Subscribe to our weekly newsletters for free

Subscribe to an email

If you want to subscribe to World & New World Newsletter, please enter
your e-mail

Defense & Security
Chess made from USA, EU and China flags on a white background. Chess made from China, Europe Union and United States of America flags. Trade, tariffs, duty and customs war

Europe’s transatlantic China challenge

by Gesine Weber

Abstract European states currently lack a clear joint strategy on China and a coordinated approach to US–China competition. This article offers a novel perspective on the challenges for European approaches to this issue due to an omnipresent transatlantic component and the risk of an alliance dilemma. Illustratively focusing on France, Germany and the UK, it demonstrates that Europeans are facing a transatlantic alliance dilemma with the risks of abandonment and entrapment. It argues that Europe needs to strike a balance between its dependence on Washington, especially with regard to European security, while fearing entrapment by the US approach towards Beijing as it aims to maintain economic ties with China. The article concludes that the ramifications of this dilemma can be mitigated through a distinctly European approach to China, strengthening European coordination on China and bolstering European strategic autonomy. As a conceptual piece rather than a full empirical analysis, this article therefore unpacks the strategic challenge and lays the groundwork for further empirical works on the topic. Introduction Strategic competition between the US and China plays out in many realms of international affairs, ranging from global trade to security in the Indo-Pacific. European states are directly affected by this dynamic as they maintain critical ties with both sides. Albeit allies of the US through NATO, Europeans have been reluctant to align with the US on its approach to the Indo-Pacific and China, which is currently characterised by the quest to win the strategic competition with Beijing in all areas of international affairs (see Leoni 2023). Furthermore, Europe maintains close economic ties with Beijing, and imports from China to the EU have most recently increased (Lovely and Yan 2024). European governments certainly do not pursue an approach of maintaining equidistance between the US and China: not only do they regularly emphasise their strategic proximity to Washington, but more recent events, such as the willingness of European allies to publicly adopt the wording of the communiqué from NATO’s Washington summit (NATO 2024) describing China as an ‘enabler of Russia’s war effort in Ukraine’, clearly demonstrate that the tone is changing in European capitals (Politi 2023). However, Europeans still tend to emphasise China’s role in global affairs and the importance of including it in multilateral cooperation formats. With the re-election of Donald Trump as US president, European policy on China and its approach to US–China competition will increasingly be a focus of the US administration. While the exact approach of the new US government still remains to be defined, there are good reasons to anticipate a more hawkish China policy from Washington, through which the US might seek not only to further compete with China, but to actually win this competition (see Pottinger and Gallagher 2023). When designing their approaches towards China—which, among the key European states, only Germany has done so far, with the publication of its China strategy in 2023—Europeans always face a transatlantic elephant in the room. US–China competition, a structuring feature of international relations shaping the global order today through the increasing emergence of geopolitical blocs (see Leoni and Tzinieris 2024), and China’s rising global influence in almost all areas of international affairs—ranging from climate to economics, the rules-based order and security—are forcing European states to reflect on their approach vis-à-vis Beijing (for a full discussion, see Oertel 2023; García-Herrero and Vasselier 2024). As NATO members, European states also need to adapt their strategy in light of the partnership with the US as their key ally. This article argues that European approaches towards China, as shown in the examples of France, Germany and the UK, have a distinctly transatlantic component. It illustrates how these three European states find themselves in an alliance dilemma with the US, and how the risks associated with alliances also define European approaches to China and US–China competition more broadly. As the US administration regularly refers to China as a ‘challenge’ (US Department of Defense 2022), this article alludes to this formulation through the coining of the term ‘transatlantic China challenge’ to describe the strategic challenges Europeans are facing with regard to defining their approach vis-à-vis China and US–China competition more broadly. It offers a conceptual understanding of the strategic challenges for Europe in this context and thereby constitutes a basis for a more thorough empirical analysis. The alliance dilemma and European strategy in US–China competition Originating in realist international relations theory, the alliance dilemma generally describes a situation in which states face risks resulting from joining an alliance. As demonstrated by Snyder (1984), smaller allies especially face a parallel risk of abandonment and entrapment by a hegemon, that is, the dominating power, after joining an alliance. Abandonment, in these circumstances, implies that the hegemon has no further interest in defending or supporting the smaller allies, whereas entrapment refers to a situation in which a state is ‘dragged into a conflict over an ally’s interests that [it] does not share, or shares only partially’ (see Snyder 1984, 466–8). In the context of alliances, a small state is ‘the weaker part in an asymmetric relationship, which is unable to change the nature or functioning of the relationship on its own’ (Wivel et al. 2014, 9), and hence has more limited space for action than the great powers (Wivel and Thorhallsson 2018, 267). This definition arguably applies to Europe in its partnership with the US, as demonstrated by the excessive military and economic dominance of the US as compared to the European states (see Stockholm International Peace Research Institute n.d.; International Monetary Fund 2025). The re-election of Trump as US president now presents the risk of an increased alliance dilemma for Europeans. On the one hand, Trump has announced several times that he does not value the alliance commitments within NATO and potentially would not defend European allies (Sullivan 2024), threatening Europe with abandonment. This scenario is being taken seriously in European capitals, and reflections on how ‘defending Europe with less America’ (Grand 2024) could shape up have gained traction, especially in 2024. Similarly, defence initiatives within the EU to enhance the European contribution to the continent’s security have leapt forward in recent years (see Scazzieri 2025). On the other hand, even the Biden administration had pushed Europe to align with the US approach on China (see Lynch et al. 2023). However, France and Germany in particular, as the big EU member states, have been hesitant to do so, as reflected in France’s opposition to the opening of a NATO liaison office in Tokyo (McCurry 2023) and Germany’s vote against tariffs on Chinese electric vehicles, fearing reprisals from Beijing (Demarais 2024). Trump’s foreign policy might be strongly characterised by issue linkage, which means that policies in one area will be linked to those in another area. Through this strategy, the new US administration might force Europeans into alignment and thereby entrap them, making them accept policies they are not eager to support (see Barkin and Kratz 2025). The exact policies of the Trump administration vis-à-vis European allies remain to be seen, but it is not hard to imagine a scenario in which abandonment and entrapment could emerge or increase, namely when the threat of abandonment is used to entrap allies and force them to support certain policy decisions. The alliance dilemma could play out for Europeans specifically when designing their approaches towards China (see Barkin and Kratz 2025) and formulating their response to US–China competition more generally. As noted above, among the big European states, only Germany has formally adopted a strategy on China, in 2023 (The Federal Government of Germany 2023). However, China and the response to US–China competition takes a prominent place in France’s Indo-Pacific Strategy and its strategy review (Government of France 2021; Secrétariat général de la défense et de la sécurité nationale 2022), and the UK systematically included the dimension of strategic competition in its Integrated Review and its refresh (Government of the United Kingdom 2021, 2023) and has announced an ‘audit’ of its China policy under the new government (Taylor 2024). While these strategies emphasise their individual approaches towards China and the risks stemming from US–China competition, the US has increasingly pressured Europe to align with its approach (Lynch et al. 2023) and can be expected to continue this pressure (Barkin and Kratz 2025). Through the potential issue linkage of security (openly questioned by President Trump) and China policy, Europe therefore finds itself in a new form of alliance security dilemma. European approaches to US–China competition: strategic hedging How can Europe respond to the alliance dilemma of the risks of abandonment and entrapment when it comes to its approaches to China? Reviewing the theoretical literature on the alliance dilemma, one can imagine different strategies. According to Snyder, members of alliances can choose between strategies that strengthen or weaken their commitment to the alliance. To demonstrate commitment, actions could include reassurances for the ally or demonstrations of loyalty, whereas actions to weaken the commitment to the alliance could consist of restraining the ally (mostly to reduce the risk of entrapment in a conflict), increasing bargaining power over the ally or preserving options for realignment outside the existing alliance (for a full discussion, see Snyder 1984, 466–9). Alternative strategies include hiding from cooperation, that is, ‘seeking to maximize autonomy by opting out of specific aspects of the cooperation or by setting up “bastions” in the cooperation’, or bandwagoning, through which states pursue strategies of adaptation ‘to the more powerful actors in the cooperation’ (Pedersen 2023, 442). At the moment, it seems that France, Germany and the UK ‘drive on sight’ rather than approaching the question holistically. The following analysis aims to unpack how the three European states see US–China competition, the risk of the alliance dilemma and how these reflections have played out so far in their strategies. The strategies of France, Germany and the UK on China demonstrate that their approaches are influenced by a distinctly transatlantic component and reflect the transatlantic alliance dilemma. This is visible in their (1) high awareness of the risks stemming from great power competition, (2) approaches to managing the risk of short-term abandonment, and (3) hedging to mitigate the medium- and long-term risks of abandonment and entrapment. The empirical evidence for this analysis was gathered through a qualitative analysis of European strategic documents, statements and policy decisions taken mostly during the period of the Biden administration. However, in light of the risk of a scaling-up of the alliance dilemma under the Trump administration, sources and evidence accessible by the end of January 2025 were included to illustrate the European approaches. In addition to publicly available documents and the sources mentioned above, this paper draws on conversations with policymakers and experts under the Chatham House rule. Mitigating risks from US–China competition: multilateralism instead of alignment That France, Germany and the UK are close allies with the US is clearly visible in their respective strategies on China, not least because of references they make to the importance of the alliance and their descriptions of their own positions between the two great powers. Overall, France, Germany and the UK share the perception of US–China competition and the emergence of blocs as potentially harmful to their interests. As a consequence, all three call for an inclusive multilateral order instead of falling into a logic of blocs, as the increasing competition is seen as a risk for Europe (Secrétariat général de la défense et de la sécurité nationale 2022, 9–15; The Federal Government of Germany 2020, 24–6; Government of the United Kingdom 2023, 22–6). The response of all three European powers to the emergence of blocs is multilateralism: instead of clearly aligning with the US, the French, German and British strategies call for building broader multilateral coalitions, which should, eventually, also include China (The Federal Government of Germany 2020, 23–6; Government of the United Kingdom 2023). The tone in Paris, Berlin and London towards Beijing has clearly changed over recent years; accordingly, the European capitals were also willing to support strong wording on China in the 2024 NATO summit declaration, which describes China as a ‘critical enabler’ of Russia’s ongoing war against Ukraine (NATO 2024). Albeit also recognised as a critical partner for key issues such as climate policy and trade, European states openly describe China as a ‘systemic rival’ and occasionally call out China’s behaviour, as they did, for example, in the case of a note verbale on the South China Sea (UN 2020). Nevertheless, Europe has not (yet) given in to US pressure to align with Washington’s more confrontational approach towards China (Etienne 2024). Even if European states and Washington have moved closer to each other, especially on economic security (Meyers and Reinsch 2023), the European positions on US–China competition demonstrate that Europeans are not willing to fully endorse or follow Washington’s approach—not least because European imports from China have increased in recent years (Lovely and Yan 2024). Managing the risk of short-term abandonment Since Trump’s election, the risk of abandonment by the US has been seen as increasingly high in Paris, Berlin and London.1 This is not least because Trump has openly questioned his willingness to adhere to Article 5 of the North Atlantic Treaty in the case of an armed attack on Europeans (Sullivan 2024). Europeans are especially concerned about issue linkage in this context, meaning that demands in a policy area other than security could be used as a condition. Concretely, Trump could use the threat of abandonment as leverage to compel Europe to align with the US on China policy.2 Barkin and Kratz (2025) suggest that Europe adopt a ‘carrot and stick’ approach, whereby Europe could start with an offer to the US: buying more liquified natural gas, defence goods and agricultural products from the US could mitigate the risk of abandonment. However, there is awareness among European states that coercion from the US to align on US–China policy, especially when linked to the threat of abandonment, might best be mitigated through enhancing European military capabilities—which would still leave the continent exposed to these threats, though to a lesser extent.3 Addressing the risk of medium- and long-term abandonment and entrapment: transatlantic hedging However, the risk of at least partial abandonment is not a new challenge for European strategy, and had already infused earlier strategic thinking. The shift of US strategic priorities away from Europe and to the Indo-Pacific has already been demonstrated in the allocation of resources to the different theatres. Moreover, European states have increasingly become aware that US forces will be withdrawn from their territories in the future and have concluded that they will have to step up their own commitment to European security (see Grand 2024). In parallel, there is an awareness in European capitals that showing more interest in the Indo-Pacific and giving more importance to policy on China is also a way for Europeans to demonstrate an understanding of their ally’s strategic priorities.4 Accordingly, the approaches of France, Germany and the UK to China and the Indo-Pacific also have to be understood as a commitment to the priorities of the US in order to keep this ally engaged in the European theatre and mitigate the risk of abandonment; however, European states abstain from fully aligning with the US approach, as their capabilities and strategic goals are perceived as diverging from those of the US. In this way, Europe aims to avoid entrapment over the medium term through slightly distancing itself from US policy. While all three European states also call for de-risking from China and diversification of their supply chains, maintaining strong economic ties with Beijing is a key component of their respective approaches—which contrasts with the US calls for decoupling. Furthermore, these states have never formally endorsed the US policy on China (Etienne 2024). Nevertheless, enhancing European capabilities would not only send a signal to Washington, but also qualify as hedging, understood as an ‘insurance policy’ to avoid a deterioration in US–Europe relations if the US opted for abandonment, or even as part of a move towards emancipation to reduce strategic dependencies on Washington (see Fiott 2018, 4–6). Conclusion: a transatlantic China challenge Designing their approaches to China and to US–China competition more broadly constitutes a complex strategic dilemma for European states. Paris, Berlin and London do not fully align with Washington’s approach, and it remains to be seen whether they will be willing to do so under the second Trump administration. To manage the risk of abandonment and entrapment, European states pursue different individual approaches to strategic hedging: their strategies on China and US–China competition are designed in a way that allows them to mitigate the risk of abandonment which might stem from significant transatlantic divergence, and to avoid automatic entrapment through their slight distancing from the US approach. From a theoretical perspective, this article has demonstrated that the alliance dilemma, along with the parallel fear of abandonment and entrapment by the US, is a major factor accounting for Europe’s limited strategies on China and its hedging behaviour. This article offers a conceptual analysis of the structural forces explaining European strategies, but other strategic cultures and relationships with the US could offer important complementary insights. To further analyse how individual European states design their strategies vis-à-vis China in light of the alliance dilemma and potential domestic constraints and specificities, neoclassical realism could offer an interesting analytical concept. This approach posits that structural forces set the parameters for foreign policy and treats domestic factors, including strategic culture, as intervening variables (see Rose 1998). Accordingly, it appears well suited for foreign policy analysis, and has indeed gained popularity in the field in recent years (see, for example, Martill and Sus 2024; Meibauer et al. 2021; Weber 2024). Empirically, this article constitutes a conceptual starting point rather than an exhaustive analysis of the strategy-making processes of European states with regard to China and US–China competition and makes a more comprehensive assessment desirable. The findings of this article have broader implications for policymaking. First, they demonstrate the necessity for Europe to determine its place in the increasing US–China competition. European coordination on the respective approaches vis-à-vis the US—especially in light of potential coercion to align—and China is of paramount importance to ensure that foreign policy strategies are mutually reinforcing and not undermining European objectives. Second, the article demonstrates that Europe currently responds to the ‘transatlantic China challenge’ through transatlantic hedging: while this strategy seems to be promising in the short term, it is questionable to what extent the strategy is sustainable and could help European states to navigate the parallel challenges of abandonment and entrapment. Unless Europe decides to fully align with the US—and it is questionable whether this decision would be in its interest—European states would be well advised to develop a sustainable long-term approach to China. A transatlantic dialogue on China, in which Europe and the US openly discuss synergies and divergences, could help prevent misunderstandings and decrease the risk of coercion or issue linkage due to a misreading of European approaches in Washington. Third, as the risks of (at least partial) abandonment and entrapment are systemic challenges due to the current composition of the transatlantic alliance, a logical step for European states to decrease their dependence on the US as the hegemon in the alliance would be to significantly strengthen European capabilities. Stronger military capabilities could help mitigate the ramifications of abandonment, and the aforementioned distinctly European strategy could allow Europe to avoid strategic entrapment in relation to China imposed by Washington. As Europe remains the junior partner in the transatlantic alliance, the parallel risks of abandonment and entrapment, as well as issue linkage, are highly likely to influence its approaches towards China in the long term, but there are certainly ways to render this ‘transatlantic China challenge’ less challenging. ORCID iDGesine Weber https://orcid.org/0009-0008-2643-0400Footnotes1. Conversation with French, German and British experts in Berlin, January 2025.2. Conversation with French, German and British experts in Berlin, January 2025.3. Conversation with French, German and British experts in Berlin, January 2025; conversation with European experts and officials in Paris, January 2025.4. Conversation with officials from Germany and France in Paris, November 2024; conversation with French, German and British experts in Berlin, January 2025.ReferencesBarkin N., Kratz A. (2025). Trump and the Europe–US–China Triangle. Rhodium Group, 16 January. https://rhg.com/research/trump-and-the-europe-us-china-triangle/. Accessed 18 January 2025.Demarais A. (2024). Divided we stand: The EU votes on Chinese electric vehicle tariffs. European Council on Foreign Relations, 9 October. https://ecfr.eu/article/divided-we-stand-the-eu-votes-on-chinese-electric-vehicle-tariffs/. Accessed 25 January 2025.Etienne P. (2024). The European Union between the United States and China: Should we choose between equidistance and following? Fondation Robert Schuman, 8 October. https://www.robert-schuman.eu/en/european-issues/763-the-european-union-between-the-united-states-and-china-should-we-choose-between-equidistance-and-following. Accessed 22 December 2024.Fiott D. (2018). Strategic autonomy and the defence of Europe. European Union Institute for Security Studies, Brief 12/2018. https://www.iss.europa.eu/sites/default/files/EUISSFiles/Brief%2012__Strategic%20Autonomy.pdf. Accessed 25 January 2025.García-Herrero A., Vasselier A. (2024). Updating EU strategy on China: Co-existence while de-risking through partnerships. Mercator Institute for China Studies. https://merics.org/en/external-publication/updating-eu-strategy-china-co-existence-while-de-risking-through-partnerships. Accessed 30 January 2025.Government of France. (2021). France’s Indo-Pacific strategy. https://www.diplomatie.gouv.fr/IMG/pdf/en_dcp_a4_indopacifique_022022_v1-4_web_cle878143.pdf. Accessed 31 January 2025.Government of the United Kingdom. (2021). Global Britain in a competitive age: The integrated review of security, defence, development and foreign policy. London: The Stationery Office. https://www.gov.uk/government/publications/global-britain-in-a-competitive-age-the-integrated-review-of-security-defence-development-and-foreign-policy. Accessed 18 January 2025.Government of the United Kingdom. (2023). Integrated review refresh 2023: Responding to a more contested and volatile world. London: The Stationery Office. https://www.gov.uk/government/publications/integrated-review-refresh-2023-responding-to-a-more-contested-and-volatile-world. Accessed 18 January 2025.Grand C. (2024). Defending Europe with less America. European Council on Foreign Relations, 3 July. https://ecfr.eu/publication/defending-europe-with-less-america/. Accessed 18 January 2025.International Monetary Fund. (2025). World economic outlook: GDP data mapper [Map]. https://www.imf.org/external/datamapper/NGDPD@WEO/OEMDC/ADVEC/WEOWORLD. Accessed 23 January 2025.Leoni Z. (2023). Grand strategy and the rise of China: Made in America. Agenda Publishing.Leoni Z., Tzinieris S. (2024). The return of geopolitical blocs. Survival, 66(2), 37–54.Lovely M. E., Yan J. (2024). As the US has relied less on imports from China, the EU has imported more. Pederson Institute for International Economics, 24 August. https://www.piie.com/research/piie-charts/2024/us-has-relied-less-imports-china-eu-has-imported-more. Accessed 22 December 2024.Lynch S., Toosi N., Moens B., Banco E. (2023). The U.S. wants Europe to stand up to China. Europe says: Not so fast. Politico, 3 August. https://www.politico.com/news/2023/03/08/us-europe-china-00086204. Accessed 18 January 2025.Martill B., Sus M. (2024). Winds of change? Neoclassical realism, foreign policy change, and European responses to the Russia-Ukraine War. British Journal of Politics & International Relations.McCurry J. (2023). France opposed to opening of Nato liaison office in Japan, official says. The Guardian, 7 June. https://www.theguardian.com/world/2023/jun/07/france-opposed-to-opening-of-nato-liaison-office-in-japan-official-says. Accessed 25 January 2025.Meibauer G., Desmaele L., Onea T., Kitchen N., Foulon M., Reichwein A., Sterling-Folker J. (2021). Forum: Rethinking neoclassical realism at theory’s end. International Studies Review, 23(1), 268–95.Meyers E., Reinsch W. A. (2023). The push for U.S.–EU convergence on economic security policy. Center for Strategic and International Studies, 7 July. https://www.csis.org/analysis/push-us-eu-convergence-economic-security-policy. Accessed 26 January 2025.NATO. (2024). Washington Summit declaration. https://www.nato.int/cps/cn/natohq/official_texts_227678.htm. Accessed 18 January 2025.Oertel J. (2023). Ende der China-Illusion: Wie wir mit Pekings Machtanspruch umgehen müssen. Munich: Piper Verlag.Pedersen R. B. (2023). Small states shelter diplomacy: Balancing costs of entrapment and abandonment in the alliance dilemma. Cooperation and Conflict, 58(4), 441–59.Politi A. (2023). The paradigm shift in EU–China relations and the limits of the EU’s current strategy towards China: A relational perspective. Asian Affairs 54(4), 670–93.Pottinger M., Gallagher M. (2024). No substitute for victory: America’s competition with China must be strategic and ideological. Foreign Affairs, 10 April. https://www.foreignaffairs.com/united-states/no-substitute-victory-pottinger-gallagher. Accessed 18 January 2025.Rose G. (1998). Neoclassical realism and theories of foreign policy. World Politics, 51(1), 144–72.Scazzieri L. (2025). Towards an EU ‘defence union’? Centre for European Reform, 30 January. https://www.cer.eu/publications/archive/policy-brief/2025/towards-eu-defence-union. Accessed 30 January 2025.Secrétariat général de la défense et de la sécurité nationale. (2022). Revue nationale stratégique 2022. https://www.sgdsn.gouv.fr/publications/revue-nationale-strategique-2022. Accessed 18 January 2025.Snyder G. H. (1984). The security dilemma in alliance politics. World Politics, 36(4), 461–95.Stockholm International Peace Research Institute. (n.d.). SIPRI Military Expenditure Database.Sullivan K. (2024). Trump says he would encourage Russia to ‘do whatever the hell they want’ to any NATO country that doesn’t pay enough. CNN, 11 February. https://edition.cnn.com/2024/02/10/politics/trump-russia-nato/index.html. Accessed 29 January 2025.Taylor R. (2024). UK government policy towards China. https://lordslibrary.parliament.uk/uk-government-policy-towards-china/. Accessed 18 January 2025.The Federal Government of Germany. (2020). Policy guidelines for the Indo-Pacific. www.auswaertiges-amt.de/blob/2380514/f9784f7e3b3fa1bd7c5446d274a4169e/200901-indo-pazifik-leitlinien–1–data.pdf. Accessed 21 December 2024.The Federal Government of Germany. (2023). China-Strategie der Bundesregierung. Berlin: Auswärtiges Amt. https://www.auswaertiges-amt.de/blueprint/servlet/resource/blob/2608578/810fdade376b1467f20bdb697b2acd58/china-strategie-data.pdf. Accessed 18 January 2025.UN (2020). Note verbale, UK NV No. 162/20, 16 September. https://www.un.org/Depts/los/clcs_new/submissions_files/mys_12_12_2019/2020_09_16_GBR_NV_UN_001.pdf. Accessed 25 January 2025.US Department of Defense. (2022). National Defense Strategy of the United States of America. https://media.defense.gov/2022/Oct/27/2003103845/-1/-1/1/2022-NATIONAL-DEFENSE-STRATEGY-NPR-MDR.pdf. Accessed 25 January 2025.Weber G. (2024). Zeitenwende à la française: Continuity and change in French foreign policy after Russia’s invasion of Ukraine. British Journal of Politics & International Relations.Wivel A., Bailes A. J. K., Archer C. (2014). Setting the scene: Small states and international security. In Archer C., Bailes A. J. K., Wivel A. (eds.), Small states and international security: Europe and beyond (pp. 3–25). London: Routledge.Wivel A., Thorhallsson B. (2018). Brexit and small states in Europe: Hedging, hiding or seeking shelter? In Rosamond B., Nedergaard P., Diamond P. (eds.), The Routledge handbook of the politics of Brexit, 1st edn. (pp. 266–77). Abingdon-on-Thames: Routledge.

