Subscribe to our weekly newsletters for free

Subscribe to an email

If you want to subscribe to World & New World Newsletter, please enter
your e-mail

Defense & Security
flag country Europe defense army

European Union Strategic Autonomy. Necessary but potentially problematic?

by Krzysztof Śliwiński

Abstract This paper examines the evolving concept of European Union Strategic Autonomy (EU-SA) within the context of contemporary geopolitical challenges, with a particular focus on EU-Russia and EU-China relations. EU-SA reflects the EU's aspiration to act independently in foreign policy, security, defence, and economic affairs, moving from a rule-taker to a rule-maker in global politics. The study outlines the historical development of EU-SA from 2013 to the present, highlighting key milestones such as the Strategic Compass and the impact of the Ukraine War, which accelerated efforts toward defence collaboration, energy independence, and economic resilience. It explores the transatlantic dynamics, noting growing uncertainties in the U.S. commitment to NATO and the resulting push for a more autonomous European defence posture. Additionally, it addresses the complex EU-China relationship, marked by both cooperation and competition, as well as the strained EU-Russia ties amid ongoing conflict. The paper concludes by questioning the economic feasibility and political risks of deeper EU strategic autonomy, especially regarding security centralisation and Germany's leadership role. Key Words: EU, Strategic Autonomy, Security, Geopolitics, U.S, China, Russia Introduction At the 2025 North Atlantic Treaty Organisation (NATO) Summit in The Hague, member states (Allies) committed to investing 5% of their Gross Domestic Product (GDP) annually in core defence requirements and defence- and security-related spending by 2035. They will allocate at least 3.5% of GDP annually, based on the agreed-upon definition of NATO defence expenditure, by 2035 to resource core defence requirements and meet the NATO Capability Targets. Allies agreed to submit annual plans that show a credible, incremental path to achieving this goal.[1] At the same time, Spain secured a special compromise, committing to meet core requirements with just 2.1% of GDP, making it the only exception to the broader 5% target. Previously, in 2014, NATO Heads of State and Government had agreed to commit 2% of their national GDP to defence spending, to help ensure the Alliance's continued military readiness. This decision was taken in response to Russia's illegal annexation of Crimea, and amid broader instability in the Middle East. The 2014 Defence Investment Pledge was built on an earlier commitment to meeting this 2% of GDP guideline, agreed in 2006 by NATO Defence Ministers. In light of the increase in defence spending, given that 23 out of 32 NATO Allies are EU member states, the idea of European Union strategic autonomy (EU-SA) comes to mind. This paper will explore the issue of EU-SA with a specific reference to EU-Russia and EU-China relations.[2] A Brief History of EU Strategic Autonomy European Union strategic autonomy is an evolving concept that reflects its ambition to act independently in strategically important policy areas, including foreign policy, security, defence, and economic relations. Strong strategic autonomy, according to Barbara Lippert, Nicolai von Ondarza and Volker Perthes, means being able to set, modify and enforce international rules, as opposed to (unwillingly) obeying rules set by others. The opposite of strategic autonomy is being a rule-taker, subject to strategic decisions made by others, such as the United States, China, or Russia.[3] The concept was first prominently discussed in the context of defence in 2013 and has since expanded to encompass a broader range of policy areas. Historically speaking, one can identify numerous phases during which EU-SA evolved. - 2013-2016: During this period, EU-SA focused on security and defence, with initiatives like the Permanent Structured Cooperation (PESCO) and the European Defence Fund, aiming to strengthen the EU's defence capabilities.[4]  - 2017-2019: During this period, the EU-SA shifted its focus to defending European interests in a hostile geopolitical environment, influenced by events such as Brexit, the Trump presidency, and China's growing assertiveness.- 2020: The COVID-19 pandemic highlighted economic vulnerabilities, prompting a focus on mitigating dependence on foreign supply chains, particularly in critical sectors like health and technology.- Since 2021: The scope widened to virtually all EU policy areas, including digital, energy, and values, with terminology evolving to include "open strategic autonomy," "strategic sovereignty," "capacity to act," and "resilience".- 2022: The Ukraine War and Accelerated Implementation. Russia's invasion of Ukraine catalysed concrete actions toward EU-SA, notably in defence, energy independence, and economic resilience. The European Council's Versailles Declaration (March 2022) expressed strong political will to increase EU-SA, calling for collaborative investments in defence, phasing out dependency on Russian energy, and reducing reliance on critical raw materials, semiconductors, health, digital technologies, and food imports.[5] - The Strategic Compass for security and defence policy (endorsed March 2022) outlines a roadmap to 2030, emphasising strengthened EU defence capacities. Among others, it includes: o   Establishment of a strong EU Rapid Deployment Capacity of up to 5000 troops for different types of crises.o   Ready to deploy 200 fully equipped Common Security and Defence Policy (CSDP) mission experts within 30 days, including in complex environments.[6]o   Conducting regular live exercises on land and at sea.o   Enhanced military mobility.o   Reinforcement of the EU's civilian and military CSDP missions and operations by promoting a rapid and more flexible decision-making process, acting more robustly and ensuring greater financial solidarity.o   Making full use of the European Peace Facility to support partners.[7] According to the EU itself, the EU-SA is not a zero-sum game, but rather a sliding scale between complete autonomy and full dependency, with different results for different policy areas. What is more, when compared to the famous Maslow's hierarchy of needs (European Parliament briefing's language), the EU is not only perceived as an economic power, but it is also seen as a normative power. Therefore, the EU is recognised for its core values of democracy, human rights and the rule of law. Ultimately, Maslow's “self-actualisation” could mean the achievement of an EU in which citizens recognise their European identity and which has realised its full autonomous policy potential.[8]   As if this is not enough, the same source introduces the concept of the 360° strategic autonomy wheel, which reportedly illustrates policy areas in which the EU aims for greater strategic autonomy, as well as the connections between them. Mutual influence between policy areas can happen across the wheel, but is particularly strong in adjacent areas. Military action, for example, can cause migration, health is linked to food quality, energy policy influences the climate, and misinformation undermines democracy. The wheel can help to understand links, set priorities and view potential conflicts. More autonomy in the digital green economy will, for example, require vast quantities of “rare earth” materials, making the EU more (instead of less) dependent on imports. Reductions in energy consumption achieved through the digitalisation of the economy (for example, by reducing transport) will be partly offset by the increase in energy consumption by electronic devices and data centres.   Global Context The significance of EU-SA lies in ensuring the EU's political survival and global influence in a multipolar world where its relative power is diminishing. The EU's long-term economic outlook is bleak: its share of global GDP, now at 17% (at current prices), could nearly halve by 2050. According to the World Economic Forum, this economic backsliding not only threatens Europe's ability to fund its social model but also risks weighing on the bloc's global influence, leaving it even more dependent on the U.S. and China.[9] Moreover, the COVID-19 pandemic highlighted the conflictual nature of economic interdependence, as reliance on foreign supply chains for critical goods exposed vulnerabilities. Soft power has become an instrument of hard power, necessitating autonomy in trade, finance, and investment.  The U.S.'s strategic pivot to Asia, the exclusion of Europe in conflicts like Nagorno-Karabakh, Libya, and Syria (termed Astanisation[10], which favours Russia and Turkey), the sidelining of the EU in EU-Russia negotiations regarding the war in Ukraine, and China's state-led economic model have all pushed the EU towards the sidelines. Transatlantic divide Security is a critical dimension, with significant uncertainty surrounding the U.S. commitment to NATO under the Trump administration. Reports indicate Trump has questioned NATO's Article 5 guarantees, with actions like withdrawing military personnel from a Ukraine aid hub in Poland on April 8, 2025, and proposing to stand down 10,000 light infantry troops in Poland, Romania, and the Baltic states by 2025.[11] This has led to fears of a "NATO-minus" scenario, where the EU must fill security gaps without full U.S. backing. In response, the EU is pushing for greater strategic autonomy in defence. Initiatives like ReArm EU are mentioned, with calls for the EU to develop a stand-alone, integrated military capacity to stabilise the global economy. As Jean-Pierre Maulny, Deputy Director of the French Institute for International and Strategic Affairs (IRIS), adequately observes "The risk is now clear: a form of bilateral agreement between the United States and Russia, benefiting the interests of both countries, could leave Ukraine severely weakened and an easy prey for Moscow, thereby weakening other European countries consequently. As a consolation prize, we will have to ensure Europe's conventional security, as U.S. Secretary of Defence Pete Hegseth announced to Europeans at the opening of the NATO ministerial meeting held in Brussels on 12–13 February 2025. This situation will place Europeans in a terrible dilemma: Either they do not wish to provide security guarantees to Ukraine and risk completely discrediting themselves in the eyes of powers such as the United States, Russia, and China, as Europeans will have demonstrated that they are unable to defend the continent, while also creating a significant long-term risk to Europe's security. Alternatively, they could provide security guarantees to Ukraine, accepting the financial burden that would impact the European Union's long-term competitiveness. In light of this situation, some advocate for the establishment of a European pillar within NATO. If one considers that the United States is negotiating peace in Europe without and against the Europeans, and that they no longer wish to defend Europe with conventional military means (will they respect the NATO Defence Planning Process?), Europeans should take on Europe's security fully. This would mean taking control of NATO. It will also be easier to make NATO and the European Union work together with a more Europeanised organisation".[12] Economically, there are several issues that contemporary demand addresses, but the most pressing is, of course, the Tariffs. The U.S. and European Union are running out of time to strike a deal on trade tariffs. Negotiations have been slow since both the U.S. and EU temporarily cut duties on each other until July 9. If an agreement is not achieved by then, full reciprocal import tariffs of 50% on EU goods, and the bloc's wide-spanning countermeasures are set to come into effect.[13] According to Almut Möller, Director for European and Global Affairs and head of the Europe in the World programme (European Policy Centre), "for the first time in decades, Europeans can no longer rely on a benign partner on the other side of the Atlantic, leaving them dangerously exposed and acutely vulnerable, including on the very foundations of liberal democracy. Until recently, the U.S. dominated a world order that provided a favourable environment for the EU to extend its membership, further develop, and leverage its strengths, particularly as a trading power, without having to worry much about geopolitics. Suddenly, liberal Europe looks very lonely, and is struggling to keep up with a world of change".[14] Other problems arguably include digital regulation and data protection, antitrust policy and digital taxation, fiscal policy and social protection, geopolitical rivalries, China's rise, and competition and trade policy. EU–China conundrum Both the EU and the U.S. are concerned about China's growing economic and technological influence, but they have differing approaches to addressing this challenge. The EU has sought to maintain a balance between cooperation and competition with China, while the U.S. has adopted a more confrontational approach.[15] These differences have led to tensions in areas such as trade policy and technology regulation. For example, the EU has been critical of the U.S.'s unilateral approach to addressing China's trade practices, while the U.S. has accused the EU of being too lenient towards China. These disagreements have made it difficult to achieve a coordinated transatlantic response to China's rise.[16] According to German experts, the balance of power between China and the EU and its member states is developing increasingly asymmetrically to Europe's disadvantage. Only in trade policy – and partially in investment – can the EU maintain its position in a manner respected by China.[17] Europe holds significant importance for China across various dimensions: economically, as its top supplier and second-largest export destination; technologically, as a source of advanced technology; institutionally, as a model to emulate; politically, to advance its objectives concerning other nations, particularly the United States; and selectively, as a collaborator in areas like global health and regional stabilisation. Unlike Russia and the United States, China perceives a vital interest in the EU's continued existence and unity within a multipolar world; yet, it employs a "divide and rule" strategy. China selectively rewards or penalises individual EU countries based on their political and economic significance and their compliance with China's expectations on key issues. These issues include arms sales to Taiwan, meetings with the Tibetan Dalai Lama, and positions on the Uighurs, human rights in China, and the South China Sea. China engages with Europe on multiple levels — political, economic, technological, cultural, and academic — using various political channels (such as strategic partnerships with the EU and individual EU member states), dialogue formats (like the 16+1 format with sixteen Central and Eastern European countries), and high-level bilateral intergovernmental consultations with Germany, France, and the United Kingdom. China's hopes that the European Union would emerge as an independent and comprehensive player in global politics, serving as a counterbalance to the United States, have diminished. However, China would be supportive of any European efforts towards achieving strategic autonomy, provided it does not translate into a confrontational approach towards China itself. In contrast, Europe's political priorities—such as ensuring peace and stability in East Asia, China's role in global stability, development, environmental issues, climate change, and non-proliferation, as well as improving human rights in China — are often considered secondary and are not actively pursued by all EU member states. Europe lacks a unified and assertive foreign policy stance regarding the geopolitical rivalry between the United States and China for dominance in the Asia-Pacific region. There is also an absence of a clear position on China's authoritarian vision of order. Even in trade and investment disputes, Europe struggles to establish a unified approach to resolving these issues. The EU member states are too diverse in terms of size, profiles, and interests in their dealings with China: Economically, there is a divide between countries that are appealing industrial and technological partners for China and those that compete for favour in Beijing. Some nations have a clear interest in global governance. Additionally, the United Kingdom and France maintain their respective military presences in the Asia region. In this context, ReArm EU and its financial instrument SAFE (analysed here https://worldnewworld.com/page/content.php?no=5384 ) have the potential to provide the EU with meaningful strategic autonomy and invite genuine geopolitical actorness. EU–Russia conundrum Since Donald Trump took office as the U.S. president, the coordination of transatlantic policies regarding Russia has largely disintegrated. The White House's openness to a comprehensive "deal" with Russian President Vladimir Putin contrasts with Congress's attempts to limit Trump's foreign policy options with Russia, resulting in the marginalisation of coordination with European allies. This situation is further complicated by Washington's increasing reliance on extraterritorial sanctions, a trend that began before Trump's presidency. Consequently, according to European foreign and security experts, Europe must achieve greater strategic autonomy in its dealings with Russia. However, this relationship is particularly strained by significant conflicts of interest. Russia's invasion of Ukraine significantly disrupted the previously peaceful and liberal democratic relations among European nations. Putin's "special military operation" compelled the EU to introduce seventeen (so far) escalating economic sanction packages aimed at undermining the Russian economy and ultimately limiting Russia's capacity to continue the war. In a gesture of solidarity with Ukraine, the EU has also allocated billions of euros to both EU member states and Ukraine to avert a humanitarian disaster and ensure the provision of essential needs for Ukrainians fleeing the conflict.[18] After three and a half years from the outset of the war, Russia continues to pose a complex challenge that the EU and European nations cannot address independently in the foreseeable future. If the U.S. security guarantee weakens before Europe can bolster its own capabilities, the EU could face new vulnerabilities that Russia might exploit along its external borders, such as in the Baltic states, and elsewhere. Currently, the EU and its member states lack sufficient means to deter Russia from pursuing its interests aggressively and recklessly in the shared neighbourhood.[19] Critics, on the other hand, argue that calls for EU strategic autonomy, particularly the creation of a European Army and a significant increase in military spending, are a double-edged sword. First, the primary official rationale is that the EU must prepare itself for a possible attack on EU member states by Russia. The legacy media are full of European leaders claiming that Russia will sooner or later attack Europe.[20] Yet, this claim is not substantiated with much evidence. The proponents of the European army completely disregard numerous doubts surrounding the 2013/2014 "Euromaidan" and the role of the CIA in the events.[21] Second, according to the Office of the High Commissioner for Human Rights (OHCHR) 's estimations, the total number of conflict-related casualties in Ukraine from April 14, 2014, to December 31, 2021, stood at 51,000 – 54,000. These numbers are broken down as follows: 14,200 - 14,400 killed (at least 3,404 civilians, estimated 4,400 Ukrainian forces, and estimated 6,500 members of armed groups), and 37,000 - 39,000 injured (7,000 – 9,000 civilians, 13,800 – 14,200 Ukrainian forces and 15,800 - 16,200 members of armed groups).[22] In short, the situation was chaotic, with many casualties among civilians. Third, it was allegedly Europeans who torpedoed a first chance of peace negotiations as early as April 2014 in Istanbul.[23] Fourth, many European leaders seem to be utterly oblivious to the fact that the prolongation of the war adds to the destruction of Ukraine and Ukrainian society, deaths and emigration. Last but not least, given the fact that it is Germany that calls for both the European Army and the federalisation of Europe (with some assistance from France), one should be extra careful given the role of Germans during the WWII and the fact that neither has there been any official peace treaty with Germany nor have they recompensated countries such as Poland. Conclusion Strategic autonomy may be a necessity for Europe, given the dynamics of transatlantic relationships. The questions, however, that have to be pondered (and it does not seem that anyone in the legacy media or mainstream academia is ready to ask them) are numerous. Who will pay for that? Can Europeans afford such expenses under the current economic circumstances, and even worse economic prospects? Is the centralisation of security and military a Pandora's box? Should Europeans allow Germany (of all EU member states) to take special responsibility for this project? Isn't the pro-war rhetoric of Western political leaders making relations with Russia even more tense and dangerous, in other words, leading to escalation? History has solemnly proven that when left to their own devices, the Europeans inevitably create disastrous conflicts that have lasting consequences for generations. The American pivot to Asia and the consequent withdrawal from Europe may therefore have tragic ramifications for the European continent. References[1] Defence expenditures and NATO’s 5% commitment. (2025, June 27). North Atlantic Treaty Organization. https://www.nato.int/cps/en/natohq/topics_49198.htm[2] NATO and the EU have 23 members in common: Belgium, Bulgaria, Croatia, Czechia, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Italy, Latvia, Lithuania, Luxembourg, the Netherlands, Poland, Portugal, Romania, Slovakia, Slovenia, Spain and Sweden. See more at: https://www.consilium.europa.eu/en/policies/eu-nato-cooperation/#0[3] Lippert, B., von Ondarza, N., & Perthes, V. (2019, March). European Strategic Autonomy. Actors, Issues, Conflicts of Interests. Stiftung Wissenschaft Un Politic. Deutches Institut für Politik Und Sicherheit. https://www.swp-berlin.org/ doi:10.18449/2019RP04/#hd-d14204e263[4] Damen, M. (2022, July). EU strategic autonomy 2013-2023: From concept to capacity (EU Strategic Autonomy Monitor). European Parliamentary Research Service. https://www.eprs.ep.parl.union.eu[5] Informal meeting of the Heads of State or Government Versailles Declaration. (2022, March 10–11). Stiftung Wissenschaft Un Politic. Deutches Institut Fur Politik Und Sicherheit. https://www.consilium.europa.eu/media/54773/20220311-versailles-declaration-en.pdf[6] See more at: https://www.eeas.europa.eu/eeas/csdp-structure-instruments-and-agencies_en[7] See more at: https://fpi.ec.europa.eu/what-we-do/european-peace-facility_en[8] Damen, M. (2022, July). EU strategic autonomy 2013-2023: From concept to capacity (EU Strategic Autonomy Monitor). European Parliamentary Research Service. https://www.eprs.ep.parl.union.eu[9] Open but Secure:  Europe’s Path to Strategic Interdependence. INSIGHT REPORT. (2025). World Economic Forum. https://reports.weforum.org/docs/WEF_Open_but_Secure_Europe%E2%80%99s_Path_to_Strategic_Interdependence_2025.pdf[10] In reference to the Astana format on Syria) which leads to the exclusion of Europe from the settlement of regional conflicts in favour of Russia and Turkey. See more: https://www.eeas.europa.eu/eeas/why-european-strategic-autonomy-matters_en[11] Tilles, D. (2025, April 8). US to withdraw military from Ukraine aid hub in Poland. Notes from Poland. https://notesfrompoland.com/2025/04/08/us-to-withdraw-military-from-ukraine-aid-hub-in-poland/[12] Maulny, J.-P. (2025, February 13). United States – Europe: Our Paths Are Splitting. The French Institute for International and Strategic Affairs (IRIS). https://www.iris-france.org/en/united-states-europe-our-paths-are-splitting/[13] Kiderlin, S. (2025, June 18). These are the sticking points holding up a U.S.-EU trade deal. CNBC. https://www.cnbc.com/2025/06/18/these-are-the-sticking-points-holding-up-a-us-eu-trade-deal.html#:~:text=The%20EU%20and%20US%20flags,Poland%20on%20March%206%2C%202025.&text=Afp%20%7C%20Getty%20Images-,The%20U.S.%20and%20European%20Union%20are%20running%20out%20of%20time,($1.93%20trillion)%20in%202024?[14] Möller, A. (2025, February 26). Europe in the World in 2025: Navigating a perilous world with realism and ambition. European Policy Centre. https://www.epc.eu/publication/Europe-in-the-World-in-2025-Navigating-a-perilous-world-with-realism-625da4/#:~:text=2025%20will%20be%20a%20year,with%20a%20world%20of%20change[15] Bradford, A. (2023). When Rights, Markets, and Security Collide (pp. 221–254). Oxford University Press. https://doi.org/10.1093/oso/9780197649268.003.0007[16] Portanskiy, A. (2023). UE - US: new barriers to trade. Современная Европа. https://doi.org/10.31857/s020170832304006x[17] Lippert, B., von Ondarza, N., & Perthes, V. (2019, March). European Strategic Autonomy. Actors, Issues, Conflicts of Interests. Stiftung Wissenschaft Un Politic. Deutches Institut für Politik Und Sicherheit. https://www.swp-berlin.org/ doi:10.18449/2019RP04/#hd-d14204e263 [18] Klüver, L. (2025, April 18). Putin’s War on Ukraine: What can the EU actually do? European Careers Association. https://ecamaastricht.org/blueandyellow-knowyourunion/putins-war-on-ukraine-what-can-the-eu-actually-do#:~:text=Similarly%2C%20the%20Strategic%20Compass%2C%20the%20most%20recent,its%20interests%20and%20promote%20its%20values%20internationally.[19] Lippert, B., von Ondarza, N., & Perthes, V. (2019, March). European Strategic Autonomy. Actors, Issues, Conflicts of Interests. Stiftung Wissenschaft Un Politic. Deutches Institut für Politik Und Sicherheit. https://www.swp-berlin.org/ doi:10.18449/2019RP04/#hd-d14204e263 [20] ochecová, K. (2025, February 11). Russia could start a major war in Europe within 5 years, Danish intelligence warns. Politico. https://www.politico.eu/article/russia-war-threat-europe-within-5-years-danish-intelligence-ddis-warns/[21] Katchanovski, I. (2024). The Maidan Massacre in Ukraine The Mass Killing that Changed the World. Palgrave Macmillan. https://doi.org/https://doi.org/10.1007/978-3-031-67121-0[22] Office of the United Nations High Commissioner for Human Rights. (2022, January 27). Conflict-related civilian casualties in Ukraine: December 2021 update. United Nations Human Rights Monitoring Mission in Ukraine. https://ohchr.org[23] Johnson, J. (2022, May 6). Boris Johnson Pressured Zelenskyy to Ditch Peace Talks With Russia: Ukrainian Paper. Common Dreams. https://www.commondreams.org/news/2022/05/06/boris-johnson-pressured-zelenskyy-ditch-peace-talks-russia-ukrainian-paper

Energy & Economics
Commodity and alternative asset, gold bar and crypto currency Bitcoin on rising price graph as financial crisis or war safe haven, investment asset or wealth concept.

