Subscribe to our weekly newsletters for free

Subscribe to an email

If you want to subscribe to World & New World Newsletter, please enter
your e-mail

Defense & Security
U.S. Navy Adm. Alvin Holsey, commander of U.S. Southern Command (USSOUTHCOM), provides remarks at the TRADEWINDS 25 (TW25) closing ceremony at Teteron Barracks in Teteron Bay, Trinidad and Tobago, May 8, 2025. U.S. Army National Guard photo by Spc. Astia

Imperialism by Invitation: Murder, Mafioso Politics and Caribbean-Venezuelan Futurity

by Zophia Edwards , Corey Gilkes , Tamanisha John

Amidst US bombs and lies about Venezuelan drug trafficking as a pretext for regime change, the subordinated position of Caribbean states’ economies plays a role in U.S. aggression. It is no exaggeration to say that for over half a millennium, the Caribbean has been a stage for imperial incursions. In the past two months, the US has increased its military presence in the Caribbean Sea, including carrying out an airstrike campaign, while claiming that these operations are necessary to protect US citizens from illicit drug trafficking allegedly occurring off the coast of Venezuela. As of November 15th, the US military has launched eleven deadly air strikes on small boats in Caribbean waters and eleven on South America’s Pacific Coast, killing over eighty people. In these operations, the US Navy also raided a tuna fishing boat, detaining the fisherfolk on board for several hours before releasing them.[1] To date, the US government has not provided any proof of its claims that the people it publicly executed are trafficking drugs. These extrajudicial killings have struck fear into the hearts of millions of ordinary people across the region, especially the fisherfolk who depend upon traversing the sea for their livelihoods. Meanwhile, Caribbean countries have either blatantly come out in support of the imperial violence at their doorsteps or been hesitant to respond. When these attacks began, Trinidad and Tobago (T&T) as well as Guyana expressed enthusiastic support for US militaristic incursions and extrajudicial murders.[2] As tensions escalated, the Guyanese government attempted to backpedal from its original position. However, the T&T Prime Minister, Kamla Persad Bissessar, has maintained a pro-US stance. PM Persad Bissessar is on record saying, “I have no sympathy for traffickers, the US military should kill them all violently.”[3] This position by the T&T government was reiterated even after the US murdered two of its citizens, Chad Joseph and Rishi Samaroo, in these airstrike campaigns. T&T allowed the US warship, USS Gravely, a guided-missile destroyer, to dock in the country’s capital between October 26-30 and for US military agents to “address shared threats like transnational crime and build resilience through training, humanitarian missions, and security efforts” on T&T soil.[4] The Caribbean Community (CARICOM) - the intergovernmental regional organization - has dragged its feet to take a position, waiting a whole month on October 18, to release a presser wherein it reaffirmed the region as a “zone of peace,” with Trinidad and Tobago excepting itself from this stance. The foot dragging is sinister when it is known for a fact that the US propaganda of conducting “anti-narcotics” operations is/are a ruse. These hostile US military aggressions in the Caribbean Sea and on South America’s Pacific Coast are part of a broader US imperial geopolitical strategy aimed at toppling the government of Venezuelan President, Nicolás Maduro. The aim, as Trump has publicly intimated,[5] is to get the Venezuelan government to grant the US more beneficial access to Venezuela’s resources. One might ask: Why are governments, like Trinidad and Tobago, enabling US imperial terror in the region? And why have CARICOM governments not taken an unequivocal anti-imperialist position? The answer lies in the subordinated position of these states’ economies within the global economy. Caribbean states are historically structured to be neoliberal, pro-imperial, and anti-democratic – while political elites are beholden to enacting external interests. Moreover, internal political dynamics – in terms of racial and class struggles – are also a factor, influencing the timing and intensity of these Caribbean governments’ responses to present US imperial terror. Debunking the Myth of the Venezuela Narco State The first order of business is dispelling the myth that Venezuela is a ‘narco-state.’ US officials have framed the current operations — boat strikes, deployments of destroyers and aircraft — as counter-narcotics efforts designed to stem the flow of illicit drugs from Venezuela to the US. However, the Caribbean route is not among the primary conduits for major volumes of cocaine and methamphetamines into the US. Most trafficking flows of narcotics to the US are overland, through Central America and via Pacific routes.[6] It is no surprise therefore that the US government has not provided any proof of its claims that the people it has extrajudicially murdered in the Caribbean Sea or on South America’s coast are engaged in drug trafficking. Additionally, the scale and nature of force being used are far beyond what traditional interdiction operations require – with the Trump administration claiming that interdiction has not worked, hence deadly air strikes are necessary. In addition to the lack of evidence of a Venezuelan route being key to drug trafficking into the US, there is also no credible proof linking the Maduro government to organized drug trafficking, despite the Trump regime’s claims, which are parroted uncritically by many Caribbean media and politicians. Within the US’s own intelligence establishment, one report explicitly states: “the Maduro regime probably does not have a policy of cooperating with TDA [Tren de Agua] and is not directing TDA movement to and operations in the United States.”[7] The report goes on to say: “Venezuelan intelligence, military, and police services view TDA as a security threat and operate against it in ways that make it highly unlikely the two sides would cooperate in a strategic or consistent way.” These facts stand out, especially given the evidentiary long and sordid history of the US’s leading role in drug trafficking in the Americas, and the US as the #1 supplier of weapons to those involved in the global drug trade in the region. The US government’s real motive is to destabilize and topple the Maduro government in Venezuela, in favor of a regime that undermines Venezuela’s sovereignty. Frantz Fanon, Walter Rodney and many others remind us that capitalist imperialism depends upon neocolonial puppet governments occupied by a predatory elite who facilitate accumulation by extractivism, dispossession, and exploitation. Positioned to usurp Maduro in Venezuela by imposition and not elections, is 2025 Nobel “Peace” Prize winner, María Corina Machado. Machado is a key US ally, Trump admirer, supporter of Israel and its bombing of Gaza, and an overall admirer of repressive regimes in Latin America – including El Salvador’s Nayib Bukele and Brazil’s former president, Jair Bolsonaro. Machado has been begging for foreign military intervention in Venezuela to remove the Maduro government while professing that her administration, if granted power through non-electoral means, intends to open up Venezuela’s doors to foreign exploiters. If the current iteration of US imperial antagonism in the region leads to regime change in Venezuela, the US is poised to have control over the resources in the southern Caribbean – namely Guyana and T&T – as well as on the South American Coast: again, namely Guyana and then Venezuela. This will give the US direct control over shipping routes in the region, as it prepares for a wider economic confrontation with China. Hence, these alleged “anti-narcotics” operations which have taken the lives of over eighty Caribbean and South American people, are just a smokescreen for deeper US geopolitical interests. Dependency and the Character of the State Caribbean states are disregarding the lives of the Venezuelan, Latin American, and their own Caribbean populations using external security narratives, largely because there is a true dictatorship of foreign capital in the region. As US Vice-President JD Vance let slip, places like the Caribbean countries were always intended to remain extractive workstations, not autonomous, functioning nations.…at all.[8] T&T, for example, has long been dependent on oil and gas extraction for the bulk of its national income. However, the country has been experiencing a decline in natural gas and crude oil production over the past decade and the country’s liquefaction complex and petrochemical plants producing ammonia, methanol, and other key exports – which depend upon gas input – have been suffering.[9] Combined with the collapse in energy prices in 2014, this situation has produced a decline in foreign exchange inflows and government revenues.[10] With the demand for US dollars far outstripping the supply, T&T is facing one of the most severe foreign exchange crises in the Caribbean, causing uproar across the working, middle, and upper classes of society alike.[11] As such, the T&T government is desperate for the resuscitation of its flailing oil and gas sector. The T&T government spent decades developing a “Dragon” gas deal, where Shell would lead operations that funnel gas located in Venezuelan waters to T&T, where it can be exported as LNG. This deal, considered by the T&T state to be the lifeline that would save the local economy from collapse, has become a weapon in Washington, DC’s arsenal against Venezuela. In the midst of the extra-judicial killings in the region, the US has revoked licenses approving the deal and re-approved them under new terms meant to ensure the involvement and profits of US companies. The continued structural dependency of T&T on foreign capital and imperial markets renders its misleaders susceptible to these coercive measures to ensure that Caribbean states align with US capitalist imperialist policies. Economic coercion is an important part of the context for Kamla Persad Bissessar’s support for imperialism, but her position cannot be traced to this alone. Persad Bissessar and the educated elite and comprador class she represents come out of some of the “best” primary, secondary, and tertiary educational institutions locally and internationally. Are these elites supposed to provide independent, critical thinkers who would decolonize “post” colonial societies? Are they only unwitting agents of imperialism or are they willing participants? From the time of many states' flag independence, foreign interventions have secured for the local Caribbean elites’ (or comprador classes) party longevity and/or political dominance, and/or visas and dual citizenships, and/or the ability to accumulate wealth for themselves by exploiting the people and land within their countries. As Frantz Fanon’s “Wretched of the Earth” and Walter Rodney’s “How Europe Underdeveloped Africa” detailed, these elites lack the sort of creativity and vitality to independently develop into an industrial bourgeoisie. They therefore turn to propping up foreign entities and dependent economic relations. Consequently, Caribbean state-making and the establishment of territorial statuses in the context of US and European imperialist capitalism has reproduced institutions that are unresponsive to Caribbean people. Whether through hopes of securing or acquiring foreign investment, or due to rank economic blackmail that threatens foreign investments elites through sanctions and other restrictions – many Caribbean states choose to serve US and Western imperialism as an almost “practical” strategy of economic “stability”. However, such imperial service only guarantees continued underdevelopment and economic beggary. Herein, T&T’s misleadership is positioning the country as a beggar to the US and reinforcing US sanctions on Venezuela, which makes it hard for Venezuela to sell its own oil and gas to states that need it, including T&T. Worse still, the US does not want China to remedy this situation between Venezuela and Trinidad. So not only are some Caribbean leaders and party supporters encouraging naked US imperialism cloaked in the deceptive language and rhetoric of “anti-drug trafficking” and “protecting the region,” they are also upholding a condition of dependency of the region on the US, advancing US attempts to subvert Chinese influence in the region, and in the process supporting direct attacks on states in the region’s right to self-determination and sovereignty. Moreover, local internal racial and class dynamics are also shaping the timing and intensity of Caribbean governments responses to US aggression in the region. In the post-WWII construction of party politics in T&T, middle-class parties carried forward the colonial divisions between the predominantly African and Indian segments of the population that multiracial worker movements had fought so hard to overcome. Kamla Persad Bissessar, as leader of the party popularly known as the one representing “Indian interests,” is advancing and exploiting this racial wedge to garner support for her pro-imperial policies. This party has actively engaged in criminalizing poor African communities as well as Venezuelan migrants, while downplaying the fact that the many poor and marginalized Indians are similarly caught in the net of US imperialism. Persad Bissessar and her party affiliates’ own ideas of “purity” mixed with class notions of entitlement merge with the supremacist foundations of US local and foreign politics. It’s bad enough that a Prime Minister — a lawyer — supports extra-judicial murders in violation of International Law, but how does one align with a political ideology that produced people like Senator James Reed, who, circa 1919, openly dismissed dealing with “a nigger from Liberia, a nigger from Honduras, a nigger from India…each (having) votes equal to that of the great United States.” Before one argues that this was long ago, consider what right-wing political commentator Ann Coulter told Vivek Ramaswamy why she’d never vote for him regardless of how his views match hers. We acknowledge that political leaders, seeking re-election, opt for the path of least resistance which in this case means not offending the mighty United States. But this cannot just be naïveté. It is in this context that Kamla Persad Bissessar has broken with even the basic understanding of what CARICOM is, and is astonishingly peddling the idea that each island seeking its own interest is somehow more progressive than banding together as one bloc! In other words, she and those who support her stance have embraced regional colonial divide-and-conquer tactics. The US has always stood in opposition to a unified body in the region. As then US diplomat Charles Whittaker put it: “A strongly federated West Indies might be detrimental to American interests.” As such, they undermined the West Indian Federation in the 1950s and sabotaged the New International Economic Order throughout the 1970s. The Caribbean misleaders proclaiming disunity as strength subscribe to political ideologies that interlock with a particular brand of politics in the West that has been openly Euro-nationalist and imperialist. Hence, at a time when many resource-rich countries are forming partnerships and alternative trading and security blocs, the political misleaders in the Caribbean calling for further fragmentation should warrant deeper investigation. Media, Political Misleadership, and How the State Weaponizes “Security” It is important to clarify that crime does exist in the Caribbean region, just as it exists elsewhere throughout the world. The size of Caribbean countries are also important to note, because though it is true that the amount of drugs flowing through the Caribbean are low relative to the global drug trade, the little that does pass through is indeed wreaking havoc, given the geographical and population sizes of these countries. The increase in guns and violent crime associated with the global drug trade in places like T&T has become a critical factor affecting everyday life for ordinary people there. This context has enabled the T&T government to justify and legitimate US military aggression in the name of “fighting” the drug trade in the region. Thus, most people cheering on the US military are simply desperate for a sense of safety. However, it is precisely this need for safety that is being weaponized — to increase unsafe conditions as new US-produced military weaponry and technologies become even more commonplace in the region. There is a direct and indirect connection between (geo)political and economic decisions made by successive generations of ruling elites in the Caribbean, and North American narratives of crime, which have – going back to the 19th century in some countries – allowed (and made space for) imperial aggression in the region. Over a number of decades, the United States has taken advantage of crises caused by rising violent crime to pursue its own security interests – even though rises in violent crime in the region is directly linked to US imported and manufactured weapons, and US consumer demands for items that the US state deems “illegal.” To establish and maintain US dominance — and the accompanying cheap labor[12] from the surplus populations which exist in a region notorious for high levels of unemployment and underemployment — the US has deployed constant applications of violence, packaged as maintaining “law and order” in the drive to “progress” and “catch up” with the West. It’s no coincidence that modern policing began in the Caribbean as militarized slave patrols in St Lucia.[13] Then, like now, the purpose is the same: protect wealth from the workers who created it. However, the real effectiveness lay in conditioning the exploited to adopt the values of the elites. To date, Western elite definitions of progress and development for the wider working people in the Caribbean region dominate, even as the dependent status of Caribbean economies make this impossible for the majority of the people in the region. Thus, US reliance on expanding its military apparatus for economic growth is justified through the construction of permanent threats that the US supposedly has to “defend” itself against. Another such narrative, like the need to “promote democracy” in Venezuela, is also within this vein of western imperialist propaganda. The US and western imperialists maintain that Venezuela is not a democracy, despite the presence of robust, active citizen’s assemblies and communes, as well as elections that occur under the presence of election observers – including from the US. Nonetheless, the western imperialist narrative maintains that Venezuela is not democratic and thus their people can be bombed for some purported “greater good.” Meanwhile, these same imperialist narratives call genocidal Israel a democracy deserving of “protection” and “defense,” as it exterminates Palestinians and decimates Palestinian land. This propaganda – not analysis based on any facts – readily frames western imperialism as “defensive,” “pro-security,” and “pro-safety” and those not in line with it as “aggressive” and “undemocratic.”[14] In lockstep with imperialists, local political figures too have long used or encouraged the use of dehumanizing language when discussing criminalized people and communities. When the T&T Prime Minister, Police Commissioner, and other influential authority figures refer to human beings as “carcasses,”[15] “pests,” “fleas” or “cockroaches,” the message sent is that these are not citizens or members of society and therefore, not worthy of certain basic courtesies and legal obligations, including the right to life. When this sort of thinking is widespread, issues of social justice fall by the wayside. Instead, heavy, often murderous attacks on real or alleged drug runners who come from poor, precarious, vulnerable communities become justified while the power brokers, bankers and their institutions[16] that launder money do not get so much as a paper weight dropped on them. Likewise, the local and international media is playing a significant role in the unfolding crisis. Save for a few columnists, the local media has been disgraceful, little more than sycophantic stenographers for egregious narratives coming from Washington. Initially, the local media conducted little to no critical research into the many available sources discrediting[17] false allegations connecting the Maduro administration to drug cartels. They parroted language that criminalized the victims of the attacks without presenting any evidence proving that they were guilty of violating any laws. They were silent on the voluminous literature connecting the CIA and the US military to colonial land and resource grabs that violate international and local laws.[18] They also proliferated the myth that Nicolas Maduro “lost” or “rigged” elections in Venezuela, contrary to information provided by election observers. The lack of critical and independent journalism is a clear dereliction of duty, supporting imperialist narratives and providing cover for extrajudicial murder. Conclusion The neoliberal era shortly after many states’ independence extended the life of bourgeois colonial thought in the Caribbean, interpreting the human “firstly, [as] a figure that is homo economics, and, secondly, a figure that can only operate within the field of white supremacy and capitalism.”[19] In this environment, Caribbean resistance weakened, having to establish itself alongside the intensification of neoliberal processes – foremost amongst them being state repression and militarist aggression supported by the US hegemon – so that Caribbean peoples could be definitively integrated into a Western capitalist system as “bottom labor-exporting economies,” whose labor commodification was masked by discourses on ‘growth’ and ‘development.'[20] It is in analyzing the characteristics of Caribbean states and governance within them – including how they interpret “development” – that helps us to answer why so many states elect to do imperial service: Caribbean neocolonial (puppet) states are fundamentally anti-democratic with no real regard for Caribbean life within them. The T&T government’s deliberate facilitation of US imperial aggression in the region mirrors the position of several African states. The post-genocide Tutsi-dominated regime of Paul Kagame in Rwanda, leveraging its image as a victim of colonialism and genocide, justifies domestic repression of Hutus and expansionist military ventures in neighboring states, notably the Democratic Republic of Congo in close alliance with the United States, France, and Israel. In exchange for U.S. and western military, financial, and political backing, Rwanda facilitates imperial access to Congo’s mineral wealth — coltan, gold, and tin — channeling profits both to Western capital and Rwandan elites. Thus, Rwanda functions as a pro-U.S. imperial proxy, advancing the global system of resource extraction and accumulation on behalf of Western powers. In addition, Rwanda along with a growing list of African states, including Ghana, Eswatini, and South Sudan have accepted the terms of bilateral agreements with the US government to receive people who have been criminalized and deported under the Trump regime’s attack on communities racialized as non-white in the US.[21] By enlisting themselves to be locations for the outsourcing of US racist incarceration policies, they are enabling the geographical expansion of the US military industrial prison complex to more and more corners of the world. These Caribbean and African misleaders will go down in history as active enablers and facilitators of the very imperial greed, oppression, and exploitation that the masses have been resisting since the days of direct colonial domination. Only invigorated mass resistance that takes power away from Caribbean neocolonial (puppet) elites engaged in imperial service can rectify these conditions. Global Africans in the Caribbean and around the world must claim power and reclaim movement histories that fought back against capitalist imperialism. Originally published in Pambazuka News and republished in Black Agenda Report References [1] https://www.pbs.org/newshour/world/venezuela-says-u-s-warship-raided-a-… [2] https://www.caribbeanlife.com/trinidad-guyana-us-moves-venezuela/ [3] https://newsday.co.tt/2025/09/03/kamla-says-kill-all-traffickers-as-tru… [4] https://www.cnn.com/2025/10/26/world/us-warship-docks-trinidad-venezeul… [5] https://www.theguardian.com/world/2025/oct/17/trump-maduro-venezuela [6] https://www.unodc.org/unodc/data-and-analysis/world-drug-report-2025.ht… [7] https://static01.nyt.com/newsgraphics/documenttools/32f71f10c36cc482/d9… [8] https://www.youtube.com/watch?v=U1bd-D1PIZg&pp=ygUZIGogZCB2YW5jZSBnbG9i… [9] https://www.finance.gov.tt/2020/03/16/effect-of-the-oil-price-collapse-… [10] https://www.imf.org/external/pubs/ft/scr/2014/cr14271.pdf; https://www.imf.org/en/Publications/CR/Issues/2024/06/04/Trinidad-and-T…. [11] Chamber of Industry and Commerce 2025; University of the West Indies Campus News 2024. [12] https://www.youtube.com/watch?v=BAJgGFtF44A [13] https://www.youtube.com/watch?v=kavkiH9YHag&pp=ygUaanVsaWFuIGdvIHBvbGlj… [14] See, for example, the Trilateral Commission’s “The Crisis of Democracy” in which influential thinkers who shaped US policy complained that decolonising countries were exercising too much democracy, which needed to be contained, leading to the proliferation of NGOs all over the peripheralized world. [15] https://trinidadexpress.com/news/local/kamla-state-resources-won-t-be-wasted/article_5d0c61fd-d633-4dd3-8e3e-6995a454c774.html [16] https://www.youtube.com/watch?v=kcpZPGOksp0 [17] https://www.dea.gov/sites/default/files/2025-07/2025NationalDrugThreatA…; https://static01.nyt.com/newsgraphics/documenttools/32f71f10c36cc482/d9… [18] https://www.goodreads.com/book/show/455652.Dark_Alliance; https://www.versobooks.com/en-gb/products/1628-whiteout?srsltid=AfmBOor…; https://www.betterworldbooks.com/product/detail/the-politics-of-heroin-…; https://www.youtube.com/watch?v=zxbW0CCuT7E [19] Bogues, Anthony. 2023. “Sylvia Wynter: Constructing Radical Caribbean Thought.” BIM: Arts for the 21st Century 11(1): 33–41, p.37. [20] Henry, Paget. 2000. “Caribbean Marxism: After the Neoliberal and Linguistic Turns.” In Caliban’s Reason: Introducing Afro-Caribbean Philosophy, Africana Thought, New York: Routledge, 221-46, p.228. [21] https://www.pbs.org/newshour/world/more-african-nations-are-receiving-t…