Energy & Economics
Commodity and alternative asset, gold bar and crypto currency Bitcoin on rising price graph as financial crisis or war safe haven, investment asset or wealth concept.

Assessing Bitcoin and Gold as Safe Havens Amid Global Uncertainties: A Rolling Window DCC-GARCH Analysis

by Anoop S Kumar , Meera Mohan , P. S. Niveditha

Abstract We examine the roles of Gold and Bitcoin as a hedge, a safe haven, and a diversifier against the coronavirus disease 2019 (COVID-19) pandemic and the Ukraine War. Using a rolling window estimation of the dynamic conditional correlation (DCC)-based regression, we present a novel approach to examine the time-varying safe haven, hedge, and diversifier properties of Gold and Bitcoin for equities portfolios. This article uses daily returns of Gold, Bitcoin, S&P500, CAC 40, and NSE 50 from January 3, 2018, to October 15, 2022. Our results show that Gold is a better safe haven than the two, while Bitcoin exhibits weak properties as safe haven. Bitcoin can, however, be used as a diversifier and hedge. This study offers policy suggestions to investors to diversify their holdings during uncertain times. Introduction Financial markets and the diversity of financial products have risen in both volume and value, creating financial risk and establishing the demand for a safe haven for investors. The global financial markets have faced several blows in recent years. From the Global Financial Crisis (GFC) to the outbreak of the pandemic and uncertainty regarding economic policy measures of governments and central banks, the financial markets including equity markets around the world were faced with severe meltdowns. This similar behavior was observed in other markets including equity and commodity markets, resulting in overall uncertainty. In this scenario, the investors normally flock toward the safe-haven assets to protect their investment. In normal situations, investors seek to diversify or hedge their assets to protect their portfolios. However, the financial markets are negatively impacted when there are global uncertainties. Diversification and hedging methods fail to safeguard investors’ portfolios during instability because almost all sectors and assets are negatively affected (Hasan et al., 2021). As a result, investors typically look for safe-haven investments to safeguard their portfolios under extreme conditions (Ceylan, 2022). Baur and Lucey (2010) provide the following definitions of hedge, diversifier, and safe haven: Hedge: An asset that, on average, has no correlation or a negative correlation with another asset or portfolio. On average, a strict hedge has a (strictly) negative correlation with another asset or portfolio.Diversifier: An asset that, on average, has a positive correlation (but not perfect correlation) with another asset or portfolio. Safe haven: This is the asset that in times of market stress or volatility becomes uncorrelated or negatively associated with other assets or a portfolio. As was previously indicated, the significant market turbulence caused by a sharp decline in consumer spending, coupled with insufficient hedging opportunities, was a common feature of all markets during these times (Yousaf et al., 2022). Nakamoto (2008) suggested a remedy by introducing Bitcoin, a “digital currency,” as an alternative to traditional fiduciary currencies (Paule-Vianez et al., 2020). Bitcoin often described as “Digital Gold” has shown greater resilience during periods of crises and has highlighted the potential safe haven and hedging property against uncertainties (Mokni, 2021). According to Dyhrberg (2016), the GFC has eased the emergence of Bitcoin thereby strengthening its popularity. Bouri et al. (2017) in their study indicate that Bitcoin has been viewed as a shelter from global uncertainties caused by conventional banking and economic systems. Recent research has found that Bitcoin is a weak safe haven, particularly in periods of market uncertainty like the coronavirus disease 2019 (COVID-19) crisis (Conlon & McGee, 2020; Nagy & Benedek, 2021; Shahzad et al., 2019; Syuhada et al., 2022). In contrast to these findings, a study by Yan et al. (2022) indicates that it can function as a strong safe haven in favorable economic times and with low-risk aversion. Ustaoglu (2022) also supports the strong safe-haven characteristic of Bitcoin against most emerging stock market indices during the COVID-19 period. Umar et al. (2023) assert that Bitcoin and Gold are not reliable safe-havens. Singh et al. (2024) in their study reveal that Bitcoin is an effective hedge for investments in Nifty-50, Sensex, GBP–INR, and JPY–INR, at the same time a good diversifier for Gold. The study suggests that investors can incorporate Bitcoin in their portfolios as a good hedge against market volatility in equities and commodities markets. During the COVID-19 epidemic, Barbu et al. (2022) investigated if Ethereum and Bitcoin could serve as a short-term safe haven or diversifier against stock indices and bonds. The outcomes are consistent with the research conducted by Snene Manzli et al. (2024). Both act as hybrid roles for stock market returns, diversifiers for sustainable stock market indices, and safe havens for bond markets. Notably, Bhuiyan et al. (2023) found that Bitcoin provides relatively better diversification opportunities than Gold during times of crisis. To reduce risks, Bitcoin has demonstrated a strong potential to operate as a buffer against global uncertainty and may be a useful hedging tool in addition to Gold and similar assets (Baur & Lucey, 2010; Bouri et al., 2017; Capie et al., 2005; Dyhrberg, 2015). According to Huang et al. (2021), its independence from monetary policies and minimal association with conventional financial assets allow it to have a safe-haven quality. Bitcoins have a substantial speed advantage over other assets since they are traded at high and constant frequencies with no days when trading is closed (Selmi et al., 2018). Additionally, it has been demonstrated that the average monthly volatility of Bitcoin is higher than that of Gold or a group of international currencies expressed in US dollars; nevertheless, the lowest monthly volatility of Bitcoin is lower than the maximum monthly volatility of Gold and other foreign currencies (Dwyer, 2015). Leverage effects are also evident in Bitcoin returns, which show lower volatilities in high return periods and higher volatilities in low return times (Bouri et al., 2017; Liu et al., 2017). According to recent research, Bitcoins can be used to hedge S&P 500 stocks, which increases the likelihood that institutional and retail investors will build secure portfolios (Okorie, 2020). Bitcoin demonstrates strong hedging capabilities and can complement Gold in minimizing specific market risks (Baur & Lucey, 2010). Its high-frequency and continuous trading further enrich the range of available hedging tools (Dyhrberg, 2016). Moreover, Bitcoin spot and futures markets exhibit similarities to traditional financial markets. In the post-COVID-19 period, Zhang et al. (2021) found that Bitcoin futures outperform Gold futures.Gold, silver, palladium, and platinum were among the most common precious metals utilized as safe-haven investments. Gold is one such asset that is used extensively (Salisu et al., 2021). Their study tested the safe-haven property of Gold against the downside risk of portfolios during the pandemic. Empirical results have also shown that Gold functions as a safe haven for only 15 trading days, meaning that holding Gold for longer than this period would result in losses to investors. This explains why investors buy Gold on days of negative returns and sell it when market prospects turn positive and volatility decreases (Baur & Lucey, 2010). In their study, Kumar et al. (2023) tried to analyse the trends in volume throughout futures contracts and investigate the connection between open interest, volume, and price for bullion and base metal futures in India. Liu et al. (2016) in their study found that there is no negative association between Gold and the US stock market during times of extremely low or high volatility. Because of this, it is not a strong safe haven for the US stock market (Hood & Malik, 2013). Post-COVID-19, studies have provided mixed evidence on the safe-haven properties of Gold (Bouri et al., 2020; Cheema et al., 2022; Ji et al., 2020). According to Kumar and Padakandla (2022), Gold continuously demonstrates safe-haven qualities for all markets, except the NSE, both in the short and long term. During the COVID-19 episode, Gold’s effectiveness as a hedge and safe-haven instrument has been impacted (Akhtaruzzaman et al., 2021). Al-Nassar (2024) conducted a study on the hedge effectiveness of Gold and found that it is a strong hedge in the long run. Bhattacharjee et al. (2023) in their paper examined the symmetrical and asymmetrical linkage between Gold price levels and the Indian stock market returns by employing linear autoregressive distributed lag and nonlinear autoregressive distributed lag models. The results exhibit that the Indian stock market returns and Gold prices are cointegrated. According to the most recent study by Kaczmarek et al. (2022), Gold has no potential as a safe haven, despite some studies on the COVID-19 pandemic showing contradictory results. The co-movements of Bitcoin and the Chinese stock market have also normalized as a result of this epidemic (Belhassine & Karamti, 2021). Widjaja and Havidz (2023) verified that Gold was a safe haven asset during the COVID-19 pandemic, confirming the Gold’s safe-haven characteristic. As previously pointed out, investors value safe-haven investments in times of risk. Investors panic at these times when asset prices fall and move from less liquid (risky) securities to more liquid (safe) ones, such as cash, Gold, and government bonds. An asset must be bought and sold rapidly, at a known price, and for a reasonably modest cost to be considered truly safe (Smales, 2019). Therefore, we need to properly re-examine the safe-haven qualities of Gold and Bitcoin due to the mixed evidences regarding their safe-haven qualities and the impact of COVID-19 and the war in Ukraine on financial markets. This work contributes to and deviates from the body of existing literature in the following ways. We propose a novel approach in this work to evaluate an asset’s time-varying safe haven, hedge, and diversifier characteristics. This research examines the safe haven, hedging, and diversifying qualities of Gold and Bitcoin against the equity indices; S&P 500, CAC 40, and NSE 50. Through the use of rolling window estimation, we extend the methodology of Ratner and Chiu (2013) by estimating the aforementioned properties of the assets. Comparing rolling window estimation to other conventional techniques, the former will provide a more accurate representation of an asset’s time-varying feature. This study explores the conventional asset Gold’s time-varying safe haven, hedging, and diversifying qualities during crises like the COVID-19 pandemic and the conflict in Ukraine. We use Bitcoin, an unconventional safe-haven asset, for comparison. Data and Methodology We use the daily returns of three major equity indices; S&P500, CAC 40, and NSE 50 from January 3, 2018, to October 15, 2022. The equity indices were selected to represent three large and diverse markets namely the United States, France, and India in terms of geography and economic development. We assess safe-haven assets using the daily returns of Gold and Bitcoin over the same time. Equity data was collected from Yahoo Finance, Bitcoin data from coinmarketcap.com, and Gold data from the World Gold Council website. Engle (2002) developed the DCC (Dynamic Conditional Correlation)-GARCH model, which is frequently used to assess contagion amid pandemic uncertainty or crises. Time-varying variations in the conditional correlation of asset pairings can be captured using the DCC-GARCH model. Through employing this model, we can analyse the dynamic behavior of volatility spillovers. Engle’s (2002) DCC-GARCH model contains two phases; 1. Univariate GARCH model estimation2. Estimation of time-varying conditional correlation. For its explanation, mathematical characteristics, and theoretical development, see here [insert the next link in “the word here” https://journals.sagepub.com/doi/10.1177/09711023251322578] Results and Discussion The outcomes of the parameters under the DCC-GARCH model for each of the asset pairs selected for the investigation are shown in Table 1.   First, we look at the dynamical conditional correlation coefficient, ρ.The rho value is negative and insignificant for NSE 50/Gold, NSE 50 /BTC, S&P500/Gold, and S&P500/BTC indicating a negative and insignificant correlation between these asset pairs, showing Gold and Bitcoin as potential hedges and safe havens. The fact that ρ is negative and significant for CAC 40/Gold suggests that Gold can be a safe haven against CAC 40 swings. The asset pair CAC/BTC, on the other hand, has possible diversifier behavior with ρ being positive but statistically insignificant. Next, we examine the behavior of the DCC-GARCH parameters; α and β. We find that αDCC is statistically insignificant for all the asset pairs, while βDCC is statistically significant for all asset pairs. βDCC quantifies the persistence feature of the correlation and the extent of the impact of volatility spillover in a particular market’s volatility dynamics. A higher βDCC value implies that a major part of the volatility dynamics can be explained by the respective market’s own past volatility. For instance, the NSE 50/Gold’s βDCC value of 0.971 shows that there is a high degree of volatility spillover between these two assets, with about 97% of market volatility being explained by the assets’ own historical values and the remainder coming from spillover. Thus, we see that the volatility spillover is highly persistent (~0.8) for all the asset pairs except NSE 50/BTC. The results above show that the nature of the dynamic correlation between the stock markets, Bitcoin and Gold is largely negative, pointing toward the possibility of Gold and Bitcoin being hedge/safe haven. However, a detailed analysis is needed to confirm the same by employing rolling window analysis, and we present the results in the forthcoming section. We present the rolling window results for S&P500 first. We present the regression results for Gold in Figure 1 and Bitcoin in Figure 2   Figure 1. Rolling Window Regression Results for S&P500 and Gold.Note: Areas shaded under factor 1 represent significant regression coefficients. In Figure 1, we examine the behavior of β0 (intercept term), β1, β2, and β3 (partial correlation coefficients). The intercept term β0 will give an idea about whether the asset is behaving as a diversifier or hedge. Here, the intercept term shows significance most of the time. However, during 2018, the intercept was negative and significant, showing that it could serve as a hedge during geopolitical tensions and volatilities in the global stock market. However, during the early stages of COVID-19, we show that the intercept is negative and showing statistical significance, suggesting that Gold could serve as a hedge during the initial shocks of the pandemic. These findings are contrary to the results in the study by Tarchella et al. (2024) where they found hold as a good diversifier. Later, we find the intercept to be positive and significant, indicating that Gold could act as a potential diversifier. But during the Russia-Ukraine War, Gold exhibited hedge ability again. Looking into the behavior of β1, which is the partial correlation coefficient for the tenth percentile of return distribution shows negative and insignificant during 2018. Later, it was again negative and significant during the initial phases of COVID-19, and then negative in the aftermath, indicating that Gold could act as a weak safe haven during the COVID-19 pandemic. Gold could serve as a strong safe haven for the SP500 against volatility in the markets brought on by the war in Ukraine, as we see the coefficient to be negative and large during this time. From β2 and β3, the partial correlation coefficients of the fifth and first percentile, respectively, show that Gold possesses weak safe haven properties during COVID-19 and strong safe haven behavior during the Ukraine crisis. Next, we examine the characteristics of Bitcoin as a hedge/diversifier/safe haven against the S&P500 returns. We present the results in Figure 2.   