>
<p>[10] Intelligence in Vex, Musa Khan Jalalzai.</p>
<p>[11] Guardian newspaper, 13 May 2018</p>
<p>[12] BBC 24 June 2016</p>
<p>[13] National Security Capability Review, March 2018</p>
<p>[14] The Guardian newspaper 04 November 2015</p>
<p>[15] Fixing the EU intelligence Crisis, Musa Khan Jalalzai, New York, 2017</p>
<p>[16] Stand up to police spying, Liberty and Human Organization, <a href="https://www.libertyhumanrights.org.uk/stand-police-spying">https://www.libertyhumanrights.org.uk/stand-police-spying</a></p>
<p>[17] Intelligence and Security Committee Annual Report 2017-18, January 2019, <a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/776111/Intelligence_and_Security_Committee_Annual_Report">https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/776111/Intelligence_and_Security_Committee_Annual_Report</a></p>
<p>[18] The National Security Council: National Security at the center of government, Dr. Joe Devanny, Josh Harris, Institute for Government report.</p>
<p>[19] The Guardian Newspaper, 11 October 2017</p>
<p>[20] BBC, 28 April 2018</p>
<p>[21] Regulation of Investigatory Powers Act (RIPA), BBC, 05 November 2015</p>
<p>[22] Intelligence in Vex. Musa Khan Jalalzai, VIJ Publishing, India, 2018</p>
<p>[23] Intelligence in Vex, Musa Khan Jalalzai.</p>
<p>[24] Ibid</p>
<p>[25] Ibid</p>
<p>[26] BBC, 01 May 2019</p>
<p>[27] The National Security Council: National Security at the center of government, Dr. Joe Devanny, Josh Harris, Institute for Government report. <a href="https://www.instituteforgovernment.org.uk/sites/default/files/publications/NSC%20final_0.pdf">https://www.instituteforgovernment.org.uk/sites/default/files/publications/NSC%20final_0.pdf</a></p>
<p><a href="https://globalsecurityreview.com/shifting-dynamics-british-national-security-threats/">The Shifting Dynamics of Britain&#8217;s National Security Threats</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CPP-NPA and the Duterte Administration: Realpolitik in Insurgency and Terrorism</title>
		<link>https://globalsecurityreview.com/cpp-npa-duterte-administration-realpolitik-insurgency-terrorism/</link>
		
		<dc:creator><![CDATA[Maria Kristina Decena Siuagan&nbsp;&&nbsp;Jumel Gabilan Estrañero]]></dc:creator>
		<pubDate>Mon, 24 Jun 2019 20:43:45 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Communism]]></category>
		<category><![CDATA[Philippines]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=11862</guid>

					<description><![CDATA[<p>For the Communist Party of the Philippines and its armed wing, the National People&#8217;s Army, strategic positioning is key to spreading influence from the organization&#8217;s core to the grassroots level. NPA tactics of dispersal, concentration, and shifting can be viewed from two perspectives: in line with their activities or ideological, political, and organizational (IPO) efforts [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/cpp-npa-duterte-administration-realpolitik-insurgency-terrorism/">CPP-NPA and the Duterte Administration: Realpolitik in Insurgency and Terrorism</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>For the Communist Party of the Philippines and its armed wing, the National People&#8217;s Army, strategic positioning is key to spreading influence from the organization&#8217;s core to the grassroots level.</h2>
<p>NPA tactics of dispersal, concentration, and shifting can be viewed from two perspectives: in line with their activities or ideological, political, and organizational (IPO) efforts as well as about that of the enemy, the Armed Forces of the Philippines (AFP). To conduct extortion and other malign activities, NPA territorial platoons break up into squads to cover the area of the platoon within the guerrilla zone (GZ) with each squad having an assigned number of 10 barrios at an average.</p>
<p>The SDG<i> (</i><a href="https://newsinfo.inquirer.net/221675/npa%E2%80%99s-sparrows-stepping-up-killings-claims-afp"><i>Sentro de Grabidad</i></a>, which serves as a “rallying point of all other NPA units engaged in military or mass works in the guerrilla front&#8221;<i>)</i> disperses with its squads only deployed in a shorter distance from a relative center conducting the same activities. Both platoons consolidate during conferences, training, and assessment exercises. Shifting is done when a platoon transfers to a different area within the same <a href="https://smallwarsjournal.com/blog/ending-an-insurgency-violently">guerrilla front (GF)</a> or to a different front to participate in a new mission or for a more specific reason, like augmenting the forces of the neighboring GF.</p>