Defense & Security
President Donald Trump Speaks During Cabinet Meeting in the Cabinet Room of the White House, Washington, DC on December 2, 2025

Opinion – The Mearsheimer Logic Underlying Trump’s National Security Strategy

by Mark N. Katz

The recently released Trump Administration’s National Security Strategy (NSS) has upended what had been the decades-long consensus about American foreign policy. Most notable in it is the Trump Administration’s prioritization of the Western Hemisphere as an American security concern, its deemphasis on defending America’s traditional European allies, its identification of China as far more of a threat than Russia, and its determination not to be drawn into conflicts in the Middle East and Africa. But while the 2025 Trump Administration National Security Strategy breaks with much of previous American foreign policy, the logic behind it is not something completely new. Even though the document makes no mention of him, the policy outlined in the NSS comports with what John Mearsheimer described in his influential book, “The Tragedy of Great Power Politics”, which was first published in 2001 and updated in 2014. In his book Mearsheimer declared that no nation has ever achieved global hegemony. According to Mearsheimer, America is the only country that has achieved predominant influence in its own region (the Western Hemisphere) and has also been able to prevent any other great power from dominating any other region. Mearsheimer wrote, “States that achieve regional hegemony seek to prevent great powers in other regions from duplicating their feat. Regional hegemons, in other words, do not want peers” (2014 edition, p. 41). Trump’s 2025 National Security Strategy has, whether knowingly or not, adopted these aims as well. It discusses the various regions of the world in the order of their priority for the Trump Administration: the Western Hemisphere first, followed by Asia (or Indo-Pacific), Europe, the Middle East, and lastly Africa. With regard to the Western Hemisphere, the NSS unambiguously calls for the restoration of “American preeminence in the Western Hemisphere,” and states, “We will deny non-Hemispheric competitors the ability to position forces or other threatening capabilities, or to own or control strategically vital assets, in our Hemisphere.” This is very much in keeping with what Mearsheimer described as America being a regional hegemon in the Western Hemisphere. As for the other four regions of the world, though, the Trump Administration seeks either to prevent any other great power from becoming predominant — or it doesn’t see this as a possibility that needs to be worried about. According to the NSS, the Middle East was a priority in the past because it was the world’s most important energy supplier and was a prime theater of superpower conflict. Now, however, there are other energy suppliers (including the U.S.) and superpower competition has been replaced by “great power jockeying” in which the U.S. retains “the most enviable position.” In other words: the Trump Administration does not see any other great power as able to become predominant in this region which is now less strategically important than it used to be anyway. Similarly, the NSS does not see any other great power as even seeking to become predominant in Africa. The NSS thus sees America’s main interests there as mainly commercial. By contrast, China is seen as a threat in the Indo-Pacific region. The NSS, though, discusses Chinese threats in the economic and technological spheres before turning to the military one. A continued U.S. military presence in the region is seen as important for preventing Chinese predominance. But Japan, South Korea, Taiwan, and Australia are all enjoined by the NSS to increase their defense spending in order to counter this threat. The NSS also identifies “the potential for any competitor to control the South China Sea” as a common threat that not only requires investment in U.S. military capabilities, “but also strong cooperation with every nation that stands to suffer, from India to Japan and beyond.” Unlike the Middle East and Africa, then, the NSS does identify a rival great power as striving for predominance in the Indo-Pacific region. Countering it, though, is not seen as just being America’s responsibility, but also that of other powerful states in the region. The strangest section in the 2025 NSS is the one on Europe. While acknowledging that “many Europeans regard Russia as an existential threat,” the NSS envisions America’s role as “managing European relations with Russia” both to “reestablish conditions of strategic stability” and “to mitigate the risk of conflict between Russia and European states.” This is very different from the decades-long U.S. policy of seeing America’s role as defending democratic Europe against an expansionist Soviet Union in the past and Putin’s Russia more recently. Indeed, the NSS’s claim that the European Union undermines “political liberty and sovereignty” and its welcoming “the growing influence of patriotic European parties” (in other words, anti-EU right wing nationalist ones) suggests that it is not Russia which the Trump Administration sees as a rival, but the European Union. The 2025 NSS does call for a “strong Europe…to work in concert with us to prevent any adversary from dominating Europe.” The NSS, though, seems to envision the European Union as either greater than or equal to Russia in threatening to dominate European nations. In his book, Mearsheimer did not envision the European Union as a potential great power rival to the U.S. Indeed, there isn’t even an entry for it in the book’s index. The way that the NSS envisions the world, though, comports with how Mearsheimer described America’s great power position: predominant in the Western Hemisphere and able to prevent any other great power from becoming predominant in any other region of the world. Mearsheimer, though, is a scholar who described the position in the world that he saw the U.S. as having achieved and which would seek to maintain. The 2025 NSS, by contrast, is a policy document laying out how the Trump Administration believes it can best maintain this position. And there is reason to doubt that it has done so realistically. Keeping non-Hemispheric great powers out of the Western Hemisphere will not be easy when there are governments there that want to cooperate with them. Further, devoting American resources to being predominant in Latin America when this will be resented and resisted could not only take away from America’s ability to prevent rival great powers from becoming predominant in other regions, but could counterproductively lead Latin American nations than have already done so to increase their cooperation with external great powers which the Trump Administration wants to avoid. Further, the Trump Administration’s efforts to reduce the influence of the European Union runs two risks: the first is that such an effort will succeed, but that the rise of anti-EU nationalist governments throughout the old continent results in a Europe less able to resist Russian manipulation and incursion. The second is that Trump Administration efforts to weaken the European Union backfire and result not only in a Europe united against American interference but unnecessarily emerging as a rival to the U.S. It would be ironic indeed if pursuing the NSS’s plan for upholding what Mearsheimer described as America’s ability to predominate over the Western Hemisphere combined with an ability to prevent any rival from predominating over any other region ended up undermining America’s ability to do either.

Defense & Security
Electric car made in China. Duty for EV cars made in China. Trade, tariffs, duty and customs war

Connected Cars as Geopolitical Weapons: The National Security Battle Over Chinese EVs

by World & New World Journal

According to the IEA by 2024, more than 20% of new cars sold worldwide were electric, exceeding 17 million and positioning China as the leader in the market with more than 11 million sales. In comparison, the European and US markets also saw a growth in the sector, but not comparable to the Chinese counterpart. Figure 1: Global EV sales, 2014-2024. Source (IEA, 2025) Figure 2: EVs registrations share in China, US and Europe: 2018-2023. Source: IEA, 2025. On the other hand, autonomous vehicles, whose market value size was estimated at USD 68.09 billion in 2024, are also trending worldwide, North America being the largest market in 2024 (market share of 37.1% and passenger vehicles leading the market with 69% of the global revenue), while the Asia Pacific region is the fastest-growing market. Figure 3: Autonomous Vehicle Market. Source: Grand View Research. (Grand View Research, 2025) Recently, despite the data and market share, discussions and analysis of the vehicle industry have moved into new concerns related to security risks, trade protectionism and unfair competition. Why? Because the vehicle industry has evolved and adopted new technologies, at the same time, concerns have shifted accordingly. These changes have relied on or prioritized human convenience and connectivity over everything else. A New Security Paradigm for Mobility: Are Connected Cars Data Weapons A simple answer is no, but there are elements that can change the answer into a yes in the future. Vehicles are evolving into connected machines, with software-driven platforms, sensors, cameras, connectivity modules and AI systems. Thus, the vehicle industry is entering a new era where data is key, and whoever controls it, is likely to control the market itself. As mentioned before, vehicle-related security risks have sparked discussions in recent years. Nowadays, practically any vehicle sold has a certain degree of connectivity, naturally this leads to a continuous and massive collection of information (sensitive or not), including for example: real-time location, driving patterns, biometric data, audio recordings, images from the Advanced Driver-Assistance Systems (ADAS) and more. For common people this might pass unnoticed but for governments, the fact of collecting and storing data or having the possibility to do so has become a critical point and a threat to their national security. After all, fear is real, and the more connected a vehicle is, the higher the chances that it can become a surveillance device, for example. The speculations can grow as much as our/their imagination leaves them, but after all, security risks and fear related to them exist. In line with the security risks, the possibility of software backdoors hidden in operating systems or telematic units is another possibility. Naturally, if exploited this possibility, these vulnerabilities could allow a remote shutdown of vehicles or fleets, manipulation of navigation systems or even data extraction could occur. In simple terms, this could open the door to cyberattacks, including the potential loss of control of a vehicle. Once again, the possibility of these ideas has reshaped and changed the paradigm of connected vehicles Actual measures and global regulatory trends As governments start recognizing these security threats associated with connected vehicles, many have begun implementing several regulations to protect their national security. For instance, the UK, Israel, the USA and the EU are among the most active actors. One of the branches of the economic war between the US and China is exactly the mobility industry, the fierce competition between both nations has tightened the nationalist policies of President Trump, in fact the US has rapidly adopted a national-security lens for automotive imports. There have been discussions in Congress and even the Commerce Department has proposed rules allowing Washington to prohibit connected car technologies linked to foreign adversaries. In addition, there is huge pressure over the United States-Mexico-Canada Agreement (USMCA), specifically in the encouragement to revise the vehicles entering the US and the promotion of US vehicle-manufacturing companies. For those reasons, the US had imposed tariffs on Chinese-made vehicles (from 25% up to 100% on 2024 during Biden’s administration and later a 35.5% extra tariff on Chinese-made EVs) and had set several rules in line with the USMCA, to limit or protect the American market from Chinese vehicles, as it argued that China is taking advantage of the USMCA by using Mexico or Canada as the entry points to the American market, avoiding tariffs and minimizing costs. According to experts, this Chinese circumvention of US tariffs can occur in three main ways. First through transshipment – products enter Canada or Mexico and then they are shipped to the USA. The second way is by incorporating the Chinese products into the North American supply chains. And the third way is through direct Chinese investments in manufacturing facilities in Mexico or Canada. At the same time, across the Atlantic the EU has also been working on tightening regulations through the Cyber Resilience Act, as well as strengthening the General Safety Regulations, both focusing on the application of rigorous standards to vehicle cybersecurity, data governance, and supply-chain transparency. Also in Europe, recently, a British newspaper reported that military and intelligence chiefs had been ordered not to discuss official business while riding in EVs, and cars with Chinese components had been banned from sensitive military sites. In addition, the former head of the intelligence service MI6 claimed that Chinese-made technology, including cars, could be controlled and programmed remotely. Consequently, the UK has begun evaluating supply chains for hidden dependencies in infotainment systems, telematics, and semiconductors. In the same line, Israel has adopted rigid measures, the Israeli army has begun withdrawing Chinese-made vehicles from officers, citing espionage concerns. Other measures implemented include auditing imported vehicles to ensure no remote-access pathways existence, plus the encouragement of local automakers and tech firms to develop secure telematics modules to minimize foreign reliance. What is China’s role in this new paradigm? To understand the role of China in the EVs and connected vehicles is important to highlight the low labor costs in China, coupled with government subsidies and a well-structured and established supply chain, these three factors gave the Chinese firms huge advantages over their competitors. However, those are not the only factors involved in the equation, the promotion of EVs over internal combustion vehicles and the adoption and development of technologies that turn “simple” vehicles into connected vehicles are important to mention too. All these factors have been well capitalized by Chinese firms, in consequence, China has become the world’s largest EV exporter and somehow a threat for the West. As mentioned throughout the article, the security risks have sparked discussions and concerns, and it is fair, as Chinese-made vehicles have become competitive and technologically well-connected, much, that nowadays are in conditions to fight for the global automotive market. Therefore, there is a clear sense of concern among Western governments, especially in conditions of a politicized world that we live in nowadays. Naturally Beijing argues that bans and investigations on their Chinese-made vehicles are forms of economic protectionism and rejects any claims related to espionage, data leaks or misuse. While, it has also responded by tightening its own domestic rules: foreign vehicles are prohibited from accessing sensitive regions, including areas near government buildings and military facilities. Benefits and challenges for other key players and global automakers Automakers from Korea, Japan or the European and American are being directly benefited from the rising Chinese scrutiny of connected cars, meaning that new export and investment opportunities could be achieved by them. If these countries can materialize transparent software supply chains, strong cybersecurity frameworks, and local data-storage compliance, their advantage would increase. Specifically Korean and Japanese firms – which are proven reliable players with a strong presence worldwide and strengths in battery technology and infotainment systems –, can position themselves as trusted suppliers in those markets that are worried about Chinese-made vehicles and their possible espionage or security risks. On the other hand, however, there are big challenges ahead. If each country or region decides to have proper regulations, major hurdles will appear. For example; compliance costs will rise as automakers must meet different cybersecurity rules across regions; the technology surrounding software auditing, and the transparency of the supply chains itself will require significant investments; the supply chain and design of vehicles will be affected and in consequence production cost will increase; and, if there are different digital standards or rules, it is likely that there could be some limitations in the global interoperability. Conclusions While the rapid growth of EVs worldwide can be considered a good sign for sustainability goals – as they displaced over 1 million barrels per day of oil consumption in 2024 –. Recently there have appeared certain concerns related to security risks – proven or not – trade protectionism and unfair competition. On top of that, the transformation of cars into fully connected digital platforms has created a new paradigm, in which certain nations – mostly western nations – have started to be worried and rethinking their mobility through the lens of national security. In consequence, governments have tightened rules related to data, cybersecurity and foreign software dependencies. This new vision is already changing and transforming the vehicle industry, while the most affected, being the Chinese firms – due the natural competition and geopolitical reasons – there are other global automakers that, if they take the chance, could become key players – as far as they prioritize transparency in supply chains, security and technological trust. The new paradigm has shifted what used to be an ordinary, everyday product into a critical national infrastructure that must be subject to regulation. Finally, this paradigm also highlights the importance of data sovereignty and how important it has become and will be in the future. Referencias Carey, N. (2025, December 2). China floods the world with gasoline cars it can't sell at home. Retrieved from Reuters: https://www.reuters.com/investigations/china-floods-world-with-gasoline-cars-it-cant-sell-home-2025-12-02/ European Commision. (2025, March 5). Industrial Action Plan for the European automotive sector . Retrieved from European Commision: https://transport.ec.europa.eu/document/download/89b3143e-09b6-4ae6-a826-932b90ed0816_en Financial Post. (2025, December 11). Why China's EVs are dangerous to Canada: CVMA. Retrieved from YouTube: https://www.youtube.com/watch?v=WV7bn29lpOQ Grand View Research. (2025). Autonomous Vehicle Market (2025 - 2030). Retrieved from Grand View Research: https://www.grandviewresearch.com/industry-analysis/autonomous-vehicles-market IEA. (2025). Trends in electric car markets. Retrieved from IEA: https://www.iea.org/reports/global-ev-outlook-2025/trends-in-electric-car-markets-2 Introvigne, M. (2024, February 6). Should Chinese Electric Cars Be Banned in the West? Retrieved from Bitter Winter: https://bitterwinter.org/should-chinese-electric-cars-be-banned-in-the-west/?gad_source=1&gad_campaignid=11726773838&gbraid=0AAAAAC6C3PdZ9Jx_edcTzlW0hHoO8yN2D&gclid=CjwKCAiA3L_JBhAlEiwAlcWO59TNJrosoZkG7MwAid0bRuGKs5KY0P7csiXimfUzLlbYshtFMafkdxoCqvQQAvD_Bw Leggett, T. (2025, June 10). China's electric cars are becoming slicker and cheaper - but is there a deeper cost? Retrieved from BBC: https://www.bbc.com/news/articles/cy8d4v69jw6o Meltzer, J. P., & Barron Esper, M. (2025, September 23). Is China circumventing US tariffs via Mexico and Canada? Retrieved from https://www.brookings.edu/articles/is-china-circumventing-us-tariffs-via-mexico-and-canada/#:~:text=Chinese%20intermediate%20goods%20used%20in,to%20the%20production%20of%20new: https://www.brookings.edu/articles/is-china-circumventing-us-tariffs-via-mexico-and-canada/#:~:text=Chinese%20intermediate%20goods%20used%20in,to%20the%20production%20of%20new Navarrete, F. (2024, May 21). Aranceles de EU a autos chinos ponen en aprietos a México. Retrieved from El Financiero: https://www.elfinanciero.com.mx/empresas/2024/05/21/aranceles-de-eu-a-autos-chinos-ponen-en-aprietos-a-mexico/ Oertel, J. (2024, January 25). European Council on Foreign Relations. Retrieved from https://ecfr.eu/article/security-recall-the-risk-of-chinese-electric-vehicles-in-europe/: https://ecfr.eu/article/security-recall-the-risk-of-chinese-electric-vehicles-in-europe/ Radio biafra. (2025). Fearing data leaks, Israel bans Chinese-made cars for army officers. Retrieved from Radio biafra: https://radiobiafra.co/ Schuman, M. (2025, November). China’s EV Market Is Imploding. Retrieved from The Atlantic: https://www.theatlantic.com/international/2025/11/china-electric-cars-market/684887/ Zhang, Z. (2025, December 4). China’s EV dominance sparks EU retaliation. Retrieved from East Asia Forum: https://eastasiaforum.org/2025/12/04/chinas-ev-dominance-sparks-eu-retaliation/

Defense & Security
Caracas (Venezuela) Feb. 18, 2009. The President of the People's Republic of China, Xi Jinping, arrival to Caracas, Venezuela, on official visit in febraury 18, 2009.