Figure 2. Rolling Window Regression Results for S&P500 and Bitcoin.Note: Areas shaded under factor 1 represent significant regression coefficients. Like in the previous case, we begin by analysing the behavior of the intercept coefficient, which is β0. As mentioned earlier the intercept term will give a clear picture of the asset’s hedging and diversifier property. In the period 2018–2019, the intercept term is positive but insignificant. This could be due to the large volatility in Bitcoin price movements during the period. It continues to be minimal (but positive) and insignificant during 2019–2020, indicating toward weak diversification possibility. Post-COVID-19 period, the coefficient shows the significance and positive value, displaying the diversification potential. We see that the coefficient remains positive throughout the analysis, confirming Bitcoin’s potential as a diversifier. Looking into the behavior of β1 (the partial correlation coefficient at tenth percentile), it is positive but insignificant during 2018. The coefficient is having negative sign and showing statistical significance in 2019, suggesting that Bitcoin could be a good safe haven in that year. This year was characterized by a long list of corporate scandals, uncertainties around Brexit, and tensions in global trade. We can observe that throughout the COVID-19 period, the coefficient is showing negative sign and negligible during the March 2020 market meltdown, suggesting inadequate safe-haven qualities. However, Bitcoin will regain its safe-haven property in the coming periods, as the coefficient is negative and significant in the coming months. The coefficient is negative and shows statistical significance during the Ukrainian crisis, suggesting strong safe-haven property. Only during the Ukrainian crisis could Bitcoin serve as a safe haven, according to the behavior of β2, which displays the partial correlation coefficient at the fifth percentile. Bitcoin was a weak safe haven during COVID-19 and the Ukrainian crisis, according to β3, the partial correlation coefficient for the first percentile (coefficient negative and insignificant). According to the overall findings, Gold is a stronger safe haven against the S&P 500’s swings. This result is consistent with the previous studies of Triki and Maatoug (2021), Shakil et al. (2018), Będowska-Sójka and Kliber (2021), Drake (2022), and Ghazali et al. (2020), etc. The same analysis was conducted for the CAC 40 and the NSE 50; the full analysis can be found here [insert the next link in “the word here” https://journals.sagepub.com/doi/10.1177/09711023251322578]. However, it is important to highlight the respective results: In general, we may say that Gold has weak safe-haven properties considering CAC40. We can conclude that Bitcoin’s safe-haven qualities for CAC40 are weak. We can say that Gold showed weak safe-haven characteristics during the Ukraine crisis and good safe-haven characteristics for the NSE50 during COVID-19. We may say that Bitcoin exhibits weak safe haven, but strong hedging abilities to NSE50. Concluding Remarks In this study, we suggested a new method to evaluate an asset’s time-varying hedge, diversifier, and safe-haven characteristics. We propose a rolling window estimation of the DCC-based regression of Ratner and Chiu (2013). Based on this, we estimate the conventional asset’s time-varying safe haven, hedging, and diversifying properties during crises like the COVID-19 pandemic and the conflict in Ukraine. For comparison purposes, we include Bitcoin, a nonconventional safe-haven asset. We evaluate Gold and Bitcoin’s safe haven, hedging, and diversifier properties to the S&P 500, CAC 40, and NSE 50 variations. We use a rolling window of length 60 to estimate the regression. From the results, we find that Gold can be considered as a better safe haven against the fluctuations of the S&P 500. In the case of CAC 40, Gold and Bitcoin have weak safe-haven properties. While Bitcoin demonstrated strong safe-haven characteristics during the Ukraine crisis, Gold exhibited strong safe-haven characteristics during COVID-19 for the NSE 50. Overall, the findings indicate that Gold is the better safe haven. This outcome is consistent with earlier research (Będowska-Sójka & Kliber, 2021; Drake, 2022; Ghazali et al., 2020; Shakil et al., 2018; Triki & Maatoug, 2021). When it comes to Bitcoin, its safe-haven feature is weak. Bitcoin, however, works well as a diversifier and hedge. Therefore, from a policy perspective, investing in safe-haven instruments is crucial to lower the risks associated with asset ownership. Policymakers aiming to enhance the stability of financial portfolios might encourage institutional investors and other market players to incorporate Gold into their asset allocations. Gold’s strong safe-haven qualities, proven across various market conditions, make it a reliable choice. Gold’s performance during crises like COVID-19 highlights its potential to mitigate systemic risks effectively. Further, Bitcoin could also play a complementary role as a hedge and diversifier, especially during periods of significant volatility such as the Ukraine crisis. While Bitcoin’s safe-haven characteristics are relatively weaker, its inclusion in a diversified portfolio offers notable value and hence it should not be overlooked. Further, policymakers may consider how crucial it is to monitor dynamic correlations and periodically rebalance portfolios to account for shifts in the safe haven and hedging characteristics of certain assets. Such measures could help reduce the risks of over-reliance on a single asset type and create more resilient portfolios that can better withstand global economic shocks. For future research, studies can be conducted on the estimation of the rolling window with different widths. This is important to understand how the safe-haven property changes across different holding periods. Further, more equity markets would be included to account for the differences in market capitalization and index constituents. This study can be extended by testing these properties for multi-asset portfolios as well. We intend to take up this study in these directions in the future. Data Availability StatementNot applicable.Declaration of Conflicting InterestsThe authors declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.FundingThe authors received no financial support for the research, authorship, and/or publication of this article.ReferencesAkhtaruzzaman M., Boubaker S., Lucey B. M., & Sensoy A. (2021). Is gold a hedge or a safe-haven asset in the COVID-19 crisis? Economic Modelling, 102, 105588. Crossref. Web of Science.Al-Nassar N. S. (2024). Can gold hedge against inflation in the UAE? A nonlinear ARDL analysis in the presence of structural breaks. PSU Research Review, 8(1), 151–166. Crossref.Barbu T. C., Boitan I. A., & Cepoi C. O. (2022). Are cryptocurrencies safe havens during the COVID-19 pandemic? A threshold regression perspective with pandemic-related benchmarks. Economics and Business Review, 8(2), 29–49. Crossref.Baur D. G., & Lucey B. M. (2010). Is gold a hedge or a safe haven? An analysis of stocks, bonds and gold. Financial Review, 45(2), 217–229. Crossref.Będowska-Sójka B., & Kliber A. (2021). Is there one safe-haven for various turbulences? The evidence from gold, Bitcoin and Ether. The North American Journal of Economics and Finance, Elsevier, 56, 101390. Crossref.Belhassine O., & Karamti C. (2021). Contagion and portfolio management in times of COVID-19. Economic Analysis and Policy, 72, 73–86. Crossref. PubMed. Web of Science.Bhattacharjee A., Das J., & Kumar S. (2023). Evaluating the symmetrical and asymmetrical linkage between gold price and Indian stock market in the presence of structural change. NMIMS Management Review, 31(4), 288–297. Crossref. Web of Science.Bhuiyan R. A., Husain A., & Zhang C. (2023). Diversification evidence of Bitcoin and Gold from wavelet analysis. Financial Innovation, 9(1), 100. Crossref. PubMed. Web of Science.Bouri E., Azzi G., & Dyhrberg A. H. (2017). On the return-volatility relationship in the Bitcoin market around the price crash of 2013. Economics, 11(1), 2. Crossref.Bouri E., Gupta R., Tiwari A. K., & Roubaud D. (2017). Does Bitcoin hedge global uncertainty? Evidence from wavelet-based quantile-in-quantile regressions. Finance Research Letters, 23, 87–95. Crossref. Web of Science.Bouri E., Shahzad S. J. H., Roubaud D., Kristoufek L., & Lucey B. (2020). Bitcoin, gold, and commodities as safe havens for stocks: New insight through wavelet analysis. The Quarterly Review of Economics and Finance, 77, 156–164. Crossref. Web of Science.Brenner M., & Galai D. (1989). New financial instruments for hedge changes in volatility. Financial Analysts Journal, 45(4), 61–65. Crossref.Capie F., Mills T. C., & Wood G. (2005). Gold as a hedge against the dollar. Journal of International Financial Markets, Institutions and Money, 15(4), 343–352. Crossref.Ceylan Ö. (2022). Hedging Effectiveness of the VIX ETPs: An analysis of the time-varying performance of the VXX. In Handbook of research on new challenges and global outlooks in financial risk management (pp. 384–401). IGI Global. Crossref.Cheema M. A., Faff R., & Szulczyk K. R. (2022). The 2008 global financial crisis and COVID-19 pandemic: How safe are the safe haven assets? International Review of Financial Analysis, 83, 102316. Crossref. PubMed. Web of Science.Conlon T., & McGee R. (2020). Safe haven or risky hazard? Bitcoin during the COVID-19 bear market. Finance Research Letters, 35, 101607. Crossref. PubMed. Web of Science.Demir E., Gozgor G., Lau C. K. M., & Vigne S. A. (2018). Does economic policy uncertainty predict the Bitcoin returns? An empirical investigation. Finance Research Letters, 26, 145–149. Crossref. Web of Science.Drake P. P. (2022). The gold-stock market relationship during COVID-19. Finance Research Letters, 44, 102111. Crossref. PubMed. Web of Science.Dwyer G. P. (2015). The economics of Bitcoin and similar private digital currencies. Journal of Financial Stability, 17, 81–91. Crossref. Web of Science.Dyhrberg A. H. (2015). Hedging capabilities of bitcoin. Is it the virtual gold? Finance Research Letters, 1–6. https://doi.org/10.1016/j.frl.2015.10.025Dyhrberg A. H. (2016). Hedging capabilities of bitcoin. Is it the virtual gold? Finance Research Letters, 16, 139–144. https://doi.org/10.1016/j.frl.2015.10.025 Web of Science.Engle R. (2002). Dynamic conditional correlation: A simple class of multivariate generalized autoregressive conditional heteroskedasticity models. Journal of Business & Economic Statistics, 20(3), 339–350. Crossref. Web of Science.Ghazali M. F., Lean H. H., & Bahari Z. (2020). Does gold investment offer protection against stock market losses? Evidence from five countries. The Singapore Economic Review, 65(02), 275–301. Crossref.Hasan M. B., Hassan M. K., Rashid M. M., & Alhenawi Y. (2021). Are safe haven assets really safe during the 2008 global financial crisis and COVID-19 pandemic? Global Finance Journal, 50, 100668. Crossref. PubMed.Hood M., & Malik F. (2013). Is gold the best hedge and a safe haven under changing stock market volatility? Review of Financial Economics, 22(2), 47–52. Crossref.Huang Y., Duan K., & Mishra T. (2021). Is Bitcoin really more than a diversifier? A pre-and post-COVID-19 analysis. Finance Research Letters, 43, 102016. Crossref.Ji Q., Zhang D., & Zhao Y. (2020). Searching for safe-haven assets during the COVID-19 pandemic. International Review of Financial Analysis, 71, 101526. Crossref. PubMed. Web of Science.Kaczmarek T., Będowska-Sójka B., Grobelny P., & Perez K. (2022). False safe haven assets: Evidence from the target volatility strategy based on recurrent neural network. Research in International Business and Finance, 60, 101610. Crossref. Web of Science.Kumar A. S., & Padakandla S. R. (2022). Testing the safe-haven properties of gold and bitcoin in the backdrop of COVID-19: A wavelet quantile correlation approach. Finance Research Letters, 47, 102707. Crossref. PubMed. Web of Science.Kumar M. A., Swathi J., Pallavi T. A., & Bavana S. (2023). Volume progression and price–volume relationship of commodity futures: Case of bullion and base metals. NMIMS Management Review, 31(4), 265–274. https://doi.org/10.1177/09711023241230463 Web of Science.Liu C. S., Chang M. S., Wu X., & Chui C. M. (2016). Hedges or safe havens—Revisit the role of gold and USD against stock: A multivariate extended skew-t copula approach. Quantitative Finance, 16(11), 1763–1789. Crossref.Liu R., Zhichao S., Wei G., & Wang W. (2017). GARCH model with fat-tailed distributions and Bitcoin exchange rate returns. Journal of Accounting, Business and Finance Research, 1(1), 71–75. https://doi.org/10.2139/ssrn.3666106 Crossref.Mokni K. (2021). When, where, and how economic policy uncertainty predicts Bitcoin returns and volatility? A quantiles-based analysis. The Quarterly Review of Economics and Finance, 80, 65–73. Crossref.Nagy B. Z., & Benedek B. (2021). Higher co-moments and adjusted Sharpe ratios for cryptocurrencies. Finance Research Letters, 39, 101543. Crossref. Web of Science.Nakamoto S. (2008). Bitcoin: A peer-to-peer electronic cash system. Bitcoin. https://bitcoin.org/bitcoin.pdfOkorie D. I. (2020). Could stock hedge Bitcoin risk(s) and vice versa? Digital Finance, 2(1), 117–136. Crossref.Paule-Vianez J., Prado-Román C., & Gómez-Martínez R. (2020). Economic policy uncertainty and Bitcoin. Is Bitcoin a safe-haven asset? European Journal of Management and Business Economics, 29(3), 347–363. Crossref.Ratner M., & Chiu C. C. J. (2013). Hedging stock sector risk with credit default swaps. International Review of Financial Analysis, 30, 18–25. Crossref. Web of Science.Salisu A. A., Raheem I. D., & Vo X. V. (2021). Assessing the safe haven property of the gold market during COVID-19 pandemic. International Review of Financial Analysis, 74, 101666. Crossref. PubMed. Web of Science.Saxena S., & Villar A. (2008). Hedging instruments in emerging market economies. Financial globalisation and emerging market capital flows. BIS Papers, 44, 71–87.Selmi R., Mensi W., Hammoudeh S., & Bouoiyour J. (2018). Is Bitcoin a hedge, a safe haven or a diversifier for oil price movements? A comparison with gold. Energy Economics, 74, 787–801. Crossref. Web of Science.Shahzad S. J. H., Bouri E., Roubaud D., Kristoufek L., & Lucey B. (2019). Is Bitcoin a better safe-haven investment than gold and commodities? International Review of Financial Analysis, 63, 322–330. Crossref. Web of Science.Shakil M. H., Mustapha I. H. M., Tasnia M., & Saiti B. (2018). Is gold a hedge or a safe haven? An application of ARDL approach. Journal of Economics, Finance and Administrative Science, 23(44), 60–76. Crossref.Singh V. V., Singh H., & Ansari A. (2024). Bitcoin as a distinct asset class for hedging and portfolio diversification: A DCC-GARCH model analysis. NMIMS Management Review, 32(1), 7–13. Crossref. Web of Science.Smales L. A. (2019). Bitcoin as a safe haven: Is it even worth considering? Finance Research Letters, 30, 385–393. Crossref. Web of Science.Snene Manzli Y., Alnafisah H., & Jeribi A. (2024). Safe haven ability of energy and agricultural commodities against G7 stock markets and banking indices during COVID-19, Russia–Ukraine War, and SVB collapse: Evidence from the wavelet coherence approach. Discrete Dynamics in Nature and Society, 2024(1), 2587000. Crossref.Syuhada K., Suprijanto D., & Hakim A. (2022). Comparing gold’s and Bitcoin’s safe-haven roles against energy commodities during the COVID-19 outbreak: A vine copula approach. Finance Research Letters, 46, 102471. Crossref. PubMed. Web of Science.Tarchella S., Khalfaoui R., & Hammoudeh S. (2024). The safe haven, hedging, and diversification properties of oil, gold, and cryptocurrency for the G7 equity markets: Evidence from the pre-and post-COVID-19 periods. Research in International Business and Finance, 67, 102125. Crossref. Web of Science.Triki M. B., & Maatoug A. B. (2021). The GOLD market as a safe haven against the stock market uncertainty: Evidence from geopolitical risk. Resources Policy, 70, 101872. Crossref. Web of Science.Umar Z., Bossman A., Choi S. Y., & Teplova T. (2023). The relationship between global risk aversion and returns from safe-haven assets. Finance Research Letters, 51, 103444. Crossref. Web of Science.Ustaoglu E. (2022). Safe-haven properties and portfolio applications of cryptocurrencies: Evidence from the emerging markets. Finance Research Letters, 47, 102716. Crossref. Web of Science.Widjaja M., & Havidz S. A. H. (2023). Are gold and cryptocurrency a safe haven for stocks and bonds? Conventional vs Islamic markets during the COVID-19 pandemic. European Journal of Management and Business Economics (ahead-of-print).Yan Y., Lei Y., & Wang Y. (2022). Bitcoin is a safe-haven asset and a medium of exchange. Axioms, 11(8), 415. Crossref.Yousaf I., Plakandaras V., Bouri E., & Gupta R. (2022). Hedge and safe haven properties of gold, US Treasury, Bitcoin, and Dollar/CHF against the FAANA companies and S&P 500 (Department of Economics, Working Paper Series No. 2022–27). University of Pretoria.Zhang Y., Zhu P., & Xu Y. (2021). Has COVID-19 changed the hedge effectiveness of bitcoin? Frontiers in Public Health, 9. https://doi.org/10.3389/fpubh.2021.704900