Assessing Bitcoin and Gold as Safe Havens Amid Global Uncertainties: A Rolling Window DCC-GARCH Analysis

by Anoop S Kumar , Meera Mohan , P. S. Niveditha

Abstract We examine the roles of Gold and Bitcoin as a hedge, a safe haven, and a diversifier against the coronavirus disease 2019 (COVID-19) pandemic and the Ukraine War. Using a rolling window estimation of the dynamic conditional correlation (DCC)-based regression, we present a novel approach to examine the time-varying safe haven, hedge, and diversifier properties of Gold and Bitcoin for equities portfolios. This article uses daily returns of Gold, Bitcoin, S&P500, CAC 40, and NSE 50 from January 3, 2018, to October 15, 2022. Our results show that Gold is a better safe haven than the two, while Bitcoin exhibits weak properties as safe haven. Bitcoin can, however, be used as a diversifier and hedge. This study offers policy suggestions to investors to diversify their holdings during uncertain times. Introduction Financial markets and the diversity of financial products have risen in both volume and value, creating financial risk and establishing the demand for a safe haven for investors. The global financial markets have faced several blows in recent years. From the Global Financial Crisis (GFC) to the outbreak of the pandemic and uncertainty regarding economic policy measures of governments and central banks, the financial markets including equity markets around the world were faced with severe meltdowns. This similar behavior was observed in other markets including equity and commodity markets, resulting in overall uncertainty. In this scenario, the investors normally flock toward the safe-haven assets to protect their investment. In normal situations, investors seek to diversify or hedge their assets to protect their portfolios. However, the financial markets are negatively impacted when there are global uncertainties. Diversification and hedging methods fail to safeguard investors’ portfolios during instability because almost all sectors and assets are negatively affected (Hasan et al., 2021). As a result, investors typically look for safe-haven investments to safeguard their portfolios under extreme conditions (Ceylan, 2022). Baur and Lucey (2010) provide the following definitions of hedge, diversifier, and safe haven: Hedge: An asset that, on average, has no correlation or a negative correlation with another asset or portfolio. On average, a strict hedge has a (strictly) negative correlation with another asset or portfolio.Diversifier: An asset that, on average, has a positive correlation (but not perfect correlation) with another asset or portfolio. Safe haven: This is the asset that in times of market stress or volatility becomes uncorrelated or negatively associated with other assets or a portfolio. As was previously indicated, the significant market turbulence caused by a sharp decline in consumer spending, coupled with insufficient hedging opportunities, was a common feature of all markets during these times (Yousaf et al., 2022). Nakamoto (2008) suggested a remedy by introducing Bitcoin, a “digital currency,” as an alternative to traditional fiduciary currencies (Paule-Vianez et al., 2020). Bitcoin often described as “Digital Gold” has shown greater resilience during periods of crises and has highlighted the potential safe haven and hedging property against uncertainties (Mokni, 2021). According to Dyhrberg (2016), the GFC has eased the emergence of Bitcoin thereby strengthening its popularity. Bouri et al. (2017) in their study indicate that Bitcoin has been viewed as a shelter from global uncertainties caused by conventional banking and economic systems. Recent research has found that Bitcoin is a weak safe haven, particularly in periods of market uncertainty like the coronavirus disease 2019 (COVID-19) crisis (Conlon & McGee, 2020; Nagy & Benedek, 2021; Shahzad et al., 2019; Syuhada et al., 2022). In contrast to these findings, a study by Yan et al. (2022) indicates that it can function as a strong safe haven in favorable economic times and with low-risk aversion. Ustaoglu (2022) also supports the strong safe-haven characteristic of Bitcoin against most emerging stock market indices during the COVID-19 period. Umar et al. (2023) assert that Bitcoin and Gold are not reliable safe-havens. Singh et al. (2024) in their study reveal that Bitcoin is an effective hedge for investments in Nifty-50, Sensex, GBP–INR, and JPY–INR, at the same time a good diversifier for Gold. The study suggests that investors can incorporate Bitcoin in their portfolios as a good hedge against market volatility in equities and commodities markets. During the COVID-19 epidemic, Barbu et al. (2022) investigated if Ethereum and Bitcoin could serve as a short-term safe haven or diversifier against stock indices and bonds. The outcomes are consistent with the research conducted by Snene Manzli et al. (2024). Both act as hybrid roles for stock market returns, diversifiers for sustainable stock market indices, and safe havens for bond markets. Notably, Bhuiyan et al. (2023) found that Bitcoin provides relatively better diversification opportunities than Gold during times of crisis. To reduce risks, Bitcoin has demonstrated a strong potential to operate as a buffer against global uncertainty and may be a useful hedging tool in addition to Gold and similar assets (Baur & Lucey, 2010; Bouri et al., 2017; Capie et al., 2005; Dyhrberg, 2015). According to Huang et al. (2021), its independence from monetary policies and minimal association with conventional financial assets allow it to have a safe-haven quality. Bitcoins have a substantial speed advantage over other assets since they are traded at high and constant frequencies with no days when trading is closed (Selmi et al., 2018). Additionally, it has been demonstrated that the average monthly volatility of Bitcoin is higher than that of Gold or a group of international currencies expressed in US dollars; nevertheless, the lowest monthly volatility of Bitcoin is lower than the maximum monthly volatility of Gold and other foreign currencies (Dwyer, 2015). Leverage effects are also evident in Bitcoin returns, which show lower volatilities in high return periods and higher volatilities in low return times (Bouri et al., 2017; Liu et al., 2017). According to recent research, Bitcoins can be used to hedge S&P 500 stocks, which increases the likelihood that institutional and retail investors will build secure portfolios (Okorie, 2020). Bitcoin demonstrates strong hedging capabilities and can complement Gold in minimizing specific market risks (Baur & Lucey, 2010). Its high-frequency and continuous trading further enrich the range of available hedging tools (Dyhrberg, 2016). Moreover, Bitcoin spot and futures markets exhibit similarities to traditional financial markets. In the post-COVID-19 period, Zhang et al. (2021) found that Bitcoin futures outperform Gold futures.Gold, silver, palladium, and platinum were among the most common precious metals utilized as safe-haven investments. Gold is one such asset that is used extensively (Salisu et al., 2021). Their study tested the safe-haven property of Gold against the downside risk of portfolios during the pandemic. Empirical results have also shown that Gold functions as a safe haven for only 15 trading days, meaning that holding Gold for longer than this period would result in losses to investors. This explains why investors buy Gold on days of negative returns and sell it when market prospects turn positive and volatility decreases (Baur & Lucey, 2010). In their study, Kumar et al. (2023) tried to analyse the trends in volume throughout futures contracts and investigate the connection between open interest, volume, and price for bullion and base metal futures in India. Liu et al. (2016) in their study found that there is no negative association between Gold and the US stock market during times of extremely low or high volatility. Because of this, it is not a strong safe haven for the US stock market (Hood & Malik, 2013). Post-COVID-19, studies have provided mixed evidence on the safe-haven properties of Gold (Bouri et al., 2020; Cheema et al., 2022; Ji et al., 2020). According to Kumar and Padakandla (2022), Gold continuously demonstrates safe-haven qualities for all markets, except the NSE, both in the short and long term. During the COVID-19 episode, Gold’s effectiveness as a hedge and safe-haven instrument has been impacted (Akhtaruzzaman et al., 2021). Al-Nassar (2024) conducted a study on the hedge effectiveness of Gold and found that it is a strong hedge in the long run. Bhattacharjee et al. (2023) in their paper examined the symmetrical and asymmetrical linkage between Gold price levels and the Indian stock market returns by employing linear autoregressive distributed lag and nonlinear autoregressive distributed lag models. The results exhibit that the Indian stock market returns and Gold prices are cointegrated. According to the most recent study by Kaczmarek et al. (2022), Gold has no potential as a safe haven, despite some studies on the COVID-19 pandemic showing contradictory results. The co-movements of Bitcoin and the Chinese stock market have also normalized as a result of this epidemic (Belhassine & Karamti, 2021). Widjaja and Havidz (2023) verified that Gold was a safe haven asset during the COVID-19 pandemic, confirming the Gold’s safe-haven characteristic. As previously pointed out, investors value safe-haven investments in times of risk. Investors panic at these times when asset prices fall and move from less liquid (risky) securities to more liquid (safe) ones, such as cash, Gold, and government bonds. An asset must be bought and sold rapidly, at a known price, and for a reasonably modest cost to be considered truly safe (Smales, 2019). Therefore, we need to properly re-examine the safe-haven qualities of Gold and Bitcoin due to the mixed evidences regarding their safe-haven qualities and the impact of COVID-19 and the war in Ukraine on financial markets. This work contributes to and deviates from the body of existing literature in the following ways. We propose a novel approach in this work to evaluate an asset’s time-varying safe haven, hedge, and diversifier characteristics. This research examines the safe haven, hedging, and diversifying qualities of Gold and Bitcoin against the equity indices; S&P 500, CAC 40, and NSE 50. Through the use of rolling window estimation, we extend the methodology of Ratner and Chiu (2013) by estimating the aforementioned properties of the assets. Comparing rolling window estimation to other conventional techniques, the former will provide a more accurate representation of an asset’s time-varying feature. This study explores the conventional asset Gold’s time-varying safe haven, hedging, and diversifying qualities during crises like the COVID-19 pandemic and the conflict in Ukraine. We use Bitcoin, an unconventional safe-haven asset, for comparison. Data and Methodology We use the daily returns of three major equity indices; S&P500, CAC 40, and NSE 50 from January 3, 2018, to October 15, 2022. The equity indices were selected to represent three large and diverse markets namely the United States, France, and India in terms of geography and economic development. We assess safe-haven assets using the daily returns of Gold and Bitcoin over the same time. Equity data was collected from Yahoo Finance, Bitcoin data from coinmarketcap.com, and Gold data from the World Gold Council website. Engle (2002) developed the DCC (Dynamic Conditional Correlation)-GARCH model, which is frequently used to assess contagion amid pandemic uncertainty or crises. Time-varying variations in the conditional correlation of asset pairings can be captured using the DCC-GARCH model. Through employing this model, we can analyse the dynamic behavior of volatility spillovers. Engle’s (2002) DCC-GARCH model contains two phases; 1. Univariate GARCH model estimation2. Estimation of time-varying conditional correlation. For its explanation, mathematical characteristics, and theoretical development, see here [insert the next link in “the word here” https://journals.sagepub.com/doi/10.1177/09711023251322578] Results and Discussion The outcomes of the parameters under the DCC-GARCH model for each of the asset pairs selected for the investigation are shown in Table 1.   First, we look at the dynamical conditional correlation coefficient, ρ.The rho value is negative and insignificant for NSE 50/Gold, NSE 50 /BTC, S&P500/Gold, and S&P500/BTC indicating a negative and insignificant correlation between these asset pairs, showing Gold and Bitcoin as potential hedges and safe havens. The fact that ρ is negative and significant for CAC 40/Gold suggests that Gold can be a safe haven against CAC 40 swings. The asset pair CAC/BTC, on the other hand, has possible diversifier behavior with ρ being positive but statistically insignificant. Next, we examine the behavior of the DCC-GARCH parameters; α and β. We find that αDCC is statistically insignificant for all the asset pairs, while βDCC is statistically significant for all asset pairs. βDCC quantifies the persistence feature of the correlation and the extent of the impact of volatility spillover in a particular market’s volatility dynamics. A higher βDCC value implies that a major part of the volatility dynamics can be explained by the respective market’s own past volatility. For instance, the NSE 50/Gold’s βDCC value of 0.971 shows that there is a high degree of volatility spillover between these two assets, with about 97% of market volatility being explained by the assets’ own historical values and the remainder coming from spillover. Thus, we see that the volatility spillover is highly persistent (~0.8) for all the asset pairs except NSE 50/BTC. The results above show that the nature of the dynamic correlation between the stock markets, Bitcoin and Gold is largely negative, pointing toward the possibility of Gold and Bitcoin being hedge/safe haven. However, a detailed analysis is needed to confirm the same by employing rolling window analysis, and we present the results in the forthcoming section. We present the rolling window results for S&P500 first. We present the regression results for Gold in Figure 1 and Bitcoin in Figure 2   Figure 1. Rolling Window Regression Results for S&P500 and Gold.Note: Areas shaded under factor 1 represent significant regression coefficients. In Figure 1, we examine the behavior of β0 (intercept term), β1, β2, and β3 (partial correlation coefficients). The intercept term β0 will give an idea about whether the asset is behaving as a diversifier or hedge. Here, the intercept term shows significance most of the time. However, during 2018, the intercept was negative and significant, showing that it could serve as a hedge during geopolitical tensions and volatilities in the global stock market. However, during the early stages of COVID-19, we show that the intercept is negative and showing statistical significance, suggesting that Gold could serve as a hedge during the initial shocks of the pandemic. These findings are contrary to the results in the study by Tarchella et al. (2024) where they found hold as a good diversifier. Later, we find the intercept to be positive and significant, indicating that Gold could act as a potential diversifier. But during the Russia-Ukraine War, Gold exhibited hedge ability again. Looking into the behavior of β1, which is the partial correlation coefficient for the tenth percentile of return distribution shows negative and insignificant during 2018. Later, it was again negative and significant during the initial phases of COVID-19, and then negative in the aftermath, indicating that Gold could act as a weak safe haven during the COVID-19 pandemic. Gold could serve as a strong safe haven for the SP500 against volatility in the markets brought on by the war in Ukraine, as we see the coefficient to be negative and large during this time. From β2 and β3, the partial correlation coefficients of the fifth and first percentile, respectively, show that Gold possesses weak safe haven properties during COVID-19 and strong safe haven behavior during the Ukraine crisis. Next, we examine the characteristics of Bitcoin as a hedge/diversifier/safe haven against the S&P500 returns. We present the results in Figure 2.   Figure 2. Rolling Window Regression Results for S&P500 and Bitcoin.Note: Areas shaded under factor 1 represent significant regression coefficients. Like in the previous case, we begin by analysing the behavior of the intercept coefficient, which is β0. As mentioned earlier the intercept term will give a clear picture of the asset’s hedging and diversifier property. In the period 2018–2019, the intercept term is positive but insignificant. This could be due to the large volatility in Bitcoin price movements during the period. It continues to be minimal (but positive) and insignificant during 2019–2020, indicating toward weak diversification possibility. Post-COVID-19 period, the coefficient shows the significance and positive value, displaying the diversification potential. We see that the coefficient remains positive throughout the analysis, confirming Bitcoin’s potential as a diversifier. Looking into the behavior of β1 (the partial correlation coefficient at tenth percentile), it is positive but insignificant during 2018. The coefficient is having negative sign and showing statistical significance in 2019, suggesting that Bitcoin could be a good safe haven in that year. This year was characterized by a long list of corporate scandals, uncertainties around Brexit, and tensions in global trade. We can observe that throughout the COVID-19 period, the coefficient is showing negative sign and negligible during the March 2020 market meltdown, suggesting inadequate safe-haven qualities. However, Bitcoin will regain its safe-haven property in the coming periods, as the coefficient is negative and significant in the coming months. The coefficient is negative and shows statistical significance during the Ukrainian crisis, suggesting strong safe-haven property. Only during the Ukrainian crisis could Bitcoin serve as a safe haven, according to the behavior of β2, which displays the partial correlation coefficient at the fifth percentile. Bitcoin was a weak safe haven during COVID-19 and the Ukrainian crisis, according to β3, the partial correlation coefficient for the first percentile (coefficient negative and insignificant). According to the overall findings, Gold is a stronger safe haven against the S&P 500’s swings. This result is consistent with the previous studies of Triki and Maatoug (2021), Shakil et al. (2018), Będowska-Sójka and Kliber (2021), Drake (2022), and Ghazali et al. (2020), etc. The same analysis was conducted for the CAC 40 and the NSE 50; the full analysis can be found here [insert the next link in “the word here” https://journals.sagepub.com/doi/10.1177/09711023251322578]. However, it is important to highlight the respective results: In general, we may say that Gold has weak safe-haven properties considering CAC40. We can conclude that Bitcoin’s safe-haven qualities for CAC40 are weak. We can say that Gold showed weak safe-haven characteristics during the Ukraine crisis and good safe-haven characteristics for the NSE50 during COVID-19. We may say that Bitcoin exhibits weak safe haven, but strong hedging abilities to NSE50. Concluding Remarks In this study, we suggested a new method to evaluate an asset’s time-varying hedge, diversifier, and safe-haven characteristics. We propose a rolling window estimation of the DCC-based regression of Ratner and Chiu (2013). Based on this, we estimate the conventional asset’s time-varying safe haven, hedging, and diversifying properties during crises like the COVID-19 pandemic and the conflict in Ukraine. For comparison purposes, we include Bitcoin, a nonconventional safe-haven asset. We evaluate Gold and Bitcoin’s safe haven, hedging, and diversifier properties to the S&P 500, CAC 40, and NSE 50 variations. We use a rolling window of length 60 to estimate the regression. From the results, we find that Gold can be considered as a better safe haven against the fluctuations of the S&P 500. In the case of CAC 40, Gold and Bitcoin have weak safe-haven properties. While Bitcoin demonstrated strong safe-haven characteristics during the Ukraine crisis, Gold exhibited strong safe-haven characteristics during COVID-19 for the NSE 50. Overall, the findings indicate that Gold is the better safe haven. This outcome is consistent with earlier research (Będowska-Sójka & Kliber, 2021; Drake, 2022; Ghazali et al., 2020; Shakil et al., 2018; Triki & Maatoug, 2021). When it comes to Bitcoin, its safe-haven feature is weak. Bitcoin, however, works well as a diversifier and hedge. Therefore, from a policy perspective, investing in safe-haven instruments is crucial to lower the risks associated with asset ownership. Policymakers aiming to enhance the stability of financial portfolios might encourage institutional investors and other market players to incorporate Gold into their asset allocations. Gold’s strong safe-haven qualities, proven across various market conditions, make it a reliable choice. Gold’s performance during crises like COVID-19 highlights its potential to mitigate systemic risks effectively. Further, Bitcoin could also play a complementary role as a hedge and diversifier, especially during periods of significant volatility such as the Ukraine crisis. While Bitcoin’s safe-haven characteristics are relatively weaker, its inclusion in a diversified portfolio offers notable value and hence it should not be overlooked. Further, policymakers may consider how crucial it is to monitor dynamic correlations and periodically rebalance portfolios to account for shifts in the safe haven and hedging characteristics of certain assets. Such measures could help reduce the risks of over-reliance on a single asset type and create more resilient portfolios that can better withstand global economic shocks. For future research, studies can be conducted on the estimation of the rolling window with different widths. This is important to understand how the safe-haven property changes across different holding periods. Further, more equity markets would be included to account for the differences in market capitalization and index constituents. This study can be extended by testing these properties for multi-asset portfolios as well. We intend to take up this study in these directions in the future. Data Availability StatementNot applicable.Declaration of Conflicting InterestsThe authors declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.FundingThe authors received no financial support for the research, authorship, and/or publication of this article.ReferencesAkhtaruzzaman M., Boubaker S., Lucey B. M., & Sensoy A. (2021). Is gold a hedge or a safe-haven asset in the COVID-19 crisis? Economic Modelling, 102, 105588. Crossref. Web of Science.Al-Nassar N. S. (2024). Can gold hedge against inflation in the UAE? A nonlinear ARDL analysis in the presence of structural breaks. PSU Research Review, 8(1), 151–166. Crossref.Barbu T. C., Boitan I. A., & Cepoi C. O. (2022). Are cryptocurrencies safe havens during the COVID-19 pandemic? A threshold regression perspective with pandemic-related benchmarks. Economics and Business Review, 8(2), 29–49. Crossref.Baur D. G., & Lucey B. M. (2010). Is gold a hedge or a safe haven? An analysis of stocks, bonds and gold. Financial Review, 45(2), 217–229. Crossref.Będowska-Sójka B., & Kliber A. (2021). Is there one safe-haven for various turbulences? The evidence from gold, Bitcoin and Ether. The North American Journal of Economics and Finance, Elsevier, 56, 101390. Crossref.Belhassine O., & Karamti C. (2021). Contagion and portfolio management in times of COVID-19. Economic Analysis and Policy, 72, 73–86. Crossref. PubMed. Web of Science.Bhattacharjee A., Das J., & Kumar S. (2023). Evaluating the symmetrical and asymmetrical linkage between gold price and Indian stock market in the presence of structural change. NMIMS Management Review, 31(4), 288–297. Crossref. Web of Science.Bhuiyan R. A., Husain A., & Zhang C. (2023). Diversification evidence of Bitcoin and Gold from wavelet analysis. Financial Innovation, 9(1), 100. Crossref. PubMed. Web of Science.Bouri E., Azzi G., & Dyhrberg A. H. (2017). On the return-volatility relationship in the Bitcoin market around the price crash of 2013. Economics, 11(1), 2. Crossref.Bouri E., Gupta R., Tiwari A. K., & Roubaud D. (2017). Does Bitcoin hedge global uncertainty? Evidence from wavelet-based quantile-in-quantile regressions. Finance Research Letters, 23, 87–95. Crossref. Web of Science.Bouri E., Shahzad S. J. H., Roubaud D., Kristoufek L., & Lucey B. (2020). Bitcoin, gold, and commodities as safe havens for stocks: New insight through wavelet analysis. The Quarterly Review of Economics and Finance, 77, 156–164. Crossref. Web of Science.Brenner M., & Galai D. (1989). New financial instruments for hedge changes in volatility. Financial Analysts Journal, 45(4), 61–65. Crossref.Capie F., Mills T. C., & Wood G. (2005). Gold as a hedge against the dollar. Journal of International Financial Markets, Institutions and Money, 15(4), 343–352. Crossref.Ceylan Ö. (2022). Hedging Effectiveness of the VIX ETPs: An analysis of the time-varying performance of the VXX. In Handbook of research on new challenges and global outlooks in financial risk management (pp. 384–401). IGI Global. Crossref.Cheema M. A., Faff R., & Szulczyk K. R. (2022). The 2008 global financial crisis and COVID-19 pandemic: How safe are the safe haven assets? International Review of Financial Analysis, 83, 102316. Crossref. PubMed. Web of Science.Conlon T., & McGee R. (2020). Safe haven or risky hazard? Bitcoin during the COVID-19 bear market. Finance Research Letters, 35, 101607. Crossref. PubMed. Web of Science.Demir E., Gozgor G., Lau C. K. M., & Vigne S. A. (2018). Does economic policy uncertainty predict the Bitcoin returns? An empirical investigation. Finance Research Letters, 26, 145–149. Crossref. Web of Science.Drake P. P. (2022). The gold-stock market relationship during COVID-19. Finance Research Letters, 44, 102111. Crossref. PubMed. Web of Science.Dwyer G. P. (2015). The economics of Bitcoin and similar private digital currencies. Journal of Financial Stability, 17, 81–91. Crossref. Web of Science.Dyhrberg A. H. (2015). Hedging capabilities of bitcoin. Is it the virtual gold? Finance Research Letters, 1–6. https://doi.org/10.1016/j.frl.2015.10.025Dyhrberg A. H. (2016). Hedging capabilities of bitcoin. Is it the virtual gold? Finance Research Letters, 16, 139–144. https://doi.org/10.1016/j.frl.2015.10.025 Web of Science.Engle R. (2002). Dynamic conditional correlation: A simple class of multivariate generalized autoregressive conditional heteroskedasticity models. Journal of Business & Economic Statistics, 20(3), 339–350. Crossref. Web of Science.Ghazali M. F., Lean H. H., & Bahari Z. (2020). Does gold investment offer protection against stock market losses? Evidence from five countries. The Singapore Economic Review, 65(02), 275–301. Crossref.Hasan M. B., Hassan M. K., Rashid M. M., & Alhenawi Y. (2021). Are safe haven assets really safe during the 2008 global financial crisis and COVID-19 pandemic? Global Finance Journal, 50, 100668. Crossref. PubMed.Hood M., & Malik F. (2013). Is gold the best hedge and a safe haven under changing stock market volatility? Review of Financial Economics, 22(2), 47–52. Crossref.Huang Y., Duan K., & Mishra T. (2021). Is Bitcoin really more than a diversifier? A pre-and post-COVID-19 analysis. Finance Research Letters, 43, 102016. Crossref.Ji Q., Zhang D., & Zhao Y. (2020). Searching for safe-haven assets during the COVID-19 pandemic. International Review of Financial Analysis, 71, 101526. Crossref. PubMed. Web of Science.Kaczmarek T., Będowska-Sójka B., Grobelny P., & Perez K. (2022). False safe haven assets: Evidence from the target volatility strategy based on recurrent neural network. Research in International Business and Finance, 60, 101610. Crossref. Web of Science.Kumar A. S., & Padakandla S. R. (2022). Testing the safe-haven properties of gold and bitcoin in the backdrop of COVID-19: A wavelet quantile correlation approach. Finance Research Letters, 47, 102707. Crossref. PubMed. Web of Science.Kumar M. A., Swathi J., Pallavi T. A., & Bavana S. (2023). Volume progression and price–volume relationship of commodity futures: Case of bullion and base metals. NMIMS Management Review, 31(4), 265–274. https://doi.org/10.1177/09711023241230463 Web of Science.Liu C. S., Chang M. S., Wu X., & Chui C. M. (2016). Hedges or safe havens—Revisit the role of gold and USD against stock: A multivariate extended skew-t copula approach. Quantitative Finance, 16(11), 1763–1789. Crossref.Liu R., Zhichao S., Wei G., & Wang W. (2017). GARCH model with fat-tailed distributions and Bitcoin exchange rate returns. Journal of Accounting, Business and Finance Research, 1(1), 71–75. https://doi.org/10.2139/ssrn.3666106 Crossref.Mokni K. (2021). When, where, and how economic policy uncertainty predicts Bitcoin returns and volatility? A quantiles-based analysis. The Quarterly Review of Economics and Finance, 80, 65–73. Crossref.Nagy B. Z., & Benedek B. (2021). Higher co-moments and adjusted Sharpe ratios for cryptocurrencies. Finance Research Letters, 39, 101543. Crossref. Web of Science.Nakamoto S. (2008). Bitcoin: A peer-to-peer electronic cash system. Bitcoin. https://bitcoin.org/bitcoin.pdfOkorie D. I. (2020). Could stock hedge Bitcoin risk(s) and vice versa? Digital Finance, 2(1), 117–136. Crossref.Paule-Vianez J., Prado-Román C., & Gómez-Martínez R. (2020). Economic policy uncertainty and Bitcoin. Is Bitcoin a safe-haven asset? European Journal of Management and Business Economics, 29(3), 347–363. Crossref.Ratner M., & Chiu C. C. J. (2013). Hedging stock sector risk with credit default swaps. International Review of Financial Analysis, 30, 18–25. Crossref. Web of Science.Salisu A. A., Raheem I. D., & Vo X. V. (2021). Assessing the safe haven property of the gold market during COVID-19 pandemic. International Review of Financial Analysis, 74, 101666. Crossref. PubMed. Web of Science.Saxena S., & Villar A. (2008). Hedging instruments in emerging market economies. Financial globalisation and emerging market capital flows. BIS Papers, 44, 71–87.Selmi R., Mensi W., Hammoudeh S., & Bouoiyour J. (2018). Is Bitcoin a hedge, a safe haven or a diversifier for oil price movements? A comparison with gold. Energy Economics, 74, 787–801. Crossref. Web of Science.Shahzad S. J. H., Bouri E., Roubaud D., Kristoufek L., & Lucey B. (2019). Is Bitcoin a better safe-haven investment than gold and commodities? International Review of Financial Analysis, 63, 322–330. Crossref. Web of Science.Shakil M. H., Mustapha I. H. M., Tasnia M., & Saiti B. (2018). Is gold a hedge or a safe haven? An application of ARDL approach. Journal of Economics, Finance and Administrative Science, 23(44), 60–76. Crossref.Singh V. V., Singh H., & Ansari A. (2024). Bitcoin as a distinct asset class for hedging and portfolio diversification: A DCC-GARCH model analysis. NMIMS Management Review, 32(1), 7–13. Crossref. Web of Science.Smales L. A. (2019). Bitcoin as a safe haven: Is it even worth considering? Finance Research Letters, 30, 385–393. Crossref. Web of Science.Snene Manzli Y., Alnafisah H., & Jeribi A. (2024). Safe haven ability of energy and agricultural commodities against G7 stock markets and banking indices during COVID-19, Russia–Ukraine War, and SVB collapse: Evidence from the wavelet coherence approach. Discrete Dynamics in Nature and Society, 2024(1), 2587000. Crossref.Syuhada K., Suprijanto D., & Hakim A. (2022). Comparing gold’s and Bitcoin’s safe-haven roles against energy commodities during the COVID-19 outbreak: A vine copula approach. Finance Research Letters, 46, 102471. Crossref. PubMed. Web of Science.Tarchella S., Khalfaoui R., & Hammoudeh S. (2024). The safe haven, hedging, and diversification properties of oil, gold, and cryptocurrency for the G7 equity markets: Evidence from the pre-and post-COVID-19 periods. Research in International Business and Finance, 67, 102125. Crossref. Web of Science.Triki M. B., & Maatoug A. B. (2021). The GOLD market as a safe haven against the stock market uncertainty: Evidence from geopolitical risk. Resources Policy, 70, 101872. Crossref. Web of Science.Umar Z., Bossman A., Choi S. Y., & Teplova T. (2023). The relationship between global risk aversion and returns from safe-haven assets. Finance Research Letters, 51, 103444. Crossref. Web of Science.Ustaoglu E. (2022). Safe-haven properties and portfolio applications of cryptocurrencies: Evidence from the emerging markets. Finance Research Letters, 47, 102716. Crossref. Web of Science.Widjaja M., & Havidz S. A. H. (2023). Are gold and cryptocurrency a safe haven for stocks and bonds? Conventional vs Islamic markets during the COVID-19 pandemic. European Journal of Management and Business Economics (ahead-of-print).Yan Y., Lei Y., & Wang Y. (2022). Bitcoin is a safe-haven asset and a medium of exchange. Axioms, 11(8), 415. Crossref.Yousaf I., Plakandaras V., Bouri E., & Gupta R. (2022). Hedge and safe haven properties of gold, US Treasury, Bitcoin, and Dollar/CHF against the FAANA companies and S&P 500 (Department of Economics, Working Paper Series No. 2022–27). University of Pretoria.Zhang Y., Zhu P., & Xu Y. (2021). Has COVID-19 changed the hedge effectiveness of bitcoin? Frontiers in Public Health, 9. https://doi.org/10.3389/fpubh.2021.704900