Why China is watching Trump’s Venezuela campaign closely

by Tom Harper

Donald Trump’s campaign against Venezuela escalated recently with the US president announcing that the country’s airspace should be considered “closed”. This is a move that has preceded US military interventions in the past, perhaps most notably in Iraq in 2003. It remains to be seen whether Trump’s declaration will be followed by military action or is just a means of raising the pressure on the Venezuelan leader, Nicolás Maduro, in an attempt to force him from office. But regardless of what happens next, what has been notable is the reaction of China. In a December 3 briefing, Chinese foreign ministry spokesperson Lin Jian said that closing Venezuelan airspace would violate international norms and infringe on national sovereignty. Jian added that China rejects interference in Venezuela’s internal affairs “under any pretext” and called on all parties to keep Latin America a “zone of peace”. This stance is no great surprise. China has developed strong relationships with several Latin American countries, including Venezuela, as part of a broader strategy to expand its presence in regions long dominated by the US. Trump’s threats of military action could jeopardise the influence China has built there. China has been involved in Latin America for centuries. But its ties to the region have grown rapidly over the past 25 years or so, with China becoming an indispensable partner to many Latin American countries. Brazil is a clear example of this indispensability. The election of Jair Bolsonaro’s right-wing government in 2018 led to expectations that Brazil would tilt towards Washington. However, such expectations were soon dampened due to China’s role as a major consumer of Brazilian goods. By 2020, China was Brazil’s largest trading partner, accounting for over 30% of total exports from the country. Ties between Brazil and China have only deepened under Bolsonaro’s successor, Luiz Inácio Lula da Silva. This has been helped by the intensification of the US-China trade war, which has seen Brazil become a crucial alternative source of agricultural products such as soybeans that China has historically imported from the US. This relationship has enabled China to exert economic pressure on the US. Brazil’s large soybean exports to China have increased the global supply, which has suppressed prices for all suppliers – including those in US. China has been a similarly indispensable partner to Venezuela since the days of Maduro’s predecessor, Hugo Chávez, who took power in the Latin American state in 1999. Chávez was a keen advocate of a multipolar international order, a concept that has gained traction as Beijing’s political and economic power has grown. Over the years, China has become the main destination for Venezuelan oil. In 2024, China bought around 268,000 barrels of oil from Venezuela on average every day – a figure that, in reality, is likely to be higher as Venezuelan oil is routinely mislabelled to bypass US sanctions. Venezuelan oil is key for China. Beijing has been attempting to diversify its sources of natural resources in recent years as part of efforts to retain its global advantage in cheap manufacturing and wean itself off a dependency on Middle Eastern oil. Trump’s threats to intervene militarily in Venezuela may, at least in part, be aimed at challenging Chinese interests. Indeed, the White House issued an official statement on December 2 affirming the Trump administration’s commitment to the Monroe Doctrine. Signed in 1823, the doctrine said the US would reject other countries’ influence in Latin America. A new “Trump Corollary” to the doctrine states that “the American people – not foreign nations nor globalist institutions – will always control their own destiny in our hemisphere”. Challenging Chinese influence Any US military action in Venezuela will probably increase paranoia across the region. Trump warned recently that any country he believes is making illegal drugs destined for the US is vulnerable to a military attack, and singled out Colombia. On December 2, Trump told reporters at the White House that he “heard” Colombia was “making cocaine”. “They have cocaine plants”, he added. The Colombian president, Gustavo Petro, hit back immediately on social media, saying: “To threaten our sovereignty is to declare war”. But China is unlikely to step in militarily to defend countries in Latin America from US aggression. While China has used its developmental influence there to pursue some political objectives – most notably persuading El Salvador, the Dominican Republic and Honduras to renounce diplomatic recognition of Taiwan in recent years – its engagement with Latin America has largely been transactional. China’s strategy in Latin America is driven primarily by economic considerations, and Beijing has generally been reluctant to enter into formal alliances with states there. This hesitance to commit to defending its partners could strain relations with countries in the region that may expect Beijing to support them in the event of a crisis. However, Trump’s Latin America campaign does provide China with some opportunities. Just as European countries concerned about Russia’s expansionist intentions have become a key market for American arms, it’s possible that Latin America becomes a lucrative destination for Chinese weaponry. Venezuela is already buying Chinese arms, varying from riot control equipment to missiles and – possibly in the future – fighter jets. China has also sold military equipment to Argentina, Bolivia and Ecuador. The US appears to be taking an increasingly active interest in Latin America. As outlined in its recently published National Security Strategy, the Trump administration is looking to readjust the US’s “global military presence to address urgent threats” in the western hemisphere. Having carefully built up its influence in Latin America over many years, China’s leadership will be keeping a keen eye on how events unfold there in the months ahead.

Defense & Security
Soldier UAV operator launches army drone with bomb to drop into enemy fortifications and trenches. Concept using military robots in modern warfare.

Unmanned aerial vehicle: geopolitical influence, industrial potential and future perspectives

by World & New World Journal

Introduction An unmanned aerial vehicle (UAV) or unmanned aircraft system (UAS), commonly known as drone, is an aircraft without a human pilot, crew or passenger on board, but rather controlled remotely or autonomously. Drones can be seen as cutting-edge technologies with tremendous ramifications across various fields, including military, security, economics, and logistics – ranging from lightweight consumer drones to advanced autonomous combat platforms – that have transformed global security economics and technological developments. Their proliferation marks a shift in the conduct of warfare, industrial processes, and urban infrastructure design. In this context, this article aims to analyze these dynamics across three domains: geopolitical and security implications, economics and industrial processes, and future technological transformation. I. Geopolitical and Security Perspective: "Game Changers" The Dawn of the Unmanned Warfare Era The past decade — and especially during the conflicts in Ukraine, Gaza, and the Caucasus —has showcased an irreversible shift toward unmanned warfare. Low-cost drones have enabled nations and non-state actors to conduct reconnaissance, precision strikes, and electronic warfare at a fraction of traditional military costs. The democratization of drone warfare erodes conventional military hierarchies by giving smaller nations and even non-state groups asymmetric capabilities (Kania, 2020), (Vision of Humanity, 2024). Figure 1: Use of drones by type. A major consequence of this shift is the emergence of continuous aerial presence, which fundamentally alters operational rhythm and tempo. Previously, only major powers could afford persistent surveillance through manned aircraft or satellites. Today, even insurgent groups can deploy swarms of commercial drones to maintain near-constant observation of enemy movements. This constant presence of drones on the battlefield forces militaries to make decisions much faster and operate as if they are always being watched. As drone technology becomes cheaper and more widely available, it also becomes easier for states or groups to launch low-risk, hard-to-trace attacks without putting their own people in danger. This reduces the barrier to starting or escalating conflicts and makes the overall situation far more unpredictable. On the other hand, despite automation, drone warfare remains heavily dependent on human adaptation, moreover, in practice, drones’ use is constrained by weather, terrain, and limited night capability (Newton, 2025). Nonetheless, and as seen in the Ukraine War, the adaptation, development and improvement of the designs and systems have skyrocketed and shortened from months to weeks. A Paradigm Shift in Modern Warfare Traditional doctrines built around armored vehicles, manned aircraft, and centralized command structures are giving way to distributed, networked, and automated operations. Drones allow for constant ISR (intelligence, surveillance, reconnaissance), rapid kill chains, and battlefield transparency that reduces the effectiveness of concealment and mass maneuver (Biddle & Oelrich, 2016). Swarm technology further accelerates this shift by overwhelming air defenses through algorithmic coordination. On a broader strategic level, unmanned systems are transforming operational art, forcing militaries to rethink how they structure campaigns. Instead of relying on a small number of high-value manned platforms, modern forces must integrate thousands of expendable, semi-autonomous assets into a coherent command-and-control ecosystem. This shift elevates the importance of data fusion, algorithms, and electronic warfare, as success increasingly depends on which side can process information more effectively rather than which side has heavier armor or more firepower. Furthermore, the psychological effects of drone warfare — constant monitoring, unpredictable strikes, and the invisibility of operators — alter the morale and behavior of both soldiers and civilians. In this sense, unmanned warfare not only changes tactics but reshapes the human dimension of conflict. Evolution of Defense Strategies States now are prioritizing anti-drone systems (C-UAS), electronic warfare, and resilient supply chains. Defense strategies emphasize dispersion, decoys, deception, and multi-layered air defense, recognizing that the cost ratio favors attackers using cheap drones against expensive assets. Militaries increasingly incorporate AI-enabled targeting, autonomous perimeter defense, and drone-versus-drone combat (Mehta, 2022). The rapid evolution of offensive drone capabilities has forced governments to pursue a new generation of integrated counter-unmanned systems, blending kinetic interceptors, directed-energy weapons, radio-frequency jamming, and cyber tools. However, the challenge is not merely technological — it is organizational. Modern militaries must revise procurement cycles, adopt flexible doctrine, and restructure units to counter the fast-changing drone threat. For example, some nations are creating dedicated “drone defense battalions” or embedding electronic warfare teams at lower echelons of command. Once more the Ukraine War is a good example: Ukraine’s early-warning systems (so called, “drone walls”) use layered reconnaissance UAVs to identify threats and enhance battlefield visibility, unfortunately, these are highly vulnerable to electronic warfare and radar destruction. More examples include the fiber-optic FPV drones as countermeasure of jamming, or decoy drones to lure air defenses and absorb munitions. (Newton, 2025) The rise of drone warfare also places huge demand on secure communications and resilient digital infrastructure; adversaries increasingly target supply chains, software vulnerabilities, and satellite links that control unmanned systems. Thus, the evolution of defense strategies represents a multi-domain effort that spans hardware, software, organizational culture, and national-level industrial capacity. Major Countries' Competition in Drone Weapon Development The United States, China, Israel, Turkey, and Iran dominate the global drone arms race, while Russia and Ukraine deserve a special mention too. • USA: it focuses on high-tech autonomous systems, for example the MQ-25, Collaborative Combat Aircraft. In addition, according to the Federal Aviation Administration they have an estimated 822,039 drones registered as of July 2025. (FAA, 2025)• China: leads in export volume, offering cost-competitive platforms like the Wing Loong series (Fischer, 2020).• Turkey: gained strategic influence through the Bayraktar TB2, proven in multiple regional conflicts like the Nagorno-Karabakh in 2020 or its use for strategic communications for Ukraine during the ongoing conflict. (Péria-Peigné, 2023)• Israel: its research, development and production of innovative drone technology and exports roughly $500 million worth of UAV-related products per year, have positioned Israel as a world leader in the area. Israel is well known for its indigenous and competitive manufacturing UAVs like the Hermes 450, the Searcher Mk II and the Heron. (Sadot, s.f.)• Iran: their Shahed-136 drone is a low-cost drone that has gained attention internationally as it has shown affordability, precision, long-range, and cheapness during the Ukraine War – deployed by Russia. (Kesteloo, 2025)• Ukraine: has emerged as a leader in tactical warfare, including mass quantities of low-cost First-Person View (FPV) drones for frontline and deep-strike operations. But also, it has implemented “Spider’s Web” operations, which strike deep inside Russia, while using low-cost assets but with strategic and punctual strikes. Ukraine has also expanded into the maritime domain with unmanned surface vessels (USVs) using them with a kamikaze-style operation targeting ships and critical offshore infrastructure in the Black Sea. (Newton, 2025)• Russia: the war has institutionalized an UAV doctrine with mass deployment of FPV drones (Newton, 2025) and the creation – similar to Ukraine – of an Unmanned System Force (USF) aiming to encompass aerial, land and surface drones. (Altman, 2025) II. Economic & Industrial Perspective: “Flying Industrial Revolution” Future Logistics and Delivery Systems Beyond the battlefield, drones are reshaping global economies and enabling new industrial ecosystems. For instance, drones are rapidly transforming last-mile delivery by reducing transportation time, bypassing road congestion, and enabling access to remote or disaster-affected areas. Companies like Amazon, Wing, and Zipline have already demonstrated how unmanned aircraft can deliver medical supplies, parcels, and consumer goods more efficiently than traditional vehicles. As autonomous navigation, battery technology, and payload capacity continue to improve, drones are expected to become critical components of global supply chains, especially in regions where infrastructure is limited or demand for ultra-fast delivery is increasing. Global drone delivery is expected to reach multi-billion-dollar scale by 2030 (PwC, 2023). In the longer term, logistics networks are expected to evolve into hybrid ground–air systems, where drones work alongside autonomous ground vehicles and smart warehouses. These systems could drastically reduce operational costs by automating pickup, sorting, and delivery processes. Integrating drones with AI-driven inventory management and predictive delivery algorithms will allow companies to anticipate demand and route products dynamically. As eVTOL cargo aircraft mature, the concept of “airborne logistics hubs” may also emerge, enabling rapid long-distance transport between distribution centers without the need for airports. Together, these developments point toward a future where aerial logistics are not just an add-on, but a central pillar of modern supply chains. Improving Industrial Efficiency Across agriculture, energy, construction, and mining drones significantly improve efficiency by automating tasks that previously required expensive equipment or manual labor. By replacing manned inspection systems, drones can reduce labor costs, increase safety, and provide data of unprecedented detail (McKinsey, 2022). For example, farmers use drones for precision spraying and crop monitoring, reducing fertilizer and water usage. Energy companies deploy unmanned systems for pipeline inspections and powerline surveys, minimizing downtime and enhancing worker safety. Construction and mining firms rely on drones for site mapping, progress tracking, and 3D modeling, improving project accuracy while lowering operational costs. Beyond task automation, drones are becoming essential to data-driven industrial optimization. Equipped with thermal sensors, LiDAR, and multispectral cameras, unmanned systems can capture high-resolution data that feeds directly into AI analytics platforms. This allows companies to detect inefficiencies, predict equipment failure, and optimize resource allocation in real time. As industries move toward digital twins — virtual models of physical assets — drones will play a key role in continuously updating these systems with accurate spatial and environmental data. The result is a more responsive, efficient, and resilient industrial ecosystem that leverages aerial automation for competitive advantage. Regulatory Environment and Market Growth Regulation remains the single most influential factor shaping the global drone market. Governments are gradually introducing frameworks to enable Beyond Visual Line of Sight (BVLOS) operations, Remote ID tracking, and certification standards for commercial drones. Regions like the European Union have adopted unified risk-based rules through EASA, while the United States continues to refine its Part 107 and UTM integration policies through the FAA. These regulatory milestones are essential for scaling commercial drone usage, as they provide clarity to manufacturers, operators, and investors. As regulatory frameworks mature, they are also becoming a competitive advantage for regions that adopt them early. Countries that implement drone-friendly ecosystems — such as Singapore, the UAE, and Rwanda — are rapidly emerging as hubs for drone research, testing, and deployment. This regulatory momentum encourages multinational companies to establish operations in these markets, accelerating local innovation and talent development. Furthermore, harmonized international standards will make it easier for drone manufacturers to reduce production complexity and expand globally. Ultimately, the pace of market growth will depend not just on technological advancement but on how effectively governments balance innovation with safety, privacy, and public acceptance. Investment Trends Investment in drone-related technologies has surged, driven by the convergence of autonomy, artificial intelligence, and advanced manufacturing. Venture capital firms increasingly fund companies developing autonomous navigation systems, UTM software, battery technology, and specialized industrial drones. Defense investors continue to expand their portfolios into dual-use drone companies, reflecting growing geopolitical interest and national security incentives. Meanwhile, major tech firms and automotive companies are exploring opportunities in cargo drones, eVTOL aircraft, and autonomous mobility ecosystems. Beyond private investment, government funding and public–private partnerships are accelerating drone adoption globally. Many nations are launching test corridors, innovation hubs, and subsidies to attract drone startups and support local manufacturing. This trend is particularly strong in Asia and the Middle East, where governments see drones as strategic tools for digital transformation and economic diversification. As markets mature, investment is shifting from hardware-heavy startups toward software, analytics, and integrated airspace management solutions — reflecting a broader transition from drone manufacturing to drone ecosystems. This shift signals a long-term, sustainable evolution of the drone industry from early experimental phases to full-scale commercial and civil integration. III. Future Technologies The Need for Unmanned Traffic Management (UTM) As drones and future eVTOL air taxis multiply, low-altitude airspace will become increasingly crowded. To prevent collisions and maintain order, UTM frameworks — already being developed by NASA, the FAA, EASA, and ICAO — aim to coordinate autonomous flights using real-time tracking, automated route planning, and digital air corridors (Kopardekar, 2016). These systems will act as the “air-traffic control of the future,” but designed for far larger numbers of smaller, faster-moving vehicles. In addition, as demand grows, it is likely that UTM will evolve into a fully automated, AI-driven airspace ecosystem capable of managing thousands of simultaneous flights with minimal human oversight. Future systems could incorporate weather prediction, dynamic rerouting, and AI-powered detect-and-avoid features, which more than a technical upgrade, would transform the air mobility in the cities worldwide. Global Standardization Competition The need for standard UTM, drone certifications, communication systems, and detect-and-avoid technology is critical, but it also represents a geopolitical contest. The U.S., the European Union, and China are each developing distinct technological ecosystems, hoping their standards will dominate global markets. Whichever region’s standards become the international norm will shape supply chains, aircraft design, and regulatory practices for decades. This competition mirrors earlier battles over telecommunications and 5G. Nations that establish widely adopted drone standards will gain strategic advantages, including influence over global manufacturing, software ecosystems, and aviation governance. As a result, UTM and drone certification are no longer just technical debates — they have become instruments of national power, economic leverage and somehow geopolitical importance. Urban Safety and Privacy Issues In addition, another major concern for cities is the widespread adoption of drones itself, which translates into surveillance risks, noise pollution from frequent flights, and vulnerability to cyberattacks that could compromise flight controls. Therefore, urban areas need strict rules governing data collection, flight paths, and liability in case of accidents to maintain public trust and safety. In the future, cities will also require integrated emergency response protocols, stronger cybersecurity defenses, and digital identity systems for all unmanned aircraft. Public engagement and transparent oversight will play a major role in ensuring that drones enhance urban life without creating new forms of intrusion or risk. Managing these challenges will be essential for the successful adoption of unmanned urban mobility. Integration with Future Urban Infrastructure In line with the previous section, smart cities could incorporate drones into their core infrastructure. For example, vertiports, rooftop landing pads, sensor-equipped air corridors, and digital twins could enable efficient navigation and real-time monitoring. In addition, drones will become essential for urban mobility and public services – from medical or any goods deliveries to emergency response like fire unit responses. As cities evolve, this integration will create a hybrid transportation ecosystem, where ground vehicles, aerial drones, and automated control systems would operate in sync. Urban planning will increasingly consider airspace as a valuable layer of infrastructure, much like roads or power grids. Therefore, collaboration between governments, industry, and technology providers to design cities capable of supporting high-density autonomous air mobility is required. Conclusion Unmanned systems are redefining the global balance of power, transforming industrial processes, and reshaping urban futures. The convergence of autonomy, AI, and networked airspace introduces both unprecedented opportunity and profound risk. Geopolitically, drones dilute traditional military dominance; economically, they catalyze a new airborne industrial revolution; technologically, they push societies toward complex management of shared automated airspace. Future policy, regulation, and innovation will determine whether unmanned systems become drivers of prosperity or vectors of instability. References Altman, H. (2025, November 13). Russia Creates New Military Branch Dedicated to Drone Warfare. The War Zone (TWZ). https://www.twz.com/news-features/russia-creates-new-military-branch-dedicated-to-drone-warfare Amazon. (2023). Prime Air: The Future of Drone Delivery. Amazon Corporate Publications. Biddle, S., & Oelrich, I. (2016). Future Warfare in the Age of Drones. Council on Foreign Relations. Deloitte. (2022). Drones in Industrial Operations: Transforming Asset Inspection and Performance. Deloitte Insights. FAA (Federal Aviation Administration). (2023). Integration of Unmanned Aircraft Systems into the National Airspace System. U.S. Department of Transportation. FAA (Federal Aviation Administration). (2025). Drones. https://www.faa.gov/uas Fischer, S. (2020). China’s Military–Civil Fusion Strategy: A View from Washington. U.S.–China Economic and Security Review Commission. Kania, E. B. (2020). Learning Warfare from the Laboratory: China’s Progress in Military Innovation. Center for a New American Security (CNAS). Kesteloo, H. (2025, September 29). Global Military Drone Race Intensifies as Nations Rush to Copy Iran’s Shahed Design. Medium. https://medium.com/@hayekesteloo/global-military-drone-race-intensifies-as-nations-rush-to-copy-irans-shahed-design-404badf482fb Kopardekar, P. (2016). Unmanned Aircraft System (UAS) Traffic Management (UTM) Concept of Operations. NASA Ames Research Center. McKinsey & Company. (2022). The Commercial Drone Market Outlook: Insights on Market Growth, Industrial Adoption, and Regulation. McKinsey Robotics & Automation Practice. Mehta, A. (2022). Counter-Drone Systems and the Future of Air Defense. Defense News. Newton, M. (2025, November 3). How Are Drones Changing War? The Future of the Battlefield. Center for European Policy Analysis (CEPA). https://cepa.org/article/how-are-drones-changing-war-the-future-of-the-battlefield/ Péria-Peigné, L. (2023, April 17). TB2 Bayraktar: Big Strategy for a Little Drone. IFRI. https://www.ifri.org/en/memos/tb2-bayraktar-big-strategy-little-drone PwC. (2023). Clarity from Above: Global Drone Market Analysis. PwC Global. Roland Berger. (2022). Urban Air Mobility: The Rise of the Drone Economy. Roland Berger Strategy Consultants. Rwanda Civil Aviation Authority. (2021). Regulatory Framework for Drone Delivery and BVLOS Operations. Government of Rwanda. Sadot, U. (n.d.). Proliferated Drones: A Perspective on Israel. Center for a New American Security (CNAS). https://drones.cnas.org/reports/a-perspective-on-israel/ Schmidt, E., Work, R., & Clyburn, M. (2021). Final Report: National Security Commission on Artificial Intelligence. U.S. Government Printing Office. Singer, P. W. (2009). Wired for War: The Robotics Revolution and Conflict in the 21st Century. Penguin Books. Statista. (2023). Global Drone Market Value and Investment Trends. Statista Market Outlook. Vision of Humanity. (2024, June 13). How Drones Have Shaped the Nature of Conflict. https://www.visionofhumanity.org/how-drones-have-shaped-the-nature-of-conflict/ Wing (Alphabet). (2023). Autonomous Delivery Networks and Future Logistics. Wing Technical Publications. Zipline. (2022). Operational Impact of Automated Medical Delivery by Drone. Zipline International Case Studies.