Energy & Economics
Global business connection concept. Double exposure world map on capital financial city and trading graph background. Elements of this image furnished by NASA

Liaison countries as foreign trade bridge builders in the geo-economic turnaround

by Eva Willer

Introduction Geopolitical tensions are making global trade increasingly difficult. In order to reduce the associated risk of default, companies are shifting their trade relations to trading partners that are politically similar to them. In the course of the beginnings of geo-economic fragmentation, politically and economically like-minded countries are also gaining in importance for German and European decision-makers. Liaison countries1 in particular can form a counterforce to the trend towards polarization in foreign trade - especially between the USA and China: they are characterized by a pronounced economic and trade policy openness that overrides differences between geopolitical or ideological camps. Consequently, the question arises: How can relevant connecting countries for Germany and Europe be identified? What opportunities and risks do closer trade relations with these countries offer in order to strengthen foreign trade resilience in geopolitically uncertain times?  With a high degree of openness - defined as the sum of imports and exports in relation to gross domestic product - of over 80 percent2 , the German economy is strongly integrated into global trade. Accordingly, the disruptive effect of geo-economic fragmentation on the German economy would be above average. The defensive strategy to strengthen Germany's economic security by pushing for trade policy independence would only reinforce geo-economic fragmentation. Against the backdrop of comparatively high economic vulnerability, it is necessary to focus on those potential partner countries with which German and European foreign trade could be developed and expanded even under the condition of increasing fragmentation.  Geoeconomic Fragmentation  The term "geo-economic fragmentation" is used to describe the politically motivated reorganization of global goods and financial flows, in which strategic, economic and political interests primarily determine the choice of countries of origin and destination for trade flows.3 In the scenario of geo-economic fragmentation, the result would be the formation of a bloc within the global community of states, which would fundamentally change the regulatory structure of global economic networking. In this case, trade and investment would probably concentrate from a previously diverse range of economic partner countries - prior to the formation of the bloc - on those countries that now - since the formation of the bloc - belong to the same bloc.  The likelihood of this scenario occurring and leading to an increased fragmentation of the global economic order has increased again in the recent past. For example, Donald Trump's second term as US president is causing increasing geopolitical uncertainty worldwide.  Statements on the concrete form of a possible demarcation of potential blocs are subject to a great deal of uncertainty. However, the division of a large part of the global economy into a "US bloc" and a "China bloc" is a conceivable scenario for which German politics and business should prepare.  Data already shows that, at a global level, foreign trade openness has decreased in the recent past. Data from the World Trade Organization (WTO) illustrates the increasing hurdles in global trade in goods. While 3.1% of global imports were still affected by tariff or non-tariff barriers to trade in 2016 - including under WTO rules - this figure rose to 11.8% in 2024 over the following years.4 This development goes hand in hand with a noticeable loss of importance and enforcement of the WTO since the 2010s, which previously played a central role as the guardian of the rules-based global economic order.  Studies by the International Monetary Fund (IMF) have already found indications of an incipient geo-economic fragmentation along potential bloc borders. It shows that trade in goods and foreign direct investment between countries that would belong to the opposing camp in the event of a bloc formation declined on average in 2022 and 2023 - in contrast to foreign trade between countries that are geopolitically close.5  In this initial phase of geo-economic fragmentation, liaison countries are beginning to establish themselves as a counterforce, holding the fragmenting global community of states together with new trade and investment routes.  Identification of liaison countries Specifically, liaison countries have the following characteristics: a pronounced openness to foreign trade in the form of a high foreign trade quota and low tariff and non-tariff trade barriers, as well as pronounced economic relations with partner countries from different geopolitical camps. The geopolitical orientation of countries can be examined using data on voting behavior within the United Nations.6 This involves analyzing whether a country can be assigned to the US or Chinese camp - or whether there is no pronounced proximity and therefore political neutrality or "non-alignment" in the sense of ideological independence. The data-based identification of connecting countries is relatively new. Empirical analyses are also limited to connecting countries in the context of US-Chinese foreign trade - specifically US imports from China. In this case, the characteristics of a connecting country can be broken down into (1) "non-alignment" - i.e. a geopolitical distance to both a Western and an Eastern bloc - as well as (2) an increase in imports and foreign investment from China and (3) a simultaneous increase in exports to the United States. In a narrower sense, this is an evasive reaction to trade restrictions, i.e. circumventing trade. If the foreign trade indicators - specifically the trade and investment data relating to the US and China - of "non-aligned" countries for the period from 2017 to 2020 show corresponding characteristic-related changes compared to previous years, these can be identified as countries connecting the US and China.  The analysis of trade data shows that the value of direct exports from China to the USA fell during Donald Trump's first term in office. At the same time, both Chinese exports to some of the "non-aligned" countries and exports from these countries to the USA have increased significantly. These countries have presumably stepped in as a link on the export route from China to the US after the previously direct trade flow was interrupted by trade barriers and had to find a new route. Companies producing in China are therefore likely to have sought new, indirect ways to maintain access to the US sales market.  A certain statistical inaccuracy in the foreign trade data makes it difficult to draw a definitive conclusion in this context. It should be noted: No single commodity can be tracked across national borders in trade data collection. Whether the additional goods imported from China actually found their way to the United States can only be assumed approximately. However, if the trade flows are aggregated, a clearer picture emerges and the circumvention trade via selected connecting countries - including Vietnam and Mexico - becomes visible.  Data on foreign direct investment rounds off the analysis.7 "Non-aligned" countries in which an increase in Chinese investment can be seen between 2016 and 2020 in addition to trade flows can be identified as connecting countries. Here, too, available data suggests that the companies concerned either exported their goods to the United States via a stopover or even outsourced parts of their production destined for the US market to connecting countries. Five connecting countries between the US and China Based on the 2017-2020 study period, various connecting countries can be empirically identified that were used to indirectly maintain access to the US market. In terms of foreign trade volume, the economically most important connecting countries include Mexico, Vietnam, Poland, Morocco and Indonesia.8 All five countries are characterized by the fact that both their exports of goods to the US and their imports of goods from China increased significantly between 2017 and 2020. In addition, greenfield investments (foreign direct investment to set up a new production facility) have risen significantly compared to the period before 2017.  However, the five countries show different priorities in their development, which differentiate them in their role as connecting countries between the USA and China. In Vietnam, exports to the USA in particular have risen sharply. China has been the most important procurement market for Vietnamese companies for years. Poland, Mexico and Indonesia are characterized as connecting countries primarily by the significant increase in imports from China. Morocco, in turn, was able to attract more Chinese foreign investment in particular. Greenfield investments have almost tripled here since 2017. However, Poland - a rather surprising candidate for the role of liaison country, as it is intuitively assigned to the US-oriented bloc - is positioned fairly centrally between the US and China according to the analysis of voting behavior within the United Nations9. In addition, Poland qualifies primarily due to the sharp rise in greenfield investments from China, primarily in the expansion of domestic battery production.10  It cannot be concluded from the previous studies on the USA and China whether German companies are also circumventing trade barriers from the USA via the countries identified. As the trade policy conflicts between the US and China differ significantly from those between the EU and China, there has been a lack of comparable empirical data to analyze connecting countries in the EU context. Opportunities and challenges As the German economy is strongly oriented towards foreign trade and is closely networked with both the USA and China, German companies play a particularly exposed role in the area of tension between the USA and China. Increased economic exchange with potential connecting countries would offer German companies an opportunity to mitigate the expected shock of a geopolitical bloc. They could at least maintain international trade to a certain extent and thus secure some of the endangered sales and procurement markets. On the other hand, there are also costs associated with expanding foreign trade relations with potential connecting countries. The greater complexity also increases the risk in the value chains. Companies that position themselves wisely within this trade-off buy themselves valuable time in the event of a shock to reorganize themselves against the backdrop of changed foreign trade conditions.  From the perspective of foreign trade policy, it is also possible to examine the extent to which stronger foreign trade cooperation with (potential) connecting countries could have advantages. The trade-off between resilience and complexity must then be assessed at a macroeconomic level, beyond individual company interests. In order to make it easier for companies to connect to potential connecting countries and to create appropriate framework conditions, German and European policy can build on existing comprehensive strategies at national and European level. Both the China Strategy11 and the National Security Strategy12 focus foreign policy on connecting countries as part of a stronger economic and political risk diversification. There is also a similar framework at European level with the EU's Strategic Compass13 . Following on from this, the German government could create targeted incentives to open up new markets in liaison countries, which would diversify critical supply chains and reduce one-sided dependencies.  At the same time, connecting countries pose a challenge. These can be used to circumvent foreign trade measures such as sanctions if flows of goods can find alternative routes via connecting countries more easily than before.  In order to realize opportunities and overcome challenges, close cooperation between science, politics and companies is required. This first requires the identification of a selection of potential connecting countries through scientifically sound analysis. This creates the basis for the subsequent steps in which European and German policymakers work closely with companies to create attractive framework conditions for trade with potential connecting countries - for example through bilateral trade agreements.  Attractive foreign trade framework conditions can create the necessary incentive to actually expand trade relations with potential connecting countries. Companies need to weigh up individual cases and make forward-looking decisions: To what extent is there a risk of a loss of production triggered by geopolitical conflicts? And how much would the complexity of the value chain increase if more potential connecting countries were included? Ultimately, the actual choice of preferred sales and procurement markets lies with the individual companies. LicenseThis work is licensed under CC BY 4.0 References1. Verbindungsländer werden im Sinne von Connectors verstanden, vgl. Gita Gopinath/Pierre-Olivier Gourinchas/Andrea F Presbitero/Petia Topalova, Changing Global Linkages: A New Cold War?, Washington, D.C.: IMF, April 2024 (IMF Working Paper) <https://www.imf.org/en/Publications/WP/Issues/2024/04/05/Changing-Global-Linkages-A-New-ColdWar-547357/>. 2. Statistisches Bundesamt (Destatis), Außenwirtschaft. 2025, <https://www.destatis.de/DE/Themen/Wirtschaft/Globalisierungsindikatoren/aussenwirtschaft.html#246 078/>.  3. Shekahar Aiyar/Franziska Ohnsorge, Geoeconomic Fragmentation and ‚Connector’ Countries, Online verfügbar unter:  <https://mpra.ub.uni-muenchen.de/121726/1/MPRA_paper_121726.pdf>.4. WTO, WTO Trade Monitoring Report, Genf, November 2024, <https://www.wto.org/english/tratop_e/tpr_e/factsheet_dec24_e.pdf/>. 5. Gita Gopinath/Pierre-Olivier Gourinchas/Andrea F Presbitero/Petia Topalova, Changing Global Linkages: A New Cold War?, Washington, D.C.: IMF, April 2024 (IMF Working Paper) <https://www.imf.org/en/Publications/WP/Issues/2024/04/05/Changing-Global-Linkages-A-New-ColdWar-547357/>.  6. Michael A. Bailey/Anton Strezhnev/Erik Voeten, »Estimating Dynamic State Preferences from United Nations Voting Data«, Journal of Conflict Resolution, 61 (2017) 2, S. 430-456, <https://journals.sagepub.com/doi/10.1177/0022002715595700/>.7. Gita Gopinath/Pierre-Olivier Gourinchas/Andrea F Presbitero/Petia Topalova, Changing Global Linkages: A New Cold War?, Washington, D.C.: IMF, April 2024 (IMF Working Paper) <https://www.imf.org/en/Publications/WP/Issues/2024/04/05/Changing-Global-Linkages-A-New-ColdWar-547357/>. War-547357. 8. Enda Curran/Shawn Donnan/Maeva Cousin, »These Five Countries are Key Economic ‚Connectors‘ in a Fragmenting World«, in Bloomberg (online), 1.11.2023, <https://www.bloomberg.com/news/articles/2023-1102/vietnam-poland-mexico-morocco-benefit-from-us-china-tensions/>.9. Michael A. Bailey/Anton Strezhnev/Erik Voeten, »Estimating Dynamic State Preferences from United Nations Voting Data«, Journal of Conflict Resolution, 61 (2017) 2, S. 430-456, <https://journals.sagepub.com/doi/10.1177/0022002715595700/>.  10. Enda Curran/Shawn Donnan/Maeva Cousin, »These Five Countries are Key Economic ‚Connectors‘ in a Fragmenting World«, in Bloomberg (online), 1.11.2023, <https://www.bloomberg.com/news/articles/202311-02/vietnam-poland-mexico-morocco-benefit-from-us-china-tensions/>.11. Auswärtiges Amt, China‐Strategie der Bundesregierung, Berlin, Juli 2023, <https://www.auswaertigesamt.de/resource/blob/2608578/810fdade376b1467f20bdb697b2acd58/china-strategie-data.pdf/>.  12. Auswärtiges Amt, Integrierte Sicherheit für Deutschland: Nationale Sicherheitsstrategie, Berlin, Juni 2023, <https://www.bmvg.de/resource/blob/5636374/38287252c5442b786ac5d0036ebb237b/nationalesicherheitsstrategie-data.pdf/>.  13. Rat der Europäischen Union, Ein Strategischer Kompass für Sicherheit und Verteidigung, Brüssel, März 2022, <https://data.consilium.europa.eu/doc/document/ST-7371-2022-INIT/de/pdf/>.