Diplomacy
President of Russia Vladimir Putin meeting with North Korean leader Kim Jong-un (2025)

Why Xi, Putin and Kim on One Stage Matters

by Roie Yellinek

Beijing’s Victory Day parade in Tiananmen Square was designed to dazzle: ranks of uniformed troops, formations of aircraft, and an arsenal of new systems meant to underscore China’s rapid military modernization. But the most consequential image was not a missile or a stealth jet. It was a tableau of three leaders—Xi Jinping at the center, flanked by Vladimir Putin and Kim Jong Un—watching the spectacle together. The scene, widely broadcast and photographed, turned a commemorative event into a geopolitical marker. It was less a snapshot than a signal: the public normalization of a deepening alignment among China, Russia, and North Korea, at a moment when Western democracies are struggling to sustain cohesion on core strategic questions. The parade itself offered the familiar mixture of hardware and narrative. Coverage highlighted the unveiling or public confirmation of advanced systems across domains: upgraded intercontinental missiles, new submarine-launched ballistic missiles, hypersonic and anti-ship capabilities, long-range bombers, early warning aircraft, and a broad stable of unmanned platforms, including undersea vehicles and “loyal wingman” drones. Chinese media presented these developments as evidence of a “world-class” People’s Liberation Army (PLA) moving beyond legacy constraints and into truly multi-domain operations, with information, space, and cyber now integrated alongside land, sea, and air. Independent reporting catalogued the breadth of systems and emphasized a narrative of credible deterrence and strategic depth rather than mere choreography. Yet the more instructive message was political. The presence of Putin and Kim, alongside other leaders, was not a mere ceremonial occurrence. Each leader arrived with clear incentives to be seen at Xi’s side, and each gained by lending visual weight to Beijing’s story. For Moscow, the image reinforced the claim that Russia is not isolated, that it retains powerful partners and is embedded in a wider non-Western coalition. For Pyongyang, the moment was even more significant: an opportunity to step out of diplomatic isolation and be recognized publicly as a member of a consequential strategic grouping. For Beijing, hosting both leaders signaled that China can convene and coordinate—projecting status, reassuring sympathetic governments, and unsettling adversaries by hinting at a tighter web of cooperation among U.S. rivals. The convergence behind the optics has been building for years, and could have happened only on Chinese soil. China and Russia have expanded their coordination across energy, defense, and diplomatic, even as they preserve maneuvering room on sensitive issues. North Korea’s accelerating exchanges with Russia, alongside growing political warmth with Beijing, provide a third leg to this emerging tripod. None of this amounts to a formal alliance with mutual defense obligations. But it does resemble a strategic alignment held together by shared interests: resisting a U.S.-led order, blunting sanctions pressure, reducing vulnerability to Western technology restrictions, and demonstrating that alternatives exist to dollar-centric finance and Western supply chains. The choreography on the rostrum did not create this alignment; it made it more legible and clear. Memory politics is a key component of that legibility. Beijing’s decision to anchor the parade in the commemoration of victory over Japan allows contemporary power projection to be cloaked in a unifying moral narrative. China increasingly leverages World War II memory in diplomacy—shaping a “memory war” that reframes the post-1945 order and what is seen from China as its rightful place within it. Russia’s long-standing use of the “Great Patriotic War” plays a parallel role, justifying current policies through selective historical continuity. North Korea’s revolutionary mythology fits easily into this narrative architecture. By standing together at an anniversary of anti-fascist victory, the three leaders signaled an ideational convergence that complements their material cooperation: a claim to moral legitimacy as guardians of an alternative international vision. The military dimension of the parade, while not the core of this argument, still matters. Displays of a maturing triad—land-based ICBMs, submarine-launched systems, and an air-launched nuclear component—aim to convey survivable second-strike capacity. The public presentation of hypersonic and anti-ship systems is meant to complicate adversary planning in the Western Pacific. The range of unmanned platforms suggests an intent to saturate domains with relatively low-cost, attritable assets, improving persistence and compressing the sensor-to-shooter loop. It is prudent to treat parades cautiously: not all showcased systems are fully operational or fielded at scale, and performance claims are difficult to validate. But as an indicator, the breadth and integration of platforms reflect a planning culture committed to joint operations and “intelligentized” warfare, where AI-enabled targeting and decision support are not theoretical ambitions but programmatic priorities What, then, does the image of Xi–Putin–Kim actually change? First, it clarifies expectations. Observers no longer need to infer the trajectory of this triangular relationship from scattered bilateral overtures. The three leaders have chosen to make their alignment visible. Visibility creates deterrent value, raising the perceived costs of coercing any one member, and it can also facilitate practical cooperation: intelligence sharing, diplomatic coordination at the UN and other fora, synchronized signaling during regional crises, and mutually reinforcing sanctions-evasion practices. Second, it complicates Western planning. Even if Beijing keeps caution around direct military assistance in Europe or the Korean Peninsula, diplomatic top-cover, economic buffering, and technology flows short of lethal aid can still alter the correlation of forces over time. Finally, it resonates across the Global South. Many governments seek strategic autonomy and resist being forced into binary choices. The parade’s optics supplied a ready-made narrative for those who argue that the international system is already multipolar and that non-Western coalitions can deliver security and development without Western tutelage. The contrast with Western coordination was strikingly evident. In the transatlantic community, support for Ukraine remains substantial; however, debates about resource levels, war aims, and timelines have intensified. In the Indo-Pacific, there is a growing alignment on deterring coercion in the Taiwan Strait and the South China Sea; however, national economic interests and differing risk tolerances result in uneven policies toward China. Across Europe and North America, electoral politics continue to inject volatility into foreign policy, complicating efforts to sustain long-term, bipartisan strategies. None of these frictions amounts to collapse, and there are genuine Western successes in coalition-building—from NATO enlargement to evolving minilateral formats in the Indo-Pacific. However, an analytically honest reading of the moment acknowledges that the authoritarian trio in Beijing has projected a unity of purpose that Western capitals currently struggle to match consistently. Three implications follow. The first is narrative competition. If Beijing, Moscow, and Pyongyang can turn a commemorative event into a global story about legitimacy and resilience, they will continue to use history as a strategic resource. The appropriate Western response is not to cede the narrative field but to invest in historically grounded, forward-looking messaging that explains the link between rules-based order and practical benefits—trade reliability, crisis management, and sovereignty protection—for diverse audiences. The second is coalition maintenance. Western policymakers will need to prioritize “coalition hygiene”: aligning export controls and investment screening where it matters most; building redundancy into critical supply chains; closing divergences in sanctions enforcement; and coordinating messaging so that tactical differences do not obscure strategic alignment. This requires political discipline more than new institutions. The third is theater integration. As the Beijing image suggested a cross-regional understanding among three adversarial capitals, allied planning must better account for cross-theater linkages—how actions in Europe affect deterrence in Asia, and vice versa—and ensure that resource allocations and industrial policies reflect genuinely global prioritization. It is important not to overstate. The emerging alignment among China, Russia, and North Korea is asymmetric and interest-based, not a tightly binding alliance. Beijing’s global economic integration imposes constraints that Moscow and Pyongyang do not share. Russia and North Korea each bring liabilities that China will manage carefully. Frictions—over technology, pricing, and regional equities—will persist. But the threshold crossed in Beijing is nonetheless meaningful. These governments judged that the benefits of public proximity now outweigh the costs. That judgment, once made, is difficult to reverse quickly; it tends to generate its own momentum through bureaucratic follow-through and sunk reputational costs. One image cannot rewrite the balance of power. It can, however, crystallize a trend and concentrate minds. The sight of Xi, Putin, and Kim standing together did exactly that. It captured an authoritarian convergence rooted in shared grievances and converging strategies, and it highlighted the challenge facing democracies that wish to preserve an open and stable order: maintaining the patience, unity, and policy discipline to act together. The test for the West is less whether it recognizes the signal—most capitals do—than whether it can convert recognition into sustained, collective action. If Beijing’s parade was a demonstration of choreography and intent, the appropriate answer is not a counter-parade, but the quieter work of alignment: aligning narratives with interests, interests with instruments, and instruments with partners. That work is not glamorous. It is, however, what turns a photo into policy.

Defense & Security
Soldier, CPU computer (central processing unit) US and Chinese flag on white background. US vs China chip war or tech war, semiconductor industry concept. US restrict and control chip export to China.