Defense & Security
AI US China Technology War as Chinese and American Technology competition for technological dominance and artificial intelligence trade war or national security risk as a 3D illustration.

The high-Tech Cold War: US-China Rivalry and the Battle for Global Innovation

by Eraj Farooqui

Since the 1970s, the US-China relationship has been defined by a combination of cooperative and competitive objectives. Competitive interests, however, have prevailed, resulting in a rising competition between the two countries. (Pillsbury, 2015) Candidates in the 2016 presidential election treated China as an adversary, with Donald Trump's China-bashing becoming a trademark of his campaign. Rivalry with China has become the organising premise of American foreign policy under Trump's administration. Republicans and Democrats differ on most issues, but they agree on the need to change America's approach towards China. This has sparked speculation about whether the US-China relationship has devolved into a possibly violent clash or a new Cold War. The Trump administration has openly announced a shift in US policy towards China, with Matt Pottinger claiming that the US has modified its China policy to emphasise competition. Former Vice President of Trump Pence stated that the United States will combat China aggressively on all fronts, including economic, military, diplomatic, political, and ideological. This statement is regarded as "the declaration of a new Cold War." (Pence’s, 2018) Former Trump advisor Stephen K. Bannon has declared economic war on China, blaming its exports on the American working and middle classes. Many people agree that China is economically dominating America, and the US government and industry have done little to solve the situation. Globalists such as Madeline Albright, Tom Friedman, and Fareed Zakaria have grown increasingly concerned about China's lack of reciprocity in economic dealings with the United States. David Lampton, a pro-engagement advocate, has criticised China's WTO membership for increasing bilateral trade surpluses. (Staff R. , 2017) The second stage began when Donald Trump determined to halt Chinese commercial and technological advancements, renouncing liberal internationalism in favor of a new grand strategy against China. (Drezner D. R., 2021) The growing view of Xi Jinping as a harsh leader with an aggressive foreign policy contributes to the sense of an ideological clash. China and the United States have initiated an unconstrained war for bilateral, regional, and global dominance, ushering in a new age of strategic conflict that has yet to be fully defined. (Rudd, 2020) The US-China conflict appears to be a Cold War, and any return to a pre-2017 environment of "strategic engagement" with Beijing is no longer politically viable. (Rudd, 2020)However, (Zakaria, 2019) does not feel that the liberal international order has deteriorated as much as is widely assumed, and China is far from a grave threat to the liberal international system. Despite the best intentions of both countries, the US-China relationship is more likely to devolve into economic and military competition. (Lake, 2018) China's strategy aims to modernize its industrial capacity and secure its position as a global powerhouse in high-tech industries. The strategy aims to reduce reliance on foreign technology imports, increase Chinese-domestic content of core materials, and upgrade its dominant position in major strategic industries, such as pharmaceutical, automotive, aerospace, semiconductors, and most importantly, IT and robotics. The 14th Five-Year Plan of China (2021-2025) emphasizes high-quality growth driven by green and high-tech industries, service sectors, and domestic consumption. The US judged China's old growth model as generating a somewhat balanced win-win relationship between the two economies, based on "comparative advantage" and "cost-benefit" evaluations. However, Beijing's new growth model, particularly the "Made in China 2025" aspiration, is perceived as competition with the US service and knowledge economy, resulting in trade and high-tech warfare between the two countries since 2018. (Bernal-Meza L. X., China-US rivalry: a new Cold War or capitalism’s intra-core competition?, 2021) The US business community, once a staunch supporter of engagement, has complained that China has hacked American industrial secrets, created barriers to American firms investing in China, enforced regulations that discriminate against foreigners, maintained high tariffs that should have been reduced decades ago, and blocked American Internet businesses. In a rare joint statement by the allies, the intelligence chiefs of the Five Eyes countries convened on Tuesday to charge China with stealing intellectual property and using artificial intelligence to hack and spy on the countries. (Bing, 2023) The officials from the United States,Britain,Canada,Australia and Huawei,for example,has tight relations with the Party and has been accused of stealing intellectual property as well as spying on Western countries. The United States is concerned about Huwaie's 5G supremacy, which is why it’s CEO, Meng Wan Zhou, was arrested in Canada. Indeed, its importance was highlighted when the United States imposed restrictions restricting, and in some cases prohibiting, Chinese telecoms operations in the American market, and launched a global effort to persuade friends, partners, and others to follow suit. Thus, while President Trump allowed one company (ZTE) a respite from what appeared to be a ban that would put it out of business, later American limitations on Huawei threatened to destroy China's premier international technology company's global viability. (Goldstein, 2020) When it comes to both green technology and chips, it is now at the center of American politics. The CHIPS Act, approved by Congress last year, included $52 billion in grants, tax credits, and other subsidies to stimulate American chip production. That's the kind of industrial policy that would make Hamilton gape and clap. Over the next few years and decades, China will pour vast sums of money into its own industrial strategy programmes, spanning a wide spectrum of cutting-edge technology. According to one Centre for Strategic and International Studies researcher, China already spends more than 12 times as much of its GDP on industrial programmes as the United States. (BROOKS, 2023) Certain social media sites, such as Facebook and Google, are prohibited in China.In the United States, there is a restriction on TIKTOK and WECHAT. To counter China, the United States has implemented a number of statutes, including the: 1.COMPETES Act 2020.: The House Science, Space, and Technology Committee decided to advance the America Competes Act of 2022, which intends to improve America's scientific and technology efforts in the twenty-first century in order to compete with China in vital fields. The bipartisan Act is divided into eleven sections, with Division K headed "Matters Related to Trade." Trade Adjustment Assistance, Import Security and Fairness Act, National Critical Capabilities Review, Modification and Extension of Generalized System of Preferences, Reauthorization of the American Manufacturing Competitiveness Act of 2016 and Other Matters, and Temporary Duty Suspensions and Reductions are the seven sections of the Act. President Joe Biden has indicated his support for the Act, arguing that it will strengthen America's supply chains and reenergize the economy's innovation engine, allowing it to compete with China and the rest of the globe for decades to come. 2.Chips and Science Act 2022: President Joe Biden signed the Chips and Science (or CHIPS) Act into law, promising local semiconductor producers more than $50 billion to expand home output and "counter China." (Cosgrove, 2023) 3.The United States passed the Inflation Reduction Act 2022: Although China now dominates clean technology manufacturing, the Inflation Reduction Act contains provisions geared primarily at strengthening the United States' clean energy supply chain. Furthermore, the global transition to clean technology such as solar panels and electric vehicles is unavoidable and ongoing as they become more affordable than fossil-fueled alternatives and countries take action to achieve their Paris climate obligations. (NUCCITELLI, 2023) CHIP War After failing to achieve an agreement with Chinese regulators, Intel cancelled a $5.4 billion takeover deal with Israel-based Tower Semiconductor. China is one of Intel's most important markets, and on July 3, Beijing announced a license requirement for exporters of gallium and germanium, rare-earth metals used in semiconductor manufacturing. The chip war is mostly motivated by the United States' concerns about China's military exploitation of semiconductor technology. However, China's military sector has a key weakness: most of its cutting-edge applications rely on foreign technological inputs, particularly microprocessor exports. China will be the world's largest buyer of semiconductor manufacturing equipment in 2021, accounting for 26% of worldwide demand. Biden established an export license requirement in October 2022, limiting China's access to semiconductor innovations manufactured by US corporations. In July 2023, Japan officially prohibited the sale of 23 types of semiconductor equipment to China, which is significantly more widespread than the US restriction, impeding China's development of advanced chips and basic chips used in technology such as automobiles and smartphones. The Netherlands Standing Committee on Foreign Trade and Development Cooperation said in September that it will begin limiting its semiconductor technology exports to China. According to Nikkie Asia, this new legislation would prohibit the Dutch ASML from exporting innovative chip manufacturing methods without first getting government-approved licenses. (CHENG TING-FANG, 2023) These export limitations have pushed Beijing to retaliate, with China's most recent regulation on gallium and germanium shipments serving as a direct retaliation to the US' global allies. According to the New York Times Magazine, Taiwan manufactures more than 90% of the world's most advanced microchips and could risk armed confrontation if China goes on the offensive in the future. (Palmer, 2023) Former national security advisor Robert O'Brien, on the other hand, believes that in the case of an impending invasion,the US would destroy Taiwan's semiconductor manufacturers rather than allow them to fall into the hands of China. The chip battle has further pushed Taiwan into an awkward position in the changing geopolitical landscape. (Carr, 2023) The Biden administration intends to restrict shipments of advanced artificial intelligence chips designed by Nvidia to China as part of a broader set of actions aimed at preventing Beijing from gaining advanced US technologies to enhance its military. The action is intended to address regulatory gaps and limit China's access to advanced semiconductors, which might feed AI advances and sophisticated computers crucial to Chinese military purposes. Gina Raimondo, Secretary of Commerce, emphasised that the administration's goal is not to harm Beijing economically. (Alexandra Alper, 2023) In the words of Lampton, "There was a widespread public perception that the Sino-American economic playing field had been unfair to Americans, with the assertion that the American economy was hollowed out, in part due to overt and covert technology transfer to China" (Lampton, 2015) . China's new growth strategy is leading to more rivalry than complementarity in the China-US economic partnership. The fact that "China's achievement in moving up in the global supply and value chains has led to Beijing's larger share of global surplus and the reduction of the profit margin for traditional core states" has disturbed the United States. (Li X. , 2020) As Lenin would have argued, the dynamics of the US-China rivalry are an inter-imperial rivalry driven by inter-capitalist struggle. Competition for the global market could quickly escalate into escalating confrontations of zones of influence, if not war. Conclusion The US-China rivalry is characterised by a complex interplay of economic, technological, and ideological issues. Although the relationship resembles a new Cold War, some argue that it is best understood as a capitalist intra-core competition driven by inter-imperial rivalry. As Lenin foresaw, competition for global markets may escalate into conflicts over areas of control. The contest is likely to last and have an impact on the global order for many years to come since both nations have made large investments in industrial strategy and technology. Advanced semi-conductors and AI chips are necessary for the next race for technological supremacy. 6G telecom and quantum computing. The globe was forced to protect the supply chain for rare earth materials due to this high-tech rivalry. Since they are currently the epicentre of the world's military and economic might. For many years to come, its influence will shape international politics, trade disputes, and technological advancements. Global struggle for these minerals is anticipated in the twenty-first century, much like the wars for oil and gas in the twentieth. Rare earths will be the focus of the twenty-first century. Mineral-rich nations like Brazil, India, Australia, and Vitenam will also become strategically significant for other reasons. As competition for these resources intensifies, international relations will shift and geopolitical alignment will result. 5Gs is no longer the focus of this new technical cold war. It now comes down to controlling the basic materials that enable technology. For this reason, JD Vance adds, "Give us your financial resources, and we'll take care of you." In the trade and technology conflict that has intensified since the Biden Administration increased the restrictions on sales of cutting-edge American technology to China, the Pentagon has designated rare earth as a strategic mineral that is essential for US defence.In response to US technology sanctions, China restricted the export of rare earth materials.It has nothing to do with economics, but rather with military supremacy on a worldwide scale. This is how the US sees the discovery of these rare earth minerals. Donald Trump is threatening Canada, Greenland, and Ukraine for this reason. Due to their large stockpiles of rare earth materials, they are able to protect the global supply chain in this way.Interestingly, however, China produces 63% of rare earth minerals and refines 83% of them. It can store 44 million metric tonnes of reserves in this manner. The US would still have 4-5 million tonnes of metric reserves if it were to seize the deposits of Greenland, Canada, and Ukraine.Thus, they are negligible compared to 44 million metric tonnes in China. If China wisely controls its rare earth export strategy, it will be powerful enough to remind the world of its might without being overly harsh. Then it can demonstrate that Beijing is just as adept at using resources as Washington is at using dollars or sanctions. However, if the world manages to get past it or if China's grip wanes, its greatest advantage may begin to diminish. The next few months are critical because tanks and missiles are not being used in the largest power fight this time. Minerals and magnets will be used to combat it. Bibliography Alexandra Alper, K. F. (2023, October 18). Biden cuts China off from more Nvidia chips, expands curbs to other countries. Retrieved from Reuters: https://www.reuters.com/technology/biden-cut-china-off-more-nvidia-chips-expand-curbs-more-countries-2023-10-17/Bernal-Meza, L. X. (2021, May 1). China-US rivalry: a new Cold War or capitalism’s intra-core competition? Revista Brasileira de Política Internacional, vol. 64, no. 1. Retrieved from https://www.redalyc.org/journal/358/35866229009/html/#B39Bing, Z. S. (2023, May 23). Chinese hackers spying on US critical infrastructure, Western intelligence says. Retrieved from Reuters: https://www.reuters.com/technology/microsoft-says-china-backed-hacker-targeted-critical-us-infrastructure-2023-05-24/BROOKS, D. (2023, March 23). The Cold War With China Is Changing Everything. Retrieved from The NewYork Times: https://www.nytimes.com/2023/03/23/opinion/cold-war-china-chips.htmlCarr, E. (2023, August 22). The 2023 US–China Chip War: The Nexus Of High Tech And Geopolitics. Retrieved from Forbes: https://www.forbes.com/sites/earlcarr/2023/08/22/uschina-chip-war-the-nexus-of-high-tech-and-international-relations/?sh=618bc5ed1bd3CHENG TING-FANG, L. L.-B. (2023, June 30). Netherlands unveils chip tool export curbs in fresh blow to China. Retrieved from Nikkei Asia: https://asia.nikkei.com/Business/Tech/Semiconductors/Netherlands-unveils-chip-tool-export-curbs-in-fresh-blow-to-ChinaCosgrove, L. (2023, May 5). Lawmakers Tout Effect of CHIPs Act in US Competition with China. Retrieved from THE EPOCH TIMES: https://www.theepochtimes.com/us/lawmakers-tout-effect-of-chips-act-in-us-competition-with-china-5243151Drezner, D. R. (2021, May/June 13). The end of grand strategy. Retrieved from Foreign Affairs,: https://www.foreignaffairs.com/articles/world/2020-04-13/end-grand-strategyGoldstein, A. (2020). US–China Rivalry in the twenty-first century: Déjà vu and Cold War II. China International Strategy Review volume 2,, 48-62.Kautsky, K. (1914, September 11). Ultra-imperialism. Der Imperialismus," Die Neue Zeit, 32 (1914), Vol. 2, 908-922. Retrieved from https://www.marxists.org/archive/kautsky/1914/09/ultra-imp.htmLake, D. A. (2018). Economic openness and great power competition: lessons for China and the United States. The Chinese Journal of International Politics 11, no. 3, 237-70.Lake, D. A. (2018). Economic openness and great power competition: lessons for China and the United States. The Chinese Journal of International Politics 11, no. 3, 237-270.Lampton, D. (2015, June 2). David Lampton on “A Tipping Point in U.S.-China Relations”. Retrieved from COUNCIL PACIFIC AFFAIRS: https://www.councilpacificaffairs.org/news-media/security-defense/dr-david-lampton-on-a-tipping-point-in-u-s-china-relations/Li, X. (2020). The rise of China and its impact on world economic stratification and re-stratification. Cambridge Review of International Affairs 34, no. 4 , 530-50.NUCCITELLI, D. (2023, September 20). The Inflation Reduction Act is reducing U.S. reliance on China. Retrieved from The YALE Climate Connection: https://yaleclimateconnections.org/2023/09/the-inflation-reduction-act-is-reducing-u-s-reliance-on-china/Palmer, A. W. (2023, August 11). An Act of War’: Inside America’s Silicon Blockade Against China. Retrieved from The NewYork Times Magazine : https://www.nytimes.com/2023/07/12/magazine/semiconductor-chips-us-china.htmlPence’s, P. J. (2018, October 5). China Speech Seen as Portent of ‘New Cold War’. Retrieved from New York Times. : https://www.nytimes.com/2018/10/05/world/asia/pence-china-speech-cold-war.htmlPillsbury, M. (2015). The Hundred-Year Marathon: China's Secret Strategy to Replace America as the Global Superpower . Henry Holt and Co.Rudd, K. (2020, May 6). The coming post-COVID anarchy. Retrieved from Foreign Affairs: https://www.foreignaffairs.com/articles/united-states/2020-05-06/coming-post-covid-anarchyStaff, R. (2017, August 17). Trump adviser Bannon says U.S. in economic war with China: media. Retrieved from Reuters: https://www.reuters.com/article/us-usa-china-bannon-idUSKCN1AX0DEZakaria, F. (2019, December 6). The new China Scare: why America shouldn’t panic about its latest challenger. Retrieved from Foreign Affairs: https://www.foreignaffairs.com/articles/china/2019-12-06/new-china-scare 