<p>The NPA has also been externally linked with Non-Government Organizations (NGOs) where financial aid is being used to entice both members of the <a href="http://www.refworld.org/pdfid/4d5a310e2.pdf">Lumad ethnicity and others to dig in. Yunit Milisyang Bayan (MBs)</a>, a highly acclaimed foothold of NPA, has driven a lot of Lumads to take part in the revolution from the ground. As an organized group, they are being armed by NPA themselves to become rogue members of NPA units. For instance, Surigao’s <a href="https://www.pna.gov.ph/articles/1061897">ALCADEV (Alternative Learning Center for Agricultural Development)</a> secures foreign funding from Europe for a hidden agenda—instilling the belief that the government cannot help them, the only groups that can are CPP cadres disguised as teachers, management committees, and even politicians. As usual, with the support of legal fronts, the issue of confronting this will die down in the process because of the protection and bias of various interest groups in favor with NPA. Legal fronts are composed of the following: the Makabayan bloc—<a href="https://smallwarsjournal.com/blog/ending-an-insurgency-violently">Bayan, Anakbayan, Karapatan, Anakpawis, Act Teachers, Gabriela</a>, and all other related groups.</p>
<p>In the aftermath of <a href="https://www.manilatimes.net/ending-insurgency-local-way/321912/">President Rodrigo Roa Duterte</a>&#8216;s 2017 State of the Nation Address (SONA), the CPP-NPA exploited the President&#8217;s controversial statement that <a href="https://www.afp.mil.ph/index.php/news/8-afp-news/460-on-the-alleged-militarization-of-lumad-communities">Lumad schools</a> were being run and manipulated by CPP-NPA. According to Armed Forces of the Philippines ‘official website, the CPP-NPA employed an institutionalized self-imposed ‘Taktikang Bakwit’ as a well-versed orchestra of rhetoric directed at the President. Conversely, the Kalumbay Lumad Alliance in Northern Mindanao led by Datu Jomorito Goaynon involved itself the investigation of alleged abuses and violations allegedly committed by army troops under 4ID and the PNP as well in Bukidnon, Surigao, and Agusan Provinces August 15, 2017.</p>
<p><img loading="lazy" decoding="async" class="wp-image-11890 aligncenter" src="http://globalsecurityreview.com/wp-content/uploads/2019/06/terror-attacks-philippines.png" alt="" width="499" height="343" srcset="https://globalsecurityreview.com/wp-content/uploads/2019/06/terror-attacks-philippines.png 677w, https://globalsecurityreview.com/wp-content/uploads/2019/06/terror-attacks-philippines-300x206.png 300w" sizes="(max-width: 499px) 100vw, 499px" /></p>
<p>According to a 2017 report by <a href="https://reliefweb.int/report/philippines/escalating-violence-new-people-s-army-mindanao">Luke Lischin</a>, sixty-four percent of recorded incidents were armed assaults involving the exchange of small arms fire (at a minimum) between the NPA and other actors, 19 percent were attacks on facilities or infrastructure such as mining sites, plantations, and vehicles, while the remaining incidents entailed abductions, arrests, and assassinations/executions.</p>
<p>Further, the CPP-NPA has also initiated a socio-politico strategy of linkage. The <a href="https://www.philstar.com/headlines/2018/12/09/1875575/schools-network-rejects-afp-claim-communist-recruitment">Save Our Schools Network (SOS Network)</a> is essentially an extension of the communist party working to subversively influence target populations by using powerful institutions and personalities in their disinformation operations, masked by the appearance of charitable work. This influence campaign supports the efforts of militants, which routinely violate the <a href="https://thediplomat.com/2019/05/bloody-violence-haunts-philippine-sugar-plantations-in-negros/">CARHRIHL (Comprehensive Agreement for the Respect of Human Rights and International Humanitarian Law).</a></p>
<p>In part, the rejection of activism as a concept stems from a belief that a sufficient amount of change has already been made. In connection therewith, many lives of promising students recruited into the organization ended too soon and too tragically because they crossed the path to armed struggle. We can see that rebel life was being romanticized by insurgents, adding that in truth, it was a portal to a life of suffering, violence, and crime. Thus, activism and membership in specific organizations could lead to a violent fate. This way of thinking emerges when people frame the righting of great historical wrongs as concessions that one group has personally made, in largesse bestowed in some ongoing negotiation (i.e., peace talks) for which there must be a quid pro quo.</p>
<p>In assessing prominent Communist politicians in government and their prospects for gaining power in a legislative manner, particularly now that national elections are nearing, one could arguably make the case that it would take years to accomplish such a goal. The CPP&#8217;s aim has always been to overthrow any individual in a leadership position. Such actions were initiated by during the administrations of three former Presidents—Joseph Ejercito Estrada, Gloria Macapagal Arroyo, and Benigno “Noynoy” Aquino III.</p>
<p>The CPP-NPA successfully ousted former President Estrada in January 2001 through the Erap Resign Movement but failed to oust both Presidents Gloria Arroyo and Noynoy Aquino through their Oust Arroyo campaign in 2006, and Kilusang Talsik in 2013. The CPP-NPA is currently engaged in the Oust Duterte Movement under a “Grand Coalition,” and are also working on other anti-Duterte initiatives—the <a href="https://news.mb.com.ph/2018/09/23/galvez-parlade-reveal-broad-coalition-allegedly-engaged-in-dutertes-ouster/">Coalition For Justice (CFJ) and the Tindig Pilipinas</a>.</p>