Superpowers Without Soldiers: Can Technology Replace Traditional Hegemony?

by Syeda Farani Fatima

Introduction Hegemony is the core principle in International Relations. It has been conceptualized through military strength, economic influence, and ideological control. The theory of cultural hegemony by Antonio Gramsci is based on assuming control but not necessarily through force, whereas realist theorists such as John Mearsheimer stress the relevance of military strength for ensuring global dominance (Mearsheimer 2001). The 21st century, though, brought into being a different era of transformation and technological breakthroughs that turned the existing arrangements on their head. With the advent of Artificial Intelligence (AI), cyber war, and space technology, great powers are transforming from traditional soldiers to cyberspace warriors. AI and other cyber tools are altering the strategic equation between major powers, providing avenues for countries like China and Russia to undermine US hegemony (Rooney et al. 2022). Hegemony in the past had been founded on military superiority, but at present, academics have discovered that technological hegemony is leading the way. Lethal Autonomous Weapons (LAWs) and AI have captivated researchers because they can transform war. Cyberspace has become the new battleground of power. The US and China are competing for cyber hegemony (Akdaǧ 2025). Space is increasingly regarded as a new battleground in geopolitics. The US Space Force and China’s BeiDou system illustrate how nations weave surveillance and communication in their strategic decision-making (O’Hanlon 2020). Thus, new technologies are reshaping the China-US rivalry. To counter this, countries are investing in tech-based industries, which will change the way human thinks. The analysis will explore whether emerging technologies can efficiently replace traditional tools of hegemony or not. Joseph Nye’s concept of smart power provides a critical framework in this modern era, where influence may flow from military boots to silicon chips. Global powers are moving towards influence and deterrence-based tech models, supplementing hard power. However, this transition has its risks, such as overdependence and ethical concerns. The paper argues that a complete transformation is not happening, but there will be dual-track hegemony where military and technology will coordinate to dominate. Policy implications of this shift are profound. Global powers must collaborate to draft international norms for AI and cyberwarfare, developing nations must develop their technology rather than dependency on global powers, as it will be easier for them to surveil and dominate, and international institutions must proactively govern the techno-political landscape to prevent destabilization. This study will use a qualitative approach, and it will be a case-based methodology combining theoretical perspectives of philosophers. This analysis is important as it delves into the transformation of the mechanics of global power from military hegemony to technology-oriented hegemony. It uses secondary sources like policy briefs, think tank reports, books, etc. Finally, this analysis concludes that soldiers may never be the first line of every fight, but the battle for global supremacy is firmly human-hinged in decisions on technology, ethics, and governance. Hegemony is a core concept in International Relations, grounded in military capacity, economic influence, and institutional influence. Historically, great civilizations like the Roman and British empires attained hegemony by dominating in naval power, making alliances and expanding their territories. In the post-World War II era, the US built dominance through overseas military bases and nuclear deterrence. Historical Foundations of Traditional Hegemony The Roman Empire, a classic example of past hegemony, attained this power by constructing roads, forts, and legions in the world's islands. Later, the British Empire sustained its dominance by modernizing the Royal Navy and the global trade network. The post-World War II era saw the hegemony of the United States with overseas military bases and security alliances. John Mearsheimer, in his book The Tragedy of Great Power Politics, says that according to great powers, hegemony is the best way to ensure their security (Mearsheimer 2001). Limitations of Traditional Hegemony The primary limitation of the traditional hegemonic model is the risk of overreach, entering into too many overseas agreements that become economically and politically unsustainable. Imperial overstretch, a model proposed by Paul Kennedy, explains the collapse of empires when they are unable to maintain their economy due to huge global aims (Kennedy 1988). Concurrently, we can see that after so many years have passed in the Vietnam, Afghanistan, and Iraq wars, the US is spending trillions. Approximately $3.68 trillion was spent on Iraq and Afghanistan (Costs of War | Brown University 2025). This highlights that military dominance can be costly and unsustainable. Mearsheimer, in an interview at the New York Times, claimed that ‘the United States is responsible for causing the Ukraine crisis’. Lack of legitimacy and local resistance is another great flaw in the traditional hegemonic pattern. For example, in Vietnam, soldiers used their knowledge of geography to push back against America's advanced weapons. Similarly, in Afghanistan and Iraq, foreign-led missions struggled with local insurgents. The New Tools of Technological Hegemony Cyber Power Cyber power has rapidly become a strategic field where states project their influence far beyond the geographic borders, often without soldiers. Cyber operations are dominating in this digital age, and the SolarWinds hack shows how states can achieve global influence through an Information Technology (IT) infrastructure breach. In March 2020, Russian hackers placed a secret backdoor in SolarWinds’ Orion software. This infected around 18000 users, including US major government departments (Cybersecurity 2021). The cyberattacks went undetected for several months, revealing vulnerabilities in the digital network. It was the worst cyber-espionage attack ever, an analyst described. Iran's 2019 cyberattack on the oil infrastructure of Saudi Arabia shows that the acquisition of digital superiority can help influence norms, command the critical infrastructure, and set global political narratives without foreign boots on the ground. To address this vulnerability, it is essential to know cyber deterrence theory. It discusses capability, attribution, and resolution. States should advance digital tools, modify their tracking system and enhance communication and transparency. The most lethal weapon today may not fire a projectile-it fires packets. This metaphor illustrates that state actors can erode adversary national infrastructure, banks and election systems without traditional warfare. The US Secretary of Defense Lloyd J. Austin III described the integrated Deterrence that integrates cyber with land, sea, and space under a unified strategy (Masitoh, Perwita, and Rudy 2025). Cybersecurity experts say that cyberpower is now a geopolitical power. And cyber warfare is not a sideshow; it’s a frontline strategy. Artificial Intelligence (AI) and Big Data AI’s strategic significance for national security has been emphasized by leaders like Jason Matheny, CEO of RAND Corporation. He warns that AI could make it easier to make harmful weapons and dangerous technologies (Matheny 2024). The 2023 report of RAND on AI and Geopolitics argues that AI may be the next frontier in US-China rivalry (Pavel et al. 2023). ChatGPT and Bard, like generative AI models, have humanitarian strategic applications, which makes fake news so believable that it feels like fact. This capability of AI can transform propaganda into scalable digital warfare. Beyond surveillance, AI has transformed military operations tactics. Military applications like drone swarming, algorithmic targeting, and predictive ISR create scenarios where the frontline shifts from kinetic zones to data centers. AI diplomacy is becoming the new foreign aid. Financial Times article notes that tech giants are deploying AI mechanisms in Africa not only for development but for their advantage as an influence tool. Thus, AI and big data are a new form of informational hegemony. Space Militarization and Satellite Dominance Space militarization emerged during the Cold War. States like the US, China, Russia, India, and Japan have developed anti-satellite (ASAT) capabilities (Samson and Cesari 2025). General John Jay Raymond at the US Space Command Launch said that, “Outer space is now recognized as a domain of military operations” (Raymond 2021). China’s 2007 ASAT test, which destroyed its own Fengyun-1C weather satellite, is still a thorn in the eyes of major powers. Russia has also launched missions like Kosmos-2553. Evolution from GPS to GNSS (Global Navigation Satellite Systems) reflects strategic change. The US has GPS, China has BeiDou, Elon Musk’s Starlink satellite constellation, and Europe has Galileo; each system highlights the sovereignty in digital positioning. China’s counterpart doctrine states in its 2021 Space White Paper that space-based assets are not crucial for renaissance only but for strategic deterrence without deploying soldiers or causing deaths of your military men (The State Council Information Office of the People’s Republic of China 2022). Undersea Cables and Digital Infrastructure Control Undersea cables carry over 95% of global data transmission (Sherman 2021). Disruption or surveillance of these cables can impact the worldwide flow of data and diplomatic communications. In developing countries like Pakistan, Kenya, and Ecuador, Huawei-funded infrastructure provides smart city services. Cable route is not just wiring undersea, it is influenced by encryption. The US and EU have Amazon Web Services (AWS), Microsoft Azure, and Google Cloud, like surveillance platforms. Cable-Landing zones (CLZs) are the chokepoints used for manipulation, Cloud interconnection policies allow control of traffic flow, and Surveillance software and firmware installed at data centers can be remotely controlled, bypassing local safeguards. Blocking connections can slow or disrupt foreign economic leverage. Digital infrastructure has become a domain for hegemony that is more insidious in strategic potential. This map exposes the physical foundations of digital power. Nations with greater cable landing nodes, like the U.S. and China, wield asymmetric influence, not through soldiers, but through network control. Disruption or surveillance of these cables can cripple economies or governance. Regional chokepoints also reflect strategic leverage in geo-economics and cyber diplomacy, making this infrastructure as consequential as traditional military bases. Figure 1: This map shows the physical foundations of digital power, nations with greater cable landing nodes, like the U.S. and China, wield asymmetric influence, not through soldiers, but through network control.Superpowers’ Technological Footprint United States Silicon Valley is the heart of US technological hegemony, and some other government agencies, like Defense Advanced Research Projects Agency (DARPA), are contributing to maintaining US technological hegemony. Lethal Autonomous Weapons (LAWs), drones, and defense-grade AI-powered decision-support systems are a tech-military hybrid force. Furthermore, the US controls major pillars of technology like operating systems (Microsoft, Apple, Google dominate desktops and mobile devices), and Satellites. Advanced technologies have enabled remote force projection like drone strikes, executing surgical operations, Cyber Command operations from SolarWinds retaliation, deployment of Overhead Persistent Infrared (OPIR) and Space Based Kill Assessment (SKA), enhancing deterrence. China Made in China 2025 vision aims to displace US techno-hegemony. China’s centralized Social Credit System reflects a template of techno-surveillance hegemony. Beijing is now selling surveillance systems to developing countries, highlighting its tech supremacy. China is controlling telecommunications architecture by promoting Huawei’s 5G worldwide. China’s cyber army, the People’s Liberation Army Strategic Support Force (PLASSF), specializes in offensive and defensive cybertech warfare (The State Council Information Office of the People’s Republic of China 2019). China’s Digital Silk Road links infrastructure investments in Asia and Africa with national encryption systems and cloud data centers. Ethiopian Prime Minister Abiy Ahmed, in a bilateral dialogue, said that ‘our fiber networks and data exchanges are now integrated with Beijing’s national infrastructure policy’. Thus, acquiring such a position in technology will prove China’s hegemony and can make it a superpower, making the world again a bipolar one. China’s strategic doctrine focuses on autonomous systems and digital authoritarian export over occupancy and geopolitical projection, respectively. Russia Russia’s global strategy remains rooted in a hybrid doctrine that combines cyber tools, space capabilities and disinformation operations. The Gerasimov Doctrine, Vladimir Putin’s strategic vision, emphasizes the blend of political, cyber, and economic tools to achieve strategic goals without casualties. The Ukraine conflict is a great example of cyber dominance. Russia has cyber units such as APT28 (Fancy Bears), Satellite Spoofing and Jamming, and the Internet Research Agency (IRA), which have executed targeted hacks against North Atlantic Treaty Organization (NATO), disrupted Global Positioning System (GPS) signals, and led disinformation campaigns. Russia’s power formula centers on dense cyber capacity, economic coercion, and unpredictability (making deterrence harder). Risks and Criticism of Tech-Based Hegemony Technology provides tools for security and influence, but overdependence causes strategic vulnerability, which leads to ethical dilemmas and raises questions about digital sovereignty. Overdependence and System Vulnerability A fundamental flaw of technological hegemony is its fragility. Systems are dependent on infrastructure (cloud servers, AI control nodes, etc.). The UN Group of Governmental Experts (GGE) says that lethal autonomous weapons are the cause of escalation in conflicts (CCW 2022). Take the SolarWinds breach of 2020, in which an update exposed thousands of sensitive pieces of information. Ethical Concerns China, Ethiopia, and some other states have AI-powered surveillance regimes. China exports networked camera systems and facial recognition tools to states that use them to suppress dissent. A senior researcher at Amnesty noted that, ‘delegating life and death decisions to software is ethically unjustifiable’. Global South Dependency and Digital Colonialism Due to technological influence, digital dependency has increased in the Global South. Digital dependency without regulatory safeguards leads to digital colonialism. Countries lacking advanced technology are reliant on digital ecosystems developed by superpowers. It is said by Dr Ruha Benjamin that ‘when code becomes law, and pipelines become policy enforcers, sovereignty is outsourced’. Hegemony Without Consent Soldiers are a visible force, but technology imposes itself quietly via platforms, which results in domination without democracy. Tech-enabled coercion doesn’t need tanks; it needs standards embedded in devices, laws baked into algorithms. This contradicts liberal norms of International Relations (IR), where hegemony should rest on consent for international legitimacy (Sakumar, Broeders, and Kello 2024). Future Power Projections: Domain-wise Breakdown There are five interconnected domains of future power projections: land, air, sea, cyber, and space. Land Domain In traditional combat, troops were used to counter enemy force, but now in the third digital era, surveillance grids, AI-powered motion detection systems, and autonomous land robots are replacing soldiers. The Israeli military is testing unmanned ground vehicles (UGVs), which they have named Jaguar, to patrol borders, and this will reduce human casualties. The diagram illustrates the interaction or the coordination between a human coordinator and an autonomous weapon system (AWS), and the target within a given environment. At first, the operator gives a high-level command which activates the controller, and the system provides feedback to the operator, such as mission success or failure. The controller is the brain of this system. It monitors the environment, processes data and controls the weapons. It operates in loops, evaluating the environment and updating the decision. Once the target is detected autonomously, the gun acts, which includes missile launch or gunfire. This entire process takes place in a dynamic environment. Figure 2: The coordination between a human coordinator and an autonomous weapon system (AWS) Air Domain Traditional manned fighter jets were dominating in aerial combat. Now, aerial dominance is shifted towards hypersonic weapons and AI-enabled drone swarms. Russia’s Zircon and China’s DF-ZF are hypersonic missiles that can travel at Mach 5+ speeds. AI drone swarms are rendering conventional missile defense systems obsolete. The US Air Force’s “Golden Horde” project and China’s GJ-11 stealth drone exemplifies this shift. Sea Domain Sea powers used to refer to blue-water navies and submarine fleets. They remain the core of maritime protection, but unmanned underwater vehicles (UUVs) are quickly supplanting aircraft carriers. UUVs are being used to surveil for months on their own, and they will not be detected. Subsea data cables, which transport 95% of internet traffic, are a strategic resource; such cables are undersea digital arteries. Securing the sea in the 21st century means controlling what is beneath it. The diagram illustrates major elements of an autonomous underwater vehicle (AUV). It is an important element in current naval battles and marine monitoring. The GPS/RF module is situated at the top of the AUV, through which the vehicle can position itself beneath the water. The propeller motor is the mobility unit of an AUV, driven by lithium-ion batteries. It provides thrust and directional movements. An electronic aid container serves as a housing store; it includes an onboard computer, a mission processor, a power distribution unit, and communication interfaces. AUVs have sensors which detect how deep the AUV is in the water column by measuring hydrostatic pressure. Acoustic Doppler Current Profile (ADCP), is a sonar device that uses Doppler shift in acoustic signals to measure the speed of water currents. An AUV manage its vertical position with a buoyancy tank. AUVs use an inertial navigation system; they determine the position of the AUV based on prior data. AUVs also contain forward-looking (Sound Navigation and Ranging) SONARs and Altimeters that scan and detect any obstacles in front of them and maintain a safe height from the seabed, respectively. Transducers are the mouth and ears of AUVs; they transmit and receive acoustic signals. They are crucial for clandestine communication and sensing of the environment. These AUVs are extremely crucial in contested sea areas such as the South China Sea or the Arctic. Therefore, AUVs are revolutionizing maritime operations by enlarging surveillance, exploration, and undersea warfighting capabilities. As technology evolves, AUVs will define the future of naval strategy and oceanographic study. Figure 3: Major elements of an autonomous underwater vehicle (AUV). Cyber Domain Cyberspace has no borders. Global powers like the US, China and Russia have developed cyber command units to disrupt the power grids of the opposite side. Russia’s cyber interference in the 2016 U.S. elections, China’s alleged breach of U.S. personnel databases (OPM hack), and the Stuxnet worm targeting Iran’s nuclear program exemplify how software has become a strategic weapon. According to NATO’s 2025 Cyber Doctrine, ‘A cyberattack triggering Article 5 [mutual defense] is not just theoretical—it’s a matter of time.’ Space Domain Traditionally, space power was limited to spy satellites, but now anti-satellite weapons (ASAT), Starlink and military satellite systems have transformed into a combat zone. The US created its Space Force in 2019 to dominate in space militarization. In the Ukraine war, SpaceX’s Starlink became crucial for Ukrainian battlefield communication, prompting Elon Musk to limit military use to avoid escalation. Table 1 (figure 4): Old model versus new model comparison in each domain of future power projection. Done by the author. Domain Old Model New Model Land Troop deployment - Armored divisions - Occupation warfare AI-enabled surveillance grids - Unmanned Ground Vehicles (UGVs) - Real-time satellite + sensor networks Air Fighter jets - Airbases - Strategic bombers Hypersonic missiles (e.g., DF-ZF, Zircon) - Drone swarms with AI autonomy - Human-out-of-loop air dominance Sea Naval fleets - Aircraft carriers Submarines Unmanned Underwater Vehicles (ORCA UUV) - Seafloor cable warfare - Autonomous maritime surveillance Cyber (No traditional equivalent) State-sponsored hacking - Data theft & disinformation ops - Cyber jamming, spoofing in kinetic war Space Reconnaissance satellites Missile early-warning systems ASAT weapons (China, Russia tests) - Satellite internet constellations (Starlink) - Real-time warfighting integration (JADC2) Can Technology Fully Replace Military Power? The emergence of advanced technologies like AI, autonomous weapons and space militarization has sparked the debate about whether technology can replace military power, wholly or not? Strategic autonomy, in which a nation’s ability to defend its interests independently requires both technology and military. Technology acts as a critical enabler but not a substitute. AI can analyze satellite data in seconds, but only trained personnel can conduct peacekeeping missions in fragile regions. Modern warfare is shifting towards grey zone conflicts that fall below the threshold of open combat. Russian operations in Crimea in 2014 blended cyberattacks and physical deployments of troops, due to which the line between technology and military became blurry. This incident shows that technology without boots is of no advantage. In addition, technology needs regular upgrades and educated users, and excessive reliance upon these systems may cause interruptions such as electronic warfare (EW) and electromagnetic pulse (EMP) attacks. In a time of humanitarian crisis, disaster response, and counterinsurgency, forces are indispensable. To defeat an enemy or to dominate, one must employ both technology and an educated military. Unmanned aerial vehicles (drones) have altered the character of air war. Great powers are investing heavily in military AI and quantum communication to improve battlefield awareness, minimize human loss of life, and enhance decision-making, but note that international decisions do not depend on a machine. They don't aim to replace the military, but they want to develop their technology. Thus, the emerging model of global power is not soldiering versus technology, but it is soldiers plus technology. It is known as dual-track hegemony, and a nation that acquires it will dominate shortly. A tech-savvy soldier, supported by AI and robotics, is the face of tomorrow’s war. Conclusion The United States, China and the EU are global powers of the modern era. These states possess the technological capital and military infrastructure that shape the regulation of engagement in cyberspace and AI. Firstly, they must strengthen international norms for cyber operations and AI governance. UNGGE has made some progress relevant to this, but this needs a broader enforcement mechanism like the Geneva Conventions. Secondly, global powers must invest in ethical and auditable technology. As AI is dangerous due to biased surveillance systems, facial recognition abuses, and it is also used in predicting policies, which is a major ethical concern. Algorithmic transparency, data protection, and privacy rights must be enforced as soon as possible. Lastly, multilateralism must extend to outer space. As space is becoming a battlefield, complicating geopolitical rivalry, to counter it, multilateralism must be encouraged. For developing countries like Pakistan, Indonesia, or Nigeria, the emergence of technological hegemony is both a threat and an opportunity. These countries should enforce digital sovereignty policies. These nations should avoid digital dependency, as it will be easier for global powers to surveil and dominate. Emerging powers should build defensive cyber infrastructure instead of offensive. They should build secure networks and legal protection against espionage on their own. Defensive strategy will serve as a strategic safeguard and can be used as a pawn in great power rivalries. Emerging powers should pursue a multilateral coalition among Muslim majority states to enhance their connectivity and ties. South-south cooperation must be promoted. The UN, G20 and other international bodies must move towards digital governance mechanisms instead of vague declarations. UN should form a Global Charter on Tech Governance, similar to a Digital Magna Carta. The charter should have ethical limits on the establishment and use of Artificial Intelligence and Lethal Autonomous Weapons. They should increase their coordination with the G20 to amplify these efforts. G20 should create a Tech and Ethics working Group, which can bridge the trust gap between Developed and developing countries in the digital arena. Global order continues to evolve in the 21st century, and the foundations of power projection are rewritten. There is a paradigm shift from boots to bots. This research demonstrates that while technology has transformed, it cannot entirely replace traditional modes of combat. Technology can only help the military to dominate in a region or conflict, but cannot fully replace it. There will be dual track hegemony, and the one who will acquire this hegemony will control world islands, and controlling world islands means ruling the world. However, this transformation comes with serious risks like AI miscalculations, vulnerabilities of digital infrastructure and ethical concerns. But we should keep in mind that military power is no longer sufficient, nor is technology alone a guarantee of dominance, in post-silo, where military, technological, and normative tools must function together to sustain leadership.ReferencesAkdaǧ, Yavuz. 2025. “Great Power Cyberpolitics and Global Cyberhegemony.” Perspectives on Politics. doi:10.1017/S1537592725000040.CCW. 2022. “Document Viewer.” : 16. https://docs.un.org/en/CCW/GGE.1/2021/3 (October 18, 2025).“Costs of War | Brown University.” https://costsofwar.watson.brown.edu/ (October 18, 2025).Cybersecurity, Centre for. 2021. SolarWinds: State-Sponsored Global Software Supply Chain Attack. https://www.cfcs.dk/globalassets/cfcs/dokumenter/rapporter/en/CFCS-solarwinds-report-EN.pdf.Kennedy, Paul. 1988. “Paul-Kennedy-the-Rise-and-Fall-of-the-Great-Powers-19891.” : 704. https://cheirif.wordpress.com/wp-content/uploads/2015/08/paul-kennedy-the-rise-and-fall-of-the-great-powers-19891.pdf.Masitoh, Yuniar Tri, Anak Agung Banyu Perwita, and Elphis Rudy. 2025. “Integrated Deterrence in Practice: The 2022 United States National Defense Strategy Towards the Russia-Ukraine War.” International Journal of Humanities, Education, and Social Sciences 3(3): 1030–48. doi:10.58578/ijhess.v3i3.7317.Matheny, Jason. 2024. “A National Security Insider Does the Math on the Dangers of AI | WIRED.” https://www.wired.com/story/jason-matheny-national-security-insider-dangers-of-ai/ (October 18, 2025).Mearsheimer, John. 2001. “S2-Mearsheimer-2001.” file:///C:/Users/sh/Downloads/s2-mearsheimer-2001.pdf.O’Hanlon, Michael. 2020. “Forecasting Change in Military Technology, 2020-2040 - Joint Air Power Competence Centre.” https://www.japcc.org/essays/forecasting-change-in-military-technology-2020-2040/ (October 18, 2025).Pavel, Barry, Ivana Ke, Michael Spirtas, James Ryseff, Lea Sabbag, Gregory Smith, Keller Scholl, and Domenique Lumpkin. 2023. “AI and Geopolitics: How Might AI Affect the Rise and Fall of Nations? | RAND.” https://www.rand.org/pubs/perspectives/PEA3034-1.html (October 18, 2025).Raymond, John W. 2021. “U.S. Leadership in Space: A Conversation With General John Raymond | Council on Foreign Relations.” https://www.cfr.org/event/us-leadership-space-conversation-general-john-raymond (October 18, 2025).Rooney, Bryan, Grant Johnson, Tobias Sytsma, and Miranda Priebe. 2022. Does the U.S. Economy Benefit from U.S. Alliances and Forward Military Presence? RAND Corporation. https://www.rand.org/content/dam/rand/pubs/research_reports/RRA700/RRA739-5/RAND_RRA739-5.pdf.Sakumar, Arun, Dennis Broeders, and Monica Kello. 2024. “Full Article: The Pervasive Informality of the International Cybersecurity Regime: Geopolitics, Non-State Actors and Diplomacy.” https://www.tandfonline.com/doi/full/10.1080/13523260.2023.2296739 (October 18, 2025).Samson, Victoria, and Laetitia Cesari. 2025. “Secure World Foundation: 2025 Global Counterspace Capabilities Report.” https://www.swfound.org/publications-and-reports/2025-global-counterspace-capabilities-report (October 18, 2025).Sherman, Justin. 2021. Cyber Defense across the Ocean Floor : The Geopolitics of Submarine Cable Security. Atlantic Council, Scowcroft Center for Strategy and Security.The State Council Information Office of the People’s Republic of China. 2019. China’s National Defense in the New Era. Foreign Languages Press. https://english.www.gov.cn/archive/whitepaper/201907/24/content_WS5d3941ddc6d08408f502283d.html.The State Council Information Office of the People’s Republic of China. 2022. “Full Text: China’s Space Program: A 2021 Perspective.” https://english.www.gov.cn/archive/whitepaper/202201/28/content_WS61f35b3dc6d09c94e48a467a.html (October 18, 2025)

Defense & Security
Soldier UAV operator launches army drone with bomb to drop into enemy fortifications and trenches. Concept using military robots in modern warfare.