Defense & Security
Missiles in front EU flag. Air defense systems European Union. Cruise missiles in Europe. Concept weapons development in Europe. Stockpiles strategic missiles. Concrete wall in foreground. 3d image

Nuclear Sharing Between the U.S. and the EU. Benefits and Challenges.

by Krzysztof Śliwiński

Abstract This paper examines the NATO nuclear sharing arrangement, focusing on its benefits and challenges within the U.S.-EU security framework. Nuclear sharing involves the U.S. deploying B61 nuclear bombs in select European NATO countries, with host nations providing delivery systems and infrastructure while the U.S. retains full control, ensuring compliance with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The arrangement strengthens NATO's deterrence posture, promotes alliance cohesion, and supports non-proliferation by dissuading the development of independent nuclear arsenals. Recent geopolitical tensions, especially Russia's invasion of Ukraine, have intensified calls for expanding sharing to countries like Poland, enhancing deterrence on NATO's eastern flank. Exercises such as Steadfast Noon validate operational readiness and signal resolve. Critics, however, highlight legal and escalation risks, potential NPT violations, and domestic opposition in host countries. Despite these issues, nuclear sharing remains a crucial component of Euro-Atlantic security, adapting to evolving threats while balancing deterrence, alliance unity, and non-proliferation goals.  Key Words: International Security, Weapons of Mass Destruction, Nuclear Sharing, Alliances Introduction Nuclear sharing is a cornerstone of NATO's deterrence strategy, designed to distribute the benefits, responsibilities, and risks of nuclear deterrence across the Alliance. Under these arrangements, the United States deploys a limited number of B61 nuclear gravity bombs at bases in several European NATO member states. At the same time, those host countries provide the necessary infrastructure, security, and dual-capable aircraft (DCAs) to deliver weapons in a crisis. The weapons remain under full U.S. custody and control at all times, in compliance with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). A nuclear mission can only be authorised after explicit political approval from NATO's Nuclear Planning Group (NPG), which includes all NATO members, and the U.S. President (and potentially the UK Prime Minister). This setup ensures collective decision-making and underscores the U.S.'s extended deterrence commitments to its allies, helping prevent nuclear proliferation by giving non-nuclear states a stake in the Alliance's nuclear posture without independent arsenals.[1] The arrangements originated in the Cold War era, with the first U.S. atomic weapons arriving in Europe in 1954. By the 1960s, they were formalised through the NPG to allow non-nuclear allies input on nuclear policy. Today, approximately 100 B61 bombs are forward-deployed in Europe, hosted by five NATO countries: Belgium, Germany, Italy, the Netherlands, and Turkey. Seven NATO allies contribute DCA, including F-16s and F-35s, which serve dual roles in conventional operations and as potential nuclear delivery platforms. France and the UK maintain independent nuclear forces that complement the US-led sharing but operate outside the formal NATO structure. While the question references the EU, nuclear sharing is strictly a NATO framework; all host countries are EU members except Turkey, creating significant overlap but no direct EU-level involvement.[2] These arrangements serve multiple purposes: they enhance Alliance cohesion, provide tools for managing escalations in conflicts, and signal resolve to adversaries, such as Russia. Recent geopolitical tensions, including Russia's invasion of Ukraine, have prompted discussions about expanding sharing to strengthen deterrence on NATO's eastern flank.[3] Poland, a NATO member since 1999, has long advocated for a stronger role in the Alliance's nuclear mission amid heightened Russian threats, particularly following the 2022 invasion of Ukraine. In June 2023, Polish Prime Minister Mateusz Morawiecki first publicly expressed interest in hosting U.S. nuclear weapons under NATO's sharing policy, arguing it would bolster deterrence without violating the NPT. This push intensified in early 2025, driven by concerns over U.S. reliability under the second Trump administration and Russia's aggressive posture.[4]   On March 13, 2025, President Andrzej Duda explicitly urged the U.S. to deploy nuclear warheads on Polish territory, stating in interviews that NATO infrastructure—including nuclear assets — should "shift east" to match the eastward expansion of the Alliance's borders since 1999. He emphasised that such a move would enhance security guarantees and deter future Russian aggression, while also praising France's potential extension of its "atomic umbrella" as a complementary option. Duda's proposal carried domestic political weight, positioning Poland's conservative opposition as pro-U.S. ahead of the May 2025 presidential election, where candidates debated transatlantic ties versus European autonomy.[5] Proponents argue Poland is an ideal candidate: it spends 4.7% of GDP on defence (exceeding NATO's 2% target), has built one of Europe's strongest militaries, and hosts significant U.S. rotational forces. Analysts suggest that deployment could involve adapting Polish F-35s for DCA roles or constructing secure storage facilities. However, logistical and political hurdles remain, including a potential Russian backlash and the need for NPG consensus.[6] As of October 2025, however, no U.S. nuclear weapons have been deployed to Poland, and the proposal remains under discussion without a formal U.S. commitment. Instead, Poland has deepened integration through participation in NATO's annual Steadfast Noon nuclear exercise, which began on October 13, 2025, across Belgium, the Netherlands, and the North Sea — testing procedures for credibility and safety. Poland joined as a full participant alongside Finland, Germany, and the U.S., signalling growing involvement in nuclear planning but stopping short of hosting assets. Alternatives like a dedicated U.S. "nuclear umbrella" declaration for Poland have been floated to avoid escalation without physical deployment.[7] What academics say Academic experts agree that Nuclear sharing is a cornerstone of NATO's defence strategy. This arrangement refers to an agreement according to which the United States deploys non-strategic nuclear weapons on allied territory while maintaining ownership and peacetime custody.[8]This allows selected NATO members to participate in nuclear planning and provide delivery systems, creating a framework that extends American nuclear deterrence across the Alliance. The operational structure of nuclear sharing involves dual-key arrangements in which both U.S. and host-nation authorisation are required for weapon employment. The United States maintains absolute control and custody of its nuclear weapons forward-deployed in Europe, while Allies provide military support for the DCA mission with conventional forces and capabilities. Nuclear sharing arrangements play a vital role in the Alliance's interconnection and remain a key component of security guarantees and the indivisibility of security across the entire Euro-Atlantic area.[9] These arrangements are coordinated through NATO's Nuclear Planning Group, ensuring multilateral consultation on nuclear policy and targeting decisions. Currently, only five European NATO members have signed bilateral nuclear-sharing agreements with the U.S. These are: Belgium, Germany, Italy, the Netherlands, and Turkey, under which the U.S. stores B61 nuclear gravity bombs at their airbases and their dual-capable aircraft can deliver them in a NATO context. These arrangements, dating back to the Cold War and reaffirmed in subsequent treaties, involve approximately 100 U.S. warheads as of 2025.[10] Nuclear sharing serves multiple strategic purposes within the alliance framework. It strengthens extended deterrence by visibly integrating allied forces into NATO's nuclear posture, thereby reassuring front-line states of American commitment.[11] Experts claim that these arrangements helped prevent nuclear proliferation by reducing incentives for European allies to develop independent arsenals during the Cold War.[12] Additionally, nuclear sharing distributes the political and operational burdens of nuclear responsibility across participating members rather than concentrating them solely with the United States. However, nuclear sharing faces significant criticisms. Legal scholars argue that forward-deploying U.S. weapons on non-nuclear states potentially contravenes the Non-Proliferation Treaty's spirit, creating ongoing diplomatic tensions with Russia and other nations.[13] Domestic opposition within host countries and concerns about the escalation of crises further complicate these arrangements.[14] Despite these challenges, nuclear sharing remains integral to NATO's deterrence strategy, particularly as renewed great-power competition has reinforced alliance solidarity and commitment to collective defence in the contemporary security environment. Benefits of Nuclear Sharing Firstly, official sources from NATO and the U.S. government consistently highlight the benefits of their efforts in preserving peace, deterring aggression, fostering unity, and aligning with global non-proliferation norms. The primary official argument for nuclear sharing is its role in bolstering NATO's deterrence posture against evolving threats, particularly from nuclear-armed adversaries like Russia. NATO's 2022 Strategic Concept and related documents emphasise that the Alliance's nuclear capabilities, including U.S. forward-deployed weapons, serve to "preserve peace, prevent coercion and deter aggression". [15] The 2024 Washington Summit Declaration reaffirms this, stating that "nuclear deterrence is the cornerstone of Alliance security" and that NATO's capabilities provide the "supreme guarantee" for all members.[16] By integrating U.S. nuclear assets with European contributions, such as DCA from seven Allies, these arrangements complicate adversaries' planning and enhance crisis management. As noted in NATO's factsheet, "nuclear sharing provides military and political tools for deterrence and can be used to manage escalation in a crisis," with DCA serving as a "visible and valuable instrument for strategic communications" to signal resolve.[17] Accordingly, in a security environment marked by Russia's integration of nuclear forces into its military strategy and threats against Allies, nuclear sharing ensures credible deterrence without provoking conflict. NATO’s former Secretary General Jens Stoltenberg argued that "the purpose of NATO's nuclear weapons is not to provoke a conflict but to preserve peace, deter aggression and prevent coercion," underscoring that arrangements like those involving Germany are vital for the "security of the whole alliance".[18] The U.S. State Department echoes this rationale, claiming that with NATO "numerically outgunned on the central front," nuclear sharing maintains a "nuclear deterrent posture sufficient to deter the Soviet aggression," a logic that persists against modern threats.[19] Against this backdrop, exercises like Steadfast Noon[1] Further strengthen this by simulating nuclear scenarios, ensuring "the credibility, effectiveness, safety and security of the nuclear deterrent mission".[20] Overall, according to official sources, these mechanisms help preserve stability in the Euro-Atlantic area, reduce reliance on nuclear weapons, and adapt to challenges posed by actors such as China and North Korea. Secondly, nuclear sharing fosters unity and shared responsibility among NATO members, distributing the benefits, risks, and political burdens of deterrence more evenly among them. NATO's publications explicitly state that these arrangements "ensure that the benefits, responsibilities and risks of nuclear deterrence are shared across the Alliance," demonstrating "unity and cohesion amongst all Allies" through joint decision-making in the Nuclear Planning Group (NPG).[21] This shared approach, as NATO sources claim, reinforces the indivisibility of security, as outlined in NATO's nuclear policy: "Nuclear sharing arrangements play a vital role in the interconnection of the Alliance and remain one of the main components of security guarantees and the indivisibility of security of the whole Euro-Atlantic area".[22] The 2024 Summit Declaration commits to "modernising its nuclear capabilities" and "strengthening its nuclear planning capability," ensuring broader participation to "demonstrate Alliance unity and resolve".[23] By involving European Allies in Allied dual-capable aircraft (DCA) missions and infrastructure, nuclear sharing is intended to help mitigate disparities in capabilities, promote equitable burden-sharing, and prevent fragmentation within the Alliance. Thirdly, NATO posits that nuclear sharing supports non-proliferation efforts. Contrary to criticisms, official sources argue that nuclear sharing advances non-proliferation by reducing incentives for Allies to pursue independent nuclear programs. NATO's review of the NPT at 50 years notes that these arrangements "have contributed to security in Europe and non-proliferation as Allies under the U.S. nuclear umbrella have not felt pressure to develop their own weapons".[24] Codified during the 1960s negotiations, they comply fully with the Treaty, as both the U.S. and the USSR ensured that no prohibitions were placed on such setups.[25] The U.S. State Department details this compromise, which allowed for "wartime nuclear sharing" without requiring peacetime transfer, thereby reassuring allies like West Germany and dissuading proliferation.[26] Post-Cold War reductions — over 90% in NATO's nuclear stockpile — align with NPT Article VI disarmament goals while maintaining deterrence.[27] This balance facilitates peaceful nuclear cooperation under the IAEA (International Atomic Energy Agency) safeguards, thereby strengthening the global nuclear non-proliferation regime.[28] Finally, according to the U.S. State Department, nuclear sharing underscores the U.S. commitment to European security, countering fears of "decoupling" where allies doubt American resolve. The State Department describes it as addressing whether the U.S. would "sacrifice Chicago to save Hamburg," by making nuclear weapons available for Europe's defence.[29] NATO's policy affirms that U.S. strategic forces, supplemented by forward-deployed assets, provide the "supreme guarantee," with Allies contributing to ensure integration across domains.[30] To sum up, official arguments portray nuclear sharing as indispensable for deterrence, cohesion, non-proliferation, and transatlantic solidarity. These arrangements, according to Western policy-makers and experts, have sustained European stability for decades, with ongoing modernisation ensuring their relevance in an unpredictable world. Nuclear Sharing in the Face of an Ongoing War in Ukraine Nuclear sharing has allegedly bolstered NATO's overall deterrence posture, helping to prevent Russian escalation in Ukraine, including potential nuclear use. NATO's nuclear capabilities, including U.S. forward-deployed weapons in Europe, are described as essential to "preserve peace, prevent coercion and deter aggression" in the face of Russia's nuclear threats and integration of nuclear forces into its strategy.[31] This has indirectly supported Ukraine by signalling to Russia that any significant escalation — such as nuclear strikes or attacks on NATO territory — would invoke a collective response, thereby limiting Russia's options in the conflict. Russia's invasion has been accompanied by nuclear sabre-rattling to deter Western intervention, but nuclear sharing has helped counter this by maintaining credible deterrence without direct NATO involvement in Ukraine.