<p>The <a href="https://news.mb.com.ph/2018/09/23/galvez-parlade-reveal-broad-coalition-allegedly-engaged-in-dutertes-ouster/">Coalition For Justice (CFJ)</a> is composed of a group of judges led by former Chief Justice Maria Lourdes Sereno, the Evangelical Church led by Pastor Caloy Dino, and the Integrated Bar of the Philippines (IBP) with Attorney Susan Villanueva as the lead personalities. Meanwhile, Tindig Pilipinas is composed of the rejectionist (RJ) group, <a href="https://patolangpilipina.com/talakitok-101/dumadami-ang-mga-grupong-gustong-patalsikin-si-duterte/">Liberal Party and Magdalo Group</a> with Senator Antonio Trillanes, Congressman Gary C Alejano (who campaigned for a Senate seat), Aleta Tolentino, and Ricky Garchitorena as the lead personalities.</p>
<p>Moreover, now that the national election will happen in the same month when Marawi Siege erupted despite its liberation from the hands of Maute-ISIS inspired terrorists, rumors, hearsays, and atrocious commentaries have been circulating to dissuade the people from believing Government’s efforts regarding Marawi rehabilitation. Recently, members of the <a href="https://www.gmanetwork.com/news/news/nation/658362/makabayan-bloc-seeks-probe-into-alleged-rights-violations-rehab-efforts-in-marawi-city/story/">House Makabayan bloc filed a Resolution 1973</a> seeking an investigation into the human rights situation and the status of reconstruction in the Islamic City of Marawi.</p>
<p>The resolution was spearheaded by ACT-Teachers  Reps. Antonio Tinio and Frances Castro, Gabriela Reps. Emmi de Jesus and Arlene Brosas, Bayan Muna Rep.  Carlos   Zarate,  Anakpawis  Rep.  Ariel  Casilao,   and   Kabataan Rep. Sarah Elago specifically asked the House committees on human rights and Muslim affairs to conduct an inquiry, in aid of legislation, on reports of human rights violations in Marawi and   other   grave   concerns   of   the   local   people   on   the   government’s   post-siege rehabilitation   plans   in   Marawi.   Meanwhile,   Amnesty   International,   in its report on November 2017 said that the Philippine security forces violated the prohibition on the use of torture and other ill-treatment of people in their custody, adding that most of the violations were carried out against civilians who were escaping from the besieged lakeside town and seeking military protection.</p>
<p>In one case, Bayan Muna Rep. Carlos Isagani Zarate cited an alleged Armed Forces of the Philippine’s (AFP) anomaly wherein the P192.5  million <a href="https://www.bworldonline.com/localized-peace-talks-could-be-money-making-scheme-for-lgus-security-forces-says-zarate/">Payapa at Masaganang Pamayanan (PAMANA)</a> program in Maguindanao is unconstitutional and promoted corruption. Zarate, as is his style, jumped on the bandwagon of Peace Adviser Jesus Dureza&#8217;s recent statement that he decided to return the extra amount in exchange for a newer version of the budget resolution to be used for allocating funds going forward. They argued that the Peace Talks are a worn-out psychological warfare tactic designed to project victory while concealing the continuing failure of the AFP to suppress the popular resistance and stem the steady growth of the NPA.</p>
<p>Meanwhile, last year, the CPP trade union campaign was developed by the <a href="https://www.gmanetwork.com/news/news/nation/670007/palace-dole-usec-maglunsod-sacked-over-strikes/story/">National Organization Department (NOD)</a>—specifically the National Trade Union Bureau (NTUB)—with <a href="https://www.gmanetwork.com/news/news/nation/670007/palace-dole-usec-maglunsod-sacked-over-strikes/story/">former DOLE Undersecretary Joel Maglunsod</a> serving as a critical player. When PRRD declared his intentions to stop the practice of ENDO—the so-called &#8220;labor contractualization,&#8221; Secretary Bebot Bello and Undersecretary Maglunsod collaborated in coming up with the Department Order 174, which imposed workers regulations. Maglunsod, an active member of the CPP operating inside DOLE, led the national audit and inspection of all labor force situation in big companies and industries, with the dubious participation of a known CPP legal organization, the KMU.</p>
<p>Currently, the CPP-NPA also co-opts the grievances of Marawi residents with grave concerns and frustrations over the lack of a clear and comprehensive rehabilitation plan for internally  displaced   persons, a lack of recognition and   accountability over intelligence failures on the part of the government, inability to stem the flow of terrorist groups into Marawi, an absence of any government statement or commitment to indemnify lost lives or provide compensation for damaged property, no assurance of assistance in rebuilding damaged or destroyed mosques and madrasahs, and the apparent absence of a clear government plan for lifting martial law in Mindanao.</p>