Defense & Security
Soldier, CPU computer (central processing unit) US and Chinese flag on white background. US vs China chip war or tech war, semiconductor industry concept. US restrict and control chip export to China.

Superpowers Without Soldiers: Can Technology Replace Traditional Hegemony?

by Syeda Farani Fatima

Introduction Hegemony is the core principle in International Relations. It has been conceptualized through military strength, economic influence, and ideological control. The theory of cultural hegemony by Antonio Gramsci is based on assuming control but not necessarily through force, whereas realist theorists such as John Mearsheimer stress the relevance of military strength for ensuring global dominance (Mearsheimer 2001). The 21st century, though, brought into being a different era of transformation and technological breakthroughs that turned the existing arrangements on their head. With the advent of Artificial Intelligence (AI), cyber war, and space technology, great powers are transforming from traditional soldiers to cyberspace warriors. AI and other cyber tools are altering the strategic equation between major powers, providing avenues for countries like China and Russia to undermine US hegemony (Rooney et al. 2022). Hegemony in the past had been founded on military superiority, but at present, academics have discovered that technological hegemony is leading the way. Lethal Autonomous Weapons (LAWs) and AI have captivated researchers because they can transform war. Cyberspace has become the new battleground of power. The US and China are competing for cyber hegemony (Akdaǧ 2025). Space is increasingly regarded as a new battleground in geopolitics. The US Space Force and China’s BeiDou system illustrate how nations weave surveillance and communication in their strategic decision-making (O’Hanlon 2020). Thus, new technologies are reshaping the China-US rivalry. To counter this, countries are investing in tech-based industries, which will change the way human thinks. The analysis will explore whether emerging technologies can efficiently replace traditional tools of hegemony or not. Joseph Nye’s concept of smart power provides a critical framework in this modern era, where influence may flow from military boots to silicon chips. Global powers are moving towards influence and deterrence-based tech models, supplementing hard power. However, this transition has its risks, such as overdependence and ethical concerns. The paper argues that a complete transformation is not happening, but there will be dual-track hegemony where military and technology will coordinate to dominate. Policy implications of this shift are profound. Global powers must collaborate to draft international norms for AI and cyberwarfare, developing nations must develop their technology rather than dependency on global powers, as it will be easier for them to surveil and dominate, and international institutions must proactively govern the techno-political landscape to prevent destabilization. This study will use a qualitative approach, and it will be a case-based methodology combining theoretical perspectives of philosophers. This analysis is important as it delves into the transformation of the mechanics of global power from military hegemony to technology-oriented hegemony. It uses secondary sources like policy briefs, think tank reports, books, etc. Finally, this analysis concludes that soldiers may never be the first line of every fight, but the battle for global supremacy is firmly human-hinged in decisions on technology, ethics, and governance. Hegemony is a core concept in International Relations, grounded in military capacity, economic influence, and institutional influence. Historically, great civilizations like the Roman and British empires attained hegemony by dominating in naval power, making alliances and expanding their territories. In the post-World War II era, the US built dominance through overseas military bases and nuclear deterrence. Historical Foundations of Traditional Hegemony The Roman Empire, a classic example of past hegemony, attained this power by constructing roads, forts, and legions in the world's islands. Later, the British Empire sustained its dominance by modernizing the Royal Navy and the global trade network. The post-World War II era saw the hegemony of the United States with overseas military bases and security alliances. John Mearsheimer, in his book The Tragedy of Great Power Politics, says that according to great powers, hegemony is the best way to ensure their security (Mearsheimer 2001). Limitations of Traditional Hegemony The primary limitation of the traditional hegemonic model is the risk of overreach, entering into too many overseas agreements that become economically and politically unsustainable. Imperial overstretch, a model proposed by Paul Kennedy, explains the collapse of empires when they are unable to maintain their economy due to huge global aims (Kennedy 1988). Concurrently, we can see that after so many years have passed in the Vietnam, Afghanistan, and Iraq wars, the US is spending trillions. Approximately $3.68 trillion was spent on Iraq and Afghanistan (Costs of War | Brown University 2025). This highlights that military dominance can be costly and unsustainable. Mearsheimer, in an interview at the New York Times, claimed that ‘the United States is responsible for causing the Ukraine crisis’. Lack of legitimacy and local resistance is another great flaw in the traditional hegemonic pattern. For example, in Vietnam, soldiers used their knowledge of geography to push back against America's advanced weapons. Similarly, in Afghanistan and Iraq, foreign-led missions struggled with local insurgents. The New Tools of Technological Hegemony Cyber Power Cyber power has rapidly become a strategic field where states project their influence far beyond the geographic borders, often without soldiers. Cyber operations are dominating in this digital age, and the SolarWinds hack shows how states can achieve global influence through an Information Technology (IT) infrastructure breach. In March 2020, Russian hackers placed a secret backdoor in SolarWinds’ Orion software. This infected around 18000 users, including US major government departments (Cybersecurity 2021). The cyberattacks went undetected for several months, revealing vulnerabilities in the digital network. It was the worst cyber-espionage attack ever, an analyst described. Iran's 2019 cyberattack on the oil infrastructure of Saudi Arabia shows that the acquisition of digital superiority can help influence norms, command the critical infrastructure, and set global political narratives without foreign boots on the ground. To address this vulnerability, it is essential to know cyber deterrence theory. It discusses capability, attribution, and resolution. States should advance digital tools, modify their tracking system and enhance communication and transparency. The most lethal weapon today may not fire a projectile-it fires packets. This metaphor illustrates that state actors can erode adversary national infrastructure, banks and election systems without traditional warfare. The US Secretary of Defense Lloyd J. Austin III described the integrated Deterrence that integrates cyber with land, sea, and space under a unified strategy (Masitoh, Perwita, and Rudy 2025). Cybersecurity experts say that cyberpower is now a geopolitical power. And cyber warfare is not a sideshow; it’s a frontline strategy. Artificial Intelligence (AI) and Big Data AI’s strategic significance for national security has been emphasized by leaders like Jason Matheny, CEO of RAND Corporation. He warns that AI could make it easier to make harmful weapons and dangerous technologies (Matheny 2024). The 2023 report of RAND on AI and Geopolitics argues that AI may be the next frontier in US-China rivalry (Pavel et al. 2023). ChatGPT and Bard, like generative AI models, have humanitarian strategic applications, which makes fake news so believable that it feels like fact. This capability of AI can transform propaganda into scalable digital warfare. Beyond surveillance, AI has transformed military operations tactics. Military applications like drone swarming, algorithmic targeting, and predictive ISR create scenarios where the frontline shifts from kinetic zones to data centers. AI diplomacy is becoming the new foreign aid. Financial Times article notes that tech giants are deploying AI mechanisms in Africa not only for development but for their advantage as an influence tool. Thus, AI and big data are a new form of informational hegemony. Space Militarization and Satellite Dominance Space militarization emerged during the Cold War. States like the US, China, Russia, India, and Japan have developed anti-satellite (ASAT) capabilities (Samson and Cesari 2025). General John Jay Raymond at the US Space Command Launch said that, “Outer space is now recognized as a domain of military operations” (Raymond 2021). China’s 2007 ASAT test, which destroyed its own Fengyun-1C weather satellite, is still a thorn in the eyes of major powers. Russia has also launched missions like Kosmos-2553. Evolution from GPS to GNSS (Global Navigation Satellite Systems) reflects strategic change. The US has GPS, China has BeiDou, Elon Musk’s Starlink satellite constellation, and Europe has Galileo; each system highlights the sovereignty in digital positioning. China’s counterpart doctrine states in its 2021 Space White Paper that space-based assets are not crucial for renaissance only but for strategic deterrence without deploying soldiers or causing deaths of your military men (The State Council Information Office of the People’s Republic of China 2022). Undersea Cables and Digital Infrastructure Control Undersea cables carry over 95% of global data transmission (Sherman 2021). Disruption or surveillance of these cables can impact the worldwide flow of data and diplomatic communications. In developing countries like Pakistan, Kenya, and Ecuador, Huawei-funded infrastructure provides smart city services. Cable route is not just wiring undersea, it is influenced by encryption. The US and EU have Amazon Web Services (AWS), Microsoft Azure, and Google Cloud, like surveillance platforms. Cable-Landing zones (CLZs) are the chokepoints used for manipulation, Cloud interconnection policies allow control of traffic flow, and Surveillance software and firmware installed at data centers can be remotely controlled, bypassing local safeguards. Blocking connections can slow or disrupt foreign economic leverage. Digital infrastructure has become a domain for hegemony that is more insidious in strategic potential. This map exposes the physical foundations of digital power. Nations with greater cable landing nodes, like the U.S. and China, wield asymmetric influence, not through soldiers, but through network control. Disruption or surveillance of these cables can cripple economies or governance. Regional chokepoints also reflect strategic leverage in geo-economics and cyber diplomacy, making this infrastructure as consequential as traditional military bases. Figure 1: This map shows the physical foundations of digital power, nations with greater cable landing nodes, like the U.S. and China, wield asymmetric influence, not through soldiers, but through network control.Superpowers’ Technological Footprint United States Silicon Valley is the heart of US technological hegemony, and some other government agencies, like Defense Advanced Research Projects Agency (DARPA), are contributing to maintaining US technological hegemony. Lethal Autonomous Weapons (LAWs), drones, and defense-grade AI-powered decision-support systems are a tech-military hybrid force. Furthermore, the US controls major pillars of technology like operating systems (Microsoft, Apple, Google dominate desktops and mobile devices), and Satellites. Advanced technologies have enabled remote force projection like drone strikes, executing surgical operations, Cyber Command operations from SolarWinds retaliation, deployment of Overhead Persistent Infrared (OPIR) and Space Based Kill Assessment (SKA), enhancing deterrence. China Made in China 2025 vision aims to displace US techno-hegemony. China’s centralized Social Credit System reflects a template of techno-surveillance hegemony. Beijing is now selling surveillance systems to developing countries, highlighting its tech supremacy. China is controlling telecommunications architecture by promoting Huawei’s 5G worldwide. China’s cyber army, the People’s Liberation Army Strategic Support Force (PLASSF), specializes in offensive and defensive cybertech warfare (The State Council Information Office of the People’s Republic of China 2019). China’s Digital Silk Road links infrastructure investments in Asia and Africa with national encryption systems and cloud data centers. Ethiopian Prime Minister Abiy Ahmed, in a bilateral dialogue, said that ‘our fiber networks and data exchanges are now integrated with Beijing’s national infrastructure policy’. Thus, acquiring such a position in technology will prove China’s hegemony and can make it a superpower, making the world again a bipolar one. China’s strategic doctrine focuses on autonomous systems and digital authoritarian export over occupancy and geopolitical projection, respectively. Russia Russia’s global strategy remains rooted in a hybrid doctrine that combines cyber tools, space capabilities and disinformation operations. The Gerasimov Doctrine, Vladimir Putin’s strategic vision, emphasizes the blend of political, cyber, and economic tools to achieve strategic goals without casualties. The Ukraine conflict is a great example of cyber dominance. Russia has cyber units such as APT28 (Fancy Bears), Satellite Spoofing and Jamming, and the Internet Research Agency (IRA), which have executed targeted hacks against North Atlantic Treaty Organization (NATO), disrupted Global Positioning System (GPS) signals, and led disinformation campaigns. Russia’s power formula centers on dense cyber capacity, economic coercion, and unpredictability (making deterrence harder). Risks and Criticism of Tech-Based Hegemony Technology provides tools for security and influence, but overdependence causes strategic vulnerability, which leads to ethical dilemmas and raises questions about digital sovereignty. Overdependence and System Vulnerability A fundamental flaw of technological hegemony is its fragility. Systems are dependent on infrastructure (cloud servers, AI control nodes, etc.). The UN Group of Governmental Experts (GGE) says that lethal autonomous weapons are the cause of escalation in conflicts (CCW 2022). Take the SolarWinds breach of 2020, in which an update exposed thousands of sensitive pieces of information. Ethical Concerns China, Ethiopia, and some other states have AI-powered surveillance regimes. China exports networked camera systems and facial recognition tools to states that use them to suppress dissent. A senior researcher at Amnesty noted that, ‘delegating life and death decisions to software is ethically unjustifiable’. Global South Dependency and Digital Colonialism Due to technological influence, digital dependency has increased in the Global South. Digital dependency without regulatory safeguards leads to digital colonialism. Countries lacking advanced technology are reliant on digital ecosystems developed by superpowers. It is said by Dr Ruha Benjamin that ‘when code becomes law, and pipelines become policy enforcers, sovereignty is outsourced’. Hegemony Without Consent Soldiers are a visible force, but technology imposes itself quietly via platforms, which results in domination without democracy. Tech-enabled coercion doesn’t need tanks; it needs standards embedded in devices, laws baked into algorithms. This contradicts liberal norms of International Relations (IR), where hegemony should rest on consent for international legitimacy (Sakumar, Broeders, and Kello 2024). Future Power Projections: Domain-wise Breakdown There are five interconnected domains of future power projections: land, air, sea, cyber, and space. Land Domain In traditional combat, troops were used to counter enemy force, but now in the third digital era, surveillance grids, AI-powered motion detection systems, and autonomous land robots are replacing soldiers. The Israeli military is testing unmanned ground vehicles (UGVs), which they have named Jaguar, to patrol borders, and this will reduce human casualties. The diagram illustrates the interaction or the coordination between a human coordinator and an autonomous weapon system (AWS), and the target within a given environment. At first, the operator gives a high-level command which activates the controller, and the system provides feedback to the operator, such as mission success or failure. The controller is the brain of this system. It monitors the environment, processes data and controls the weapons. It operates in loops, evaluating the environment and updating the decision. Once the target is detected autonomously, the gun acts, which includes missile launch or gunfire. This entire process takes place in a dynamic environment. Figure 2: The coordination between a human coordinator and an autonomous weapon system (AWS) Air Domain Traditional manned fighter jets were dominating in aerial combat. Now, aerial dominance is shifted towards hypersonic weapons and AI-enabled drone swarms. Russia’s Zircon and China’s DF-ZF are hypersonic missiles that can travel at Mach 5+ speeds. AI drone swarms are rendering conventional missile defense systems obsolete. The US Air Force’s “Golden Horde” project and China’s GJ-11 stealth drone exemplifies this shift. Sea Domain Sea powers used to refer to blue-water navies and submarine fleets. They remain the core of maritime protection, but unmanned underwater vehicles (UUVs) are quickly supplanting aircraft carriers. UUVs are being used to surveil for months on their own, and they will not be detected. Subsea data cables, which transport 95% of internet traffic, are a strategic resource; such cables are undersea digital arteries. Securing the sea in the 21st century means controlling what is beneath it. The diagram illustrates major elements of an autonomous underwater vehicle (AUV). It is an important element in current naval battles and marine monitoring. The GPS/RF module is situated at the top of the AUV, through which the vehicle can position itself beneath the water. The propeller motor is the mobility unit of an AUV, driven by lithium-ion batteries. It provides thrust and directional movements. An electronic aid container serves as a housing store; it includes an onboard computer, a mission processor, a power distribution unit, and communication interfaces. AUVs have sensors which detect how deep the AUV is in the water column by measuring hydrostatic pressure. Acoustic Doppler Current Profile (ADCP), is a sonar device that uses Doppler shift in acoustic signals to measure the speed of water currents. An AUV manage its vertical position with a buoyancy tank. AUVs use an inertial navigation system; they determine the position of the AUV based on prior data. AUVs also contain forward-looking (Sound Navigation and Ranging) SONARs and Altimeters that scan and detect any obstacles in front of them and maintain a safe height from the seabed, respectively. Transducers are the mouth and ears of AUVs; they transmit and receive acoustic signals. They are crucial for clandestine communication and sensing of the environment. These AUVs are extremely crucial in contested sea areas such as the South China Sea or the Arctic. Therefore, AUVs are revolutionizing maritime operations by enlarging surveillance, exploration, and undersea warfighting capabilities. As technology evolves, AUVs will define the future of naval strategy and oceanographic study. Figure 3: Major elements of an autonomous underwater vehicle (AUV). Cyber Domain Cyberspace has no borders. Global powers like the US, China and Russia have developed cyber command units to disrupt the power grids of the opposite side. Russia’s cyber interference in the 2016 U.S. elections, China’s alleged breach of U.S. personnel databases (OPM hack), and the Stuxnet worm targeting Iran’s nuclear program exemplify how software has become a strategic weapon. According to NATO’s 2025 Cyber Doctrine, ‘A cyberattack triggering Article 5 [mutual defense] is not just theoretical—it’s a matter of time.’ Space Domain Traditionally, space power was limited to spy satellites, but now anti-satellite weapons (ASAT), Starlink and military satellite systems have transformed into a combat zone. The US created its Space Force in 2019 to dominate in space militarization. In the Ukraine war, SpaceX’s Starlink became crucial for Ukrainian battlefield communication, prompting Elon Musk to limit military use to avoid escalation. Table 1 (figure 4): Old model versus new model comparison in each domain of future power projection. Done by the author. Domain Old Model New Model Land Troop deployment - Armored divisions - Occupation warfare AI-enabled surveillance grids - Unmanned Ground Vehicles (UGVs) - Real-time satellite + sensor networks Air Fighter jets - Airbases - Strategic bombers Hypersonic missiles (e.g., DF-ZF, Zircon) - Drone swarms with AI autonomy - Human-out-of-loop air dominance Sea Naval fleets - Aircraft carriers Submarines Unmanned Underwater Vehicles (ORCA UUV) - Seafloor cable warfare - Autonomous maritime surveillance Cyber (No traditional equivalent) State-sponsored hacking - Data theft & disinformation ops - Cyber jamming, spoofing in kinetic war Space Reconnaissance satellites Missile early-warning systems ASAT weapons (China, Russia tests) - Satellite internet constellations (Starlink) - Real-time warfighting integration (JADC2) Can Technology Fully Replace Military Power? The emergence of advanced technologies like AI, autonomous weapons and space militarization has sparked the debate about whether technology can replace military power, wholly or not? Strategic autonomy, in which a nation’s ability to defend its interests independently requires both technology and military. Technology acts as a critical enabler but not a substitute. AI can analyze satellite data in seconds, but only trained personnel can conduct peacekeeping missions in fragile regions. Modern warfare is shifting towards grey zone conflicts that fall below the threshold of open combat. Russian operations in Crimea in 2014 blended cyberattacks and physical deployments of troops, due to which the line between technology and military became blurry. This incident shows that technology without boots is of no advantage. In addition, technology needs regular upgrades and educated users, and excessive reliance upon these systems may cause interruptions such as electronic warfare (EW) and electromagnetic pulse (EMP) attacks. In a time of humanitarian crisis, disaster response, and counterinsurgency, forces are indispensable. To defeat an enemy or to dominate, one must employ both technology and an educated military. Unmanned aerial vehicles (drones) have altered the character of air war. Great powers are investing heavily in military AI and quantum communication to improve battlefield awareness, minimize human loss of life, and enhance decision-making, but note that international decisions do not depend on a machine. They don't aim to replace the military, but they want to develop their technology. Thus, the emerging model of global power is not soldiering versus technology, but it is soldiers plus technology. It is known as dual-track hegemony, and a nation that acquires it will dominate shortly. A tech-savvy soldier, supported by AI and robotics, is the face of tomorrow’s war. Conclusion The United States, China and the EU are global powers of the modern era. These states possess the technological capital and military infrastructure that shape the regulation of engagement in cyberspace and AI. Firstly, they must strengthen international norms for cyber operations and AI governance. UNGGE has made some progress relevant to this, but this needs a broader enforcement mechanism like the Geneva Conventions. Secondly, global powers must invest in ethical and auditable technology. As AI is dangerous due to biased surveillance systems, facial recognition abuses, and it is also used in predicting policies, which is a major ethical concern. Algorithmic transparency, data protection, and privacy rights must be enforced as soon as possible. Lastly, multilateralism must extend to outer space. As space is becoming a battlefield, complicating geopolitical rivalry, to counter it, multilateralism must be encouraged. For developing countries like Pakistan, Indonesia, or Nigeria, the emergence of technological hegemony is both a threat and an opportunity. These countries should enforce digital sovereignty policies. These nations should avoid digital dependency, as it will be easier for global powers to surveil and dominate. Emerging powers should build defensive cyber infrastructure instead of offensive. They should build secure networks and legal protection against espionage on their own. Defensive strategy will serve as a strategic safeguard and can be used as a pawn in great power rivalries. Emerging powers should pursue a multilateral coalition among Muslim majority states to enhance their connectivity and ties. South-south cooperation must be promoted. The UN, G20 and other international bodies must move towards digital governance mechanisms instead of vague declarations. UN should form a Global Charter on Tech Governance, similar to a Digital Magna Carta. The charter should have ethical limits on the establishment and use of Artificial Intelligence and Lethal Autonomous Weapons. They should increase their coordination with the G20 to amplify these efforts. G20 should create a Tech and Ethics working Group, which can bridge the trust gap between Developed and developing countries in the digital arena. Global order continues to evolve in the 21st century, and the foundations of power projection are rewritten. There is a paradigm shift from boots to bots. This research demonstrates that while technology has transformed, it cannot entirely replace traditional modes of combat. Technology can only help the military to dominate in a region or conflict, but cannot fully replace it. There will be dual track hegemony, and the one who will acquire this hegemony will control world islands, and controlling world islands means ruling the world. However, this transformation comes with serious risks like AI miscalculations, vulnerabilities of digital infrastructure and ethical concerns. But we should keep in mind that military power is no longer sufficient, nor is technology alone a guarantee of dominance, in post-silo, where military, technological, and normative tools must function together to sustain leadership.ReferencesAkdaǧ, Yavuz. 2025. “Great Power Cyberpolitics and Global Cyberhegemony.” Perspectives on Politics. doi:10.1017/S1537592725000040.CCW. 2022. “Document Viewer.” : 16. https://docs.un.org/en/CCW/GGE.1/2021/3 (October 18, 2025).“Costs of War | Brown University.” https://costsofwar.watson.brown.edu/ (October 18, 2025).Cybersecurity, Centre for. 2021. SolarWinds: State-Sponsored Global Software Supply Chain Attack. https://www.cfcs.dk/globalassets/cfcs/dokumenter/rapporter/en/CFCS-solarwinds-report-EN.pdf.Kennedy, Paul. 1988. “Paul-Kennedy-the-Rise-and-Fall-of-the-Great-Powers-19891.” : 704. https://cheirif.wordpress.com/wp-content/uploads/2015/08/paul-kennedy-the-rise-and-fall-of-the-great-powers-19891.pdf.Masitoh, Yuniar Tri, Anak Agung Banyu Perwita, and Elphis Rudy. 2025. “Integrated Deterrence in Practice: The 2022 United States National Defense Strategy Towards the Russia-Ukraine War.” International Journal of Humanities, Education, and Social Sciences 3(3): 1030–48. doi:10.58578/ijhess.v3i3.7317.Matheny, Jason. 2024. “A National Security Insider Does the Math on the Dangers of AI | WIRED.” https://www.wired.com/story/jason-matheny-national-security-insider-dangers-of-ai/ (October 18, 2025).Mearsheimer, John. 2001. “S2-Mearsheimer-2001.” file:///C:/Users/sh/Downloads/s2-mearsheimer-2001.pdf.O’Hanlon, Michael. 2020. “Forecasting Change in Military Technology, 2020-2040 - Joint Air Power Competence Centre.” https://www.japcc.org/essays/forecasting-change-in-military-technology-2020-2040/ (October 18, 2025).Pavel, Barry, Ivana Ke, Michael Spirtas, James Ryseff, Lea Sabbag, Gregory Smith, Keller Scholl, and Domenique Lumpkin. 2023. “AI and Geopolitics: How Might AI Affect the Rise and Fall of Nations? | RAND.” https://www.rand.org/pubs/perspectives/PEA3034-1.html (October 18, 2025).Raymond, John W. 2021. “U.S. Leadership in Space: A Conversation With General John Raymond | Council on Foreign Relations.” https://www.cfr.org/event/us-leadership-space-conversation-general-john-raymond (October 18, 2025).Rooney, Bryan, Grant Johnson, Tobias Sytsma, and Miranda Priebe. 2022. Does the U.S. Economy Benefit from U.S. Alliances and Forward Military Presence? RAND Corporation. https://www.rand.org/content/dam/rand/pubs/research_reports/RRA700/RRA739-5/RAND_RRA739-5.pdf.Sakumar, Arun, Dennis Broeders, and Monica Kello. 2024. “Full Article: The Pervasive Informality of the International Cybersecurity Regime: Geopolitics, Non-State Actors and Diplomacy.” https://www.tandfonline.com/doi/full/10.1080/13523260.2023.2296739 (October 18, 2025).Samson, Victoria, and Laetitia Cesari. 2025. “Secure World Foundation: 2025 Global Counterspace Capabilities Report.” https://www.swfound.org/publications-and-reports/2025-global-counterspace-capabilities-report (October 18, 2025).Sherman, Justin. 2021. Cyber Defense across the Ocean Floor : The Geopolitics of Submarine Cable Security. Atlantic Council, Scowcroft Center for Strategy and Security.The State Council Information Office of the People’s Republic of China. 2019. China’s National Defense in the New Era. Foreign Languages Press. https://english.www.gov.cn/archive/whitepaper/201907/24/content_WS5d3941ddc6d08408f502283d.html.The State Council Information Office of the People’s Republic of China. 2022. “Full Text: China’s Space Program: A 2021 Perspective.” https://english.www.gov.cn/archive/whitepaper/202201/28/content_WS61f35b3dc6d09c94e48a467a.html (October 18, 2025)