[32] In that sense, the already mentioned exercises like Steadfast Noon simulate nuclear scenarios, reinforcing the "credibility, effectiveness, safety and security" of the deterrent, which has been crucial amid threats from Russia, China, and North Korea. Analysts note that this has made Russian nuclear signalling less credible over time, allowing the West to provide advanced weapons to Ukraine that were initially considered taboo.[33] However, Russia's threats have still delayed and limited the scale of Western aid, such as restrictions on long-range strikes into Russia, due to fears of crossing "red lines".[34] As mentioned before, nuclear sharing agreements have arguably fostered greater unity among NATO allies, enabling sustained military and economic support for Ukraine. By sharing the "benefits, responsibilities and risks of nuclear deterrence," nuclear sharing demonstrates Alliance solidarity and the "indivisibility of security" in the Euro-Atlantic area.[35] This has reassured European allies, particularly those near Russia, allowing them to commit resources to Ukraine without fearing abandonment. For example, Poland's push to join nuclear sharing reflects heightened threat perceptions from the war, aiming to strengthen deterrence and defence in a hostile environment. NATO's support, including intelligence sharing and strategic communications, has, at least in the eyes of Western policy-makers, deterred Russian use of chemical, biological, or nuclear weapons in Ukraine.[36] Without reassurance from nuclear sharing of U.S. commitment — countering fears of "decoupling" — it might have been harder for Europe to maintain this level of involvement.[37] From Russia's perspective, nuclear sharing exacerbates tensions, viewing it as part of NATO's eastward expansion that provoked the invasion.[38] Putin has used this to support claims behind "Russia's Special Military Operation" in Ukraine, framing Ukraine's potential NATO integration as a threat that could place U.S. nuclear weapons near Russia's borders, similar to the Cuban Missile Crisis in reverse. This rationale has fueled Russian nuclear threats, which aim to limit Western aid and prolong the conflict by raising escalation fears.[39] The war has heightened nuclear risks, with some analysts arguing it presents greater dangers than the Cuban Missile Crisis due to the potential for miscalculation.[40] Russia's deployment of tactical nuclear weapons in Belarus as a counter to NATO's sharing arrangements has further escalated postures.[41] Recent decisions by the U.S., UK, and France to allow Ukraine to use long-range missiles against Russian targets have prompted Putin to warn of a direct NATO-Russia war, indirectly tying into nuclear sharing's role in deterrence dynamics.[42] This has possibly complicated peace efforts, as Russia perceives Western escalation as existential, making negotiations harder. As mentioned earlier, nuclear sharing has arguably helped mitigate proliferation risks during the war. By providing a shared nuclear umbrella, it reduces the incentives for allies like Poland and Germany to pursue independent nuclear programs, thereby supporting the NPT.[43] Possibly then, the invasion has not sparked widespread proliferation, partly because NATO's deterrent reassures members. Interestingly, however, the debates over a "European nuclear deterrent" independent of the U.S. — spurred by uncertainties such as potential shifts in U.S. policy under Trump — could undermine this if not managed effectively.[44] The war has also renewed focus on modernising nuclear sharing, with NATO committing to enhancing capabilities at the 2024 Washington Summit.[45] This has indirectly affected Ukraine by diverting Russian resources and attention, though some argue it prolongs the stalemate without a decisive victory. In summary, nuclear sharing has possibly acted as a stabilising force for NATO, enabling robust support for Ukraine and deterring Russian nuclear escalation. However, it has also contributed to heightened tensions and Russian intransigence, complicating pathways to peace. As the war persists into 2025, proposals to expand sharing (e.g., to Poland) reflect its evolving role in countering ongoing threats. Conclusion The "Steadfast Noon" exercises are arguably a clear signal to any potential adversary, including Russia, that NATO is prepared to defend all its members against any threats, including nuclear ones. Such exercises involve the use of American non-strategic nuclear weapons stationed in Europe, although no real combat weapons are used during the drills. The exercises serve not only to practice deterrence against possible nuclear attacks but also to prepare for the potential use of nuclear weapons by NATO if necessary. The fact that these exercises involve nuclear deterrence indicates that NATO's defence strategy includes readiness to escalate to a nuclear response if provoked by a nuclear attack. The locations of these nuclear weapons are not publicly disclosed. Still, there is speculation about their presence in countries like Poland, particularly in light of recent secret agreements that allow foreign troops to enter Polish territory. On the other hand, one should also consider potential downsides, especially for countries in Central and Eastern Europe. Nuclear sharing for potential allied use in wartime poses significant risks despite its deterrence aims. One major downside is its incompatibility with the NPT, which violates Articles I and II.[2] Enabling the indirect transfer of control to non-nuclear states undermines global non-proliferation efforts and draws criticism from states such as China. This arrangement also heightens proliferation risks, as peacetime training and exercises normalise nuclear readiness, potentially inspiring similar setups in Asia-Pacific regions like Japan and South Korea, escalating regional tensions.[46] Security concerns include increased escalation dangers, where limited nuclear use could spiral into full-scale war, especially amid vulnerabilities at host bases like Incirlik in Türkiye during political instability. Expanding sharing, such as to Poland, fuels arms races with Russia and exposes more European sites to attacks, without adding credible deterrence given NATO's conventional superiority. Politically, it breeds divisiveness within NATO, fostering resentment among allies and diverting resources from conventional forces, while eroding U.S. control and complicating disarmament. Domestically, host nations face public backlash and moral burdens from anti-nuclear norms, straining alliance cohesion. Russia's objections in NPT forums further highlight how sharing provokes international backlash, risking broader conflicts. Notes [1] On Monday (October 13 2025), NATO began its annual nuclear deterrence exercise Steadfast Noon. The exercise is a long-planned, routine training activity and part of NATO’s broader efforts to maintain readiness and ensure transparency around its nuclear posture. It is not linked to any current world events, and no live weapons are used.[2] Article I - Each nuclear-weapon State Party to the Treaty undertakes not to transfer to any recipient whatsoever nuclear weapons or other nuclear explosive devices or control over such weapons or explosive devices directly, or indirectly; and not in any way to assist, encourage, or induce any non-nuclear-weapon State to manufacture or otherwise acquire nuclear weapons or other nuclear explosive devices, or control over such weapons or explosive devices. Article II - Each non-nuclear-weapon State Party to the Treaty undertakes not to receive the transfer from any transferor whatsoever of nuclear weapons or other nuclear explosive devices or of control over such weapons or explosive devices directly, or indirectly; not to manufacture or otherwise acquire nuclear weapons or other nuclear explosive devices; and not to seek or receive any assistance in the manufacture of nuclear weapons or other nuclear explosive devices. See more at: https://www.un.org/en/conf/npt/2005/npttreaty.html References [1] NATO’s Nuclear Sharing Arrangements. (2022, February). NATO. https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[2] Kristensen, H. M., Korda, M., Johns, E., & Knight-Boyle, M. (2023, November 8). Nuclear weapons sharing, 2023. Bulletin of the Atomic Scientists. https://thebulletin.org/premium/2023-11/nuclear-weapons-sharing-2023/[3] Johns, E. (2025, October 10). Incomplete Upgrades at RAF Lakenheath Raise Questions About Suspected US Nuclear Deployment. Federation of American Scientists. https://fas.org/publication/incomplete-upgrades-lakenheath-questions-nuclear/[4] Johns, E. (n.d.). Poland’s bid to participate in NATO nuclear sharing. IISS. Retrieved October 14, 2025, from https://fas.org/publication/incomplete-upgrades-lakenheath-questions-nuclear/[5] Poland’s president urges U.S. to move nuclear warheads to Polish territory, FT reports. (2025, March 13). Reuters. https://www.reuters.com/world/polands-president-urges-us-move-nuclear-warheads-polish-territory-ft-reports-2025-03-13/[6] Poland’s president vows to spend 4.7% of GDP on defence this year. (2025, February 5). Euronews. https://www.euronews.com/my-europe/2025/02/05/polands-president-vows-to-spend-47-of-gdp-on-defence-this-year[7] NATO’s annual nuclear exercise Steadfast Noon begins. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/news_238367.htm[8] von Hlatky, S., & Lambert-Deslandes, É. (2024). The Ukraine war and nuclear sharing in NATO. International Affairs, 100(2), 467-485. https://academic.oup.com/ia/article-abstract/100/2/509/7617216?redirectedFrom=fulltext[9] NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/fr/natohq/topics_50068.htm?selectedLocale=en#:~:text=Nuclear%20consultation,are%20members%20of%20the%20NPG[10] NATO’s Nuclear Sharing Arrangements. (2022, February). NATO. https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[11] von Hlatky, S., & Lambert-Deslandes, É. (2024). The Ukraine war and nuclear sharing in NATO. International Affairs, 100(2), 467-485. https://academic.oup.com/ia/article-abstract/100/2/509/7617216?redirectedFrom=fulltext[12] Khalessi, D. (2015). Strategic ambiguity: Nuclear sharing and the secret strategy for drafting articles I and II of the nonproliferation treaty. The Nonproliferation Review, 23(1-2), 81-103. https://doi.org/10.1080/10736700.2016.1155865 [13] Park, K. C., & Choo, J. (2022). NATO's nuclear sharing strategy and its implications for establishing a new strategy for strengthening extended deterrence on the Korean Peninsula. International Area Studies Review, 26(1), 51-78. https://doi.org/10.18327/jias.2022.1.26.1.51 [14] Smith, M. A. (2004). To neither use them nor lose them: NATO and nuclear weapons since the cold war. Contemporary Security Policy, 25(3), 485-514. https://doi.org/10.1080/1352326042000330637[15] NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/topics_50068.htm[16] Washington Summit Declaration. (2024, July 10). NATO. https://www.nato.int/cps/en/natohq/official_texts_227678.htm[17] NATO’s Nuclear Sharing Arrangements. (n.d.). NATO. Retrieved October 20, 2025, from https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[18] Germany’s support for nuclear sharing is vital to protect peace and freedom. (2020, May 11). NATO. https://www.nato.int/cps/en/natohq/opinions_175663.htm[19] Ford, C. A. (2019, December 9). Challenges of Policymaking in Responsible Nuclear Weapons Stewardship. US Department of State. https://2017-2021.state.gov/challenges-of-policymaking-in-responsible-nuclear-weapons-stewardship/[20] NATO’s annual nuclear exercise Steadfast Noon begins. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/news_238367.htm[21] NATO’s Nuclear Sharing Arrangements. (n.d.). NATO. Retrieved October 20, 2025, from https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[22] NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/topics_50068.htm[23] Washington Summit Declaration. (2024, July 10). NATO. https://www.nato.int/cps/en/natohq/official_texts_227678.htm[24] Durkalec, J. (2018, June 29). The Nuclear Non-proliferation Treaty at fifty: a midlife crisis. NATO. https://www.nato.int/docu/review/articles/2018/06/29/the-nuclear-non-proliferation-treaty-at-fifty-a-midlife-crisis/index.html[25] NATO’s Nuclear Sharing Arrangements. (n.d.). NATO. Retrieved October 20, 2025, from https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[26] Ford, C. A. (2019, December 9). Challenges of Policymaking in Responsible Nuclear Weapons Stewardship. US Department of State. https://2017-2021.state.gov/challenges-of-policymaking-in-responsible-nuclear-weapons-stewardship/[27] See more at: https://www.iaea.org/sites/default/files/publications/documents/infcircs/1970/infcirc140.pdf[28] See more at: https://www.iaea.org/[29] Ford, C. A. (2019, December 9). Challenges of Policymaking in Responsible Nuclear Weapons Stewardship. US Department of State. https://2017-2021.state.gov/challenges-of-policymaking-in-responsible-nuclear-weapons-stewardship/[30]NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/topics_50068.htm[31] NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/topics_50068.htm [32] Nuclear Stability and Escalation Risks in Europe. (2023, September 1). Foreign Policy Research Institute. https://www.fpri.org/article/2023/09/nuclear-stability-and-escalation-risks-in-europe/[33] Ibidem.[34] Kimball, D., & Bugos, S. (2022, February 28). Russia’s War on Ukraine and the Risk of Nuclear Escalation: Answers to Frequently Asked Questions. Arms Control Association. https://www.armscontrol.org/issue-briefs/2022-02/FAQ-russia-ukraine[35] NATO’s support for Ukraine. (2025, October 14). NATO. https://www.nato.int/cps/en/natohq/topics_192648.htm[36] Dickinson, P., Arick, R., & Lander Finch, N. (2025, October 15). How the US and Europe can deter and respond to Russia’s chemical, biological, and nuclear threats. Atlantic Council. https://www.atlanticcouncil.org/in-depth-research-reports/report/how-the-us-and-europe-can-deter-and-respond-to-russias-chemical-biological-and-nuclear-threats/[37] Dalton, T. (2022, April 8). Nuclear Nonproliferation After the Russia-Ukraine War. Georgetown Journal of International Affairs. https://gjia.georgetown.edu/2022/04/08/nuclear-nonproliferation-after-the-russia-ukraine-war/[38] Magnier, E. J. POST. X. Retrieved October 21, 2025, from https://x.com/ejmalrai/status/1796511588465201374[39] Ukraine: how nuclear weapons continue to increase the risks, two years on. (n.d.). ICAN (International Campaign to Abolish Nuclear Weapons). Retrieved October 21, 2025, from https://www.icanw.org/ukraine_two_years_how_nuclear_weapons_increase_the_risks[40] Kimballl, D., & Bugos, S. (2022, February 28). Russia’s War on Ukraine and the Risk of Nuclear Escalation: Answers to Frequently Asked Questions. Arms Control Association. https://www.armscontrol.org/issue-briefs/2022-02/FAQ-russia-ukraine [41] Kayali, L., Jungholt, T., & Fritz, P. (2024, July 4). Europe Is Quietly Debating a Nuclear Future Without the US. POLITICO. https://www.politico.com/news/magazine/2024/07/04/europe-us-nuclear-weapons-00166070[42] Katchanovski, I. (n.d.). POST. X. Retrieved October 21, 2025, from https://x.com/I_Katchanovski/status/1858244090909127000[43] Dalton, T. (2022, April 8). Nuclear Nonproliferation After the Russia-Ukraine War. Georgetown Journal of International Affairs. https://gjia.georgetown.edu/2022/04/08/nuclear-nonproliferation-after-the-russia-ukraine-war/[44] Samuelki, O. (2025, March 11). Europe going nuclear would be a catastrophic mistake. https://www.aljazeera.com/opinions/2025/3/11/europe-going-nuclear-would-be-a-catastrophic-mistake[45] NATO’s support for Ukraine. (2025, October 14). NATO. https://www.nato.int/cps/en/natohq/topics_192648.htm[46] Analysis of the Incompatibility of NATO’s Nuclear Sharing Arrangements with the Treaty on the Non-Proliferation of Nuclear Weapons. (2024). China Arms Control and Disarmament Association China Institute of Nuclear Industry Strategy. https://www.cinis.com.cn/zhzlghyjzy/yjbg/1446912/2024072914514738359.pdf 