<p>The CPP&#8217;s rhetoric advances their interests to position the party at all levels of the political hierarchy—from the individual level to party-list representatives. This strategy is designed to counter the government’s initiatives on charter reform and federalism. Thus, the <a href="http://constitutionnet.org/news/dutertes-philippines-and-push-constitutional-shift-towards-federalism">CPP-NPA are wary over the potential to reform the country&#8217;s system of government</a> to a more federalist structure, as this will abolish the Party-list system, which would severely affect the entire organization. This was validated by José María Canlás Sison&#8217;s statement citing that “federalism is meant to concentrate executive, legislative, and judicial powers in the hands of Duterte.&#8221;</p>
<p>Externally, the European Union’s funding for Communist Non-Government Organizations (NGOs), along with UN Special Rapporteur for the Indigenous People (UNSRIP) and similar EU agencies, reveal that the CPP-NPA has successfully established international alliances through front organizations—purportedly to address social ills afflicting Filipino society.</p>
<p>Through its International Department, infiltrating the UN and engaging the EU through &#8220;Lakbay Lumad Europe,&#8221; to achieve the eventual revival of the People’s Permanent Tribunal, the CPP-NPA intends to humiliate the Duterte administration in international arena purposely to reinforce the initiative of delegitimizing the President on the international stage. According to CNN Philippines, the CPP-NPA is on EU&#8217;s list of terrorist organizations, yet the government&#8217;s motion to label communist rebels as terrorists is still pending before a local court.</p>
<p>Among the listed Philippine NGOs were the Alternative Learning Center for Agricultural and Livelihood Development (ALCADEV); IBON Foundation; Karapatan; Mindanao Interfaith Services Foundation, Inc.; the Rural Missionaries of the Philippines; the Salugpungan Ta&#8217;tanu Igkanugon Community Learning Center, Inc.; the Alliance of Health Workers; the Kilusang Mayo Uno; Gabriela; and ACT. Meanwhile, the ALCADEV and Salugpungan are identified as CPP-NPA alternative learning centers and schools.</p>
<p>In response, the National Security Adviser and Vice Chairman of the National Task Force to End Local Communist Armed Conflict (NTFELCAC) Hermogenes Esperon formally wrote to the <a href="https://www.pna.gov.ph/articles/1061897">European Union (EU)</a> to &#8220;immediately cease&#8221; funding to groups serving as legal fronts of the Communist Party of the Philippines-New People&#8217;s Army. In a letter to Gilles De Kerchove, EU Counter-Terrorism Coordinator, dated March 26, <a href="https://www.pna.gov.ph/articles/1066058">Esperon said EU funds</a> are being used to sustain terrorist activities of the longest-lasting existing communist terrorist organization in the world—the CPP-NPA—which is listed as a terrorist group by both the United States and the EU.</p>
<p>On March 28, 2019, the EU received a set of documents concerning the more specific allegations by the Government. As a result, the <a href="https://eeas.europa.eu/delegations/philippines/60406/press-statement-eu-delegation-philippines-regarding-alleged-funding-ngos-linked-cpp-npa_en">EU issued a Press Statement</a> stating that “since 2005 the EU considers the Communist Party of the Philippines and the New People&#8217;s Army as terrorist groups, which means, among other things, that no assets can be held in EU by these organizations.”</p>
<p>The European Union&#8217;s commitment investigate the government&#8217;s allegations that EU funds have been donated to groups acting as legal fronts of the Communist Party of the Philippines (CPP) and its armed wing New People&#8217;s Army (NPA) is clear, as outlined in the statement. In April, it was announced that an external firm would be auditing EU grants to non-government organizations (NGOs) in the Philippines that were allegedly funneled to the Communist Party of the Philippines-New People&#8217;s Army (CPP-NPA). The EU did not just commit to looking into the voluminous documents the <a href="https://www.pna.gov.ph/articles/1066058">NTF (National Task Force)</a> has submitted; it also committed to enlisting a third-party firm to audit the funds they donated to <a href="https://globalnation.inquirer.net/173959/belgium-probes-ngos-links-to-cpp-npa">NGOs reported having links with the CPP-NPA.</a></p>
<p><a href="https://globalsecurityreview.com/cpp-npa-duterte-administration-realpolitik-insurgency-terrorism/">CPP-NPA and the Duterte Administration: Realpolitik in Insurgency and Terrorism</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Defeating the Philippine&#8217;s Communist Rebellion</title>
		<link>https://globalsecurityreview.com/defeating-philippines-communist-rebellion/</link>
		
		<dc:creator><![CDATA[Jumel Gabilan Estrañero]]></dc:creator>
		<pubDate>Mon, 03 Jun 2019 22:04:52 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Philippines]]></category>
		<category><![CDATA[Southeast Asia]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?p=11595</guid>