Defense & Security
Missiles in front EU flag. Air defense systems European Union. Cruise missiles in Europe. Concept weapons development in Europe. Stockpiles strategic missiles. Concrete wall in foreground. 3d image

Nuclear Sharing Between the U.S. and the EU. Benefits and Challenges.

by Krzysztof Śliwiński

Abstract This paper examines the NATO nuclear sharing arrangement, focusing on its benefits and challenges within the U.S.-EU security framework. Nuclear sharing involves the U.S. deploying B61 nuclear bombs in select European NATO countries, with host nations providing delivery systems and infrastructure while the U.S. retains full control, ensuring compliance with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The arrangement strengthens NATO's deterrence posture, promotes alliance cohesion, and supports non-proliferation by dissuading the development of independent nuclear arsenals. Recent geopolitical tensions, especially Russia's invasion of Ukraine, have intensified calls for expanding sharing to countries like Poland, enhancing deterrence on NATO's eastern flank. Exercises such as Steadfast Noon validate operational readiness and signal resolve. Critics, however, highlight legal and escalation risks, potential NPT violations, and domestic opposition in host countries. Despite these issues, nuclear sharing remains a crucial component of Euro-Atlantic security, adapting to evolving threats while balancing deterrence, alliance unity, and non-proliferation goals.  Key Words: International Security, Weapons of Mass Destruction, Nuclear Sharing, Alliances Introduction Nuclear sharing is a cornerstone of NATO's deterrence strategy, designed to distribute the benefits, responsibilities, and risks of nuclear deterrence across the Alliance. Under these arrangements, the United States deploys a limited number of B61 nuclear gravity bombs at bases in several European NATO member states. At the same time, those host countries provide the necessary infrastructure, security, and dual-capable aircraft (DCAs) to deliver weapons in a crisis. The weapons remain under full U.S. custody and control at all times, in compliance with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). A nuclear mission can only be authorised after explicit political approval from NATO's Nuclear Planning Group (NPG), which includes all NATO members, and the U.S. President (and potentially the UK Prime Minister). This setup ensures collective decision-making and underscores the U.S.'s extended deterrence commitments to its allies, helping prevent nuclear proliferation by giving non-nuclear states a stake in the Alliance's nuclear posture without independent arsenals.[1] The arrangements originated in the Cold War era, with the first U.S. atomic weapons arriving in Europe in 1954. By the 1960s, they were formalised through the NPG to allow non-nuclear allies input on nuclear policy. Today, approximately 100 B61 bombs are forward-deployed in Europe, hosted by five NATO countries: Belgium, Germany, Italy, the Netherlands, and Turkey. Seven NATO allies contribute DCA, including F-16s and F-35s, which serve dual roles in conventional operations and as potential nuclear delivery platforms. France and the UK maintain independent nuclear forces that complement the US-led sharing but operate outside the formal NATO structure. While the question references the EU, nuclear sharing is strictly a NATO framework; all host countries are EU members except Turkey, creating significant overlap but no direct EU-level involvement.[2] These arrangements serve multiple purposes: they enhance Alliance cohesion, provide tools for managing escalations in conflicts, and signal resolve to adversaries, such as Russia. Recent geopolitical tensions, including Russia's invasion of Ukraine, have prompted discussions about expanding sharing to strengthen deterrence on NATO's eastern flank.[3] Poland, a NATO member since 1999, has long advocated for a stronger role in the Alliance's nuclear mission amid heightened Russian threats, particularly following the 2022 invasion of Ukraine. In June 2023, Polish Prime Minister Mateusz Morawiecki first publicly expressed interest in hosting U.S. nuclear weapons under NATO's sharing policy, arguing it would bolster deterrence without violating the NPT. This push intensified in early 2025, driven by concerns over U.S. reliability under the second Trump administration and Russia's aggressive posture.[4]   On March 13, 2025, President Andrzej Duda explicitly urged the U.S. to deploy nuclear warheads on Polish territory, stating in interviews that NATO infrastructure—including nuclear assets — should "shift east" to match the eastward expansion of the Alliance's borders since 1999. He emphasised that such a move would enhance security guarantees and deter future Russian aggression, while also praising France's potential extension of its "atomic umbrella" as a complementary option. Duda's proposal carried domestic political weight, positioning Poland's conservative opposition as pro-U.S. ahead of the May 2025 presidential election, where candidates debated transatlantic ties versus European autonomy.[5] Proponents argue Poland is an ideal candidate: it spends 4.7% of GDP on defence (exceeding NATO's 2% target), has built one of Europe's strongest militaries, and hosts significant U.S. rotational forces. Analysts suggest that deployment could involve adapting Polish F-35s for DCA roles or constructing secure storage facilities. However, logistical and political hurdles remain, including a potential Russian backlash and the need for NPG consensus.[6] As of October 2025, however, no U.S. nuclear weapons have been deployed to Poland, and the proposal remains under discussion without a formal U.S. commitment. Instead, Poland has deepened integration through participation in NATO's annual Steadfast Noon nuclear exercise, which began on October 13, 2025, across Belgium, the Netherlands, and the North Sea — testing procedures for credibility and safety. Poland joined as a full participant alongside Finland, Germany, and the U.S., signalling growing involvement in nuclear planning but stopping short of hosting assets. Alternatives like a dedicated U.S. "nuclear umbrella" declaration for Poland have been floated to avoid escalation without physical deployment.[7] What academics say Academic experts agree that Nuclear sharing is a cornerstone of NATO's defence strategy. This arrangement refers to an agreement according to which the United States deploys non-strategic nuclear weapons on allied territory while maintaining ownership and peacetime custody.[8]This allows selected NATO members to participate in nuclear planning and provide delivery systems, creating a framework that extends American nuclear deterrence across the Alliance. The operational structure of nuclear sharing involves dual-key arrangements in which both U.S. and host-nation authorisation are required for weapon employment. The United States maintains absolute control and custody of its nuclear weapons forward-deployed in Europe, while Allies provide military support for the DCA mission with conventional forces and capabilities. Nuclear sharing arrangements play a vital role in the Alliance's interconnection and remain a key component of security guarantees and the indivisibility of security across the entire Euro-Atlantic area.[9] These arrangements are coordinated through NATO's Nuclear Planning Group, ensuring multilateral consultation on nuclear policy and targeting decisions. Currently, only five European NATO members have signed bilateral nuclear-sharing agreements with the U.S. These are: Belgium, Germany, Italy, the Netherlands, and Turkey, under which the U.S. stores B61 nuclear gravity bombs at their airbases and their dual-capable aircraft can deliver them in a NATO context. These arrangements, dating back to the Cold War and reaffirmed in subsequent treaties, involve approximately 100 U.S. warheads as of 2025.[10] Nuclear sharing serves multiple strategic purposes within the alliance framework. It strengthens extended deterrence by visibly integrating allied forces into NATO's nuclear posture, thereby reassuring front-line states of American commitment.[11] Experts claim that these arrangements helped prevent nuclear proliferation by reducing incentives for European allies to develop independent arsenals during the Cold War.[12] Additionally, nuclear sharing distributes the political and operational burdens of nuclear responsibility across participating members rather than concentrating them solely with the United States. However, nuclear sharing faces significant criticisms. Legal scholars argue that forward-deploying U.S. weapons on non-nuclear states potentially contravenes the Non-Proliferation Treaty's spirit, creating ongoing diplomatic tensions with Russia and other nations.[13] Domestic opposition within host countries and concerns about the escalation of crises further complicate these arrangements.[14] Despite these challenges, nuclear sharing remains integral to NATO's deterrence strategy, particularly as renewed great-power competition has reinforced alliance solidarity and commitment to collective defence in the contemporary security environment. Benefits of Nuclear Sharing Firstly, official sources from NATO and the U.S. government consistently highlight the benefits of their efforts in preserving peace, deterring aggression, fostering unity, and aligning with global non-proliferation norms. The primary official argument for nuclear sharing is its role in bolstering NATO's deterrence posture against evolving threats, particularly from nuclear-armed adversaries like Russia. NATO's 2022 Strategic Concept and related documents emphasise that the Alliance's nuclear capabilities, including U.S. forward-deployed weapons, serve to "preserve peace, prevent coercion and deter aggression". [15] The 2024 Washington Summit Declaration reaffirms this, stating that "nuclear deterrence is the cornerstone of Alliance security" and that NATO's capabilities provide the "supreme guarantee" for all members.[16] By integrating U.S. nuclear assets with European contributions, such as DCA from seven Allies, these arrangements complicate adversaries' planning and enhance crisis management. As noted in NATO's factsheet, "nuclear sharing provides military and political tools for deterrence and can be used to manage escalation in a crisis," with DCA serving as a "visible and valuable instrument for strategic communications" to signal resolve.[17] Accordingly, in a security environment marked by Russia's integration of nuclear forces into its military strategy and threats against Allies, nuclear sharing ensures credible deterrence without provoking conflict. NATO’s former Secretary General Jens Stoltenberg argued that "the purpose of NATO's nuclear weapons is not to provoke a conflict but to preserve peace, deter aggression and prevent coercion," underscoring that arrangements like those involving Germany are vital for the "security of the whole alliance".[18] The U.S. State Department echoes this rationale, claiming that with NATO "numerically outgunned on the central front," nuclear sharing maintains a "nuclear deterrent posture sufficient to deter the Soviet aggression," a logic that persists against modern threats.[19] Against this backdrop, exercises like Steadfast Noon[1] Further strengthen this by simulating nuclear scenarios, ensuring "the credibility, effectiveness, safety and security of the nuclear deterrent mission".[20] Overall, according to official sources, these mechanisms help preserve stability in the Euro-Atlantic area, reduce reliance on nuclear weapons, and adapt to challenges posed by actors such as China and North Korea. Secondly, nuclear sharing fosters unity and shared responsibility among NATO members, distributing the benefits, risks, and political burdens of deterrence more evenly among them. NATO's publications explicitly state that these arrangements "ensure that the benefits, responsibilities and risks of nuclear deterrence are shared across the Alliance," demonstrating "unity and cohesion amongst all Allies" through joint decision-making in the Nuclear Planning Group (NPG).[21] This shared approach, as NATO sources claim, reinforces the indivisibility of security, as outlined in NATO's nuclear policy: "Nuclear sharing arrangements play a vital role in the interconnection of the Alliance and remain one of the main components of security guarantees and the indivisibility of security of the whole Euro-Atlantic area".[22] The 2024 Summit Declaration commits to "modernising its nuclear capabilities" and "strengthening its nuclear planning capability," ensuring broader participation to "demonstrate Alliance unity and resolve".[23] By involving European Allies in Allied dual-capable aircraft (DCA) missions and infrastructure, nuclear sharing is intended to help mitigate disparities in capabilities, promote equitable burden-sharing, and prevent fragmentation within the Alliance. Thirdly, NATO posits that nuclear sharing supports non-proliferation efforts. Contrary to criticisms, official sources argue that nuclear sharing advances non-proliferation by reducing incentives for Allies to pursue independent nuclear programs. NATO's review of the NPT at 50 years notes that these arrangements "have contributed to security in Europe and non-proliferation as Allies under the U.S. nuclear umbrella have not felt pressure to develop their own weapons".[24] Codified during the 1960s negotiations, they comply fully with the Treaty, as both the U.S. and the USSR ensured that no prohibitions were placed on such setups.[25] The U.S. State Department details this compromise, which allowed for "wartime nuclear sharing" without requiring peacetime transfer, thereby reassuring allies like West Germany and dissuading proliferation.[26] Post-Cold War reductions — over 90% in NATO's nuclear stockpile — align with NPT Article VI disarmament goals while maintaining deterrence.[27] This balance facilitates peaceful nuclear cooperation under the IAEA (International Atomic Energy Agency) safeguards, thereby strengthening the global nuclear non-proliferation regime.[28] Finally, according to the U.S. State Department, nuclear sharing underscores the U.S. commitment to European security, countering fears of "decoupling" where allies doubt American resolve. The State Department describes it as addressing whether the U.S. would "sacrifice Chicago to save Hamburg," by making nuclear weapons available for Europe's defence.[29] NATO's policy affirms that U.S. strategic forces, supplemented by forward-deployed assets, provide the "supreme guarantee," with Allies contributing to ensure integration across domains.[30] To sum up, official arguments portray nuclear sharing as indispensable for deterrence, cohesion, non-proliferation, and transatlantic solidarity. These arrangements, according to Western policy-makers and experts, have sustained European stability for decades, with ongoing modernisation ensuring their relevance in an unpredictable world. Nuclear Sharing in the Face of an Ongoing War in Ukraine Nuclear sharing has allegedly bolstered NATO's overall deterrence posture, helping to prevent Russian escalation in Ukraine, including potential nuclear use. NATO's nuclear capabilities, including U.S. forward-deployed weapons in Europe, are described as essential to "preserve peace, prevent coercion and deter aggression" in the face of Russia's nuclear threats and integration of nuclear forces into its strategy.[31] This has indirectly supported Ukraine by signalling to Russia that any significant escalation — such as nuclear strikes or attacks on NATO territory — would invoke a collective response, thereby limiting Russia's options in the conflict. Russia's invasion has been accompanied by nuclear sabre-rattling to deter Western intervention, but nuclear sharing has helped counter this by maintaining credible deterrence without direct NATO involvement in Ukraine.[32] In that sense, the already mentioned exercises like Steadfast Noon simulate nuclear scenarios, reinforcing the "credibility, effectiveness, safety and security" of the deterrent, which has been crucial amid threats from Russia, China, and North Korea. Analysts note that this has made Russian nuclear signalling less credible over time, allowing the West to provide advanced weapons to Ukraine that were initially considered taboo.[33] However, Russia's threats have still delayed and limited the scale of Western aid, such as restrictions on long-range strikes into Russia, due to fears of crossing "red lines".[34] As mentioned before, nuclear sharing agreements have arguably fostered greater unity among NATO allies, enabling sustained military and economic support for Ukraine. By sharing the "benefits, responsibilities and risks of nuclear deterrence," nuclear sharing demonstrates Alliance solidarity and the "indivisibility of security" in the Euro-Atlantic area.[35] This has reassured European allies, particularly those near Russia, allowing them to commit resources to Ukraine without fearing abandonment. For example, Poland's push to join nuclear sharing reflects heightened threat perceptions from the war, aiming to strengthen deterrence and defence in a hostile environment. NATO's support, including intelligence sharing and strategic communications, has, at least in the eyes of Western policy-makers, deterred Russian use of chemical, biological, or nuclear weapons in Ukraine.[36] Without reassurance from nuclear sharing of U.S. commitment — countering fears of "decoupling" — it might have been harder for Europe to maintain this level of involvement.[37] From Russia's perspective, nuclear sharing exacerbates tensions, viewing it as part of NATO's eastward expansion that provoked the invasion.[38] Putin has used this to support claims behind "Russia's Special Military Operation" in Ukraine, framing Ukraine's potential NATO integration as a threat that could place U.S. nuclear weapons near Russia's borders, similar to the Cuban Missile Crisis in reverse. This rationale has fueled Russian nuclear threats, which aim to limit Western aid and prolong the conflict by raising escalation fears.[39] The war has heightened nuclear risks, with some analysts arguing it presents greater dangers than the Cuban Missile Crisis due to the potential for miscalculation.[40] Russia's deployment of tactical nuclear weapons in Belarus as a counter to NATO's sharing arrangements has further escalated postures.[41] Recent decisions by the U.S., UK, and France to allow Ukraine to use long-range missiles against Russian targets have prompted Putin to warn of a direct NATO-Russia war, indirectly tying into nuclear sharing's role in deterrence dynamics.[42] This has possibly complicated peace efforts, as Russia perceives Western escalation as existential, making negotiations harder. As mentioned earlier, nuclear sharing has arguably helped mitigate proliferation risks during the war. By providing a shared nuclear umbrella, it reduces the incentives for allies like Poland and Germany to pursue independent nuclear programs, thereby supporting the NPT.[43] Possibly then, the invasion has not sparked widespread proliferation, partly because NATO's deterrent reassures members. Interestingly, however, the debates over a "European nuclear deterrent" independent of the U.S. — spurred by uncertainties such as potential shifts in U.S. policy under Trump — could undermine this if not managed effectively.[44] The war has also renewed focus on modernising nuclear sharing, with NATO committing to enhancing capabilities at the 2024 Washington Summit.[45] This has indirectly affected Ukraine by diverting Russian resources and attention, though some argue it prolongs the stalemate without a decisive victory. In summary, nuclear sharing has possibly acted as a stabilising force for NATO, enabling robust support for Ukraine and deterring Russian nuclear escalation. However, it has also contributed to heightened tensions and Russian intransigence, complicating pathways to peace. As the war persists into 2025, proposals to expand sharing (e.g., to Poland) reflect its evolving role in countering ongoing threats. Conclusion The "Steadfast Noon" exercises are arguably a clear signal to any potential adversary, including Russia, that NATO is prepared to defend all its members against any threats, including nuclear ones. Such exercises involve the use of American non-strategic nuclear weapons stationed in Europe, although no real combat weapons are used during the drills. The exercises serve not only to practice deterrence against possible nuclear attacks but also to prepare for the potential use of nuclear weapons by NATO if necessary. The fact that these exercises involve nuclear deterrence indicates that NATO's defence strategy includes readiness to escalate to a nuclear response if provoked by a nuclear attack. The locations of these nuclear weapons are not publicly disclosed. Still, there is speculation about their presence in countries like Poland, particularly in light of recent secret agreements that allow foreign troops to enter Polish territory. On the other hand, one should also consider potential downsides, especially for countries in Central and Eastern Europe. Nuclear sharing for potential allied use in wartime poses significant risks despite its deterrence aims. One major downside is its incompatibility with the NPT, which violates Articles I and II.[2] Enabling the indirect transfer of control to non-nuclear states undermines global non-proliferation efforts and draws criticism from states such as China. This arrangement also heightens proliferation risks, as peacetime training and exercises normalise nuclear readiness, potentially inspiring similar setups in Asia-Pacific regions like Japan and South Korea, escalating regional tensions.[46] Security concerns include increased escalation dangers, where limited nuclear use could spiral into full-scale war, especially amid vulnerabilities at host bases like Incirlik in Türkiye during political instability. Expanding sharing, such as to Poland, fuels arms races with Russia and exposes more European sites to attacks, without adding credible deterrence given NATO's conventional superiority. Politically, it breeds divisiveness within NATO, fostering resentment among allies and diverting resources from conventional forces, while eroding U.S. control and complicating disarmament. Domestically, host nations face public backlash and moral burdens from anti-nuclear norms, straining alliance cohesion. Russia's objections in NPT forums further highlight how sharing provokes international backlash, risking broader conflicts. Notes [1] On Monday (October 13 2025), NATO began its annual nuclear deterrence exercise Steadfast Noon. The exercise is a long-planned, routine training activity and part of NATO’s broader efforts to maintain readiness and ensure transparency around its nuclear posture. It is not linked to any current world events, and no live weapons are used.[2] Article I - Each nuclear-weapon State Party to the Treaty undertakes not to transfer to any recipient whatsoever nuclear weapons or other nuclear explosive devices or control over such weapons or explosive devices directly, or indirectly; and not in any way to assist, encourage, or induce any non-nuclear-weapon State to manufacture or otherwise acquire nuclear weapons or other nuclear explosive devices, or control over such weapons or explosive devices. Article II - Each non-nuclear-weapon State Party to the Treaty undertakes not to receive the transfer from any transferor whatsoever of nuclear weapons or other nuclear explosive devices or of control over such weapons or explosive devices directly, or indirectly; not to manufacture or otherwise acquire nuclear weapons or other nuclear explosive devices; and not to seek or receive any assistance in the manufacture of nuclear weapons or other nuclear explosive devices. See more at: https://www.un.org/en/conf/npt/2005/npttreaty.html References [1] NATO’s Nuclear Sharing Arrangements. (2022, February). NATO. https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[2] Kristensen, H. M., Korda, M., Johns, E., & Knight-Boyle, M. (2023, November 8). Nuclear weapons sharing, 2023. Bulletin of the Atomic Scientists. https://thebulletin.org/premium/2023-11/nuclear-weapons-sharing-2023/[3] Johns, E. (2025, October 10). Incomplete Upgrades at RAF Lakenheath Raise Questions About Suspected US Nuclear Deployment. Federation of American Scientists. https://fas.org/publication/incomplete-upgrades-lakenheath-questions-nuclear/[4] Johns, E. (n.d.). Poland’s bid to participate in NATO nuclear sharing. IISS. Retrieved October 14, 2025, from https://fas.org/publication/incomplete-upgrades-lakenheath-questions-nuclear/[5] Poland’s president urges U.S. to move nuclear warheads to Polish territory, FT reports. (2025, March 13). Reuters. https://www.reuters.com/world/polands-president-urges-us-move-nuclear-warheads-polish-territory-ft-reports-2025-03-13/[6] Poland’s president vows to spend 4.7% of GDP on defence this year. (2025, February 5). Euronews. https://www.euronews.com/my-europe/2025/02/05/polands-president-vows-to-spend-47-of-gdp-on-defence-this-year[7] NATO’s annual nuclear exercise Steadfast Noon begins. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/news_238367.htm[8] von Hlatky, S., & Lambert-Deslandes, É. (2024). The Ukraine war and nuclear sharing in NATO. International Affairs, 100(2), 467-485. https://academic.oup.com/ia/article-abstract/100/2/509/7617216?redirectedFrom=fulltext[9] NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/fr/natohq/topics_50068.htm?selectedLocale=en#:~:text=Nuclear%20consultation,are%20members%20of%20the%20NPG[10] NATO’s Nuclear Sharing Arrangements. (2022, February). NATO. https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[11] von Hlatky, S., & Lambert-Deslandes, É. (2024). The Ukraine war and nuclear sharing in NATO. International Affairs, 100(2), 467-485. https://academic.oup.com/ia/article-abstract/100/2/509/7617216?redirectedFrom=fulltext[12] Khalessi, D. (2015). Strategic ambiguity: Nuclear sharing and the secret strategy for drafting articles I and II of the nonproliferation treaty. The Nonproliferation Review, 23(1-2), 81-103. https://doi.org/10.1080/10736700.2016.1155865 [13] Park, K. C., & Choo, J. (2022). NATO's nuclear sharing strategy and its implications for establishing a new strategy for strengthening extended deterrence on the Korean Peninsula. International Area Studies Review, 26(1), 51-78. https://doi.org/10.18327/jias.2022.1.26.1.51 [14] Smith, M. A. (2004). To neither use them nor lose them: NATO and nuclear weapons since the cold war. Contemporary Security Policy, 25(3), 485-514. https://doi.org/10.1080/1352326042000330637[15] NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/topics_50068.htm[16] Washington Summit Declaration. (2024, July 10). NATO. https://www.nato.int/cps/en/natohq/official_texts_227678.htm[17] NATO’s Nuclear Sharing Arrangements. (n.d.). NATO. Retrieved October 20, 2025, from https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[18] Germany’s support for nuclear sharing is vital to protect peace and freedom. (2020, May 11). NATO. https://www.nato.int/cps/en/natohq/opinions_175663.htm[19] Ford, C. A. (2019, December 9). Challenges of Policymaking in Responsible Nuclear Weapons Stewardship. US Department of State. https://2017-2021.state.gov/challenges-of-policymaking-in-responsible-nuclear-weapons-stewardship/[20] NATO’s annual nuclear exercise Steadfast Noon begins. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/news_238367.htm[21] NATO’s Nuclear Sharing Arrangements. (n.d.). NATO. Retrieved October 20, 2025, from https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[22] NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/topics_50068.htm[23] Washington Summit Declaration. (2024, July 10). NATO. https://www.nato.int/cps/en/natohq/official_texts_227678.htm[24] Durkalec, J. (2018, June 29). The Nuclear Non-proliferation Treaty at fifty: a midlife crisis. NATO. https://www.nato.int/docu/review/articles/2018/06/29/the-nuclear-non-proliferation-treaty-at-fifty-a-midlife-crisis/index.html[25] NATO’s Nuclear Sharing Arrangements. (n.d.). NATO. Retrieved October 20, 2025, from https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[26] Ford, C. A. (2019, December 9). Challenges of Policymaking in Responsible Nuclear Weapons Stewardship. US Department of State. https://2017-2021.state.gov/challenges-of-policymaking-in-responsible-nuclear-weapons-stewardship/[27] See more at: https://www.iaea.org/sites/default/files/publications/documents/infcircs/1970/infcirc140.pdf[28] See more at: https://www.iaea.org/[29] Ford, C. A. (2019, December 9). Challenges of Policymaking in Responsible Nuclear Weapons Stewardship. US Department of State. https://2017-2021.state.gov/challenges-of-policymaking-in-responsible-nuclear-weapons-stewardship/[30]NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/topics_50068.htm[31] NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/topics_50068.htm [32] Nuclear Stability and Escalation Risks in Europe. (2023, September 1). Foreign Policy Research Institute. https://www.fpri.org/article/2023/09/nuclear-stability-and-escalation-risks-in-europe/[33] Ibidem.[34] Kimball, D., & Bugos, S. (2022, February 28). Russia’s War on Ukraine and the Risk of Nuclear Escalation: Answers to Frequently Asked Questions. Arms Control Association. https://www.armscontrol.org/issue-briefs/2022-02/FAQ-russia-ukraine[35] NATO’s support for Ukraine. (2025, October 14). NATO. https://www.nato.int/cps/en/natohq/topics_192648.htm[36] Dickinson, P., Arick, R., & Lander Finch, N. (2025, October 15). How the US and Europe can deter and respond to Russia’s chemical, biological, and nuclear threats. Atlantic Council. https://www.atlanticcouncil.org/in-depth-research-reports/report/how-the-us-and-europe-can-deter-and-respond-to-russias-chemical-biological-and-nuclear-threats/[37] Dalton, T. (2022, April 8). Nuclear Nonproliferation After the Russia-Ukraine War. Georgetown Journal of International Affairs. https://gjia.georgetown.edu/2022/04/08/nuclear-nonproliferation-after-the-russia-ukraine-war/[38] Magnier, E. J. POST. X. Retrieved October 21, 2025, from https://x.com/ejmalrai/status/1796511588465201374[39] Ukraine: how nuclear weapons continue to increase the risks, two years on. (n.d.). ICAN (International Campaign to Abolish Nuclear Weapons). Retrieved October 21, 2025, from https://www.icanw.org/ukraine_two_years_how_nuclear_weapons_increase_the_risks[40] Kimballl, D., & Bugos, S. (2022, February 28). Russia’s War on Ukraine and the Risk of Nuclear Escalation: Answers to Frequently Asked Questions. Arms Control Association. https://www.armscontrol.org/issue-briefs/2022-02/FAQ-russia-ukraine [41] Kayali, L., Jungholt, T., & Fritz, P. (2024, July 4). Europe Is Quietly Debating a Nuclear Future Without the US. POLITICO. https://www.politico.com/news/magazine/2024/07/04/europe-us-nuclear-weapons-00166070[42] Katchanovski, I. (n.d.). POST. X. Retrieved October 21, 2025, from https://x.com/I_Katchanovski/status/1858244090909127000[43] Dalton, T. (2022, April 8). Nuclear Nonproliferation After the Russia-Ukraine War. Georgetown Journal of International Affairs. https://gjia.georgetown.edu/2022/04/08/nuclear-nonproliferation-after-the-russia-ukraine-war/[44] Samuelki, O. (2025, March 11). Europe going nuclear would be a catastrophic mistake. https://www.aljazeera.com/opinions/2025/3/11/europe-going-nuclear-would-be-a-catastrophic-mistake[45] NATO’s support for Ukraine. (2025, October 14). NATO. https://www.nato.int/cps/en/natohq/topics_192648.htm[46] Analysis of the Incompatibility of NATO’s Nuclear Sharing Arrangements with the Treaty on the Non-Proliferation of Nuclear Weapons. (2024). China Arms Control and Disarmament Association China Institute of Nuclear Industry Strategy. https://www.cinis.com.cn/zhzlghyjzy/yjbg/1446912/2024072914514738359.pdf 

Defense & Security
Soldier UAV operator launches army drone with bomb to drop into enemy fortifications and trenches. Concept using military robots in modern warfare.

Unmanned aerial vehicle: geopolitical influence, industrial potential and future perspectives