Defense & Security
USA and China competing in AI supremacy, represented by chess pieces on a world map highlighting technological rivalry. AI wars between USA and china concept.

Emerging global AI order: a comparative analysis of US and China's AI strategic vision

by Hammad Gillani

Introduction   The 21st century global politics has now taken a new shape with the advent of artificial intelligence (AI). The traditional nature of great power rivalry revolves around military maneuvers, defensive-offensive moves, and weapons deployment to challenge each other, maintaining their respective hegemony over the international arena. The revival of artificial intelligence has reshaped the conventional great power game.(Feijóo et al. 2020) From now onwards, whenever the strategic circles discuss the security paradigm, AI has to be its part and parcel. The emergence of AI has altered the status quo, where major powers are now shifting towards AI-based technology. As the most basic function of AI is to create such machines and platforms that can perform tasks more proficiently than humans, it has the ability to enhance decision-making, increase efficiency, and reduce the likely risk of human errors. But at the same time, risks are also lingering.   The United States (US) and the People's Republic of China (PRC) are considered to be the main players of great power politics. Their rivalry has long been centered around territorial conflicts and maritime contests. With the PRC claiming most of the territories in the South China Sea and East China Sea, the US, under its Indo-Pacific Strategy (2022), has challenged the Chinese assertion.(Hassan and Ali 2025) But what the world has witnessed is that both economic hegemons have been avoiding any direct military conflict with each other. The most prominent area where both the US and the PRC are now in a continuous competition is the technological domain. China has always maintained an edge over the US in the respective field due to the fact that it holds most of the world’s known rare earth minerals—a key to technological superiority. Through trade barriers, i.e., tariffs, quotas, etc., and restricting trade with prominent Chinese companies, the US has always tried to contain technological developments in China.(Wang and Chen 2018)   “The reality is that both China and the United States are focused on getting the infrastructure necessary to win the so-called AI race. Now, whether it’s actually a race is a separate question, but data, energy, and human capital are all critical inputs to this. The massive investment infrastructure is top of mind for leaders in both countries as they seek to do it. China’s access to the advanced technology and semiconductors is going to be a key cornerstone in this regard.”(Sacks, 2025) US and China have placed AI at the center of their national policies and global strategies. Both have been introducing various policy papers, strategies, and action plans for the advancements in the field of artificial intelligence and how to counter the side. Now, the international arena is witnessing two parallel AI setups: one created by the US and the other by China. As both are tremendously investing in research, development, and innovation in artificial intelligence, their national narratives and global plans are competing with each other, further exacerbating the international AI landscape.   This paper aims to critically analyze key policies highlighted under the national action plans and strategies launched by the US and the PRC, respectively. Applying the theoretical lens of constructivism, which deals with the role of ideas, norms, and values in shaping the international system, the paper will demonstrate key differences between the AI strategies of the US and China and how their ideological beliefs shape their respective AI policies. Moreover, the analysis will provide expert views on the future landscape of the AI race, its relation to the Great Game, and its political, economic, and military repercussions for the rest of the world. Furthermore, the analysis will mostly rely on expert interviews, key excerpts from official administrative documents, and research findings. This study will also provide insights into the Trump 2.0 administration’s policy outlooks vis-à-vis Beijing’s National AI policy.   America’s AI Action Plan 2025   President Trump unveiled his administration’s national strategy on artificial intelligence on 23rd July 2025. Entitled as “Winning the Race: America’s AI Action Plan”, this strategy is a long-term road map to counter and contain China’s growing profile in the tech world, in particular the AI.(White House, 2025) The title of the strategy explicitly announces that the US has entered into the global AI race. Under this strategy, the United States does not want to eliminate China, rather the US desires to lead the AI world as a core nation, while the PRC should operate as a periphery nation. On July 15 2025, while addressing the AI Summit in Pittsburgh, President Donald Trump stated, “The PRC is coming at par with us and we would not let it happen. We have the great chips and we have everything great. And, we will be fighting them in a friendly fashion. I have a great relationship with President Xi and we smile at the back and forth, but we are leading…...”(AFP, 2025)   America’s AI Action Plan: Key Pillars   A. Accelerate AI Innovation   This first pillar of the AI national strategy by the US deals with the fact that AI should be integrated into every sector of American lives. From the grassroots level to the national or international level, the US should be a leading AI power. AI innovation states that any type of barrier, i.e., legal, regulatory, or domestic constraints, must be eradicated at first to promote, enhance, and boost AI innovation in the US. The strategy clearly states the innovation in artificial intelligence to be the fundamental step towards AI global dominance. The American beliefs, values and norms hold much significance in this regard. This strategy laid down the framework where AI platforms and models should have to align with the US democratic principles, including free speech, equality, transparency, and recognition. This means that the US AI action plan will operate under the umbrella of capitalist ideology.(White House, 2025)   Another most important feature in the field of AI innovation is the conglomeration of public-private ventures. Both the governmental authorities and public institutions are provided with such policies and frameworks to integrate AI platforms into their day-to-day operations. Creating an AI ecosystem is the cornerstone of this strategy.(White House, 2025) It aims to build an American workforce mastered in AI capabilities, defense forces and their key platforms integrated with AI, and provide a secure and safe environment to national and international investors, thus encouraging them to increase their investments in the US. Last but not least, the development of various departments countering the unethical use of AI, i.e., deep fakes, thus securing the national sovereignty and integrity of the homeland.   Principal Deputy Director of the Office of Science and Technology Policy (OSTP), Lynne Parker, while highlighting the significance of the US 2025 AI Action Plan, stated, “The Trump Administration is committed to ensuring the United States is the undeniable leader in AI technology. This plan of action is our first move to enhance and preserve the US AI interest, and we are eager to receive our public perception and viewpoints in this regard.”(House, 2025) The AI innovation drive is indicative of the US being a liberal-democratic and entrepreneurial society. It has an innovation culture that focuses on open research, leadership in the private sector, and ethics based on its national myth of freedom, individualism and technological optimism.   B. Building the AI Infrastructure   This is the most crucial pillar of the US AI Action Plan 2025. From propagating the idea of AI innovation, the next step is to build a strong, secure, and renowned infrastructure to streamline the policy guidelines highlighted in the national AI strategy. This includes the development of indigenous AI factories, companies, data facilities, and their integration into the American energy infrastructure. The most significant step highlighted in this pillar is the construction of indigenous American semiconductor manufacturing units.(White House, 2025) Now what does it mean? As of today, China is considered to be the center of semiconductor manufacturing. Semiconductors are the basic units of any technology, i.e., weapons, aircraft, smartphones, etc. The US has long been importing semiconductor chips from China. Integration of the US energy infrastructure with that of the AI facilities is the ultimate objective of this strategy. Immense energy-producing units, i.e., electricity, under the ‘National Energy Emergency Act’ would be established to provide a continuous supply of electricity to AI data centers and facilities without any hindrance.(House, 2025)   But the Trump 2.0 administration, under its protectionist policies, aspires to restrict imports from China and build a domestic semiconductor processing unit. Highlighting the American dependence on Chinese chips, the American chemist and politician John Moolenaar stated, “The Trump administration has made one thing abundantly clear: we must reassert control over our own economic destiny. That’s not isolationism; that’s common sense. The Chip Security Act, outbound investment restrictions, and stronger export controls—those aren’t closing ourselves off. They are about ensuring America isn’t subsidizing or facilitating our own decline. The Chinese Communist Party (CCP) is using American capital to fund aircraft carriers, fighter jets, and AI systems that target our allies and threaten our freedoms.”(Moolenaar, 2025)   The norm of decentralized innovation is applied in developing the infrastructure, and it empowers universities, startups, and private corporations. This is an expression of confidence in market mechanisms and civil liberties, which is in line with its social values of open innovation and competition.   C. AI Diplomacy and Security   The last pillar of the US AI national action plan is to collaborate with international partners and allies. This simply means to export American AI technology to strategic partners and those with common interests. This will, as a result, give rise to new types of groupings known as ‘AI Alliances.”(White House, 2025) The Global Partnership on AI (GPAI), QUAI AI Mechanism, and US-EU Trade and Technology Council are some of its best manifestations. Like the security and defense partnerships, the AI alliances will enable the US and the West to encircle the PRC in the tech world, where strong western collaborations and partnerships would hinder the PRC from becoming the tech giant or from excelling in AI production. It Encourages responsible AI governance and a democratic form of AI standards of the US, which are based on its self-perception as a global governor of the liberal values.   Thus, in order to enhance AI-related exports to allies, the US has established various institutions, including the US International Development Finance Corporation (DFC). The US AI diplomacy aims to counter China’s growing footprints in the international bodies and institutions.(State 2023) As these global bodies are a key to spreading particular norms and values, shaping the public perception, and framing the global order, the US wants to challenge Chinese entrenchments in these organizations through political and diplomatic coalitions and groupings. Doing this, the West will be able to propagate their version of the global AI order. This means capitalism vs. communism will now be clearly visible in the global AI race between the economic hegemons.   The US Vice President J.D. Vance, while addressing the European Union (EU) leaders in Paris explicitly stated, “The US really wants to work with its European allies. And we wish to start the AI revolution with an attitude of cooperation and transparency. However, international regulatory frameworks that encourage rather than stifle the development of AI technology are necessary to establish that kind of trust. In particular, we need our European allies to view this new frontier with hope rather than fear.”(Sanger 2025) In case of security, the strategy aims to establish various AI Safety Institutes (AISIs) to reduce or eliminate the risk of AI-related accidents, which include errors in AI platforms, most specifically in the AI-operated weapon systems, and the unethical use of AI programs, i.e., generative AI or LLMs. Similarly, the strategy emphasized the danger posed by the non-state actors. These violent actors must be restrained from acquiring such advanced yet sophisticated technology.(White House, 2025)   China’s New Generation Artificial Intelligence Development Plan   For the first time in July 2017, the PRC launched its long-term national AI vision 2030, entitled “New Generation Artificial Intelligence Development Plan,” which is comprised of all the policies, guidelines, and measures to be taken by the Chinese Communist Party (CCP) to foster its AI developments.(Council 2017) China’s AI 2030 vision is none other than the extension of the idea that President Xi Jinping circulated in 2012 regarding China’s future role in the field of Artificial Intelligence (AI). This strategy aims to strengthen China’s AI footprints in the international arena. Ranging from investments to infrastructure, this plan of action explicitly declared to develop the PRC into the hub of AI innovation and investment by 2030. This plan of action is determined to bring about a profit of $160 billion by 2030.(O’Meara 2024) While addressing the Politburo Study Session on 25th April 2025, the Chinese President Xi Jinping noted, “To gain a head start and secure a competitive edge in AI, it is a must to achieve breakthroughs in basic theories, methodologies, and tools. By leveraging AI to drive the transformation of scientific research paradigms, we can speed up achieving breakthroughs in scientific and technological innovation in all sectors.”(Agency 2025)   China’s AI Vision 2030: Key Objectives   A. AI Leadership (2020)   The PRC has successfully accomplished this objective. Under this pillar, China has established significant AI infrastructure, including key facilities and data centers, coming at par with the US. Within this, the CCP urged the academic institutions to promote, enhance, and foster research in the AI domain, which resulted in the major developments in the sectors of big data, swarm intelligence, and super artificial intelligence.(Council 2017) China has successfully established its domestic AI industrial complex worth $22 billion. Various educational institutions, i.e., Tsinghua, Peking, etc., and major companies, i.e., Baidu, iFlyTek, etc., have now completely transformed into AI hubs where research, innovation, and practices are conducted through highly advanced AI platforms.   Commenting on the US-China AI leadership contest, Dr. Yasar Ayaz, the Chairman and Central Project Director of the National Center for AI at NUST, Islamabad, explicitly remarked, “Efficiency is the new name of the game now. Chinese AI inventions and developments clarify the fact that even with the smaller number of parameters, you could achieve the same kind of efficiency that others with an economic edge are achieving.”(Ayaz 2025) The AI leadership symbolically builds the socially constructed narrative of the Chinese Dream and national rejuvenation into the need to overcome the century of humiliation and take its place in the world order. Here, AI leadership is not just a technical objective but a discursive portrayal of the Chinese self-concept of being a technologically independent and morally oriented civilization.   B. AI Technology (2025)   The second most important objective of China’s AI Vision 2030 is to reach a level of tech supremacy in the international arena by 2025. Major work areas include localization of chip industries, advancements in semiconductors and robot manufacturing, etc. The first phase of 2020 basically laid the infrastructural foundation of the plan, while this phase deals with the development and innovation of key AI-operated platforms, including robots, health equipment, and quantum technology.(Council 2017) Another most crucial feature of the 2025 phase is to establish various AI labs throughout mainland China. This would result in the integration of AI into different public-private sectors, i.e., finance, medical, politics, agriculture, etc. Last but not least, a civil-military collaboration is described to be a cornerstone in this regard.   The AI-operated platforms would be utilized by both civil and military institutions, thus preserving the PRC’s national security and safety. Giving remarks over China’s technological edge, Syed Mustafa Bilal, a technology enthusiast and research assistant at the Centre for Aerospace and Security Studies (CASS), added, “China, which for the longest time has been criticized for having a technologically closed-off ecosystem, is now opting for an open-source approach. That was evident by the speeches of Chinese officials at the Global AI Action Summit, in which they tried to frame China’s AI strategy as being much more inclusive as compared to the West. And one illustration of that is the ironic way in which deep search is currently furthering OpenAI's initial selfless objective of increasing AI adoption worldwide.”(Bilal 2025) Thus, the AI vision of China reflects ideational promises of social order, central coordination, and a moral government, ideals that are based on its political culture and civilization background.   C. AI Innovation Hub (2030)   By 2030, China aims to be at the epicenter of global AI innovations, development, and investments. The PRC’s political, economic, and defense institutions will be governed under AI overhang. The most significant feature of this phase is to counter the US-led AI order by challenging the US and the West in various international bodies like the International Telecommunication Union (ITU). The main tenet of China’s 2030 vision is to transform it into a completely AI-driven economy—an AI economic giant.(Council 2017) As the PRC is ruled by the communist regime of President Xi Jinping, China aspires to counter the Western-led AI order through instigating its communist values, including high surveillance, strict national policies, and population control. By avoiding a completely liberal, free speech AI environment in mainland China, the CCP aims to come on par with the US by having authoritative control over its people, thus maintaining its doctrine of ‘techno self-reliance.’   Giving his insights on the new global AI order and the ideological rift between the US and China, Dr. Wajahat Mehmood Qazi, advisor on AI and digital transformation to the private tech companies and faculty member at the COMSATS University, Lahore, explicated, “Yes, there is a digital divide, but the interesting part over here is this: the world is evolving, so this big divide is no more about the decentralization or the centralization. If we look at how China is promoting openness by releasing its foundation models, at the same time the ecosystem of their LM models or AI is still in close proximity. Whereas, the western world is having a different narrative. They are talking about the openness of the models, but at the same time it’s more market-driven. In my view, we are entering into a world where innovation requires openness and closed methods simultaneously.”(Qazi 2025)   The concept of innovation with Chinese features is used to describe a socially constructed attempt to exemplify another approach to technological modernity, which combines dictatorial rule and developmental prosperity. It is a mirror image of self-concept in China as a norm entrepreneur that wants to legitimize its system of governance and impact the moral and technological discourse of AI at the global scale.   Conclusion   The constructivist perspective informs us that the competition between Washington and Beijing is not predetermined; it is being conditioned by the perceptions, suspicion, and competing versions that can be rebuilt through dialogue and mutual rules. The ideological divide can be overcome by creating inclusive tools of AI governance, with transparency, ethical principles, and shared responsibility in their focus. The common ground created through the establishment of a mutual conception of the threats and the ethical aspects of AI will enable the United States and China to leave the zero-sum game on AI and enter into a model of normative convergence and accountable innovation. Constructivism thereby teaches us that cooperation in AI is not just a strategic requirement but also a social option, which is constructed on shifting identities and the recognition of global interdependence with each other.   The great power competition is now in its transformative phase, bypassing the traditional arms race for a more nascent yet powerful AI race. In the context of the US-China contest, administrations on both sides are trying their utmost to launch, implement, and conclude critical national strategies and formulations in the field of artificial intelligence. Both are moving forward at a much greater pace, thus developing advanced technologies in the political, economic, and military domains. Be it China’s Deep Seek or the Western Chat GPT, be it Trump’s Stargate project or Xi’s AgiBot, both are investing heavily into the tech-AI sector. Despite this contest, both economic giants also need joint efforts and collaborations in various matters of concern. Until now, it’s been very difficult to declare which will lead the global AI order. The chances of a global AI standoff are there.ReferencesAFP. 2025. “Trump Vows to Keep US Ahead in AI Race with China.” The News International. Accessed July 24, 2025. https://www.thenews.com.pk/latest/1328672-trump-vows-to-keep-us-ahead-in-ai-race-with-china.Agency, Xinhua News. 2025. “20th Collective Study Session of the CCP Central Committee Politburo.” Center for Security and Emerging Technology, 1–3.Ayaz, Dr. Yasar. 2025. “Global AI Rivalry: U.S vs China.” PTV. Accessed July 24, 2025. https://www.youtube.com/watch?v=_82MMzI_g2c&t.Bilal, Syed Mustafa. 2025. “Global AI Rivalry: U.S vs China.” PTV. Accessed July 24, 2025. https://www.youtube.com/watch?v=_82MMzI_g2c&t.Council, State. 2017. “Next Generation Artificial Intelligence Development Plan.https://digichina.stanford.edu/work/full-translation-chinas-new-generation-artificial-intelligence-development-plan-2017/.Feijóo, Claudio, Youngsun Kwon, Johannes M. Bauer, Erik Bohlin, Bronwyn Howell, Rekha Jain, Petrus Potgieter, Khuong Vu, Jason Whalley, and Jun Xia. 2020. “Harnessing Artificial Intelligence (AI) to Increase Wellbeing for All: The Case for a New Technology Diplomacy.” Telecommunications Policy 44 (6). https://doi.org/10.1016/j.telpol.2020.101988.Hassan, Abid, and Syed Hammad Ali. 2025. “Evolving US Indo-Pacific Posture and Strategic Competition with China.” Policy Perspectives 22 (1). https://doi.org/10.13169/polipers.22.1.ra4.House, White. 2025. “Declaring a National Energy Emergency – The White House.” Accessed July 24, 2025. https://www.whitehouse.gov/presidential-actions/2025/01/declaring-a-national-energy-emergency/.House, White. 2025. “Public Comment Invited on Artificial Intelligence Action Plan – The White House.” Accessed July 24, 2025. https://www.whitehouse.gov/briefings-statements/2025/02/public-comment-invited-on-artificial-intelligence-action-plan/.Moolenaar, John. 2025. “The 2025 B.C. Lee Lecture Featuring Congressman John Moolenaar.” Accessed July 24, 2025. https://www.youtube.com/watch?v=QIIUZlaKofU.O’Meara, Sean. 2024. “China Ramps Up AI Push, Eyes $1.4tn Industry By 2030.” Asia Financial. Accessed July 24, 2025. https://www.asiafinancial.com/china-ramps-up-ai-push-eyes-1-4tn-industry-by-2030-xinhua.Qazi, Dr. Wajahat Mehmood. 2025. “Global AI Rivalry: U.S vs China.” PTV. Accessed July 24, 2025. https://www.youtube.com/watch?v=_82MMzI_g2c&t=.Sacks, Samm. 2025. “China’s Race for AI Supremacy - YouTube.” Accessed July 24, 2025. https://www.youtube.com/watch?v=xaccSxP8pOQ&t=8s.Sanger, David E. 2025. “Vance, in First Foreign Speech, Tells Europe That U.S. Will Dominate A.I.” THe NewYork Times. Accessed July 24, 2025. https://www.nytimes.com/2025/02/11/world/europe/vance-speech-paris-ai-summit.html.State, US Department of. 2023. “Enterprise Artificial Intelligence Strategy,” no. October, 103–13. https://www.state.gov/wp-content/uploads/2023/11/Department-of-State-Enterprise-Artificial-Intelligence-Strategy.pdfWang, You, and Dingding Chen. 2018. “Rising Sino-U.S. Competition in Artificial Intelligence.” China Quarterly of International Strategic Studies 4 (2): 241–58. https://doi.org/10.1142/S2377740018500148.White House. 2025. “Winning the Race: America’s AI Action Plan.” https://www.whitehouse.gov/wp-content/uploads/2025/07/Americas-AI-Action-Plan.pdf

Defense & Security
Soldier, CPU computer (central processing unit) US and Chinese flag on white background. US vs China chip war or tech war, semiconductor industry concept. US restrict and control chip export to China.

Superpowers Without Soldiers: Can Technology Replace Traditional Hegemony?