					<description><![CDATA[<p>CPP-NPA and the Duterte Administration: Post-Activism, Insurgency, and Terrorism Five decades of insurgency and terrorism in the Philippines has presented a socio-political dilemma for both the government and the general public. From the perspective of the Communist Party of the Philippines (CPP) and its armed wing, New People’s Army (NPA), the platform espoused by the [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/defeating-philippines-communist-rebellion/">Defeating the Philippine&#8217;s Communist Rebellion</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>CPP-NPA and the Duterte Administration: Post-Activism, Insurgency, and Terrorism</h2>
<p>Five decades of insurgency and terrorism in the Philippines has presented a socio-political dilemma for both the government and the general public. From the perspective of the <a href="https://www.brookings.edu/opinions/terrorism-in-the-philippines-and-u-s-philippine-security-cooperation/">Communist Party of the Philippines (CPP)</a> and its armed wing, New People’s Army (NPA), the platform espoused by the Duterte administration&#8217;s tagline of &#8220;<i>change is</i> <em>coming</em>&#8221; has been not realized until now. The NPA&#8217;s actions of late reveal a presumption of justification of its violent struggle, as protracted infighting within its ranks draws increased attention from the authorities and society at-large.</p>
<p>The government&#8217;s over-arching strategy is to prevent communist rebels from committing atrocities and acts of violence going forward. Increased engagement on the part of the government highlights the policy guidance of President Rodrigo Duterte, amidst conflicting internal and external factors as well as joint cooperative operations (i.e., <a href="https://www.rappler.com/nation/157788-armed-forces-philippines-dssp-kapayapaan">AFP-DND’s DSSP Kapayapaan 2017</a> and an audit request to the European Union over the alleged funding of communist NGOs).</p>
<p>Even after the fiftieth anniversary of Communist Party of the Philippines (CPP) on December 26, 2018, there are two compelling and competing dilemmas in Philippine political climate that may or may not come to a head until the end of this year. The first is a continued push for charter change (CHA-CHA), vis-a-vis legal reformation, and a restructuring of the political system (i.e., Federalism). The second is finding a resolution over the insurgent and terrorist activities of the Communist Party of the Philippines (CPP) and the New People’s Army (NPA) through the resumption of peace talks.</p>
<p>The current negotiations, to date, are the longest–running peace talks since the CPP-NPA began its armed struggle. After years of guerrilla warfare, disinformation, and a strategy which is heavily influenced by <a href="https://www.manilatimes.net/false-claims-by-the-cpp-npa/509821/">communism and radical left-leaning ideology</a>, the NPA&#8217;s seemingly newfound use of terror tactics attempts to sway the minds of many to favor the group&#8217;s cause, as well as to drive recruitment to boost its numbers.</p>
<p>Between January 16 and February 1, 2017—six months after Duterte was inaugurated as president—the NPA was involved in fifteen incidents, nine of which occurred on January 30. Around the same time, talks between the <a href="https://thediplomat.com/2017/06/a-closer-look-at-the-philippine-peace-process-with-communist-rebels/">NDFP and GRP (Government of the Republic of the Philippines) proceeded in Rome</a> from January 19-25, which involved discussion of the implementation of the NDFP’s socioeconomic reform program. Though the talks were considered productive by all parties, it resulted in few concessions by either side. In particular, the GRP maintained its refusal to release 392 NDFP prisoners from custody until the issue of amnesty was fleshed out.</p>
<p>On January 30, 2017, the NPA broke a ceasefire with simultaneous assaults in Mati, Surigao Del Norte, Valencia City, Bukidnon, Pag-asa, Lebe, Sarangani, Union, Compostella Valley, San Isidro, Mahayahay, Hinambangan, Kitcharao, and Agusan Del Norte. Subsequently, on February 1, the NPA unilaterally called off its ceasefire, citing the failure of the GRP to release their political prisoners and generally abide by the terms of the ceasefire. In response, on February 3, Duterte withdrew the GRP from its ceasefire in response. In May 2017, <a href="https://www.mindanews.com/peace-process/2017/07/duterte-on-peace-talks-with-ndf-no-more-talk-let-us-fight/">President Duterte suspended peace talks</a> with the NDFP, accusing communist rebels of attacking government forces while engaging in negotiations. Months later, on November 23, 2017, President Duterte signed Proclamation No. 360 that formally terminated the talks. Eleven days later, he issued Proclamation No. 374, declaring the CPP and the NPA to be terrorist organizations.</p>