Unmanned aerial vehicle: geopolitical influence, industrial potential and future perspectives

by World & New World Journal

Introduction An unmanned aerial vehicle (UAV) or unmanned aircraft system (UAS), commonly known as drone, is an aircraft without a human pilot, crew or passenger on board, but rather controlled remotely or autonomously. Drones can be seen as cutting-edge technologies with tremendous ramifications across various fields, including military, security, economics, and logistics – ranging from lightweight consumer drones to advanced autonomous combat platforms – that have transformed global security economics and technological developments. Their proliferation marks a shift in the conduct of warfare, industrial processes, and urban infrastructure design. In this context, this article aims to analyze these dynamics across three domains: geopolitical and security implications, economics and industrial processes, and future technological transformation. I. Geopolitical and Security Perspective: "Game Changers" The Dawn of the Unmanned Warfare Era The past decade — and especially during the conflicts in Ukraine, Gaza, and the Caucasus —has showcased an irreversible shift toward unmanned warfare. Low-cost drones have enabled nations and non-state actors to conduct reconnaissance, precision strikes, and electronic warfare at a fraction of traditional military costs. The democratization of drone warfare erodes conventional military hierarchies by giving smaller nations and even non-state groups asymmetric capabilities (Kania, 2020), (Vision of Humanity, 2024). Figure 1: Use of drones by type. A major consequence of this shift is the emergence of continuous aerial presence, which fundamentally alters operational rhythm and tempo. Previously, only major powers could afford persistent surveillance through manned aircraft or satellites. Today, even insurgent groups can deploy swarms of commercial drones to maintain near-constant observation of enemy movements. This constant presence of drones on the battlefield forces militaries to make decisions much faster and operate as if they are always being watched. As drone technology becomes cheaper and more widely available, it also becomes easier for states or groups to launch low-risk, hard-to-trace attacks without putting their own people in danger. This reduces the barrier to starting or escalating conflicts and makes the overall situation far more unpredictable. On the other hand, despite automation, drone warfare remains heavily dependent on human adaptation, moreover, in practice, drones’ use is constrained by weather, terrain, and limited night capability (Newton, 2025). Nonetheless, and as seen in the Ukraine War, the adaptation, development and improvement of the designs and systems have skyrocketed and shortened from months to weeks. A Paradigm Shift in Modern Warfare Traditional doctrines built around armored vehicles, manned aircraft, and centralized command structures are giving way to distributed, networked, and automated operations. Drones allow for constant ISR (intelligence, surveillance, reconnaissance), rapid kill chains, and battlefield transparency that reduces the effectiveness of concealment and mass maneuver (Biddle & Oelrich, 2016). Swarm technology further accelerates this shift by overwhelming air defenses through algorithmic coordination. On a broader strategic level, unmanned systems are transforming operational art, forcing militaries to rethink how they structure campaigns. Instead of relying on a small number of high-value manned platforms, modern forces must integrate thousands of expendable, semi-autonomous assets into a coherent command-and-control ecosystem. This shift elevates the importance of data fusion, algorithms, and electronic warfare, as success increasingly depends on which side can process information more effectively rather than which side has heavier armor or more firepower. Furthermore, the psychological effects of drone warfare — constant monitoring, unpredictable strikes, and the invisibility of operators — alter the morale and behavior of both soldiers and civilians. In this sense, unmanned warfare not only changes tactics but reshapes the human dimension of conflict. Evolution of Defense Strategies States now are prioritizing anti-drone systems (C-UAS), electronic warfare, and resilient supply chains. Defense strategies emphasize dispersion, decoys, deception, and multi-layered air defense, recognizing that the cost ratio favors attackers using cheap drones against expensive assets. Militaries increasingly incorporate AI-enabled targeting, autonomous perimeter defense, and drone-versus-drone combat (Mehta, 2022). The rapid evolution of offensive drone capabilities has forced governments to pursue a new generation of integrated counter-unmanned systems, blending kinetic interceptors, directed-energy weapons, radio-frequency jamming, and cyber tools. However, the challenge is not merely technological — it is organizational. Modern militaries must revise procurement cycles, adopt flexible doctrine, and restructure units to counter the fast-changing drone threat. For example, some nations are creating dedicated “drone defense battalions” or embedding electronic warfare teams at lower echelons of command. Once more the Ukraine War is a good example: Ukraine’s early-warning systems (so called, “drone walls”) use layered reconnaissance UAVs to identify threats and enhance battlefield visibility, unfortunately, these are highly vulnerable to electronic warfare and radar destruction. More examples include the fiber-optic FPV drones as countermeasure of jamming, or decoy drones to lure air defenses and absorb munitions. (Newton, 2025) The rise of drone warfare also places huge demand on secure communications and resilient digital infrastructure; adversaries increasingly target supply chains, software vulnerabilities, and satellite links that control unmanned systems. Thus, the evolution of defense strategies represents a multi-domain effort that spans hardware, software, organizational culture, and national-level industrial capacity. Major Countries' Competition in Drone Weapon Development The United States, China, Israel, Turkey, and Iran dominate the global drone arms race, while Russia and Ukraine deserve a special mention too. • USA: it focuses on high-tech autonomous systems, for example the MQ-25, Collaborative Combat Aircraft. In addition, according to the Federal Aviation Administration they have an estimated 822,039 drones registered as of July 2025. (FAA, 2025)• China: leads in export volume, offering cost-competitive platforms like the Wing Loong series (Fischer, 2020).• Turkey: gained strategic influence through the Bayraktar TB2, proven in multiple regional conflicts like the Nagorno-Karabakh in 2020 or its use for strategic communications for Ukraine during the ongoing conflict. (Péria-Peigné, 2023)• Israel: its research, development and production of innovative drone technology and exports roughly $500 million worth of UAV-related products per year, have positioned Israel as a world leader in the area. Israel is well known for its indigenous and competitive manufacturing UAVs like the Hermes 450, the Searcher Mk II and the Heron. (Sadot, s.f.)• Iran: their Shahed-136 drone is a low-cost drone that has gained attention internationally as it has shown affordability, precision, long-range, and cheapness during the Ukraine War – deployed by Russia. (Kesteloo, 2025)• Ukraine: has emerged as a leader in tactical warfare, including mass quantities of low-cost First-Person View (FPV) drones for frontline and deep-strike operations. But also, it has implemented “Spider’s Web” operations, which strike deep inside Russia, while using low-cost assets but with strategic and punctual strikes. Ukraine has also expanded into the maritime domain with unmanned surface vessels (USVs) using them with a kamikaze-style operation targeting ships and critical offshore infrastructure in the Black Sea. (Newton, 2025)• Russia: the war has institutionalized an UAV doctrine with mass deployment of FPV drones (Newton, 2025) and the creation – similar to Ukraine – of an Unmanned System Force (USF) aiming to encompass aerial, land and surface drones. (Altman, 2025) II. Economic & Industrial Perspective: “Flying Industrial Revolution” Future Logistics and Delivery Systems Beyond the battlefield, drones are reshaping global economies and enabling new industrial ecosystems. For instance, drones are rapidly transforming last-mile delivery by reducing transportation time, bypassing road congestion, and enabling access to remote or disaster-affected areas. Companies like Amazon, Wing, and Zipline have already demonstrated how unmanned aircraft can deliver medical supplies, parcels, and consumer goods more efficiently than traditional vehicles. As autonomous navigation, battery technology, and payload capacity continue to improve, drones are expected to become critical components of global supply chains, especially in regions where infrastructure is limited or demand for ultra-fast delivery is increasing. Global drone delivery is expected to reach multi-billion-dollar scale by 2030 (PwC, 2023). In the longer term, logistics networks are expected to evolve into hybrid ground–air systems, where drones work alongside autonomous ground vehicles and smart warehouses. These systems could drastically reduce operational costs by automating pickup, sorting, and delivery processes. Integrating drones with AI-driven inventory management and predictive delivery algorithms will allow companies to anticipate demand and route products dynamically. As eVTOL cargo aircraft mature, the concept of “airborne logistics hubs” may also emerge, enabling rapid long-distance transport between distribution centers without the need for airports. Together, these developments point toward a future where aerial logistics are not just an add-on, but a central pillar of modern supply chains. Improving Industrial Efficiency Across agriculture, energy, construction, and mining drones significantly improve efficiency by automating tasks that previously required expensive equipment or manual labor. By replacing manned inspection systems, drones can reduce labor costs, increase safety, and provide data of unprecedented detail (McKinsey, 2022). For example, farmers use drones for precision spraying and crop monitoring, reducing fertilizer and water usage. Energy companies deploy unmanned systems for pipeline inspections and powerline surveys, minimizing downtime and enhancing worker safety. Construction and mining firms rely on drones for site mapping, progress tracking, and 3D modeling, improving project accuracy while lowering operational costs. Beyond task automation, drones are becoming essential to data-driven industrial optimization. Equipped with thermal sensors, LiDAR, and multispectral cameras, unmanned systems can capture high-resolution data that feeds directly into AI analytics platforms. This allows companies to detect inefficiencies, predict equipment failure, and optimize resource allocation in real time. As industries move toward digital twins — virtual models of physical assets — drones will play a key role in continuously updating these systems with accurate spatial and environmental data. The result is a more responsive, efficient, and resilient industrial ecosystem that leverages aerial automation for competitive advantage. Regulatory Environment and Market Growth Regulation remains the single most influential factor shaping the global drone market. Governments are gradually introducing frameworks to enable Beyond Visual Line of Sight (BVLOS) operations, Remote ID tracking, and certification standards for commercial drones. Regions like the European Union have adopted unified risk-based rules through EASA, while the United States continues to refine its Part 107 and UTM integration policies through the FAA. These regulatory milestones are essential for scaling commercial drone usage, as they provide clarity to manufacturers, operators, and investors. As regulatory frameworks mature, they are also becoming a competitive advantage for regions that adopt them early. Countries that implement drone-friendly ecosystems — such as Singapore, the UAE, and Rwanda — are rapidly emerging as hubs for drone research, testing, and deployment. This regulatory momentum encourages multinational companies to establish operations in these markets, accelerating local innovation and talent development. Furthermore, harmonized international standards will make it easier for drone manufacturers to reduce production complexity and expand globally. Ultimately, the pace of market growth will depend not just on technological advancement but on how effectively governments balance innovation with safety, privacy, and public acceptance. Investment Trends Investment in drone-related technologies has surged, driven by the convergence of autonomy, artificial intelligence, and advanced manufacturing. Venture capital firms increasingly fund companies developing autonomous navigation systems, UTM software, battery technology, and specialized industrial drones. Defense investors continue to expand their portfolios into dual-use drone companies, reflecting growing geopolitical interest and national security incentives. Meanwhile, major tech firms and automotive companies are exploring opportunities in cargo drones, eVTOL aircraft, and autonomous mobility ecosystems. Beyond private investment, government funding and public–private partnerships are accelerating drone adoption globally. Many nations are launching test corridors, innovation hubs, and subsidies to attract drone startups and support local manufacturing. This trend is particularly strong in Asia and the Middle East, where governments see drones as strategic tools for digital transformation and economic diversification. As markets mature, investment is shifting from hardware-heavy startups toward software, analytics, and integrated airspace management solutions — reflecting a broader transition from drone manufacturing to drone ecosystems. This shift signals a long-term, sustainable evolution of the drone industry from early experimental phases to full-scale commercial and civil integration. III. Future Technologies The Need for Unmanned Traffic Management (UTM) As drones and future eVTOL air taxis multiply, low-altitude airspace will become increasingly crowded. To prevent collisions and maintain order, UTM frameworks — already being developed by NASA, the FAA, EASA, and ICAO — aim to coordinate autonomous flights using real-time tracking, automated route planning, and digital air corridors (Kopardekar, 2016). These systems will act as the “air-traffic control of the future,” but designed for far larger numbers of smaller, faster-moving vehicles. In addition, as demand grows, it is likely that UTM will evolve into a fully automated, AI-driven airspace ecosystem capable of managing thousands of simultaneous flights with minimal human oversight. Future systems could incorporate weather prediction, dynamic rerouting, and AI-powered detect-and-avoid features, which more than a technical upgrade, would transform the air mobility in the cities worldwide. Global Standardization Competition The need for standard UTM, drone certifications, communication systems, and detect-and-avoid technology is critical, but it also represents a geopolitical contest. The U.S., the European Union, and China are each developing distinct technological ecosystems, hoping their standards will dominate global markets. Whichever region’s standards become the international norm will shape supply chains, aircraft design, and regulatory practices for decades. This competition mirrors earlier battles over telecommunications and 5G. Nations that establish widely adopted drone standards will gain strategic advantages, including influence over global manufacturing, software ecosystems, and aviation governance. As a result, UTM and drone certification are no longer just technical debates — they have become instruments of national power, economic leverage and somehow geopolitical importance. Urban Safety and Privacy Issues In addition, another major concern for cities is the widespread adoption of drones itself, which translates into surveillance risks, noise pollution from frequent flights, and vulnerability to cyberattacks that could compromise flight controls. Therefore, urban areas need strict rules governing data collection, flight paths, and liability in case of accidents to maintain public trust and safety. In the future, cities will also require integrated emergency response protocols, stronger cybersecurity defenses, and digital identity systems for all unmanned aircraft. Public engagement and transparent oversight will play a major role in ensuring that drones enhance urban life without creating new forms of intrusion or risk. Managing these challenges will be essential for the successful adoption of unmanned urban mobility. Integration with Future Urban Infrastructure In line with the previous section, smart cities could incorporate drones into their core infrastructure. For example, vertiports, rooftop landing pads, sensor-equipped air corridors, and digital twins could enable efficient navigation and real-time monitoring. In addition, drones will become essential for urban mobility and public services – from medical or any goods deliveries to emergency response like fire unit responses. As cities evolve, this integration will create a hybrid transportation ecosystem, where ground vehicles, aerial drones, and automated control systems would operate in sync. Urban planning will increasingly consider airspace as a valuable layer of infrastructure, much like roads or power grids. Therefore, collaboration between governments, industry, and technology providers to design cities capable of supporting high-density autonomous air mobility is required. Conclusion Unmanned systems are redefining the global balance of power, transforming industrial processes, and reshaping urban futures. The convergence of autonomy, AI, and networked airspace introduces both unprecedented opportunity and profound risk. Geopolitically, drones dilute traditional military dominance; economically, they catalyze a new airborne industrial revolution; technologically, they push societies toward complex management of shared automated airspace. Future policy, regulation, and innovation will determine whether unmanned systems become drivers of prosperity or vectors of instability. References Altman, H. (2025, November 13). Russia Creates New Military Branch Dedicated to Drone Warfare. The War Zone (TWZ). https://www.twz.com/news-features/russia-creates-new-military-branch-dedicated-to-drone-warfare Amazon. (2023). Prime Air: The Future of Drone Delivery. Amazon Corporate Publications. Biddle, S., & Oelrich, I. (2016). Future Warfare in the Age of Drones. Council on Foreign Relations. Deloitte. (2022). Drones in Industrial Operations: Transforming Asset Inspection and Performance. Deloitte Insights. FAA (Federal Aviation Administration). (2023). Integration of Unmanned Aircraft Systems into the National Airspace System. U.S. Department of Transportation. FAA (Federal Aviation Administration). (2025). Drones. https://www.faa.gov/uas Fischer, S. (2020). China’s Military–Civil Fusion Strategy: A View from Washington. U.S.–China Economic and Security Review Commission. Kania, E. B. (2020). Learning Warfare from the Laboratory: China’s Progress in Military Innovation. Center for a New American Security (CNAS). Kesteloo, H. (2025, September 29). Global Military Drone Race Intensifies as Nations Rush to Copy Iran’s Shahed Design. Medium. https://medium.com/@hayekesteloo/global-military-drone-race-intensifies-as-nations-rush-to-copy-irans-shahed-design-404badf482fb Kopardekar, P. (2016). Unmanned Aircraft System (UAS) Traffic Management (UTM) Concept of Operations. NASA Ames Research Center. McKinsey & Company. (2022). The Commercial Drone Market Outlook: Insights on Market Growth, Industrial Adoption, and Regulation. McKinsey Robotics & Automation Practice. Mehta, A. (2022). Counter-Drone Systems and the Future of Air Defense. Defense News. Newton, M. (2025, November 3). How Are Drones Changing War? The Future of the Battlefield. Center for European Policy Analysis (CEPA). https://cepa.org/article/how-are-drones-changing-war-the-future-of-the-battlefield/ Péria-Peigné, L. (2023, April 17). TB2 Bayraktar: Big Strategy for a Little Drone. IFRI. https://www.ifri.org/en/memos/tb2-bayraktar-big-strategy-little-drone PwC. (2023). Clarity from Above: Global Drone Market Analysis. PwC Global. Roland Berger. (2022). Urban Air Mobility: The Rise of the Drone Economy. Roland Berger Strategy Consultants. Rwanda Civil Aviation Authority. (2021). Regulatory Framework for Drone Delivery and BVLOS Operations. Government of Rwanda. Sadot, U. (n.d.). Proliferated Drones: A Perspective on Israel. Center for a New American Security (CNAS). https://drones.cnas.org/reports/a-perspective-on-israel/ Schmidt, E., Work, R., & Clyburn, M. (2021). Final Report: National Security Commission on Artificial Intelligence. U.S. Government Printing Office. Singer, P. W. (2009). Wired for War: The Robotics Revolution and Conflict in the 21st Century. Penguin Books. Statista. (2023). Global Drone Market Value and Investment Trends. Statista Market Outlook. Vision of Humanity. (2024, June 13). How Drones Have Shaped the Nature of Conflict. https://www.visionofhumanity.org/how-drones-have-shaped-the-nature-of-conflict/ Wing (Alphabet). (2023). Autonomous Delivery Networks and Future Logistics. Wing Technical Publications. Zipline. (2022). Operational Impact of Automated Medical Delivery by Drone. Zipline International Case Studies.