by World & New World Journal

Introduction An unmanned aerial vehicle (UAV) or unmanned aircraft system (UAS), commonly known as drone, is an aircraft without a human pilot, crew or passenger on board, but rather controlled remotely or autonomously. Drones can be seen as cutting-edge technologies with tremendous ramifications across various fields, including military, security, economics, and logistics – ranging from lightweight consumer drones to advanced autonomous combat platforms – that have transformed global security economics and technological developments. Their proliferation marks a shift in the conduct of warfare, industrial processes, and urban infrastructure design. In this context, this article aims to analyze these dynamics across three domains: geopolitical and security implications, economics and industrial processes, and future technological transformation. I. Geopolitical and Security Perspective: "Game Changers" The Dawn of the Unmanned Warfare Era The past decade — and especially during the conflicts in Ukraine, Gaza, and the Caucasus —has showcased an irreversible shift toward unmanned warfare. Low-cost drones have enabled nations and non-state actors to conduct reconnaissance, precision strikes, and electronic warfare at a fraction of traditional military costs. The democratization of drone warfare erodes conventional military hierarchies by giving smaller nations and even non-state groups asymmetric capabilities (Kania, 2020), (Vision of Humanity, 2024). Figure 1: Use of drones by type. A major consequence of this shift is the emergence of continuous aerial presence, which fundamentally alters operational rhythm and tempo. Previously, only major powers could afford persistent surveillance through manned aircraft or satellites. Today, even insurgent groups can deploy swarms of commercial drones to maintain near-constant observation of enemy movements. This constant presence of drones on the battlefield forces militaries to make decisions much faster and operate as if they are always being watched. As drone technology becomes cheaper and more widely available, it also becomes easier for states or groups to launch low-risk, hard-to-trace attacks without putting their own people in danger. This reduces the barrier to starting or escalating conflicts and makes the overall situation far more unpredictable. On the other hand, despite automation, drone warfare remains heavily dependent on human adaptation, moreover, in practice, drones’ use is constrained by weather, terrain, and limited night capability (Newton, 2025). Nonetheless, and as seen in the Ukraine War, the adaptation, development and improvement of the designs and systems have skyrocketed and shortened from months to weeks. A Paradigm Shift in Modern Warfare Traditional doctrines built around armored vehicles, manned aircraft, and centralized command structures are giving way to distributed, networked, and automated operations. Drones allow for constant ISR (intelligence, surveillance, reconnaissance), rapid kill chains, and battlefield transparency that reduces the effectiveness of concealment and mass maneuver (Biddle & Oelrich, 2016). Swarm technology further accelerates this shift by overwhelming air defenses through algorithmic coordination. On a broader strategic level, unmanned systems are transforming operational art, forcing militaries to rethink how they structure campaigns. Instead of relying on a small number of high-value manned platforms, modern forces must integrate thousands of expendable, semi-autonomous assets into a coherent command-and-control ecosystem. This shift elevates the importance of data fusion, algorithms, and electronic warfare, as success increasingly depends on which side can process information more effectively rather than which side has heavier armor or more firepower. Furthermore, the psychological effects of drone warfare — constant monitoring, unpredictable strikes, and the invisibility of operators — alter the morale and behavior of both soldiers and civilians. In this sense, unmanned warfare not only changes tactics but reshapes the human dimension of conflict. Evolution of Defense Strategies States now are prioritizing anti-drone systems (C-UAS), electronic warfare, and resilient supply chains. Defense strategies emphasize dispersion, decoys, deception, and multi-layered air defense, recognizing that the cost ratio favors attackers using cheap drones against expensive assets. Militaries increasingly incorporate AI-enabled targeting, autonomous perimeter defense, and drone-versus-drone combat (Mehta, 2022). The rapid evolution of offensive drone capabilities has forced governments to pursue a new generation of integrated counter-unmanned systems, blending kinetic interceptors, directed-energy weapons, radio-frequency jamming, and cyber tools. However, the challenge is not merely technological — it is organizational. Modern militaries must revise procurement cycles, adopt flexible doctrine, and restructure units to counter the fast-changing drone threat. For example, some nations are creating dedicated “drone defense battalions” or embedding electronic warfare teams at lower echelons of command. Once more the Ukraine War is a good example: Ukraine’s early-warning systems (so called, “drone walls”) use layered reconnaissance UAVs to identify threats and enhance battlefield visibility, unfortunately, these are highly vulnerable to electronic warfare and radar destruction. More examples include the fiber-optic FPV drones as countermeasure of jamming, or decoy drones to lure air defenses and absorb munitions. (Newton, 2025) The rise of drone warfare also places huge demand on secure communications and resilient digital infrastructure; adversaries increasingly target supply chains, software vulnerabilities, and satellite links that control unmanned systems. Thus, the evolution of defense strategies represents a multi-domain effort that spans hardware, software, organizational culture, and national-level industrial capacity. Major Countries' Competition in Drone Weapon Development The United States, China, Israel, Turkey, and Iran dominate the global drone arms race, while Russia and Ukraine deserve a special mention too. • USA: it focuses on high-tech autonomous systems, for example the MQ-25, Collaborative Combat Aircraft. In addition, according to the Federal Aviation Administration they have an estimated 822,039 drones registered as of July 2025. (FAA, 2025)• China: leads in export volume, offering cost-competitive platforms like the Wing Loong series (Fischer, 2020).• Turkey: gained strategic influence through the Bayraktar TB2, proven in multiple regional conflicts like the Nagorno-Karabakh in 2020 or its use for strategic communications for Ukraine during the ongoing conflict. (Péria-Peigné, 2023)• Israel: its research, development and production of innovative drone technology and exports roughly $500 million worth of UAV-related products per year, have positioned Israel as a world leader in the area. Israel is well known for its indigenous and competitive manufacturing UAVs like the Hermes 450, the Searcher Mk II and the Heron. (Sadot, s.f.)• Iran: their Shahed-136 drone is a low-cost drone that has gained attention internationally as it has shown affordability, precision, long-range, and cheapness during the Ukraine War – deployed by Russia. (Kesteloo, 2025)• Ukraine: has emerged as a leader in tactical warfare, including mass quantities of low-cost First-Person View (FPV) drones for frontline and deep-strike operations. But also, it has implemented “Spider’s Web” operations, which strike deep inside Russia, while using low-cost assets but with strategic and punctual strikes. Ukraine has also expanded into the maritime domain with unmanned surface vessels (USVs) using them with a kamikaze-style operation targeting ships and critical offshore infrastructure in the Black Sea. (Newton, 2025)• Russia: the war has institutionalized an UAV doctrine with mass deployment of FPV drones (Newton, 2025) and the creation – similar to Ukraine – of an Unmanned System Force (USF) aiming to encompass aerial, land and surface drones. (Altman, 2025) II. Economic & Industrial Perspective: “Flying Industrial Revolution” Future Logistics and Delivery Systems Beyond the battlefield, drones are reshaping global economies and enabling new industrial ecosystems. For instance, drones are rapidly transforming last-mile delivery by reducing transportation time, bypassing road congestion, and enabling access to remote or disaster-affected areas. Companies like Amazon, Wing, and Zipline have already demonstrated how unmanned aircraft can deliver medical supplies, parcels, and consumer goods more efficiently than traditional vehicles. As autonomous navigation, battery technology, and payload capacity continue to improve, drones are expected to become critical components of global supply chains, especially in regions where infrastructure is limited or demand for ultra-fast delivery is increasing. Global drone delivery is expected to reach multi-billion-dollar scale by 2030 (PwC, 2023). In the longer term, logistics networks are expected to evolve into hybrid ground–air systems, where drones work alongside autonomous ground vehicles and smart warehouses. These systems could drastically reduce operational costs by automating pickup, sorting, and delivery processes. Integrating drones with AI-driven inventory management and predictive delivery algorithms will allow companies to anticipate demand and route products dynamically. As eVTOL cargo aircraft mature, the concept of “airborne logistics hubs” may also emerge, enabling rapid long-distance transport between distribution centers without the need for airports. Together, these developments point toward a future where aerial logistics are not just an add-on, but a central pillar of modern supply chains. Improving Industrial Efficiency Across agriculture, energy, construction, and mining drones significantly improve efficiency by automating tasks that previously required expensive equipment or manual labor. By replacing manned inspection systems, drones can reduce labor costs, increase safety, and provide data of unprecedented detail (McKinsey, 2022). For example, farmers use drones for precision spraying and crop monitoring, reducing fertilizer and water usage. Energy companies deploy unmanned systems for pipeline inspections and powerline surveys, minimizing downtime and enhancing worker safety. Construction and mining firms rely on drones for site mapping, progress tracking, and 3D modeling, improving project accuracy while lowering operational costs. Beyond task automation, drones are becoming essential to data-driven industrial optimization. Equipped with thermal sensors, LiDAR, and multispectral cameras, unmanned systems can capture high-resolution data that feeds directly into AI analytics platforms. This allows companies to detect inefficiencies, predict equipment failure, and optimize resource allocation in real time. As industries move toward digital twins — virtual models of physical assets — drones will play a key role in continuously updating these systems with accurate spatial and environmental data. The result is a more responsive, efficient, and resilient industrial ecosystem that leverages aerial automation for competitive advantage. Regulatory Environment and Market Growth Regulation remains the single most influential factor shaping the global drone market. Governments are gradually introducing frameworks to enable Beyond Visual Line of Sight (BVLOS) operations, Remote ID tracking, and certification standards for commercial drones. Regions like the European Union have adopted unified risk-based rules through EASA, while the United States continues to refine its Part 107 and UTM integration policies through the FAA. These regulatory milestones are essential for scaling commercial drone usage, as they provide clarity to manufacturers, operators, and investors. As regulatory frameworks mature, they are also becoming a competitive advantage for regions that adopt them early. Countries that implement drone-friendly ecosystems — such as Singapore, the UAE, and Rwanda — are rapidly emerging as hubs for drone research, testing, and deployment. This regulatory momentum encourages multinational companies to establish operations in these markets, accelerating local innovation and talent development. Furthermore, harmonized international standards will make it easier for drone manufacturers to reduce production complexity and expand globally. Ultimately, the pace of market growth will depend not just on technological advancement but on how effectively governments balance innovation with safety, privacy, and public acceptance. Investment Trends Investment in drone-related technologies has surged, driven by the convergence of autonomy, artificial intelligence, and advanced manufacturing. Venture capital firms increasingly fund companies developing autonomous navigation systems, UTM software, battery technology, and specialized industrial drones. Defense investors continue to expand their portfolios into dual-use drone companies, reflecting growing geopolitical interest and national security incentives. Meanwhile, major tech firms and automotive companies are exploring opportunities in cargo drones, eVTOL aircraft, and autonomous mobility ecosystems. Beyond private investment, government funding and public–private partnerships are accelerating drone adoption globally. Many nations are launching test corridors, innovation hubs, and subsidies to attract drone startups and support local manufacturing. This trend is particularly strong in Asia and the Middle East, where governments see drones as strategic tools for digital transformation and economic diversification. As markets mature, investment is shifting from hardware-heavy startups toward software, analytics, and integrated airspace management solutions — reflecting a broader transition from drone manufacturing to drone ecosystems. This shift signals a long-term, sustainable evolution of the drone industry from early experimental phases to full-scale commercial and civil integration. III. Future Technologies The Need for Unmanned Traffic Management (UTM) As drones and future eVTOL air taxis multiply, low-altitude airspace will become increasingly crowded. To prevent collisions and maintain order, UTM frameworks — already being developed by NASA, the FAA, EASA, and ICAO — aim to coordinate autonomous flights using real-time tracking, automated route planning, and digital air corridors (Kopardekar, 2016). These systems will act as the “air-traffic control of the future,” but designed for far larger numbers of smaller, faster-moving vehicles. In addition, as demand grows, it is likely that UTM will evolve into a fully automated, AI-driven airspace ecosystem capable of managing thousands of simultaneous flights with minimal human oversight. Future systems could incorporate weather prediction, dynamic rerouting, and AI-powered detect-and-avoid features, which more than a technical upgrade, would transform the air mobility in the cities worldwide. Global Standardization Competition The need for standard UTM, drone certifications, communication systems, and detect-and-avoid technology is critical, but it also represents a geopolitical contest. The U.S., the European Union, and China are each developing distinct technological ecosystems, hoping their standards will dominate global markets. Whichever region’s standards become the international norm will shape supply chains, aircraft design, and regulatory practices for decades. This competition mirrors earlier battles over telecommunications and 5G. Nations that establish widely adopted drone standards will gain strategic advantages, including influence over global manufacturing, software ecosystems, and aviation governance. As a result, UTM and drone certification are no longer just technical debates — they have become instruments of national power, economic leverage and somehow geopolitical importance. Urban Safety and Privacy Issues In addition, another major concern for cities is the widespread adoption of drones itself, which translates into surveillance risks, noise pollution from frequent flights, and vulnerability to cyberattacks that could compromise flight controls. Therefore, urban areas need strict rules governing data collection, flight paths, and liability in case of accidents to maintain public trust and safety. In the future, cities will also require integrated emergency response protocols, stronger cybersecurity defenses, and digital identity systems for all unmanned aircraft. Public engagement and transparent oversight will play a major role in ensuring that drones enhance urban life without creating new forms of intrusion or risk. Managing these challenges will be essential for the successful adoption of unmanned urban mobility. Integration with Future Urban Infrastructure In line with the previous section, smart cities could incorporate drones into their core infrastructure. For example, vertiports, rooftop landing pads, sensor-equipped air corridors, and digital twins could enable efficient navigation and real-time monitoring. In addition, drones will become essential for urban mobility and public services – from medical or any goods deliveries to emergency response like fire unit responses. As cities evolve, this integration will create a hybrid transportation ecosystem, where ground vehicles, aerial drones, and automated control systems would operate in sync. Urban planning will increasingly consider airspace as a valuable layer of infrastructure, much like roads or power grids. Therefore, collaboration between governments, industry, and technology providers to design cities capable of supporting high-density autonomous air mobility is required. Conclusion Unmanned systems are redefining the global balance of power, transforming industrial processes, and reshaping urban futures. The convergence of autonomy, AI, and networked airspace introduces both unprecedented opportunity and profound risk. Geopolitically, drones dilute traditional military dominance; economically, they catalyze a new airborne industrial revolution; technologically, they push societies toward complex management of shared automated airspace. Future policy, regulation, and innovation will determine whether unmanned systems become drivers of prosperity or vectors of instability. References Altman, H. (2025, November 13). Russia Creates New Military Branch Dedicated to Drone Warfare. The War Zone (TWZ). https://www.twz.com/news-features/russia-creates-new-military-branch-dedicated-to-drone-warfare Amazon. (2023). Prime Air: The Future of Drone Delivery. Amazon Corporate Publications. Biddle, S., & Oelrich, I. (2016). Future Warfare in the Age of Drones. Council on Foreign Relations. Deloitte. (2022). Drones in Industrial Operations: Transforming Asset Inspection and Performance. Deloitte Insights. FAA (Federal Aviation Administration). (2023). Integration of Unmanned Aircraft Systems into the National Airspace System. U.S. Department of Transportation. FAA (Federal Aviation Administration). (2025). Drones. https://www.faa.gov/uas Fischer, S. (2020). China’s Military–Civil Fusion Strategy: A View from Washington. U.S.–China Economic and Security Review Commission. Kania, E. B. (2020). Learning Warfare from the Laboratory: China’s Progress in Military Innovation. Center for a New American Security (CNAS). Kesteloo, H. (2025, September 29). Global Military Drone Race Intensifies as Nations Rush to Copy Iran’s Shahed Design. Medium. https://medium.com/@hayekesteloo/global-military-drone-race-intensifies-as-nations-rush-to-copy-irans-shahed-design-404badf482fb Kopardekar, P. (2016). Unmanned Aircraft System (UAS) Traffic Management (UTM) Concept of Operations. NASA Ames Research Center. McKinsey & Company. (2022). The Commercial Drone Market Outlook: Insights on Market Growth, Industrial Adoption, and Regulation. McKinsey Robotics & Automation Practice. Mehta, A. (2022). Counter-Drone Systems and the Future of Air Defense. Defense News. Newton, M. (2025, November 3). How Are Drones Changing War? The Future of the Battlefield. Center for European Policy Analysis (CEPA). https://cepa.org/article/how-are-drones-changing-war-the-future-of-the-battlefield/ Péria-Peigné, L. (2023, April 17). TB2 Bayraktar: Big Strategy for a Little Drone. IFRI. https://www.ifri.org/en/memos/tb2-bayraktar-big-strategy-little-drone PwC. (2023). Clarity from Above: Global Drone Market Analysis. PwC Global. Roland Berger. (2022). Urban Air Mobility: The Rise of the Drone Economy. Roland Berger Strategy Consultants. Rwanda Civil Aviation Authority. (2021). Regulatory Framework for Drone Delivery and BVLOS Operations. Government of Rwanda. Sadot, U. (n.d.). Proliferated Drones: A Perspective on Israel. Center for a New American Security (CNAS). https://drones.cnas.org/reports/a-perspective-on-israel/ Schmidt, E., Work, R., & Clyburn, M. (2021). Final Report: National Security Commission on Artificial Intelligence. U.S. Government Printing Office. Singer, P. W. (2009). Wired for War: The Robotics Revolution and Conflict in the 21st Century. Penguin Books. Statista. (2023). Global Drone Market Value and Investment Trends. Statista Market Outlook. Vision of Humanity. (2024, June 13). How Drones Have Shaped the Nature of Conflict. https://www.visionofhumanity.org/how-drones-have-shaped-the-nature-of-conflict/ Wing (Alphabet). (2023). Autonomous Delivery Networks and Future Logistics. Wing Technical Publications. Zipline. (2022). Operational Impact of Automated Medical Delivery by Drone. Zipline International Case Studies.

Diplomacy
Russia US Peace Plan as Russian American and Ukrainian deal to end the war as an agreement of Moscow and Washington Kyiv on the outside in negotiations.

Peace in Ukraine? Believe it when you see it, especially if demands are prioritized

by Oleksa Drachewych

The United States recently — and suddenly — announced a 28-point peace plan to end Russia’s war in Ukraine, seemingly jointly written with Russian delegates, and presented it to Ukraine. The leaked contents of the peace plan caused concerns for Ukrainian representatives, European leaders and some American politicians. Yet it has nonetheless led to “meaningful progress”, according to the White House, on a revised peace proposal drafted by Ukrainian and American delegates in Geneva. Ukraine has reportedly agreed to the deal, with minor tweaks, while Russia says it’s premature to say a resolution is close, even as Russian representatives met with U.S. delegates in Abu Dhabi to discuss the revised plan. What was in the first plan? The leaked initial 28-point plan was criticized for asserting many Russian demands that date back to the initial peace negotiations of March and April 2022: • It placed a limit of 600,000 troops on Ukraine’s military; • It prevented Ukraine from having long-range missiles; • It placed a permanent ban on Ukrainian membership in NATO; • It included protections of Russian language and the Russian Orthodox Church in Ukraine. It also explicitly gave the entire Donbas region of eastern Ukraine to Russia, and called on the international community to recognize full Russian control of the Donbas and Crimea and control of Kherson and Zaporizhzhia on the front lines. In return, there would be “reliable security guarantees” envisioned by U.S. President Donald Trump: a NATO-style “Article 5” for Ukraine. This would mean if Ukraine was purposefully attacked by Russia in the future, the U.S. and other parties involved would come to Ukraine’s defence through sanctions, diplomatic pressure and military support, if necessary. In many of the economic and security arrangements that could emerge from the agreement, Russia and the United States would manage them together under the terms of the 28-point plan. The original plan also offered amnesty to all parties for any crimes and atrocities committed during the war, meaning Russia would not be brought to justice for war crimes. It also called for Russia’s return to European and global affairs, ending its political isolation with the West by reforming the G8. In short, the agreement would essentially act as if the war in Ukraine never happened. Was this a joint U.S.-Russia plan? The origins of the peace plan have been widely debated. The stilted language in the English version has led some to speculate it was translated from Russian. American senators said U.S. Secretary of State Marco Rubio, when briefing them, called the deal a “Russian wish list.” The draft reportedly came as a result of meetings held in Florida between Trump’s son-in-law, Jared Kushner, special envoy Steve Witkoff and Russian envoy Kirill Dmitriev, a noted Putin supporter. Rubio has insisted it was a U.S.-crafted document while Russian President Vladimir Putin said Russia could accept the peace plan. The fact that the document tended to mirror many of Russia’s demands immediately put Ukraine, and Europe, on the defensive. Trump declared that Ukraine would have until American Thanksgiving — Thursday, Nov. 27 — to agree to the plan. He has since softened his stance. But he’s also lambasted Ukraine’s leadership for not showing sufficient “gratitude” for American efforts to bring peace to Ukraine. Details of Europe’s plan In response, European leaders offered their own peace plan. They largely removed some of Russia’s most egregious demands, keeping some of the 28 points, while placing sensitive issues like NATO membership as something to be determined by NATO members and Ukraine. But it also acceded to some Russian demands, including accepting a cap on Ukraine’s military and offering Russia re-entry into the G8. It included a provision for territorial swaps with negotiations starting from the current front lines instead of recognizing Russia’s annexations. European proposals include using frozen Russian assets as reparations for Russia’s aggression, eliminating any of the amnesty clauses and making the European Union and NATO the key players in any future political, economic and military security arrangements. The European deal also removes key qualifiers in the original 28-point plan that could be manipulated by Russian misinformation — namely that Ukraine would be forced to face Russia alone if it struck either St. Petersburg or Moscow with a missile or it failed to “de-Nazify”, a common and erroneous Russian line of attack against Ukraine. The Kremlin rejected the European counter-plan outright. Where does the deal stand now? Ukrainian and American officials recently met in Geneva to discuss the peace plan. Emerging from the meeting, European leaders were cautiously optimistic while insisting a lot more work needed to be done. Trump stated that “something good just may be happening.” So, what resulted from that meeting? Few details have been leaked. Sources have shared that the 28-point plan has now been pared down to 19. It has also been suggested that key issues like territorial swaps and NATO accession have been left for Trump and Ukraine’s Volodymyr Zelenskyy to discuss at a future meeting. Ukrainian officials have said the plan has been substantially revised and reflects Ukraine’s concerns. The Russian response has been cagey, to say the least. Since there’s been no formal presentation of any revised peace plan, they are electing to say nothing firm. But U.S. Army Secretary Dan Driscoll recently met with Russian delegates in Abu Dhabi. Russian sources, meanwhile, have restated their preference for the original 28-point plan. Seeing is believing While this appears to be the most notable progress in the peace process in months, expectations should be tempered until there’s a presidential summit between Zelenskyy and Putin and until their signatures are on a treaty. Such momentum for peace has happened in the past. And it has often been scuttled by the key sticking points of both nations. Ukraine has continued to demand extensive security guarantees, justice for Russian war crimes, and has rejected territorial swaps. Russia has wanted a pliable Ukraine and one that could remain in its orbit politically and economically. Fundamentally, these positions haven’t changed. At this point, it appears the Ukrainians have managed to bring the Americans to their side in the latest peace talks, which reflects the importance Ukraine places on U.S. support in their fight against Russia. Russia has elected to say little, but if it was to agree to the revised deal, it would represent a seismic shift. For those reasons, believe in success in the peace process when you actually see it.

Defense & Security
Electric car made in China. Duty for EV cars made in China. Trade, tariffs, duty and customs war