<figure id="attachment_11596" aria-describedby="caption-attachment-11596" style="width: 768px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-11596 size-full" src="http://globalsecurityreview.com/wp-content/uploads/2019/06/1551395285-e1559495939275.jpeg" alt="Joint Statement on the Successful Third Round of Formal Talks Between the GRP and NDFP in Rome, Italy 2017" width="768" height="995" srcset="https://globalsecurityreview.com/wp-content/uploads/2019/06/1551395285-e1559495939275.jpeg 768w, https://globalsecurityreview.com/wp-content/uploads/2019/06/1551395285-e1559495939275-232x300.jpeg 232w" sizes="(max-width: 768px) 100vw, 768px" /><figcaption id="caption-attachment-11596" class="wp-caption-text">Figure 1. Joint Statement on the Successful Third Round of Formal Talks Between the GRP and NDFP in Rome, Italy (2017)</figcaption></figure>
<p>To counter the Duterte administration&#8217;s moves, <a href="https://peace.gov.ph/category/news/indigenous-peoples/">CPP had a Second International Conference on the Indigenous Peoples</a> in Metro Manila (July 2018). This conference intended to portray the Filipino government as having committed human rights violations. The <a href="http://www.afp.mil.ph/index.php/8-afp-news/639-opening-statement-ip-press-conference">UN High Commission and European Union</a> acted as third-party assessors for the conference.</p>
<p>Despite its substantial experience with running counter-insurgency campaigns over fifty years, the Philippines remains plagued with insurgent groups. After launching numerous assaults based on purportedly effective methodologies and sound concepts, why is the government unable to defeat the CPP-NPA? Such questions that continue to linger in the minds of not only those in government but of the general public, as well.</p>
<h3>The CPP-NPA Theater of Power</h3>
<p>An analysis of the works of <a href="https://josemariasison.org/building-the-peoples-army-and-waging-the-peoples-war/">Jose Maria Sison (JOMA)</a>—such as the <i>Rectify Errors, Rebuild the Party! </i>(1968)<i>, Our Urgent Tasks</i> (between 1969 and 1975), and<i> Specific Characteristics of our People’s War </i>(1971)—reveals that the main difference between the new communist party founded by <a href="https://web.stanford.edu/group/mappingmilitants/cgi-bin/groups/view/149?highlight=Philippines">JOMA in 1968</a> to that of its precursor, the old communist party of the Lavas’ and Taruc is the former’s emphasis on the importance of a sound mass base. The works above also provide for the phasing and general direction of the <a href="https://www.google.com/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=1&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwj6tvK7osjiAhWOUN4KHUDdArQQFjAAegQIBhAC&amp;url=https%3A%2F%2Fjosemariasison.org%2Fwp-content%2Fuploads%2F2015%2F12%2F2015-02-Tangi.pdf&amp;usg=AOvVaw2D11tGcxpdThxKeY4TayUC">revolution</a> which calls for the adoption of stages in the development of revolution through a protracted war of encircling the cities from the countryside and by concentrating first on building a strong base and a peasant army.</p>
<figure id="attachment_11605" aria-describedby="caption-attachment-11605" style="width: 640px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="size-full wp-image-11605" src="http://globalsecurityreview.com/wp-content/uploads/2019/06/IMG_JOMA_SISON_PRRD_UNTV.jpg" alt="CPP Founder Jose Maria Sison" width="640" height="427" srcset="https://globalsecurityreview.com/wp-content/uploads/2019/06/IMG_JOMA_SISON_PRRD_UNTV.jpg 640w, https://globalsecurityreview.com/wp-content/uploads/2019/06/IMG_JOMA_SISON_PRRD_UNTV-300x200.jpg 300w" sizes="(max-width: 640px) 100vw, 640px" /><figcaption id="caption-attachment-11605" class="wp-caption-text">Figure 2. CPP Founder and NDFP Chief Political Consultant Jose Maria Sison (Source: UNTV News)</figcaption></figure>
<p>Based on the said works of JOMA, the old party pushed for the immediate overthrow of the “reactionary” government by directly confronting the military. Without a stable base to launch its offensive, the former party became vulnerable to the Armed Forces of the Philippines (AFP) counter-offensive. Learning from this mistake, the new Communist Party of the Philippines (CPP) of JOMA and its armed wing, the New Peoples Army (NPA) established Guerrilla Fronts (GFs) all throughout the Philippine archipelago to spread out the AFP and dissipate it away from the seat of national government in Metro Manila purposely to provide initiative and flexibility to the Party and the Army.</p>
<p>The <a href="https://www.philippinerevolution.info/2018/08/23/great-achievements-of-the-cpp-in-50-years-of-waging-revolution/">CPP-NPA document <i>Reaffirm Our Basic Principles and Carry the Revolution Forward!</i></a> (1991) reveals that an ideological split in the early 1990s among the CPP-NPA&#8217;s top leaders over the general direction that the revolution shall follow resulted in a divide between the “Rejectionist” (anti-Sison) <span style="background-color: #f5f6f5;">bloc </span>and the “Reaffirmist” (pro-Sison) bloc. The “Reaffirmists” accused the “Rejectionists” of leftist adventurism and rightist opportunism that undermined the revolution. The leftist adventurists departed from the protracted war concept and pushed the revolution into the urban centers, while the rightist opportunists espoused legal and parliamentary participation as the primary means of struggle relegating the armed struggle to the backdrop.</p>