Diplomacy
Prime Minister's Office (GODL-India), GODL-India <https://data.gov.in/sites/default/files/Gazette_Notification_OGDL.pdf>, via Wikimedia Commons

Media statements by the President of Russia and the Prime Minister of India

by Vladimir Putin , Narendra Modi

Following Russian-Indian talks, Vladimir Putin and Prime Minister of India Narendra Modi made statements for the media. The statements were preceded by a ceremony for the exchange of signed documents. Prime Minister of India Narendra Modi (retranslated): Your Excellency Vladimir Putin, my dear friend, Representatives of the two countries, and our friends from India, good afternoon. I am delighted to welcome President Putin to the 23rd Russia–India Annual Summit. President Vladimir Putin’s visit to India is taking place at a time marked by several historical dates in our relations. President Putin laid the groundwork for our strategic cooperation 25 years ago, and 15 years ago, in 2010, we upgraded our partnership to the level of a special privileged strategic partnership. Over the past 25 years, President Putin has been relentless in promoting these relations by demonstrating his wise leadership and vision. Regardless of the circumstances, it is his leadership that has reinforced our mutual relations and enabled us to achieve new heights. I would like to express my sincere gratitude to President Putin for his friendship and for his unwavering commitment to working with India. Friends, The world has faced numerous ups and downs over the past 80 years, during which humankind has had to endure many crises and challenges. And throughout this time, the friendship between Russia and India has successfully weathered these storms. These relations are based on mutual respect and deep trust and have invariably stood the test of time. Today, we discussed our ties and cooperation in all their aspects with a view to creating an even more solid foundation. We want to reinforce our economic cooperation and elevate it to a new level. This is the objective we share and it is our shared priority. To make this a reality, we have agreed to implement a programme for economic cooperation until 2030. It will provide for diversifying our trade and investment, making them more balanced and sustainable. At the same time, it will help unlock new dimensions in our cooperation. Today, President Putin and I will be taking part in the Russia–India Business Forum. I am convinced that this platform will also help strengthen our business ties and open new doors for exports, joint manufacture and technical innovation. Both countries have been proactive in working on a free trade agreement between the Eurasian Economic Union and our country. Our cooperation in agriculture and fertilizers is extremely important for our food security and the prosperity of our farmers. I am happy that our countries will work together to promote our mutual production of urea. Friends, Promoting connectivity between our countries is another priority for us. We will redouble our efforts regarding the discussions on the North-South International Transport Corridor and the Vladivostok-Chennai Maritime Corridor. I am confident that we will effectively cooperate in the interests of promoting polar trade via local trade routes. We have offered an opportunity to strengthen our cooperation in the Arctic, which will create new jobs for Indian young people. At the same time, our deep cooperation in shipbuilding will help us boost our joint initiatives. This is yet another important example of our mutually beneficial cooperation, which is increasing the number of jobs and skills while strengthening regional connectivity. Energy security is another important pillar of partnership between Russia and India. Our cooperation in the field of civilian nuclear energy, which is rooted in our history, has helped us uphold our commitment to providing clean energy, which is extremely important for both countries. I have no doubt that our mutually beneficial cooperation in the field of critical minerals will also be important for a safe and diversified provision of resources to the world. We also maintain our cooperation in such areas as clean energy, high technologies and modern industries. Friends, Our cultural relations and ties between individual representatives of our countries are of special importance for relations between Russia and India. Over the past decades, our peoples have demonstrated respect and admiration for each other’s cultures, and we have coordinated various measures to further strengthen this cooperation. The recent opening of two Indian consulates in Russia is a significant step forward, facilitating contacts for all our citizens and bringing our nations even closer together. This October, hundreds of thousands of pilgrims received blessings at the sacred relics of Buddha Shakyamuni in Kalmykia. I am confident that we will soon implement a 30-day visa-free regime for tourist groups, which will greatly enhance travel between our countries. This measure will not only bring our peoples closer but also invigorate our societies and unlock new opportunities. I am therefore pleased that today we were able to sign two key agreements to advance this initiative. Our collaboration will also deepen in education and professional development, including through increased student and academic exchanges. Friends, Today, we discussed a range of pressing regional and global issues. On Ukraine, India’s position has been consistent from the outset: we stand for peace. We welcome all initiatives and efforts aimed at achieving a peaceful, long-term resolution of this conflict. India has always been ready to support such efforts, and we will continue to do so. India and Russia have always supported one another and worked shoulder to shoulder in the fight against terrorism. The terrorist attack in Pahalgam and the cowardly atrocity at Crocus City Hall are connected by a common, hateful ideology. India firmly believes that terrorism constitutes a direct assault on universal human values. Our unity within the global community is the only effective way to combat this evil. We cooperate closely within the UN, the G20, the SCO, BRICS, and other multilateral forums. We will continue this essential dialogue and cooperation across all these platforms. Your Excellency, I am confident that our enduring friendship will provide the strength needed to address global challenges. Together, we can help lead the way towards a more prosperous future. Once again, I thank you and all members of your delegation for your visit to India. Thank you very much. President of Russia Vladimir Putin: Mr. Prime Minister, dear friend, Ladies and gentlemen, My sincere thanks to the President of the Republic of India, Droupadi Murmu, to you, Mr Prime Minister, and to all our Indian colleagues for the exceptionally warm and cordial welcome extended to the Russian delegation. The discussions we have just concluded with our Indian colleagues, along with our highly productive one-on-one conversation last night – for which I thank you again, Mr Modi, for your generous hospitality – were held in a constructive and friendly spirit, reflecting the privileged partnership between Russia and India. I would note that the Prime Minister and I have established a close working and personal rapport. We have met at the SCO summit in September, we maintain regular contact by telephone and personally oversee the development of our strategic cooperation across all key areas, as well as the progress of major bilateral projects. Today, with the participation of our delegations, we conducted a thorough and comprehensive review of the entire spectrum of Russian-Indian cooperation. We also exchanged views on current international and regional issues. The joint statement we have adopted outlines clear priorities for advancing our ties in politics, security, trade, the economy, and cultural and humanitarian affairs. As you have seen, this was complemented by the signing of a substantial package of intergovernmental, interdepartmental, and corporate agreements. Many of these documents are aimed at expanding our economic partnership. This is only natural, as our nations are important partners in trade, investment, and technology. Last year, our bilateral trade grew by a further 12 percent, reaching a new record. While various estimates differ slightly, the consensus places the figure somewhere between US$64 and US$65 billion. We project trade will stand at a comparable level by year’s end. That said, we believe there is clear potential to increase this volume to US$100 billion. To realise this ambitious goal, we have now agreed upon a joint Programme for the Development of Russian-Indian Economic Cooperation until 2030. This comprehensive roadmap provides clear guidelines. Our intergovernmental commission and the relevant economic ministries and agencies are tasked with removing barriers to the flows of goods and capital, implementing joint industrial projects, and deepening our collaboration in technology and investment. Today, His Excellency the Prime Minister shared a comprehensive list of issues with us. It goes without saying that both Russia and India will be extremely diligent and responsive in reviewing them. Make no mistake, we will work on this matter. Of course, having India create a free trade zone with the Eurasian Economic Union would help boost Russia-India business ties. The effort to draft an agreement to this effect is already in progress. I must express my satisfaction with the fact that the two countries have been consistent in their commitment to switching to national currencies in mutual transactions. Their share in business deals has already reached 96 percent. Our two countries have developed resilient interbank channels for lending and financial transactions. Russian economic actors have been making wider use of the rupees they generate from export contracts. Major joint projects receive their funding in Russian rubles. There has been positive momentum in our energy partnership. Russia is a reliable supplier of energy resources and everything India needs for developing its energy sector. We are ready to continue ensuring uninterrupted fuel supplies for the Indian economy to support its rapid expansion. Of course, our bilateral energy cooperation goes far beyond this horizon. The flagship project to build India’s biggest NPP, Kudankulam, is underway. Two out of six reactors have been connected to the power grid, while the other four are in the engineering and construction stages. Once this NPP reaches its full capacity, it will make a meaningful contribution to India’s energy mix, helping Indian companies and households access affordable and clean energy. We believe that building small modular reactors and floating NPPs could also be relevant, just as using nuclear technology for non-energy purposes, including in healthcare, agriculture and other sectors. We are also working with our Indian partners to create new effective international transport logistics routes. This includes a project to create the North-South corridor linking Russia and Belarus to the Indian Ocean. Infrastructure development along the Trans-Arctic Transport Corridor, including the Northern Sea Route as its main artery, offers ample opportunities for expanding bilateral trade. There are many other economic sectors in which Russia and India have built a positive track record. We are working on joint initiatives in manufacturing, machine building, digital technology, space exploration and other research-intensive domains. For example, a business agreement that was signed as part of the visit provides for building a major Russian-Indian pharmaceutical plant in the Kaluga Region for producing high-quality anticancer medicine using cutting-edge Indian technology. At the same time, Russian companies will start producing their goods as part of the Make in India programme, which is Prime Minister Modi’s flagship project. Prospects for strengthening interaction between Russian and Indian entrepreneurs and business communities are being discussed in detail at the business forum that is currently underway in New Delhi. Mr Prime Minister and I will attend its plenary session later today. Russian-Indian humanitarian cooperation is ongoing in many spheres. Our peoples have been sincerely interested in each other’s traditions, history and spiritual values for centuries. Our scientific and educational contacts, as well as youth and public exchanges are actively developing. The regular cross festivals of Russian and Indian films invariably enjoy success. Mutual tourist flows grow every year. The Russian RT channel will begin broadcasting to India today. This will certainly help the Indian audience learn more about Russia and Russians and acquire objective information about current developments in our country. Our discussions on key global and regional issues have reaffirmed the similarity of our countries’ positions. Russia and India pursue an independent and sovereign foreign policy. We are working together with our allies in BRICS, the SCO and other countries of the Global Majority to promote the shaping of a more just and democratic multipolar world order, and to protect the fundamental principles of international law enshrined in the UN Charter. These include the right of every country to its own path of development, the preservation of its own cultural and civilisational identity, respect for sovereignty and a delicate balance of interests of all members of the international community. Russia and India, as the founding nations of BRICS, have done and continue to do a great deal to enhance the prestige of that organisation. As you know, India will assume the BRICS chairmanship next year. We will provide all-round assistance to our Indian friends in their work on the current BRICS agenda. Of course, I would also like to say that Russia and India have traditionally worked closely together in the military-technical sphere. Our country has been assisting the modernisation of the Indian army, including the air defence, air force and navy, for over 50 years. Overall, we are certainly satisfied with the results of our talks. Our plans include a meeting with President of India Droupadi Murmu. However, I can already express my confidence that this visit and the agreements reached will effectively promote the further strengthening of the Russian-Indian strategic partnership for the benefit of the people of India and Russia. Thank you.

Defense & Security
Soldier in engineering role uses AI application on laptop to manage server hub systems. Army commander reviews secret intelligence information using artificial intelligence in data center, camera A

Dual-Use AI Technologies in Defense: Strategic Implications and Security Risks

by Mayukh Dey

Introduction Artificial intelligence has become a critical technology in the 21st century, with applications spanning healthcare, commerce, and scientific research. However, the same algorithms that enable medical diagnostics can guide autonomous weapons, and the same machine learning systems that power recommendation engines can identify military targets. This dual-use nature, where technologies developed for civilian purposes can be repurposed for military applications, has positioned AI as a central element in evolving global security dynamics. The strategic implications are substantial. China views AI as essential for military modernization, with the People's Liberation Army planning to deploy "algorithmic warfare" and "network-centric warfare" capabilities by 2030 (Department of Defense, 2024). Concurrently, military conflicts in Ukraine and Gaza have demonstrated the operational deployment of AI-driven targeting systems. As nations allocate significant resources to military AI development, a critical question emerges: whether the security benefits of dual-use AI technologies can be realized without generating severe humanitarian consequences. The Reversal Commercial Innovation Driving Military Modernization Historically, military research and development drove technological innovation, with civilian applications emerging as secondary benefits, a phenomenon termed "spin-off." The internet, GPS, and microwave ovens all originated in defense laboratories. This dynamic has reversed. Commercially developed technologies now increasingly "spin into" the defense sector, with militaries dependent on technologies initially developed for commercial markets. This reversal carries significant implications for global security. Unlike the Cold War era, when the United States and Soviet Union controlled nuclear weapons development through state programs, AI innovation occurs primarily in private sector companies, technology firms, and university research institutions. Organizations like DARPA influence global emerging technology development, with their projects often establishing benchmarks for research and development efforts worldwide (Defense Advanced Research Projects Agency, 2024). This diffusion of technological capacity complicates traditional arms control frameworks based on state-controlled military production. The scale of investment is considerable. The U.S. Department of Defense's unclassified AI investments increased from approximately $600 million in 2016 to about $1.8 billion in 2024, with more than 685 active AI projects underway (Defense One, 2024). China's spending may exceed this figure, though exact data remains unavailable due to the opacity of Chinese defense budgeting. Europe is pursuing comparable investments, with the EU committing €1.5 billion to defense-related research and development through initiatives like the European Defence Fund. Dual-Use Applications in Contemporary Warfare AI's military applications span the spectrum of warfare, from strategic planning to tactical execution. Current deployments include: Intelligence, Surveillance, and Reconnaissance (ISR): AI systems process large volumes of sensor data, satellite imagery, and signals intelligence to identify patterns beyond human analytical capacity. In 2024, "China's commercial and academic AI sectors made progress on large language models (LLMs) and LLM-based reasoning models, which has narrowed the performance gap between China's models and the U.S. models currently leading the field," enabling more sophisticated intelligence analysis (Department of Defense, 2024). Autonomous Weapons Systems: Autonomous weapons can identify, track, and engage targets with minimal human oversight. In the Russia-Ukraine war, drones now account for approximately 70-80% of battlefield casualties (Center for Strategic and International Studies, 2025). Ukrainian officials predicted that AI-operated first person view drones could achieve hit rates of around 80%, compared to 30-50% for manually piloted systems (Reuters, 2024). Predictive Maintenance and Logistics: The U.S. Air Force employs AI in its Condition-Based Maintenance Plus program for F-35 fighters, analyzing sensor data to predict system failures before occurrence, reducing downtime and operational costs. Command and Control: AI assists military commanders in processing battlefield information and evaluating options at speeds exceeding human capacity. Project Convergence integrates AI, advanced networking, sensors, and automation across all warfare domains (land, air, sea, cyber, and space) to enable synchronized, real-time decision-making. Cyber Operations: AI powers both offensive and defensive cyber capabilities, from automated vulnerability discovery to malware detection and sophisticated social engineering campaigns. Gaza and Ukraine: AI in Contemporary Conflict Recent conflicts have provided operational demonstrations of AI's military applications and associated humanitarian costs. Israel's Lavender system reportedly identified up to 37,000 potential Hamas-linked targets, with sources claiming error rates near 10 percent (972 Magazine, 2024). An Israeli intelligence officer stated that "the IDF bombed targets in homes without hesitation, as a first option. It's much easier to bomb a family's home" (972 Magazine, 2024). The system accelerated airstrikes but also contributed to civilian casualties, raising questions about algorithmic accountability. The system's design involved explicit tradeoffs: prioritizing speed and scale over accuracy. According to sources interviewed by 972 Magazine, the army authorized the killing of up to 15 or 20 civilians for every junior Hamas operative that Lavender marked, while in some cases more than 100 civilians were authorized to be killed to assassinate a single senior commander (972 Magazine, 2024). Foundation models trained on commercial data lack the reasoning capacity humans possess, yet when applied to military targeting, false positives result in civilian deaths. Data sourced from WhatsApp metadata, Google Photos, and other commercial platforms created targeting profiles based on patterns that may not correspond to combatant status. Ukraine has implemented different approaches, using AI to coordinate drone swarms and enhance defensive capabilities against a numerically superior adversary. Ukrainian Deputy Defense Minister Kateryna Chernohorenko stated that "there are currently several dozen solutions on the market from Ukrainian manufacturers" for AI-augmented drone systems being delivered to armed forces (Reuters, 2024). Ukraine produced approximately 2 million drones in 2024, with AI-enabled systems achieving engagement success rates of 70 to 80 percent compared to 10 to 20 percent for manually controlled drones (Center for Strategic and International Studies, 2025). Both sides in the conflict have developed AI-powered targeting systems, creating operational arms race dynamics with immediate battlefield consequences. Civilian Harm: Technical and Legal Limitarions The integration of AI into lethal military systems raises humanitarian concerns extending beyond technical reliability. AI's inability to uphold the principle of distinction, which requires protecting civilians by distinguishing them from combatants in compliance with international humanitarian law, presents fundamental challenges. Current AI systems lack several capabilities essential for legal warfare:  Contextual Understanding: AI cannot comprehend the complex social, cultural, and situational factors that determine combatant status. A person carrying a weapon might be a combatant, a civilian defending their home, or a shepherd protecting livestock.  Proportionality Assessments: International humanitarian law requires that military attacks not cause disproportionate civilian damage. Human Rights Watch noted that it is doubtful whether robotic systems can make such nuanced assessments (Human Rights Watch, 2024).  Moral Judgment: Machines lack the capacity for compassion, mercy, or understanding of human dignity, qualities that have historically provided safeguards against wartime atrocities.  Accountability: With autonomous weapon systems, responsibility is distributed among programmers, manufacturers, and operators, making individual accountability difficult to establish. As one expert observed, "when AI, machine learning and human reasoning form a tight ecosystem, the capacity for human control is limited. Humans have a tendency to trust whatever computers say, especially when they move too fast for us to follow" (The Conversation, 2024). The risks extend to specific populations. Autonomous weapons systems trained on data predominantly consisting of male combatants in historical records could create algorithmic bias. In the case of Lavender, analysis suggests "one of the key equations was 'male equals militant,'" echoing the Obama administration's approach during drone warfare operations (The Conversation, 2024). Communities of color and Muslim populations face heightened risks given historical patterns of discriminatory force deployment. Export Controls and Technology Transfer Challenges Recognizing AI's strategic importance, governments have implemented export control regimes. The U.S. Bureau of Industry and Security now requires licenses for exports of advanced computing chips and AI model weights, imposing security conditions to safeguard storage of the most advanced models. These controls face inherent tensions. Overly broad restrictions risk hampering legitimate research and commercial innovation. Analysis suggests that if AI technology is too extensively controlled, American universities may face difficulties performing AI research, resulting in a less robust U.S. AI ecosystem. Insufficient controls enable adversaries to acquire cutting-edge capabilities. The effectiveness of export controls remains uncertain. In 2024, hundreds of thousands of chips, totaling millions of dollars, were smuggled into China through shell companies, varying distributors, and mislabeling techniques (Oxford Analytica, 2025). China's DeepSeek models, which achieved performance approaching U.S. systems, were reportedly trained on chips that circumvented export restrictions. International Governance: Fragmentation and Competing Frameworks The international community has struggled to develop coherent governance frameworks for dual-use AI. Rather than a cohesive global regulatory approach, what has emerged is a collection of national policies, multilateral agreements, high-level summits, declarations, frameworks, and voluntary commitments. Multiple international forums have addressed AI governance: ● The UN Secretary-General created an AI Advisory Board and called for a legally binding treaty to prohibit lethal autonomous weapons systems without human control, to be concluded by 2026 ● The Group of Governmental Experts on Lethal Autonomous Weapons Systems has held discussions under the Convention on Certain Conventional Weapons since 2013, with limited concrete progress ● NATO released a revised AI strategy in 2024, establishing standards for responsible use and accelerated adoption in military operations ● The EU's AI Act, adopted in 2023, explicitly excludes military applications and national security from its scope This fragmented landscape reflects geopolitical divisions. The perceived centrality of AI for competition has led the U.S. to position itself as leader of ideologically aligned countries in opposition to China, including for security purposes. China promotes its own governance vision through initiatives like the Belt and Road, exporting technology standards alongside infrastructure. Strategic Stability Implications AI creates strategic stability challenges. Autonomous weapons enable substitution of machines for human soldiers in many battlefield roles, reducing the human cost and thus political cost of waging offensive war. This could increase the frequency of conflicts between peer adversaries, each believing they can prevail without significant domestic casualties. For conflicts between non-peer adversaries, reduced casualties further diminish domestic opposition to wars of aggression. The implications extend beyond conventional warfare. Armed, fully-autonomous drone swarms could combine mass harm with lack of human control, potentially becoming weapons of mass destruction comparable to low-scale nuclear devices. The technical barriers to such systems are declining as components become commercially available. AI also complicates nuclear stability. Advances in AI-enhanced sensors and data processing could undermine second-strike capabilities by improving detection of mobile missile launchers and submarines. This erosion of assured retaliation could incentivize first strikes during crises. Simultaneously, AI systems managing nuclear command and control create risks of accidents, miscalculations, or unauthorized launches. Ethical Framework Limitations The integration of AI into warfare strains traditional ethical frameworks. Just War Theory requires that combatants maintain moral responsibility for their actions, possess the capacity to distinguish combatants from civilians, and apply proportionate force. Automation bias and technological mediation weaken moral agency among operators of AI-enabled targeting systems, diminishing their capacity for ethical decision-making. When operators interact with targeting through screens displaying algorithmic recommendations rather than direct observation, psychological distance increases. This mediation risks transforming killing into a bureaucratic process. The operator becomes less a moral agent making decisions and more a technician approving or rejecting algorithmic suggestions. Furthermore, industry dynamics, particularly venture capital funding, shape discourses surrounding military AI, influencing perceptions of responsible AI use in warfare. When commercial incentives align with military applications, the boundaries between responsible innovation and reckless proliferation become unclear. Companies developing AI for civilian markets face pressure to expand into defense contracting, often with insufficient ethical deliberation. Conclusion Dual-use AI technologies present both opportunities and risks for international security. One trajectory leads toward normalized algorithmic warfare at scale, arms races in autonomous weapons that erode strategic stability, and inadequate international governance resulting in civilian harm. An alternative trajectory involves international cooperation that constrains the most dangerous applications while permitting beneficial uses. The timeframe for establishing governance frameworks is limited. AI capabilities are advancing rapidly, and widespread proliferation of autonomous weapons will make policy reversal substantially more difficult. The challenge resembles nuclear non-proliferation but unfolds at greater speed, driven by commercial incentives rather than state-controlled programs. Because AI is a dual-use technology, technical advances can provide economic and security benefits. This reality means unilateral restraint by democratic nations would cede advantages to authoritarian competitors. However, uncontrolled competition risks adverse outcomes for all parties. Concrete action is required from multiple actors. States must strengthen multilateral agreements through forums like the UN Convention on Certain Conventional Weapons to establish binding restrictions on autonomous weapons without meaningful human control. NATO and regional security alliances should harmonize AI ethics standards and create verification mechanisms for military AI deployments. Military institutions must implement mandatory human-in-the-loop requirements for lethal autonomous systems and establish clear chains of accountability for AI-driven targeting decisions. Technology companies developing dual-use AI systems bear responsibility for implementing ethical safeguards and conducting thorough threat modeling before commercial release. Industry alliances should establish transparency standards for military AI applications and create independent audit mechanisms. Universities and research institutions must integrate AI ethics and international humanitarian law into technical training programs. Export control regimes require coordination between the United States, EU, and allied nations to prevent regulatory arbitrage while avoiding overreach that stifles legitimate research. Democratic governments should lead by demonstrating that military AI can be developed within strict ethical and legal constraints, setting standards that distinguish legitimate security applications from destabilizing weapons proliferation. As Austrian Foreign Minister Alexander Schallenberg observed, this represents the Oppenheimer moment of the current generation, recognizing that dual-use AI, like nuclear weapons, represents a technology whose military applications demand collective restraint. The policy choices made in the next few years will have long-term consequences. They will determine whether AI becomes a tool for human advancement or an instrument of algorithmic warfare. The technology exists; the policy framework remains to be established. The actors are identified; the question is whether they possess the political will to act before proliferation becomes irreversible. References 972 Magazine (2024) 'Lavender': The AI machine directing Israel's bombing spree in Gaza. https://www.972mag.com/lavender-ai-israeli-army-gaza/ Center for Strategic and International Studies (2024) Where the Chips Fall: U.S. Export Controls Under the Biden Administration from 2022 to 2024. https://www.csis.org/analysis/where-chips-fall-us-export-controls-under-biden-administration-2022-2024 Center for Strategic and International Studies (2025) Ukraine's Future Vision and Current Capabilities for Waging AI-Enabled Autonomous Warfare. https://www.csis.org/analysis/ukraines-future-vision-and-current-capabilities-waging-ai-enabled-autonomous-warfare Defense One (2023) The Pentagon's 2024 Budget Proposal, In Short. https://www.defenseone.com/policy/2023/03/heres-everything-we-know-about-pentagons-2024-budget-proposal/383892/ Department of Defense (2024) Military and Security Developments Involving the People's Republic of China 2024. https://media.defense.gov/2024/Dec/18/2003615520/-1/-1/0/MILITARY-AND-SECURITY-DEVELOPMENTS-INVOLVING-THE-PEOPLES-REPUBLIC-OF-CHINA-2024.PDF Foreign Policy Research Institute (2024) Breaking the Circuit: US-China Semiconductor Controls. https://www.fpri.org/article/2024/09/breaking-the-circuit-us-china-semiconductor-controls/ Human Rights Watch (2024) A Hazard to Human Rights: Autonomous Weapons Systems and Digital Decision-Making. https://www.hrw.org/report/2025/04/28/a-hazard-to-human-rights/autonomous-weapons-systems-and-digital-decision-making National Defense Magazine (2024) Pentagon Sorting Out AI's Future in Warfare. https://www.nationaldefensemagazine.org/articles/2024/10/22/pentagon-sorting-out-ais-future-in-warfare Queen Mary University of London (2024) Gaza war: Israel using AI to identify human targets raising fears that innocents are being caught in the net. https://www.qmul.ac.uk/media/news/2024/hss/gaza-war-israel-using-ai-to-identify-human-targets-raising-fears-that-innocents-are-being-caught-in-the-net.html Reuters (2024) Ukraine rolls out dozens of AI systems to help its drones hit targets. https://euromaidanpress.com/2024/10/31/reuters-ukraine-rolls-out-dozens-of-ai-systems-to-help-its-drones-hit-targets/