Connected Cars as Geopolitical Weapons: The National Security Battle Over Chinese EVs

by World & New World Journal

According to the IEA by 2024, more than 20% of new cars sold worldwide were electric, exceeding 17 million and positioning China as the leader in the market with more than 11 million sales. In comparison, the European and US markets also saw a growth in the sector, but not comparable to the Chinese counterpart. Figure 1: Global EV sales, 2014-2024. Source (IEA, 2025) Figure 2: EVs registrations share in China, US and Europe: 2018-2023. Source: IEA, 2025. On the other hand, autonomous vehicles, whose market value size was estimated at USD 68.09 billion in 2024, are also trending worldwide, North America being the largest market in 2024 (market share of 37.1% and passenger vehicles leading the market with 69% of the global revenue), while the Asia Pacific region is the fastest-growing market. Figure 3: Autonomous Vehicle Market. Source: Grand View Research. (Grand View Research, 2025) Recently, despite the data and market share, discussions and analysis of the vehicle industry have moved into new concerns related to security risks, trade protectionism and unfair competition. Why? Because the vehicle industry has evolved and adopted new technologies, at the same time, concerns have shifted accordingly. These changes have relied on or prioritized human convenience and connectivity over everything else. A New Security Paradigm for Mobility: Are Connected Cars Data Weapons A simple answer is no, but there are elements that can change the answer into a yes in the future. Vehicles are evolving into connected machines, with software-driven platforms, sensors, cameras, connectivity modules and AI systems. Thus, the vehicle industry is entering a new era where data is key, and whoever controls it, is likely to control the market itself. As mentioned before, vehicle-related security risks have sparked discussions in recent years. Nowadays, practically any vehicle sold has a certain degree of connectivity, naturally this leads to a continuous and massive collection of information (sensitive or not), including for example: real-time location, driving patterns, biometric data, audio recordings, images from the Advanced Driver-Assistance Systems (ADAS) and more. For common people this might pass unnoticed but for governments, the fact of collecting and storing data or having the possibility to do so has become a critical point and a threat to their national security. After all, fear is real, and the more connected a vehicle is, the higher the chances that it can become a surveillance device, for example. The speculations can grow as much as our/their imagination leaves them, but after all, security risks and fear related to them exist. In line with the security risks, the possibility of software backdoors hidden in operating systems or telematic units is another possibility. Naturally, if exploited this possibility, these vulnerabilities could allow a remote shutdown of vehicles or fleets, manipulation of navigation systems or even data extraction could occur. In simple terms, this could open the door to cyberattacks, including the potential loss of control of a vehicle. Once again, the possibility of these ideas has reshaped and changed the paradigm of connected vehicles Actual measures and global regulatory trends As governments start recognizing these security threats associated with connected vehicles, many have begun implementing several regulations to protect their national security. For instance, the UK, Israel, the USA and the EU are among the most active actors. One of the branches of the economic war between the US and China is exactly the mobility industry, the fierce competition between both nations has tightened the nationalist policies of President Trump, in fact the US has rapidly adopted a national-security lens for automotive imports. There have been discussions in Congress and even the Commerce Department has proposed rules allowing Washington to prohibit connected car technologies linked to foreign adversaries. In addition, there is huge pressure over the United States-Mexico-Canada Agreement (USMCA), specifically in the encouragement to revise the vehicles entering the US and the promotion of US vehicle-manufacturing companies. For those reasons, the US had imposed tariffs on Chinese-made vehicles (from 25% up to 100% on 2024 during Biden’s administration and later a 35.5% extra tariff on Chinese-made EVs) and had set several rules in line with the USMCA, to limit or protect the American market from Chinese vehicles, as it argued that China is taking advantage of the USMCA by using Mexico or Canada as the entry points to the American market, avoiding tariffs and minimizing costs. According to experts, this Chinese circumvention of US tariffs can occur in three main ways. First through transshipment – products enter Canada or Mexico and then they are shipped to the USA. The second way is by incorporating the Chinese products into the North American supply chains. And the third way is through direct Chinese investments in manufacturing facilities in Mexico or Canada. At the same time, across the Atlantic the EU has also been working on tightening regulations through the Cyber Resilience Act, as well as strengthening the General Safety Regulations, both focusing on the application of rigorous standards to vehicle cybersecurity, data governance, and supply-chain transparency. Also in Europe, recently, a British newspaper reported that military and intelligence chiefs had been ordered not to discuss official business while riding in EVs, and cars with Chinese components had been banned from sensitive military sites. In addition, the former head of the intelligence service MI6 claimed that Chinese-made technology, including cars, could be controlled and programmed remotely. Consequently, the UK has begun evaluating supply chains for hidden dependencies in infotainment systems, telematics, and semiconductors. In the same line, Israel has adopted rigid measures, the Israeli army has begun withdrawing Chinese-made vehicles from officers, citing espionage concerns. Other measures implemented include auditing imported vehicles to ensure no remote-access pathways existence, plus the encouragement of local automakers and tech firms to develop secure telematics modules to minimize foreign reliance. What is China’s role in this new paradigm? To understand the role of China in the EVs and connected vehicles is important to highlight the low labor costs in China, coupled with government subsidies and a well-structured and established supply chain, these three factors gave the Chinese firms huge advantages over their competitors. However, those are not the only factors involved in the equation, the promotion of EVs over internal combustion vehicles and the adoption and development of technologies that turn “simple” vehicles into connected vehicles are important to mention too. All these factors have been well capitalized by Chinese firms, in consequence, China has become the world’s largest EV exporter and somehow a threat for the West. As mentioned throughout the article, the security risks have sparked discussions and concerns, and it is fair, as Chinese-made vehicles have become competitive and technologically well-connected, much, that nowadays are in conditions to fight for the global automotive market. Therefore, there is a clear sense of concern among Western governments, especially in conditions of a politicized world that we live in nowadays. Naturally Beijing argues that bans and investigations on their Chinese-made vehicles are forms of economic protectionism and rejects any claims related to espionage, data leaks or misuse. While, it has also responded by tightening its own domestic rules: foreign vehicles are prohibited from accessing sensitive regions, including areas near government buildings and military facilities. Benefits and challenges for other key players and global automakers Automakers from Korea, Japan or the European and American are being directly benefited from the rising Chinese scrutiny of connected cars, meaning that new export and investment opportunities could be achieved by them. If these countries can materialize transparent software supply chains, strong cybersecurity frameworks, and local data-storage compliance, their advantage would increase. Specifically Korean and Japanese firms – which are proven reliable players with a strong presence worldwide and strengths in battery technology and infotainment systems –, can position themselves as trusted suppliers in those markets that are worried about Chinese-made vehicles and their possible espionage or security risks. On the other hand, however, there are big challenges ahead. If each country or region decides to have proper regulations, major hurdles will appear. For example; compliance costs will rise as automakers must meet different cybersecurity rules across regions; the technology surrounding software auditing, and the transparency of the supply chains itself will require significant investments; the supply chain and design of vehicles will be affected and in consequence production cost will increase; and, if there are different digital standards or rules, it is likely that there could be some limitations in the global interoperability. Conclusions While the rapid growth of EVs worldwide can be considered a good sign for sustainability goals – as they displaced over 1 million barrels per day of oil consumption in 2024 –. Recently there have appeared certain concerns related to security risks – proven or not – trade protectionism and unfair competition. On top of that, the transformation of cars into fully connected digital platforms has created a new paradigm, in which certain nations – mostly western nations – have started to be worried and rethinking their mobility through the lens of national security. In consequence, governments have tightened rules related to data, cybersecurity and foreign software dependencies. This new vision is already changing and transforming the vehicle industry, while the most affected, being the Chinese firms – due the natural competition and geopolitical reasons – there are other global automakers that, if they take the chance, could become key players – as far as they prioritize transparency in supply chains, security and technological trust. The new paradigm has shifted what used to be an ordinary, everyday product into a critical national infrastructure that must be subject to regulation. Finally, this paradigm also highlights the importance of data sovereignty and how important it has become and will be in the future. Referencias Carey, N. (2025, December 2). China floods the world with gasoline cars it can't sell at home. Retrieved from Reuters: https://www.reuters.com/investigations/china-floods-world-with-gasoline-cars-it-cant-sell-home-2025-12-02/ European Commision. (2025, March 5). Industrial Action Plan for the European automotive sector . Retrieved from European Commision: https://transport.ec.europa.eu/document/download/89b3143e-09b6-4ae6-a826-932b90ed0816_en Financial Post. (2025, December 11). Why China's EVs are dangerous to Canada: CVMA. Retrieved from YouTube: https://www.youtube.com/watch?v=WV7bn29lpOQ Grand View Research. (2025). Autonomous Vehicle Market (2025 - 2030). Retrieved from Grand View Research: https://www.grandviewresearch.com/industry-analysis/autonomous-vehicles-market IEA. (2025). Trends in electric car markets. Retrieved from IEA: https://www.iea.org/reports/global-ev-outlook-2025/trends-in-electric-car-markets-2 Introvigne, M. (2024, February 6). Should Chinese Electric Cars Be Banned in the West? Retrieved from Bitter Winter: https://bitterwinter.org/should-chinese-electric-cars-be-banned-in-the-west/?gad_source=1&gad_campaignid=11726773838&gbraid=0AAAAAC6C3PdZ9Jx_edcTzlW0hHoO8yN2D&gclid=CjwKCAiA3L_JBhAlEiwAlcWO59TNJrosoZkG7MwAid0bRuGKs5KY0P7csiXimfUzLlbYshtFMafkdxoCqvQQAvD_Bw Leggett, T. (2025, June 10). China's electric cars are becoming slicker and cheaper - but is there a deeper cost? Retrieved from BBC: https://www.bbc.com/news/articles/cy8d4v69jw6o Meltzer, J. P., & Barron Esper, M. (2025, September 23). Is China circumventing US tariffs via Mexico and Canada? Retrieved from https://www.brookings.edu/articles/is-china-circumventing-us-tariffs-via-mexico-and-canada/#:~:text=Chinese%20intermediate%20goods%20used%20in,to%20the%20production%20of%20new: https://www.brookings.edu/articles/is-china-circumventing-us-tariffs-via-mexico-and-canada/#:~:text=Chinese%20intermediate%20goods%20used%20in,to%20the%20production%20of%20new Navarrete, F. (2024, May 21). Aranceles de EU a autos chinos ponen en aprietos a México. Retrieved from El Financiero: https://www.elfinanciero.com.mx/empresas/2024/05/21/aranceles-de-eu-a-autos-chinos-ponen-en-aprietos-a-mexico/ Oertel, J. (2024, January 25). European Council on Foreign Relations. Retrieved from https://ecfr.eu/article/security-recall-the-risk-of-chinese-electric-vehicles-in-europe/: https://ecfr.eu/article/security-recall-the-risk-of-chinese-electric-vehicles-in-europe/ Radio biafra. (2025). Fearing data leaks, Israel bans Chinese-made cars for army officers. Retrieved from Radio biafra: https://radiobiafra.co/ Schuman, M. (2025, November). China’s EV Market Is Imploding. Retrieved from The Atlantic: https://www.theatlantic.com/international/2025/11/china-electric-cars-market/684887/ Zhang, Z. (2025, December 4). China’s EV dominance sparks EU retaliation. Retrieved from East Asia Forum: https://eastasiaforum.org/2025/12/04/chinas-ev-dominance-sparks-eu-retaliation/

Diplomacy
Flag USA and China on Computer Chip . Global chip shortage crisis and China-United States trade war concept.

Leading States in the Race for Artificial Intelligence in the Current International System

by Danna Fernanda Mena Navarro

1. Introduction: AI as a Reconfiguration of the Global Order Artificial intelligence (AI) has become one of the most influential factors shaping the contemporary international system. Major powers are competing to lead the new technological revolution that impacts the economy, security, foreign policy, defense, communications, and scientific innovation. The development of AI depends on three strategic inputs: 1. Human talent (research, data engineering, mathematics, computer science). 2. Computational capacity and access to large volumes of data. 3. Robust innovation ecosystems, with companies, universities, and aligned industrial policies. Global spending on artificial intelligence is expected to exceed USD 52 billion over the next three years, consolidating AI as the central axis of the Fourth Industrial Revolution (IDC, 2023; Stanford AI Index Report, 2024). 2. Talent as a Global Strategic Resource More than 60% of top AI researchers work in the United States, and about half of them are immigrants, primarily from China, India, Europe, and Iran (Stanford AI Index Report, 2024). The so-called brain drain is not merely an academic issue, but a geopolitical one: • States compete to attract talent through visas, high salaries, and access to frontier laboratories. • Innovation in AI depends on who concentrates the largest amount of specialized human capital. The United States dominates due to its ability to attract international researchers, while China compensates through massive investment and domestic talent production. 3. The United States Leads the AI Race for Three Main Structural Reasons 1. Innovation, talent, and industry: The United States leads in high-impact research publications and AI startups (more than 50% worldwide). Private investment exceeded USD 350 billion in 2023 alone. Key companies include Google, Meta, Microsoft, OpenAI, NVIDIA, Tesla, and IBM, among others. 2. Computational infrastructure and chips: The country concentrates the most advanced computational infrastructure and controls cutting-edge chips (such as the NVIDIA H100), a resource that China cannot yet produce at the same level. 3. AI and national security: The United States allocates more than 16 federal agencies and billions of dollars annually to AI development for defense, cybersecurity, and intelligence (White House AI Budget, 2024). 4. China: The Emerging Superpower on the AI Path China ranks second globally in the AI race but follows a more aggressive, centralized, and ambitious strategy. • Massive investment as state policy: China has pledged to invest more than USD 150 billion by 2030 in AI under its Next Generation Artificial Intelligence Development Plan (AIDP) (Government of China, 2017). • Domestic talent production: China trains more AI engineers than any other country. Annual graduates in science and engineering reach 4.7 million, compared to 600,000 in the United States (UNESCO, 2023). However, a significant portion migrates to the U.S. due to better research conditions. • China’s role in the global AI industry: China leads in AI-based facial recognition, with generative AI startups such as Baidu, SenseTime, Alibaba Cloud, and Tencent AI Lab. It produces massive numbers of publications, although with lower scientific impact than those from the United States. AI is widely implemented in governance, security, and smart cities. • The chip dilemma: China depends on advanced semiconductors produced only by Taiwan (TSMC), South Korea (Samsung), and the United States/Netherlands (ASML). • Export controls: Export restrictions imposed on China since 2022 limit its ability to train frontier models, although the country is making radical investments to achieve chip sovereignty. 5. Europe, India, Israel, Canada, and Other Relevant Actors • Europe: The United Kingdom, Germany, France, and the Netherlands generate a solid ecosystem in algorithmic ethics, digital regulation (AI Act), and applied research. • India: The world’s main hub of engineering talent and a global provider of technological services. • Israel: A powerhouse in cybersecurity and military AI, with per-capita innovation comparable to Silicon Valley. • Canada: The birthplace of deep learning (Geoffrey Hinton, Yoshua Bengio) and a strong center for basic research. 6. Africa on the AI Chessboard: Intentions, Challenges, and Opportunities Although Africa does not lead the AI race, its geopolitical role is growing rapidly for four strategic reasons. Africa is a major producer of critical minerals. AI depends on lithium, cobalt, graphite, and rare earth elements, and Africa holds 70% of the world’s cobalt reserves (in the DRC), as well as other strategic minerals in Zambia, Namibia, South Africa, and Mozambique. This places the continent in a key position within the supply chains for batteries, computers, and data centers. There is also a rapid expansion of digital infrastructure. China, through Huawei and ZTE, has built around 70% of Africa’s 4G network, as well as Ethiopia’s first smart data center and technology innovation hubs in Egypt, Kenya, and South Africa. Africa is entering the AI space through fintech, digital health, smart agriculture, and biometric systems. In terms of AI policy, African countries with formal AI strategies include Egypt, Rwanda, Kenya, and South Africa. • Threats and challenges: limited computational infrastructure, a deep digital divide, the risk of dependence on external technological solutions, the use of AI for political surveillance (as seen in Ethiopia and Uganda), and a shortage of specialized talent. 7. China and Africa: The Intersection of AI, Data, and Geopolitics China combines its role in AI with its influence in Africa through investments in digital infrastructure, the sale of surveillance systems, the construction of data centers, and technical training programs. This creates interdependence but also raises concerns: Africa could become dependent on Chinese systems that are difficult to replace. Data may become centralized on foreign platforms, and the risk of a technological debt trap adds to existing financial dependence. 8. AI, Regulation, and Global Governance The rapid expansion of AI calls for international treaties on data use, security standards, limits on military automation, and ethical regulations to protect civil society. Governance will be decisive in determining not only who leads, but also how this technology will be used in the coming decades. In this context, global AI governance has become a new field of geopolitical competition. While the European Union promotes a regulatory approach based on human rights and risk prevention, the United States favors market self-regulation and innovation, and China advances a model of state control and technological sovereignty. Multilateral organizations such as the UN, the OECD, and the G20 have begun discussing common principles, but there is still no binding international regime. The absence of clear rules increases the risks of an algorithmic arms race, the use of AI for mass surveillance, and the deepening of global inequalities in access to and control over technology. 9. Conclusions The United States leads due to innovation, global talent attraction, and computational capacity. China follows closely with a comprehensive state-led strategy and dominance in global digital infrastructure. Europe, India, Israel, and Canada contribute key elements to the global ecosystem. Africa, while not a leader, occupies an increasingly strategic role due to its resources, data, markets, and alliances. The race for AI will define not only the global economy, but also the balance of power in the international system of the 21st century. References -Stanford University.(2024). AI Index Report 2024. Stanford Institute for Human-Centered Artificial Intelligence. https://hai.stanford.edu/ai-index/2024-ai-index-report?utm_source=chatgpt.com -International Data Corporation. (2023). Worldwide Artificial Intelligence Spending Guide. IDC. https://www.idc.com/data-analytics/spending-guide/ -State Council of the People’s Republic of China (2017). Next Generation Artificial Intelligence Development Plan. Government of China https://fi.china-embassy.gov -UNESCO. (2023). Global Education Monitoring Report: science, technology, engineering and mathematics. United Nations Educational, Scientific and Cultural Organization. https://www.unesco.org/en -The White House. (2024). Federal AI Budget and National AI Strategy. Executive Office of the President of the United States. https://www.whitehouse.gov/presidential-actions/2025/12/eliminating-state-law-obstruction-of-national-artificial-intelligence-policy/ -European Commission.(2023).Artificial Intelligence Act. Publications Office of the European Union. https://digital-strategy.ec.europa.eu/en/policies/regulatory-framework-ai -Organisation for Economic Co-operation and Development. (2023). OECD. Artificial Intelligence Policy Observatory. https://www.oecd.org/en/topics/artificial-intelligence.html

Defense & Security
President Donald Trump Speaks During Cabinet Meeting in the Cabinet Room of the White House, Washington, DC on December 2, 2025

Opinion – The Mearsheimer Logic Underlying Trump’s National Security Strategy

by Mark N. Katz

The recently released Trump Administration’s National Security Strategy (NSS) has upended what had been the decades-long consensus about American foreign policy. Most notable in it is the Trump Administration’s prioritization of the Western Hemisphere as an American security concern, its deemphasis on defending America’s traditional European allies, its identification of China as far more of a threat than Russia, and its determination not to be drawn into conflicts in the Middle East and Africa. But while the 2025 Trump Administration National Security Strategy breaks with much of previous American foreign policy, the logic behind it is not something completely new. Even though the document makes no mention of him, the policy outlined in the NSS comports with what John Mearsheimer described in his influential book, “The Tragedy of Great Power Politics”, which was first published in 2001 and updated in 2014. In his book Mearsheimer declared that no nation has ever achieved global hegemony. According to Mearsheimer, America is the only country that has achieved predominant influence in its own region (the Western Hemisphere) and has also been able to prevent any other great power from dominating any other region. Mearsheimer wrote, “States that achieve regional hegemony seek to prevent great powers in other regions from duplicating their feat. Regional hegemons, in other words, do not want peers” (2014 edition, p. 41). Trump’s 2025 National Security Strategy has, whether knowingly or not, adopted these aims as well. It discusses the various regions of the world in the order of their priority for the Trump Administration: the Western Hemisphere first, followed by Asia (or Indo-Pacific), Europe, the Middle East, and lastly Africa. With regard to the Western Hemisphere, the NSS unambiguously calls for the restoration of “American preeminence in the Western Hemisphere,” and states, “We will deny non-Hemispheric competitors the ability to position forces or other threatening capabilities, or to own or control strategically vital assets, in our Hemisphere.” This is very much in keeping with what Mearsheimer described as America being a regional hegemon in the Western Hemisphere. As for the other four regions of the world, though, the Trump Administration seeks either to prevent any other great power from becoming predominant — or it doesn’t see this as a possibility that needs to be worried about. According to the NSS, the Middle East was a priority in the past because it was the world’s most important energy supplier and was a prime theater of superpower conflict. Now, however, there are other energy suppliers (including the U.S.) and superpower competition has been replaced by “great power jockeying” in which the U.S. retains “the most enviable position.” In other words: the Trump Administration does not see any other great power as able to become predominant in this region which is now less strategically important than it used to be anyway. Similarly, the NSS does not see any other great power as even seeking to become predominant in Africa. The NSS thus sees America’s main interests there as mainly commercial. By contrast, China is seen as a threat in the Indo-Pacific region. The NSS, though, discusses Chinese threats in the economic and technological spheres before turning to the military one. A continued U.S. military presence in the region is seen as important for preventing Chinese predominance. But Japan, South Korea, Taiwan, and Australia are all enjoined by the NSS to increase their defense spending in order to counter this threat. The NSS also identifies “the potential for any competitor to control the South China Sea” as a common threat that not only requires investment in U.S. military capabilities, “but also strong cooperation with every nation that stands to suffer, from India to Japan and beyond.” Unlike the Middle East and Africa, then, the NSS does identify a rival great power as striving for predominance in the Indo-Pacific region. Countering it, though, is not seen as just being America’s responsibility, but also that of other powerful states in the region. The strangest section in the 2025 NSS is the one on Europe. While acknowledging that “many Europeans regard Russia as an existential threat,” the NSS envisions America’s role as “managing European relations with Russia” both to “reestablish conditions of strategic stability” and “to mitigate the risk of conflict between Russia and European states.” This is very different from the decades-long U.S. policy of seeing America’s role as defending democratic Europe against an expansionist Soviet Union in the past and Putin’s Russia more recently. Indeed, the NSS’s claim that the European Union undermines “political liberty and sovereignty” and its welcoming “the growing influence of patriotic European parties” (in other words, anti-EU right wing nationalist ones) suggests that it is not Russia which the Trump Administration sees as a rival, but the European Union. The 2025 NSS does call for a “strong Europe…to work in concert with us to prevent any adversary from dominating Europe.” The NSS, though, seems to envision the European Union as either greater than or equal to Russia in threatening to dominate European nations. In his book, Mearsheimer did not envision the European Union as a potential great power rival to the U.S. Indeed, there isn’t even an entry for it in the book’s index. The way that the NSS envisions the world, though, comports with how Mearsheimer described America’s great power position: predominant in the Western Hemisphere and able to prevent any other great power from becoming predominant in any other region of the world. Mearsheimer, though, is a scholar who described the position in the world that he saw the U.S. as having achieved and which would seek to maintain. The 2025 NSS, by contrast, is a policy document laying out how the Trump Administration believes it can best maintain this position. And there is reason to doubt that it has done so realistically. Keeping non-Hemispheric great powers out of the Western Hemisphere will not be easy when there are governments there that want to cooperate with them. Further, devoting American resources to being predominant in Latin America when this will be resented and resisted could not only take away from America’s ability to prevent rival great powers from becoming predominant in other regions, but could counterproductively lead Latin American nations than have already done so to increase their cooperation with external great powers which the Trump Administration wants to avoid. Further, the Trump Administration’s efforts to reduce the influence of the European Union runs two risks: the first is that such an effort will succeed, but that the rise of anti-EU nationalist governments throughout the old continent results in a Europe less able to resist Russian manipulation and incursion. The second is that Trump Administration efforts to weaken the European Union backfire and result not only in a Europe united against American interference but unnecessarily emerging as a rival to the U.S. It would be ironic indeed if pursuing the NSS’s plan for upholding what Mearsheimer described as America’s ability to predominate over the Western Hemisphere combined with an ability to prevent any rival from predominating over any other region ended up undermining America’s ability to do either.