<p>The document, together with other <a href="http://openanthcoop.net/press/emancipatory-politics-a-critique/chapter-5/">CPP-NPA published documents</a>, also called for the implementation of the “back to basics” program to correct deviations and repudiate in particular the <a href="https://www.philippinerevolution.info/statement/on-the-pen-and-the-gun/">strategic counter-offensive (SCO)</a> concept of the “leftist adventurists.” The SCO concept had resulted in large NPA formations decimated by the AFP. Also mentioned in the document is the assertion made by JOMA that the strength of the NPA is still in no match to the AFP. He directed to break down the NPA military formations back into platoons and squads and intensify mass works to recover the lost mass base left unchecked and regained by the AFP. JOMA pointed out that the continued decline of the party&#8217;s base would isolate both the party and army, as happened to the old CPP.</p>
<p>An analysis of the CPP-NPA documents previously mentioned as well as to other CPP-NPA Anniversary Statements published over the past two decades would disclose that the “back to basics” program of the 1990s was designed to alter the NPA development from vertical to horizontal in order to enable the NPA platoons and squads to cover a wider area and build as many GFs as possible, necessary for the survival of the Party and the Army.</p>
<p>In terms of ongoing counter-insurgency methodologies, the AFP has come up with <a href="https://www.lawphil.net/executive/execord/eo1994/eo_216_1994.html">Internal Security Operations (ISO)</a> concepts and methods to address the internal security threats. One of these is the triad concept of Civil-Military Operations (CMO), Intelligence, and Combat Operations. There has been much debate over the years as to which triad component shall prevail over the rest.</p>
<p>The <a href="http://www.interaksyon.com/breaking-news/2017/05/27/75019/5th-peace-talks-round-in-the-netherlands-trips-over-grp-conditionality/">Philippine government</a> grappled for the right solution to the country’s communist insurgency problem, while the AFP—with a mandate to conduct ISOs—initiated several campaigns to address this primary threat to the country’s internal peace and security, with little success. The ascent to the presidency by the then Senator Benigno Simeon Cojuangco Aquino III in the 2010 national election through an overwhelming victory gave hope for a speedy resolution of armed conflicts in the country.</p>
<p>The Aquino administration promoted the peace process as the centerpiece of its internal security program anchored on the overarching concept of “Unified Action,” a holistic approach which emphasizes that “the AFP will focus on the military dimension, while it will be supporting and/or assisting other government agencies in the economic and political dimensions” of insurgency (AFP Strategic Intent, p. 12). As regards to ISOs, “a grand plan in dealing with internal threats, including the non-traditional actors, had been laid out through the <a href="http://catalystforpeace.blogspot.com/">Internal Peace and Security Plan (IPSP)</a> (Ibid., p.10).” While it is indisputablee that the AFP’s success in all of the aforesaid mission areas is crucial, it cannot also be an overstatement that its success in ISO is as critical as ever, for in order to focus on other mission areas especially in Territorial Defense, the current internal threats must be addressed first and foremost.</p>
<p><a href="https://globalsecurityreview.com/defeating-philippines-communist-rebellion/">Defeating the Philippine&#8217;s Communist Rebellion</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Non-State Actors: Terrorist Groups and Insurgencies</title>
		<link>https://globalsecurityreview.com/non-state-actors-terrorist-groups-insurgencies/</link>
		
		<dc:creator><![CDATA[Joshua Ball]]></dc:creator>
		<pubDate>Wed, 06 Dec 2017 17:00:14 +0000</pubDate>
				<category><![CDATA[Defense & Security]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Saudi Arabia]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">http://globalsecurityreview.com/?post_type=forecast&#038;p=2556</guid>

					<description><![CDATA[<p>Threats from terrorist and insurgent groups will persist and are likely to become more decentralized in their nature. The terrorist threat is likely to increase as the means and the motivations of states, groups, and people to impose harm diversify. Prolonged conflicts and the info age allow terrorists to recruit and operate on a large [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/non-state-actors-terrorist-groups-insurgencies/">Non-State Actors: Terrorist Groups and Insurgencies</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Threats from terrorist and insurgent groups will persist and are likely to become more decentralized in their nature.</h2>
<p>The terrorist threat is likely to increase as the means and the motivations of states, groups, and people to impose harm diversify. Prolonged conflicts and the info age allow terrorists to recruit and operate on a large scale, demonstrating the evolving nature of the threat.</p>