Defense & Security
Map of Arctic Ocean styled in grey color. Selective focus on label, close-up view

Greenland at the Center of the Arctic Power: US NSS 2025, NATO Cohesion, and the New Geopolitics of the High North.

by World & New World Journal

In the chilling expanse of the Arctic, where ice and ocean frame the edges of the known world, a geopolitical drama has quietly gathered momentum. The world’s strategic gaze is no longer fixed solely on the traditional theatres of diplomacy in Europe, the Middle East, or the Indo-Pacific. Instead, the High North — and particularly Greenland, the vast Arctic territory within the Kingdom of Denmark — has emerged as a critical arena where great-power competition, national security priorities, global trade dynamics, and climate change converge. This transformation did not occur overnight. For decades, military planners, geographers, and strategic thinkers recognized the Arctic’s latent importance. Yet only in recent years have those projections translated into urgent geopolitical reality. At the center of this shift stands the United States’ National Security Strategy 2025 (NSS 2025), unveiled in late 2025, which redefines American priorities in a world shaped by renewed great-power rivalry. While the strategy addresses multiple global theatres, its emphasis on territorial security, critical resources, strategic geography, and adversarial competition underscores why Greenland has moved from the periphery to the heart of international geopolitics. Greenland today sits at the intersection of U.S. homeland defense, NATO cohesion, Arctic militarization, global trade transformation, and the accelerating race for critical minerals. The tensions surrounding the island reveal not only disputes among allies but also deeper structural changes in the international system. This article argues that Greenland is no longer a remote outpost but a strategic fulcrum of the Arctic, whose future will shape the balance of power in the High North and beyond. America’s Strategic Recalibration in the 2025 National Security Strategy The NSS 2025 marks a clear departure from post-Cold War doctrines centered on expansive multilateralism and global institution-building. Instead, it reflects a return to strategic realism, prioritizing the protection of core national interests, territorial security, and the prevention of adversarial dominance in critical regions. The strategy defines the United States’ primary objective as “the continued survival and safety of the United States as an independent, sovereign republic,” coupled with maintaining decisive military, technological, and economic power. Although the Indo-Pacific remains central, the strategy elevates the Western Hemisphere and adjacent strategic regions, emphasizing the need to prevent hostile encroachment on areas vital to U.S. security and economic resilience. Supply chains, critical minerals, missile defense, and strategic geography feature prominently throughout the document. Within this framework, Greenland has transitioned from a peripheral Arctic territory to a linchpin of U.S. strategic defense and resource security. While the NSS does not outline a standalone Arctic doctrine, its underlying logic — securing access to essential materials, protecting strategic approaches to the homeland, and denying adversaries positional advantages — aligns directly with the intensifying focus on Greenland. Latest developments: US position over Greenland. As already mentioned, the release of the NSS 2025 made one thing clear: US foreign policy is now defined by an assertive approach towards the entire Western Hemisphere – where Greenland is part of –. Moreover, this implies that the US might claim the right to intervene in other countries’ domestic affairs in order to guarantee its strategic and corporate interests. Therefore, after Venezuela – in addition to its rhetoric towards Cuba and Mexico – Greenland has become a hot topic, due its geopolitical, economical and strategical position and of course as part of the US “national security” and interest. The interest from the US over Greenland is not new, during Trump’s first administration an attempt to buy Greenland occurred and even at the beginning of his second administration there were comments to obtain the island. Next are presented the developments that occurred until January 22nd: - The US-Greenland-NATO crisis escalated when Trump’s desire to have Greenland either “by hook or by crook” sparked the global debate, while Europeans, Greenlanders and Danish rejected his ideas and showed support for Greenland and the Kingdom of Denmark itself. - A later diplomatic meeting between Danish, Greenlandic and US officials in Washington ended up in a “fundamental disagreement” over the sovereignty of the island on January 14th. - A joint statement of several European countries supporting the idea that “Greenland belongs to its people, and only Denmark and Greenland can decide on matters concerning their relations” was released on January 18th. - Launch of “Operation Arctic Endurance” and the initial deployment of a small number of troops from the European allies plus Danish soldiers. By January 18th there were over 100 troops in Nuuk and another 100 in Kangerlussuaq. (numbers could be increased in a short time). - Worries within Europe and the NATO allies. In addition, China urged the US to stop using the so-called “China threat” as a pretext for pursuing its own interest. - General concern for Greenlanders and several protest in Denmark, and Greenland against the US actions. - The imposition of 10% tariffs from the US over Denmark, Norway, Sweden, France, Germany, Finland, the UK and the Netherlands that would increase by 25% on June 1st if there is no deal reached. After Trump’s speech in the World Economic Forum, he confirmed that tariffs threats were off the table as there was a “framework of a future deal” for Greenland. In summary, in January 2026, Washington’s posture toward Greenland has sharpened into a high-profile mix of strategic urgency and political brinkmanship, framed publicly as an Arctic and homeland-security imperative. Recent reporting describes President Donald Trump repeatedly arguing the U.S. “needs” Greenland for security, while also signaling limits on how far he would go — saying at the World Economic Forum in Davos that he would not use military force to acquire it. At the same time, the episode has clearly strained allied politics: coverage indicates Denmark has insisted Greenland’s sovereignty is not negotiable even as the U.S. debate escalated, and Greenland’s own authorities have taken the moment seriously enough to urge practical preparedness at home. The most concrete “near-term” direction emerging in January 2026 is not annexation but a NATO – and alliance-linked security bargain. Multiple outlets report Trump backing away from threatened tariffs after announcing a “framework” tied to future Arctic security cooperation with NATO leadership — suggesting the administration is trying to convert its Greenland pressure campaign into expanded defense access, posture, or burden-sharing rather than an immediate territorial transfer. Even where details remain vague, the logic is consistent: Greenland’s geography — especially its role in Arctic air/sea lanes and missile-warning architecture — makes it a leverage point for U.S. deterrence and homeland defense planning, and U.S. officials appear to be testing what they can gain diplomatically inside the alliance system when outright sovereignty change is off the table. This posture also lines up with the 2025 National Security Strategy (NSS), which elevates the Western Hemisphere as the top priority region and argues the U.S. will “deny non-Hemispheric competitors” the ability to “own or control strategically vital assets” in the hemisphere, while calling for readjusting military presence and “establishing or expanding access in strategically important locations.” While the NSS text excerpt does not name Greenland in the lines above, its framework — reasserting hemispheric primacy, blocking external footholds, and expanding access — maps neatly onto a Greenland approach that treats the island as a critical node in Arctic security competition and infrastructure control. European Parliament analysis likewise characterizes the NSS as a “pivot” toward a Monroe Doctrine–style sphere-of-interest logic in the Western Hemisphere, reinforcing the idea that Greenland is being handled less as a narrow Denmark dispute and more as part of a broader hemispheric strategy. Greenland’s Geographic Centrality: The broader US security interest of the Island. Figure 1: Arctic states, counties and other administrative regions with capitals. Source: Map by Arto Vitikka, Arctic Centre, University of Lapland. Credit for the border data: Runfola, D. et al. (2020) geoBoundaries: A global database of political administrative boundaries. PLoS ONE 15(4): e0231866. https://doi.org/10.1371/journal.pone.0231866e. Figure 2: Arctic Population Centers. Map by Arto Vitikka, Arctic Centre, University of Lapland. When viewed from a polar perspective, the Arctic is not a distant fringe but the shortest connective space between North America, Europe, and Eurasia. The Arctic as seen in Figure 1 is composed of several administrative areas, including Canada, Alaska (USA), Russia, Norway, Sweden, Finland, Iceland and Greenland (Denmark). The latter can be said to be located at the center between North America and Europe and Eurasia, underscoring its geopolitical importance. In other words, Greenland occupies the central Atlantic–Arctic axis, the shortest air and missile trajectories between Russia and North America and a pivotal position between the Canadian Arctic Archipelago and the Russian Arctic coast. This geography carries deep strategic implications. First, Greenland is part of the so-called GIUK (Greenland-Iceland-UK) Gap, a crucial corridor for monitoring naval and air activity in the North Atlantic. The GIUK Gap played an important role during the Second World War and the Cold War and nowadays it has become crucial in securing air and sea surveillance through radar stations, while securing the sea lines of communication (SLOCs) as well as supply lines making them uninterrupted between NATO’s European members and the USA. The GIUK Gap can assist in ensuring maritime visibility and assist anti-submarine warfare (ASW) in case of conflicts. The presence of Russian submarines in the Arctic is a central pillar of Russia’s military strategy and nuclear deterrence, making the region one of the most militarized maritime spaces in the world. Russia views the Arctic as both a strategic sanctuary and a launch platform. In consequence, its Northern Fleet – headquartered on the Kola Peninsula –, is the most powerful of Russia’s fleets and operates a large share of its nuclear-powered ballistic missile submarines (SSBNs), such as the Borei and Delta IV classes. These submarines carry submarine-launched ballistic missiles (SLBMs) and are designed to remain hidden under Arctic ice, ensuring a second-strike capability in the event of a nuclear conflict. The ice cover, combined with Russia’s familiarity with Arctic waters, provides concealment and operational depth. In addition to SSBNs, Russia deploys nuclear-powered attack submarines (SSNs) and guided-missile submarines (SSGNs) in the Arctic. These vessels conduct intelligence gathering, protect ballistic missile submarines, and pose threats to NATO naval forces and undersea infrastructure, including communication cables. Russian submarines regularly transit through key chokepoints such as the GIUK Gap, bringing them into strategic relevance for Greenland, Iceland, and NATO’s anti-submarine warfare (ASW) posture. In addition, the Arctic also supports Russia’s broader bastion defense concept, which seeks to create heavily defended maritime zones where submarines can operate safely. Air defenses, surface ships, icebreakers, and coastal missile systems complement submarine operations. As climate change reduces sea ice and increases accessibility, Russian submarine activity in the Arctic is expected to remain intense, reinforcing the region’s importance for NATO surveillance, early warning systems, and transatlantic security — especially for locations like Greenland that sit astride critical Arctic–Atlantic routes. Second, Greenland’s high latitude makes it an ideal place for early detection of long-range missile launches. Russia has long-range intercontinental ballistic missiles (ICBMs), if ever launched from Russia toward the United States, the total flight time would be roughly between 25 to 35 minutes – depending on the launch location and target. But because of the Earth’s curvature, the shortest path from Russia to the continental US goes over the Arctic which is why Greenland is so strategically important for early detection and missile defense. In practical terms, US decision-makers would have only minutes to assess the threat and respond after a launch is detected. Establishments such as the U.S. Pituffik Space Base underscore how Greenland functions as a first line of surveillance against possible ballistic missile threats from the Eurasian landmass. Therefore, Greenland is indispensable to early-warning and missile-defense systems. Sensors, radars, and space-tracking infrastructure based on the island form a crucial layer of “U.S. homeland defense”. Finally, Greenland is the only large Arctic landmass under Western democratic control outside Eurasia. Russia dominates the Eurasian Arctic coastline, while Alaska and Canada anchor North America. Greenland bridges these spaces, serving as a keystone for transatlantic Arctic security. Its isolation does not diminish its importance; rather, it magnifies it. – making Greenland a linchpin of US homeland defense and NATO’s northern security architecture. Greenland and NATO: The Fragile Architecture of Arctic Security Figure 3: NATO’s and Russia’s militarization in the Arctic. Figure 3 exposes a stark asymmetry in the Arctic militarization between NATO and Russian. The latter maintains a dense, continuous network of military bases stretching from the Kola Peninsula to the Bering Strait. These installations support air defense, naval operations, missile forces, and surveillance — forming an integrated arc of control along Russia’s northern frontier. On the other hand, NATO’s Arctic posture is fundamentally different. It relies on discrete strategic nodes rather than territorial saturation, interoperability over mass and coordination among multiple sovereign states. Within this fragmented architecture, Greenland is NATO’s most critical node. Nonetheless, the US has presence in Greenland, specifically with the Pituffik Space Base (formerly Thule Air Base), which is located in northwest Greenland. This base – as mentioned before – is indispensable for early missile warning, space surveillance and tracking adversary launches across the polar region. While the UK has presence in Norway in the logistic Camp Viking site. Without Greenland, NATO’s Arctic posture would fracture into disconnected segments — North America on one side, Scandinavia on the other — with no central anchor. This reality explains the sharp European response in 2025–2026 to U.S. rhetoric suggesting unilateral action or coercive pressure regarding Greenland. The deployment of European troops under Operation Arctic Endurance was not merely symbolic; it was an assertion that Greenland is a collective NATO concern, not a bilateral bargaining chip. Greenland’s Resources: Strategic Minerals in a Fragmenting World Beyond military geography, Greenland’s subsoil wealth significantly enhances its geopolitical importance. The island holds substantial deposits of rare earth elements (REEs), lithium, graphite, niobium, titanium, uranium and zinc. As it is well known these strategic materials are indispensable and critical for renewable energy systems, electric vehicles, advanced electronics, missile guidance and radar technologies and space and defense infrastructure. Last but not least there is also oil and gas, but the conditions and viability to extract them make them an economic challenge. In the context of the control of natural resources, the NSS 2025 repeatedly stresses the need to reduce U.S. dependence on adversarial supply chains — an implicit reference to China’s dominance in rare-earth processing. Therefore, US eyes are on Greenland, as it represents one of the few politically aligned alternatives with large-scale potential reserves – ironically not under Chinese or Russian influence, but under US “allies” control. Yet resource abundance does not automatically translate into strategic advantage. Mining in Greenland faces severe challenges: extreme climate conditions, environmental risks, limited infrastructure, and strong local opposition to environmentally destructive projects. As a result, Greenland’s mineral wealth is strategically valuable but politically sensitive. Its development requires local consent and long-term cooperation, not coercion — a fact often overlooked in external strategic calculations. The Arctic Trade Revolution: Melting Ice, Shifting Routes Figure 4: Arctic Seaways (Northern Sea Route, Northwest Passage and Transpolar Sea Route). Source: Map by Arto Vitikka, Arctic Centre, University of Lapland. Climate change is transforming the Arctic faster than any other region on Earth. As sea ice recedes, new maritime routes are becoming seasonally viable, with potentially transformative consequences for global trade. The Northern Sea Route (NSR) along Russia’s Arctic coast already reduces transit times between Europe and Asia by up to 40%, even though some parts are free of ice for some months per year. On the other hand, a future transpolar route, cutting directly across the Arctic Ocean, could bypass traditional chokepoints such as: The Suez Canal, The Panama Canal or The Strait of Malacca. Therefore, Greenland importance relies on its geographic position that places it adjacent to these emerging corridors. Potential roles for the island include: the search-and-rescue hubs, refueling and logistics points, maritime surveillance and communications infrastructure. This elevates Greenland from a military asset to a potential gatekeeper of future Arctic trade, linking regional security directly to global economic flows. Icebreakers and Power Projection: Mobility as Sovereignty Figure 5: Major Icebreakers and Ice-Capable Patrol Ships highlight a decisive but underappreciated imbalance. Source: generated with Chat GPT using Routers Nov 2022 data. The transit in the Arctic can be defined by the possibility to move freely without any inconvenience due its extreme conditions – or at least with the least inconveniences. In consequence major ice breakers and ice-capable patrol ships became very important assets for the countries in the region. In a simple comparison, Russia possesses more icebreakers than NATO combined, as shown in Figure 5, including nuclear-powered vessels capable of year-round Arctic operations. These ships are instruments of sovereignty, enabling continuous military presence, escort of commercial shipping, enforcement of Arctic regulations and rapid crisis responses. By contrast, the United States has long underinvested in icebreaking capacity. NATO relies on a patchwork of national fleets, with Finland and Sweden contributing significantly but still lagging behind Russia’s scale. The strategic implication is clear: Russia controls mobility while NATO controls nodes. In such an environment, fixed strategic anchors like Greenland become even more critical. Competing Arctic Visions Russia Russia views the Arctic as a core strategic and economic priority, central to its national identity, security, and long-term development. Its Arctic vision emphasizes sovereignty, military security, and the exploitation of vast natural resources, particularly hydrocarbons and minerals. Moscow sees the Northern Sea Route as a critical shipping corridor that can enhance Russia’s control over Arctic navigation and generate economic revenues. To support this vision, Russia has invested heavily in Arctic infrastructure, icebreaker fleets, and military modernization, positioning itself as the dominant Arctic power and framing the region as vital to its great-power status. The Arctic is not an extension of Russian power; it is central to it. Figure 6: Cargo volume in Russia’s Northern Sea Route (1933-2023) China China approaches the Arctic as a “near-Arctic state,” framing its vision around scientific research, economic opportunity, and global governance. Beijing emphasizes participation in Arctic affairs through international law, particularly the UN Convention on the Law of the Sea, and promotes cooperation rather than territorial claims. Its strategy emphasizes long-term access to resources, influence over Arctic governance norms, and participation in future trade routes. Its concept of a “Polar Silk Road” reflects an interest in future shipping routes, energy projects, and digital connectivity, linking the Arctic to China’s broader Belt and Road Initiative. Even though China presents its Arctic engagement as peaceful and mutually beneficial, while gradually expanding its strategic and economic footprint in the region, it also has interest in Greenland’s mining sector, for example, which has heightened concerns about strategic leverage rather than direct control. Figure 7: Map of China’s Polar Silk Road. Source: Map by Arto Vitikka, Arctic Centre, University of Lapland. United States The U.S. approach, as reflected in the NSS 