<p>Terrorism kills fewer people globally than crime or disease, but the potential for new capabilities reaching the hands of people bent on apocalyptic destruction is all too real. This ultimate low-probability, high-impact event underscores the imperative of international cooperation and state attention to the issue.</p>
<p>Terrorists will continue to justify their violence by their very own interpretations of religion, but several underlying drivers are also in play. Within nations, the breakdown of state structures in much of the Middle East carries on to create space for extremists.</p>
<h3>The Sunni-Shia Divide Will Fuel Ongoing Sectarianism</h3>
<p>The ongoing proxy war between Iran and Saudi Arabia also is fueling Shia-Sunni sectarianism—with a few militant groups further fracturing over religious differences. Additionally, perceptions of &#8220;Western hegemony&#8221; remains a potent rallying cry for some groups, mobilized around striking the &#8220;far enemy.&#8221;</p>
<p>Even though the location of religiously driven terrorism will fluctuate, the rise of violent religious nationalism and the schism between Shia and Sunni are likely to worsen in the short term and may not abate by 2035.</p>
<p>A combination of ideologies such as Salafi-jihadism (like ISIL&#8217;s or al-Qaeda&#8217;s), in a region undergoing vast and rapid political change—against the backdrop of generations of autocratic government and economic disparities—create an ideological nexus where the likelihood of violence only increases. Militant Christianity and Islam in central Africa, militant Buddhism in Burma, and violent Hindutva in India will all continue to fuel terror and conflict.</p>
<p>Extremists will exploit anger and link perceived injustices with the collective identity of deepening religious affiliation in some areas of the world. Religion will become a more important source of meaning and continuity because of increasing info connectedness, the extent of state weakness in much of the developing world, and the rise of alienation due to the dislocation from traditional work in the industrialized world. Rapid change and conditions of political and economic uncertainty, if not insecurity, will encourage many individuals to embrace ideologies and identities for meaning and continuity.</p>
<p>The vast majority of believers will be peaceful, but those with extreme views will find like-minded followers and vulnerable recruits through info technology. Most world religions—including Christianity, Islam, and Judaism, Buddhism, and Hinduism—have exclusionary aspects of doctrine that may be exploited in this way.</p>
<p>Beyond religion, psychological and social factors will drive individual participation in terrorism, as well as help terrorist groups attract recruits and resources and maintain cohesion. Groups will exploit ethnic and kinship bonds, peer, social or familial networks, as well as a desire for adventure, fame, and belonging, to swell their ranks.</p>
<p>They will also exploit feelings of alienation that are spreading across the world as young people feel increasingly disconnected from the socio-cultural mainstream, that they are unable to take part from the political process, or lacking in certain economic or social advantages.</p>
<p>Advances in information technology—whether with the printing press and Gutenberg Bible in the fifteenth century or with the invention of the World Wide Web in 1989—allow religious content to spread widely, in part because religions are ideas that transcend borders and are usually more influential in daily lives than state authority.</p>
<h3>Technology may be a double-edged sword.</h3>
<p>On the one hand, it is going to facilitate communications, recruitment, logistics, and lethality. On the other hand, it is going to provide governments with strategies to identify and describe threats, if their publics let them. Technology will continue to enable non-state actors to mask their action and identity. The use of cyber tools to get down electric systems, for example, has possible mass disruption effects, a few with deadly consequences.</p>
<p>Communication technology also will be critical to non-state actors capability to recruit new members, fund operations, and disseminate messages. Advancements in technology will lower technological barriers to high impact, low likelihood terrorist WMD situations, and enable the proliferation of deadly, conventional weapons to terrorist groups.</p>
<p>Technology will further decentralize terrorist threats. Centrally controlled and hierarchical organizations like Al Qaeda could shift into widespread jihadist militancy, for example. This tendency will pose barriers to counterterrorism efforts and adjust the nature of future terrorist plots and approaches.</p>
<div class="grammarly-disable-indicator"></div>
<p><a href="https://globalsecurityreview.com/non-state-actors-terrorist-groups-insurgencies/">Non-State Actors: Terrorist Groups and Insurgencies</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