2025, is reactive but intensifying. Greenland crystallizes American concerns about strategic vulnerability, supply-chain dependence, and alliance credibility. Yet pressure tactics risk undermining the very alliances that make Arctic stability possible. The United States views the Arctic as an increasingly important region for national security, environmental stewardship, and economic opportunities. At the same time, it recognizes the strategic implications of growing Russian and Chinese activity in the region. Arctic States The European Arctic states emphasize sustainability, human security, and regional cooperation as the foundation of their Arctic vision. Their policies prioritize environmental protection, responsible resource management, and the rights and livelihoods of Indigenous peoples, while balancing economic development in sectors such as fisheries, renewable energy, and limited resource extraction. These states strongly support multilateral governance through institutions like the Arctic Council and stress adherence to international law. Collectively, they view the Arctic as a region where stability, cooperation, and climate leadership are essential, especially amid rising geopolitical tensions and accelerating environmental change. Canada Canada’s Arctic vision centers on sovereignty, Indigenous partnership, and sustainable development, reflecting the region’s importance to national identity and security. Ottawa emphasizes the protection of its northern territories and views the Northwest Passage as internal waters, while supporting a rules-based Arctic order. A core pillar of Canada’s approach is its collaboration with Indigenous peoples, recognizing their rights, knowledge, and role in governance and stewardship. Canada also prioritizes climate change adaptation, environmental protection, and responsible economic development, seeking to ensure that increased Arctic activity benefits northern communities while maintaining peace and stability in the region. India India’s Arctic vision is primarily science-driven and climate-focused, reflecting its broader emphasis on environmental security and multilateral cooperation. Through its Arctic research station, Himadri, and active participation in the Arctic Council as an observer, India seeks to understand the Arctic’s impact on global climate systems, particularly the Indian monsoon. New Delhi also recognizes the long-term economic and geopolitical significance of the Arctic but approaches the region cautiously, prioritizing sustainable development, international collaboration, and respect for Arctic states’ sovereignty. Strategic Futures: Cooperation or Fragmentation The future of Greenland and the Arctic more broadly will hinge on whether the region evolves toward structured cooperation or strategic fragmentation. In a cooperative scenario, Greenland becomes a stabilizing anchor within a renewed Arctic security framework, where the United States, Denmark, and NATO align their defense priorities with Greenlandic self-determination and environmental safeguards. Such an approach would emphasize multilateral governance, transparency in resource development, confidence-building military measures, and shared investment in infrastructure, search-and-rescue capabilities, and climate resilience. Cooperation would not eliminate competition, particularly with Russia and China, but it would establish rules, norms, and mechanisms to prevent escalation and miscalculation in an increasingly accessible Arctic. By contrast, a fragmented Arctic would be characterized by unilateral actions, coercive diplomacy, and the erosion of trust among allies. Pressure tactics aimed at securing access, influence, or control over Greenland could weaken NATO cohesion, fuel local resistance, and open political space for external actors to exploit divisions. In such a scenario, the Arctic risks becoming a patchwork of contested zones rather than a managed strategic commons. Therefore, fragmentation would increase the likelihood of militarization without coordination, resource development without legitimacy, and crisis dynamics without effective communication channels — conditions that historically precede instability rather than security. Conclusion Greenland’s transformation from a remote Arctic territory into a strategic fulcrum reflects deeper shifts in the international system. The United States’ National Security Strategy 2025 captures a world defined by renewed great-power rivalry, supply-chain vulnerability, and the reassertion of geography as destiny. In this context, Greenland sits at the intersection of homeland defense, NATO credibility, critical resource security, and emerging Arctic trade routes. Its importance is not a product of any single factor, but of the convergence of military, economic, and environmental dynamics reshaping the High North. Yet Greenland’s strategic value does not grant external powers unlimited leverage. Geography may confer importance, but legitimacy, consent, and alliance cohesion determine whether that importance translates into durable influence. Attempts to treat Greenland as a transactional asset risk undermining NATO unity, destabilizing Arctic governance, and alienating the very population whose cooperation is essential for security and development. The Arctic’s future must not be decided solely by military deployments or mineral deposits, but by the political relationships that sustain them. Ultimately, Greenland illustrates the central paradox of the new Arctic geopolitics: the region’s growing accessibility increases both opportunity and risk. Stability will depend not on dominance, but on restraint, not on unilateralism, but on partnership. Whether the Arctic becomes a zone of managed competition or strategic fragmentation will shape not only the balance of power in the High North, but the credibility of international order adapting to a rapidly changing world. Also, it is important to highlight Greenland’s voice – referring to sovereignty and identity. Usually under great-power maneuvering, Greenland’s own population has often been sidelined. Yet Greenland is not merely an object of strategy; it is a political community with a strong Indigenous identity, environmental concerns, and aspirations for greater autonomy. Therefore, it is important to keep in mind its constitutional status within the Kingdom of Denmark, their principle of self-determination and the political costs of alienating local consent. Paradoxically, the more external powers push, the more Greenlandic society resists — complicating both security arrangements and resource development. Finally, the Arctic is not only Greenland, the US or the NATO, there are other authors involved, Russia for instance appears as the main one, while, China and India are increasing their interests in the region Moreover, climate change seems to be game changer as new Arctic seaways gain importance in terms of trade and mobility, which in consequence are and will redefine sovereignty. For instance, either icebreakers or minerals would become as strategic as missiles. The Arctic transformation is already happening, and who will lead and what will happen in the region in the future are questions to be solved in the near future. References Agneman, G. (2025, February 04). Trump wants Greenland – but here’s what the people of Greenland want. Retrieved from The Conversation: https://theconversation.com/trump-wants-greenland-but-heres-what-the-people-of-greenland-want-248745 Aljazeera. (2026, January 15). European troops arrive in Greenland as talks with US hit wall over future. Retrieved from Aljazeera: https://www.aljazeera.com/news/2026/1/15/european-troops-arrive-in-greenland-as-talks-with-us-hit-wall-over-future Aljazeera. (2026, January 18). Trump announces new tariffs over Greenland: How have allies responded? Retrieved from Aljazeera: https://www.aljazeera.com/news/2026/1/18/trump-announces-new-tariffs-over-greenland-how-have-eu-allies-responded Arctic Centre University of Lapland. (n.d.). Arctic Region. Retrieved from https://arcticcentre.org/en/arctic-region/maps/polar-silk-road/ Bassets, M. (2026, Enero 11). “Por las buenas o por las malas”: así puede Trump conquistar Groenlandia. Retrieved from El País: https://elpais.com/internacional/2026-01-10/por-las-buenas-o-por-las-malas-asi-puede-trump-conquistar-groenlandia.html Bateman, T. (2026, January 14). Danish minister says 'fundamental disagreement' remains after 'frank' Greenland talks with US. Retrieved from BBC: https://www.bbc.com/news/live/cn824zzp670t BBC News. (2026, January 21). Trump drops threat of tariffs over Greenland after Nato talks in Davos. Retrieved from BBC News: https://www.bbc.com/news/live/cjrzjqg8dlwt Bierman, P. (2025, February 19). Greenland’s melting ice and landslide-prone fjords make the oil and minerals Trump is eyeing dangerous to extract. Retrieved from The Conversation: https://theconversation.com/greenlands-melting-ice-and-landslide-prone-fjords-make-the-oil-and-minerals-trump-is-eyeing-dangerous-to-extract-249985 Bierman, P. (2025, February 19). Greenland’s melting ice and landslide-prone fjords make the oil and minerals Trump is eyeing dangerous to extract. Retrieved from The Conversation: https://theconversation.com/greenlands-melting-ice-and-landslide-prone-fjords-make-the-oil-and-minerals-trump-is-eyeing-dangerous-to-extract-249985 Bierman, P. (2026, January 14). US military has a long history in Greenland, from mining during WWII to a nuclear-powered Army base built into the ice. Retrieved from The Conversatiion: https://theconversation.com/us-military-has-a-long-history-in-greenland-from-mining-during-wwii-to-a-nuclear-powered-army-base-built-into-the-ice-273355 Bonsoms, J. (2025, Dececmber 16). ‘Extreme melting’ episodes are accelerating ice loss in the Arctic. Retrieved from The Conversation: https://theconversation.com/extreme-melting-episodes-are-accelerating-ice-loss-in-the-arctic-272114 Brincat, S. (2026, January 18). Trump has threatened European countries with higher tariffs if he doesn’t get Greenland. Will it work? Retrieved from The Conversation: https://theconversation.com/trump-has-threatened-european-countries-with-higher-tariffs-if-he-doesnt-get-greenland-will-it-work-273698 Brincat, S., & Naranjo Cáceres, J. Z. (2026, January 07). Trump wants Greenland. Europe’s tepid response is putting NATO and global security at risk. Retrieved from The Conversation: https://theconversation.com/trump-wants-greenland-europes-tepid-response-is-putting-nato-and-global-security-at-risk-272819 Brooks, J. (2026, January 20). Pro-Greenland protesters mock Trump’s MAGA slogan with ‘Make America Go Away’ caps. Retrieved from AP: https://apnews.com/article/denmark-greenland-maga-trump-protest-cd1213dd73e9ea1e4da43285704c95ea Bryant, M., & Sabbagh, D. (2026, January 15). Greenland's defence is 'common concern' for Nato, Danish PM says as European troops fly in. Retrieved from The Guardian: https://www.theguardian.com/world/2026/jan/15/greenland-defence-nato-denmark-prime-minister-european-troops Burrows, E., Ciobanu, C., & Niemann, D. (2026, January 16). European troops arrive in Greenland as talks with US highlight 'disagreement' over island's future. Retrieved from AP: https://apnews.com/article/greenland-united-states-denmark-trump-vance-rubio-meeting-b10f5151008f1f18a788dc0751473c0e CNN. (2026, January 21). Trump says he’s formed a ‘framework of a future deal’ on Greenland. Retrieved from CNN: https://edition.cnn.com/politics/live-news/trump-administration-news-01-21-26 Davies, M. (2026, January 19). Starmer holds phone call with Trump over Greenland tariff threat. Retrieved from BBC: https://www.bbc.com/news/articles/cwyn90l1dneo Dodds, K. (2026, January 09). As the Arctic warms up, the race to control the region is growing ever hotter. Retrieved from The Conversation: https://theconversation.com/as-the-arctic-warms-up-the-race-to-control-the-region-is-growing-ever-hotter-273118 Dunbar, M. (2026, January 18). Trump's calls to seize Greenland ignite fresh criticism from Republican party. Retrieved from The Guardian: https://www.theguardian.com/us-news/2026/jan/18/trump-greenland-republican-party FitzGerald, J. (2026, January 19). Why does Trump want Greenland and what could it mean for Nato? Retrieved from BBC: https://www.bbc.com/news/articles/c74x4m71pmjo Fleck, A. (2025, January 24). NATO’s and Russia’s Militarization of the Arctic. Retrieved from statista: https://www.statista.com/chart/33824/military-bases-in-the-arctic-belonging-to-nato-and-russia/?srsltid=AfmBOoqwc5PmGe6_JB6mYjQSP9pr9fIZE_LcEtMOo_rtnCD86zMcQpwn Gjedssø Bertelsen, R. (2025). Divided Arctic in a Divided World Order. Strategic Analysis, 48(Issue 6: Changing Dynamics in the Arctic: Actors and Alliances), 568-577. doi:https://doi.org/10.1080/09700161.2025.2453322 Government Offices of Sweden. (2026, January 18). Statement by Denmark, Finland, France, Germany, the Netherlands, Norway, Sweden and the United Kingdom. Retrieved from Government Offices of Sweden: https://www.government.se/statements/2026/01/statement-by-denmark-finland-france-germany-the-netherlands-norway-sweden-and-the-united-kingdom/ Grillo, F. (2026, January 08). As the US eyes Greenland, Europe must turn a global problem into an opportunity. Retrieved from The Conversation: https://theconversation.com/as-the-us-eyes-greenland-europe-must-turn-a-global-problem-into-an-opportunity-272872 Gupta, P. (2024, September 18). Understanding the potential of the Northern Sea Route. Retrieved from ORF: https://www.orfonline.org/expert-speak/understanding-the-potential-of-the-northern-sea-route Harvey, L. (2026, January 16). European nations send additional troops to Greenland as US annexation threats escalate. Retrieved from CNN: https://edition.cnn.com/2026/01/15/world/europe-troops-greenland-trump-nato-intl-hnk Hastings Dunn MBE, D., Webber, M., & Wolff, S. (2026, January 07). US action against Greenland would undermine Nato, but now is not the time to panic. Retrieved from The Conversation: https://theconversation.com/us-action-against-greenland-would-undermine-nato-but-now-is-not-the-time-to-panic-272911 Holland, S., Mason, J., & Erickson, B. (2026, January 07). Trump discussing how to acquire Greenland, US military always an option, White House says. Retrieved from Reuters: https://www.reuters.com/world/trump-advisers-discussing-options-acquiring-greenland-us-military-is-always-an-2026-01-06/ huaxia. (2026, January 19). China urges U.S. to stop using so-called "China threat" as pretext for pursuing selfish gains. Retrieved from Xinhua: https://english.news.cn/20260119/57899ee8d43345ddbfa222828ec1d0a4/c.html Jakes, L., Tankersley, J., & Kanno-Youngs, Z. (2026, January 22). Trump Touts Greenland Framework as NATO Mulls U.S. Sovereignty Over Bases. Retrieved from The New York Times: https://www.nytimes.com/live/2026/01/21/us/trump-davos-greenland-news Karjee, M. (2025, August 20). Russia’s Arctic Corridor: Between Ice and Isolation. Retrieved from E-International Relations: https://www.e-ir.info/2025/08/20/russias-arctic-corridor-between-ice-and-isolation/ Katila, A. (2026, January 15). As US and Denmark fight, Greenland’s voices are being excluded once again. Retrieved from The Conversation: https://theconversation.com/as-us-and-denmark-fight-greenlands-voices-are-being-excluded-once-again-273131 Kennedy-Pipe, C. (2026, January 14). Whether or not US acquires Greenland, the island will be at the centre of a massive military build-up in the Arctic. Retrieved from The Conversation: https://theconversation.com/whether-or-not-us-acquires-greenland-the-island-will-be-at-the-centre-of-a-massive-military-build-up-in-the-arctic-273301 Khanna, M. (2025, March 19). China and the Arctic: An Overview. Retrieved from ORF: https://www.orfonline.org/research/china-and-the-arctic-an-overview Kirby, P. (2026, January 16). European military personnel arrive in Greenland as Trump says US needs island. Retrieved from BBC: https://www.bbc.com/news/articles/cd0ydjvxpejo Kotak, S. (2025, September 08). Leveraging India’s Arctic Observer Status: Scientific Diplomacy as a Lever for Climate, Resource and Security Advancement. Retrieved from World & New World Journal: https://worldandnewworld.com/india-arctic-observer-status/ Kottasová, I., & Edwards, C. (2026, Enero 19). Trump le dice a Noruega que ya no se siente obligado a "pensar únicamente en la paz" en carta sobre el Nobel y Groenlandia. Retrieved from CNN Español: https://cnnespanol.cnn.com/2026/01/19/eeuu/trump-paz-noruega-nobel-reux Kumar, A., & Haldar, S. (2024, October 2024). An evolving partnership in the Arctic between China and Russia. Retrieved from ORF: https://www.orfonline.org/expert-speak/an-evolving-partnership-in-the-arctic-between-china-and-russia L. Montgomery, S. (2026, January 14). 4 reasons why the US might want to buy Greenland – if it were for sale, which it isn’t. Retrieved from The Conversation: https://theconversation.com/4-reasons-why-the-us-might-want-to-buy-greenland-if-it-were-for-sale-which-it-isnt-246955 Lebowitz, M. (2026, January 18). Treasury secretary defends Greenland tariffs: 'The national emergency is avoiding the national emergency'. Retrieved from NBC News: https://www.nbcnews.com/politics/trump-administration/treasury-secretary-bessent-tariffs-national-emergency-greenland-eu-rcna254650 Levison, J., & Russell, L. (2026, January 19). Why Trump says the US 'needs' Greenland - and what the fallout could be. Retrieved from Sky news: https://news.sky.com/story/why-trump-says-the-us-needs-greenland-and-what-the-fallout-could-be-13285350 Lubold, G., Kube, C., Williams, A., & Alba, M. (2026, January 14). Buying Greenland could cost as much as $700 billion. Retrieved from NBC News: https://www.nbcnews.com/politics/white-house/buying-greenland-cost-much-700-billion-rcna253921 Manners, I. (2026, January 09). Four ways to understand what’s going on with the US, Denmark and Greenland. Retrieved from The Conversation: https://theconversation.com/four-ways-to-understand-whats-going-on-with-the-us-denmark-and-greenland-272873 Nicholas, P., & Smith, A. (2026, January 20). Trump won't say whether he would use force to seize Greenland. Retrieved from NBC News: https://www.nbcnews.com/politics/trump-administration/trump-greenland-use-of-force-nobel-norway-europe-tariffs-ukraine-rcna254786 Passi, R. (2018, February 21). One belt, one road, and now one circle. Retrieved from ORF: https://www.orfonline.org/expert-speak/one-belt-one-road-and-now-one-circle Paul, J. (2026, January 08). Greenland is rich in natural resources – a geologist explains why. Retrieved from The Conversation: https://theconversation.com/greenland-is-rich-in-natural-resources-a-geologist-explains-why-273022 Reuters. (2021, July 16). Greenland ends unsuccessful 50-year bid to produce oil. Retrieved from Reuters: https://www.reuters.com/business/energy/greenland-puts-an-end-unsuccessful-oil-adventure-2021-07-16/#:~:text=Naaja%20Nathanielsen%2C%20Greenland's%20minister%20of,profits%20or%20make%20a%20loss Rønberg, N., Gjerding Nielson, E., & Haugaard, M. (2026, January 06). Kampen om Grønlands fremtid. Retrieved from Nyheder: https://nyheder.tv2.dk/live/2025-01-06-kampen-om-groenlands-fremtid/over-200-soldater-i-groenland-lige-nu?entry=c342b2d3-e01d-4f60-b1dc-8df98fdac85b Sergunin, A., & Konyshev, V. (2025, April 21). The Arctic Great Game: The Need for Cautious Optimism. Retrieved from ORF: https://www.orfonline.org/expert-speak/the-arctic-great-game-the-need-for-cautious-optimism Sheftalovich, Z., & Jack, V. (2026, January 07). How Trump gets Greenland in 4 easy steps. Retrieved from Politico: https://www.politico.eu/article/donald-trump-greenland-easy-steps-nato-policy-deal-military/ Shetty, K. (2023, June 06). The Northern Sea route: A gamechanger or a road to hegemony? Retrieved from ORF: https://www.orfonline.org/expert-speak/the-northern-sea-route Slothuus, L. (2026, January 12). Why Greenland’s vast natural resources won’t necessarily translate into huge profits. Retrieved from The Conversation: https://theconversation.com/why-greenlands-vast-natural-resources-wont-necessarily-translate-into-huge-profits-273137 Soufi Burridge, T., Gardiner, C., & Pereira, I. (2026, January 16). France, other NATO countries send troops to Greenland for exercises after meeting with Vance and Rubio. Retrieved from ABC News: https://abcnews.go.com/Politics/france-nato-countries-send-troops-greenland-exercises-after/story?id=129241103 Talmazan, Y. (2026, January 15). European troops arrive in Greenland as Trump throws another curveball. Retrieved from NBC News: https://www.nbcnews.com/world/greenland/european-troops-arrive-greenland-trump-throws-curveball-rcna254166 Tanno, S., & Waldenberg, S. (2026, Enero 10). Trump dice que Estados Unidos tomará Groenlandia "por las malas" sino puede hacerlo por las buenas. Retrieved from CNN Español: https://cnnespanol.cnn.com/2026/01/10/eeuu/trump-groenlandia-malas-trax Testoni, M. (2026, January 16). US-Greenland negotiations have hit a wall. Here are three ways the crisis could end. Retrieved from The Conversation: https://theconversation.com/us-greenland-negotiations-have-hit-a-wall-here-are-three-ways-the-crisis-could-end-273629 tg24. (2026, January 16). Groenlandia, scattata la missione "Arctic Endurance": cosa sapere. Retrieved from tg24: https://tg24.sky.it/mondo/2026/01/16/groenlandia-arctic-endurance-esercitazione-militare The White House. (2025, November). National Security Strategy of the United States of America. Retrieved from The White House: https://www.whitehouse.gov/wp-content/uploads/2025/12/2025-National-Security-Strategy.pdf