by Syeda Farani Fatima

Introduction Hegemony is the core principle in International Relations. It has been conceptualized through military strength, economic influence, and ideological control. The theory of cultural hegemony by Antonio Gramsci is based on assuming control but not necessarily through force, whereas realist theorists such as John Mearsheimer stress the relevance of military strength for ensuring global dominance (Mearsheimer 2001). The 21st century, though, brought into being a different era of transformation and technological breakthroughs that turned the existing arrangements on their head. With the advent of Artificial Intelligence (AI), cyber war, and space technology, great powers are transforming from traditional soldiers to cyberspace warriors. AI and other cyber tools are altering the strategic equation between major powers, providing avenues for countries like China and Russia to undermine US hegemony (Rooney et al. 2022). Hegemony in the past had been founded on military superiority, but at present, academics have discovered that technological hegemony is leading the way. Lethal Autonomous Weapons (LAWs) and AI have captivated researchers because they can transform war. Cyberspace has become the new battleground of power. The US and China are competing for cyber hegemony (Akdaǧ 2025). Space is increasingly regarded as a new battleground in geopolitics. The US Space Force and China’s BeiDou system illustrate how nations weave surveillance and communication in their strategic decision-making (O’Hanlon 2020). Thus, new technologies are reshaping the China-US rivalry. To counter this, countries are investing in tech-based industries, which will change the way human thinks. The analysis will explore whether emerging technologies can efficiently replace traditional tools of hegemony or not. Joseph Nye’s concept of smart power provides a critical framework in this modern era, where influence may flow from military boots to silicon chips. Global powers are moving towards influence and deterrence-based tech models, supplementing hard power. However, this transition has its risks, such as overdependence and ethical concerns. The paper argues that a complete transformation is not happening, but there will be dual-track hegemony where military and technology will coordinate to dominate. Policy implications of this shift are profound. Global powers must collaborate to draft international norms for AI and cyberwarfare, developing nations must develop their technology rather than dependency on global powers, as it will be easier for them to surveil and dominate, and international institutions must proactively govern the techno-political landscape to prevent destabilization. This study will use a qualitative approach, and it will be a case-based methodology combining theoretical perspectives of philosophers. This analysis is important as it delves into the transformation of the mechanics of global power from military hegemony to technology-oriented hegemony. It uses secondary sources like policy briefs, think tank reports, books, etc. Finally, this analysis concludes that soldiers may never be the first line of every fight, but the battle for global supremacy is firmly human-hinged in decisions on technology, ethics, and governance. Hegemony is a core concept in International Relations, grounded in military capacity, economic influence, and institutional influence. Historically, great civilizations like the Roman and British empires attained hegemony by dominating in naval power, making alliances and expanding their territories. In the post-World War II era, the US built dominance through overseas military bases and nuclear deterrence. Historical Foundations of Traditional Hegemony The Roman Empire, a classic example of past hegemony, attained this power by constructing roads, forts, and legions in the world's islands. Later, the British Empire sustained its dominance by modernizing the Royal Navy and the global trade network. The post-World War II era saw the hegemony of the United States with overseas military bases and security alliances. John Mearsheimer, in his book The Tragedy of Great Power Politics, says that according to great powers, hegemony is the best way to ensure their security (Mearsheimer 2001). Limitations of Traditional Hegemony The primary limitation of the traditional hegemonic model is the risk of overreach, entering into too many overseas agreements that become economically and politically unsustainable. Imperial overstretch, a model proposed by Paul Kennedy, explains the collapse of empires when they are unable to maintain their economy due to huge global aims (Kennedy 1988). Concurrently, we can see that after so many years have passed in the Vietnam, Afghanistan, and Iraq wars, the US is spending trillions. Approximately $3.68 trillion was spent on Iraq and Afghanistan (Costs of War | Brown University 2025). This highlights that military dominance can be costly and unsustainable. Mearsheimer, in an interview at the New York Times, claimed that ‘the United States is responsible for causing the Ukraine crisis’. Lack of legitimacy and local resistance is another great flaw in the traditional hegemonic pattern. For example, in Vietnam, soldiers used their knowledge of geography to push back against America's advanced weapons. Similarly, in Afghanistan and Iraq, foreign-led missions struggled with local insurgents. The New Tools of Technological Hegemony Cyber Power Cyber power has rapidly become a strategic field where states project their influence far beyond the geographic borders, often without soldiers. Cyber operations are dominating in this digital age, and the SolarWinds hack shows how states can achieve global influence through an Information Technology (IT) infrastructure breach. In March 2020, Russian hackers placed a secret backdoor in SolarWinds’ Orion software. This infected around 18000 users, including US major government departments (Cybersecurity 2021). The cyberattacks went undetected for several months, revealing vulnerabilities in the digital network. It was the worst cyber-espionage attack ever, an analyst described. Iran's 2019 cyberattack on the oil infrastructure of Saudi Arabia shows that the acquisition of digital superiority can help influence norms, command the critical infrastructure, and set global political narratives without foreign boots on the ground. To address this vulnerability, it is essential to know cyber deterrence theory. It discusses capability, attribution, and resolution. States should advance digital tools, modify their tracking system and enhance communication and transparency. The most lethal weapon today may not fire a projectile-it fires packets. This metaphor illustrates that state actors can erode adversary national infrastructure, banks and election systems without traditional warfare. The US Secretary of Defense Lloyd J. Austin III described the integrated Deterrence that integrates cyber with land, sea, and space under a unified strategy (Masitoh, Perwita, and Rudy 2025). Cybersecurity experts say that cyberpower is now a geopolitical power. And cyber warfare is not a sideshow; it’s a frontline strategy. Artificial Intelligence (AI) and Big Data AI’s strategic significance for national security has been emphasized by leaders like Jason Matheny, CEO of RAND Corporation. He warns that AI could make it easier to make harmful weapons and dangerous technologies (Matheny 2024). The 2023 report of RAND on AI and Geopolitics argues that AI may be the next frontier in US-China rivalry (Pavel et al. 2023). ChatGPT and Bard, like generative AI models, have humanitarian strategic applications, which makes fake news so believable that it feels like fact. This capability of AI can transform propaganda into scalable digital warfare. Beyond surveillance, AI has transformed military operations tactics. Military applications like drone swarming, algorithmic targeting, and predictive ISR create scenarios where the frontline shifts from kinetic zones to data centers. AI diplomacy is becoming the new foreign aid. Financial Times article notes that tech giants are deploying AI mechanisms in Africa not only for development but for their advantage as an influence tool. Thus, AI and big data are a new form of informational hegemony. Space Militarization and Satellite Dominance Space militarization emerged during the Cold War. States like the US, China, Russia, India, and Japan have developed anti-satellite (ASAT) capabilities (Samson and Cesari 2025). General John Jay Raymond at the US Space Command Launch said that, “Outer space is now recognized as a domain of military operations” (Raymond 2021). China’s 2007 ASAT test, which destroyed its own Fengyun-1C weather satellite, is still a thorn in the eyes of major powers. Russia has also launched missions like Kosmos-2553. Evolution from GPS to GNSS (Global Navigation Satellite Systems) reflects strategic change. The US has GPS, China has BeiDou, Elon Musk’s Starlink satellite constellation, and Europe has Galileo; each system highlights the sovereignty in digital positioning. China’s counterpart doctrine states in its 2021 Space White Paper that space-based assets are not crucial for renaissance only but for strategic deterrence without deploying soldiers or causing deaths of your military men (The State Council Information Office of the People’s Republic of China 2022). Undersea Cables and Digital Infrastructure Control Undersea cables carry over 95% of global data transmission (Sherman 2021). Disruption or surveillance of these cables can impact the worldwide flow of data and diplomatic communications. In developing countries like Pakistan, Kenya, and Ecuador, Huawei-funded infrastructure provides smart city services. Cable route is not just wiring undersea, it is influenced by encryption. The US and EU have Amazon Web Services (AWS), Microsoft Azure, and Google Cloud, like surveillance platforms. Cable-Landing zones (CLZs) are the chokepoints used for manipulation, Cloud interconnection policies allow control of traffic flow, and Surveillance software and firmware installed at data centers can be remotely controlled, bypassing local safeguards. Blocking connections can slow or disrupt foreign economic leverage. Digital infrastructure has become a domain for hegemony that is more insidious in strategic potential. This map exposes the physical foundations of digital power. Nations with greater cable landing nodes, like the U.S. and China, wield asymmetric influence, not through soldiers, but through network control. Disruption or surveillance of these cables can cripple economies or governance. Regional chokepoints also reflect strategic leverage in geo-economics and cyber diplomacy, making this infrastructure as consequential as traditional military bases. Figure 1: This map shows the physical foundations of digital power, nations with greater cable landing nodes, like the U.S. and China, wield asymmetric influence, not through soldiers, but through network control.Superpowers’ Technological Footprint United States Silicon Valley is the heart of US technological hegemony, and some other government agencies, like Defense Advanced Research Projects Agency (DARPA), are contributing to maintaining US technological hegemony. Lethal Autonomous Weapons (LAWs), drones, and defense-grade AI-powered decision-support systems are a tech-military hybrid force. Furthermore, the US controls major pillars of technology like operating systems (Microsoft, Apple, Google dominate desktops and mobile devices), and Satellites. Advanced technologies have enabled remote force projection like drone strikes, executing surgical operations, Cyber Command operations from SolarWinds retaliation, deployment of Overhead Persistent Infrared (OPIR) and Space Based Kill Assessment (SKA), enhancing deterrence. China Made in China 2025 vision aims to displace US techno-hegemony. China’s centralized Social Credit System reflects a template of techno-surveillance hegemony. Beijing is now selling surveillance systems to developing countries, highlighting its tech supremacy. China is controlling telecommunications architecture by promoting Huawei’s 5G worldwide. China’s cyber army, the People’s Liberation Army Strategic Support Force (PLASSF), specializes in offensive and defensive cybertech warfare (The State Council Information Office of the People’s Republic of China 2019). China’s Digital Silk Road links infrastructure investments in Asia and Africa with national encryption systems and cloud data centers. Ethiopian Prime Minister Abiy Ahmed, in a bilateral dialogue, said that ‘our fiber networks and data exchanges are now integrated with Beijing’s national infrastructure policy’. Thus, acquiring such a position in technology will prove China’s hegemony and can make it a superpower, making the world again a bipolar one. China’s strategic doctrine focuses on autonomous systems and digital authoritarian export over occupancy and geopolitical projection, respectively. Russia Russia’s global strategy remains rooted in a hybrid doctrine that combines cyber tools, space capabilities and disinformation operations. The Gerasimov Doctrine, Vladimir Putin’s strategic vision, emphasizes the blend of political, cyber, and economic tools to achieve strategic goals without casualties. The Ukraine conflict is a great example of cyber dominance. Russia has cyber units such as APT28 (Fancy Bears), Satellite Spoofing and Jamming, and the Internet Research Agency (IRA), which have executed targeted hacks against North Atlantic Treaty Organization (NATO), disrupted Global Positioning System (GPS) signals, and led disinformation campaigns. Russia’s power formula centers on dense cyber capacity, economic coercion, and unpredictability (making deterrence harder). Risks and Criticism of Tech-Based Hegemony Technology provides tools for security and influence, but overdependence causes strategic vulnerability, which leads to ethical dilemmas and raises questions about digital sovereignty. Overdependence and System Vulnerability A fundamental flaw of technological hegemony is its fragility. Systems are dependent on infrastructure (cloud servers, AI control nodes, etc.). The UN Group of Governmental Experts (GGE) says that lethal autonomous weapons are the cause of escalation in conflicts (CCW 2022). Take the SolarWinds breach of 2020, in which an update exposed thousands of sensitive pieces of information. Ethical Concerns China, Ethiopia, and some other states have AI-powered surveillance regimes. China exports networked camera systems and facial recognition tools to states that use them to suppress dissent. A senior researcher at Amnesty noted that, ‘delegating life and death decisions to software is ethically unjustifiable’. Global South Dependency and Digital Colonialism Due to technological influence, digital dependency has increased in the Global South. Digital dependency without regulatory safeguards leads to digital colonialism. Countries lacking advanced technology are reliant on digital ecosystems developed by superpowers. It is said by Dr Ruha Benjamin that ‘when code becomes law, and pipelines become policy enforcers, sovereignty is outsourced’. Hegemony Without Consent Soldiers are a visible force, but technology imposes itself quietly via platforms, which results in domination without democracy. Tech-enabled coercion doesn’t need tanks; it needs standards embedded in devices, laws baked into algorithms. This contradicts liberal norms of International Relations (IR), where hegemony should rest on consent for international legitimacy (Sakumar, Broeders, and Kello 2024). Future Power Projections: Domain-wise Breakdown There are five interconnected domains of future power projections: land, air, sea, cyber, and space. Land Domain In traditional combat, troops were used to counter enemy force, but now in the third digital era, surveillance grids, AI-powered motion detection systems, and autonomous land robots are replacing soldiers. The Israeli military is testing unmanned ground vehicles (UGVs), which they have named Jaguar, to patrol borders, and this will reduce human casualties. The diagram illustrates the interaction or the coordination between a human coordinator and an autonomous weapon system (AWS), and the target within a given environment. At first, the operator gives a high-level command which activates the controller, and the system provides feedback to the operator, such as mission success or failure. The controller is the brain of this system. It monitors the environment, processes data and controls the weapons. It operates in loops, evaluating the environment and updating the decision. Once the target is detected autonomously, the gun acts, which includes missile launch or gunfire. This entire process takes place in a dynamic environment. Figure 2: The coordination between a human coordinator and an autonomous weapon system (AWS) Air Domain Traditional manned fighter jets were dominating in aerial combat. Now, aerial dominance is shifted towards hypersonic weapons and AI-enabled drone swarms. Russia’s Zircon and China’s DF-ZF are hypersonic missiles that can travel at Mach 5+ speeds. AI drone swarms are rendering conventional missile defense systems obsolete. The US Air Force’s “Golden Horde” project and China’s GJ-11 stealth drone exemplifies this shift. Sea Domain Sea powers used to refer to blue-water navies and submarine fleets. They remain the core of maritime protection, but unmanned underwater vehicles (UUVs) are quickly supplanting aircraft carriers. UUVs are being used to surveil for months on their own, and they will not be detected. Subsea data cables, which transport 95% of internet traffic, are a strategic resource; such cables are undersea digital arteries. Securing the sea in the 21st century means controlling what is beneath it. The diagram illustrates major elements of an autonomous underwater vehicle (AUV). It is an important element in current naval battles and marine monitoring. The GPS/RF module is situated at the top of the AUV, through which the vehicle can position itself beneath the water. The propeller motor is the mobility unit of an AUV, driven by lithium-ion batteries. It provides thrust and directional movements. An electronic aid container serves as a housing store; it includes an onboard computer, a mission processor, a power distribution unit, and communication interfaces. AUVs have sensors which detect how deep the AUV is in the water column by measuring hydrostatic pressure. Acoustic Doppler Current Profile (ADCP), is a sonar device that uses Doppler shift in acoustic signals to measure the speed of water currents. An AUV manage its vertical position with a buoyancy tank. AUVs use an inertial navigation system; they determine the position of the AUV based on prior data. AUVs also contain forward-looking (Sound Navigation and Ranging) SONARs and Altimeters that scan and detect any obstacles in front of them and maintain a safe height from the seabed, respectively. Transducers are the mouth and ears of AUVs; they transmit and receive acoustic signals. They are crucial for clandestine communication and sensing of the environment. These AUVs are extremely crucial in contested sea areas such as the South China Sea or the Arctic. Therefore, AUVs are revolutionizing maritime operations by enlarging surveillance, exploration, and undersea warfighting capabilities. As technology evolves, AUVs will define the future of naval strategy and oceanographic study. Figure 3: Major elements of an autonomous underwater vehicle (AUV). Cyber Domain Cyberspace has no borders. Global powers like the US, China and Russia have developed cyber command units to disrupt the power grids of the opposite side. Russia’s cyber interference in the 2016 U.S. elections, China’s alleged breach of U.S. personnel databases (OPM hack), and the Stuxnet worm targeting Iran’s nuclear program exemplify how software has become a strategic weapon. According to NATO’s 2025 Cyber Doctrine, ‘A cyberattack triggering Article 5 [mutual defense] is not just theoretical—it’s a matter of time.’ Space Domain Traditionally, space power was limited to spy satellites, but now anti-satellite weapons (ASAT), Starlink and military satellite systems have transformed into a combat zone. The US created its Space Force in 2019 to dominate in space militarization. In the Ukraine war, SpaceX’s Starlink became crucial for Ukrainian battlefield communication, prompting Elon Musk to limit military use to avoid escalation. Table 1 (figure 4): Old model versus new model comparison in each domain of future power projection. Done by the author. Domain Old Model New Model Land Troop deployment - Armored divisions - Occupation warfare AI-enabled surveillance grids - Unmanned Ground Vehicles (UGVs) - Real-time satellite + sensor networks Air Fighter jets - Airbases - Strategic bombers Hypersonic missiles (e.g., DF-ZF, Zircon) - Drone swarms with AI autonomy - Human-out-of-loop air dominance Sea Naval fleets - Aircraft carriers Submarines Unmanned Underwater Vehicles (ORCA UUV) - Seafloor cable warfare - Autonomous maritime surveillance Cyber (No traditional equivalent) State-sponsored hacking - Data theft & disinformation ops - Cyber jamming, spoofing in kinetic war Space Reconnaissance satellites Missile early-warning systems ASAT weapons (China, Russia tests) - Satellite internet constellations (Starlink) - Real-time warfighting integration (JADC2) Can Technology Fully Replace Military Power? The emergence of advanced technologies like AI, autonomous weapons and space militarization has sparked the debate about whether technology can replace military power, wholly or not? Strategic autonomy, in which a nation’s ability to defend its interests independently requires both technology and military. Technology acts as a critical enabler but not a substitute. AI can analyze satellite data in seconds, but only trained personnel can conduct peacekeeping missions in fragile regions. Modern warfare is shifting towards grey zone conflicts that fall below the threshold of open combat. Russian operations in Crimea in 2014 blended cyberattacks and physical deployments of troops, due to which the line between technology and military became blurry. This incident shows that technology without boots is of no advantage. In addition, technology needs regular upgrades and educated users, and excessive reliance upon these systems may cause interruptions such as electronic warfare (EW) and electromagnetic pulse (EMP) attacks. In a time of humanitarian crisis, disaster response, and counterinsurgency, forces are indispensable. To defeat an enemy or to dominate, one must employ both technology and an educated military. Unmanned aerial vehicles (drones) have altered the character of air war. Great powers are investing heavily in military AI and quantum communication to improve battlefield awareness, minimize human loss of life, and enhance decision-making, but note that international decisions do not depend on a machine. They don't aim to replace the military, but they want to develop their technology. Thus, the emerging model of global power is not soldiering versus technology, but it is soldiers plus technology. It is known as dual-track hegemony, and a nation that acquires it will dominate shortly. A tech-savvy soldier, supported by AI and robotics, is the face of tomorrow’s war. Conclusion The United States, China and the EU are global powers of the modern era. These states possess the technological capital and military infrastructure that shape the regulation of engagement in cyberspace and AI. Firstly, they must strengthen international norms for cyber operations and AI governance. UNGGE has made some progress relevant to this, but this needs a broader enforcement mechanism like the Geneva Conventions. Secondly, global powers must invest in ethical and auditable technology. As AI is dangerous due to biased surveillance systems, facial recognition abuses, and it is also used in predicting policies, which is a major ethical concern. Algorithmic transparency, data protection, and privacy rights must be enforced as soon as possible. Lastly, multilateralism must extend to outer space. As space is becoming a battlefield, complicating geopolitical rivalry, to counter it, multilateralism must be encouraged. For developing countries like Pakistan, Indonesia, or Nigeria, the emergence of technological hegemony is both a threat and an opportunity. These countries should enforce digital sovereignty policies. These nations should avoid digital dependency, as it will be easier for global powers to surveil and dominate. Emerging powers should build defensive cyber infrastructure instead of offensive. They should build secure networks and legal protection against espionage on their own. Defensive strategy will serve as a strategic safeguard and can be used as a pawn in great power rivalries. Emerging powers should pursue a multilateral coalition among Muslim majority states to enhance their connectivity and ties. South-south cooperation must be promoted. The UN, G20 and other international bodies must move towards digital governance mechanisms instead of vague declarations. UN should form a Global Charter on Tech Governance, similar to a Digital Magna Carta. The charter should have ethical limits on the establishment and use of Artificial Intelligence and Lethal Autonomous Weapons. They should increase their coordination with the G20 to amplify these efforts. G20 should create a Tech and Ethics working Group, which can bridge the trust gap between Developed and developing countries in the digital arena. Global order continues to evolve in the 21st century, and the foundations of power projection are rewritten. There is a paradigm shift from boots to bots. This research demonstrates that while technology has transformed, it cannot entirely replace traditional modes of combat. Technology can only help the military to dominate in a region or conflict, but cannot fully replace it. There will be dual track hegemony, and the one who will acquire this hegemony will control world islands, and controlling world islands means ruling the world. However, this transformation comes with serious risks like AI miscalculations, vulnerabilities of digital infrastructure and ethical concerns. But we should keep in mind that military power is no longer sufficient, nor is technology alone a guarantee of dominance, in post-silo, where military, technological, and normative tools must function together to sustain leadership.ReferencesAkdaǧ, Yavuz. 2025. “Great Power Cyberpolitics and Global Cyberhegemony.” Perspectives on Politics. doi:10.1017/S1537592725000040.CCW. 2022. “Document Viewer.” : 16. https://docs.un.org/en/CCW/GGE.1/2021/3 (October 18, 2025).“Costs of War | Brown University.” https://costsofwar.watson.brown.edu/ (October 18, 2025).Cybersecurity, Centre for. 2021. SolarWinds: State-Sponsored Global Software Supply Chain Attack. https://www.cfcs.dk/globalassets/cfcs/dokumenter/rapporter/en/CFCS-solarwinds-report-EN.pdf.Kennedy, Paul. 1988. “Paul-Kennedy-the-Rise-and-Fall-of-the-Great-Powers-19891.” : 704. https://cheirif.wordpress.com/wp-content/uploads/2015/08/paul-kennedy-the-rise-and-fall-of-the-great-powers-19891.pdf.Masitoh, Yuniar Tri, Anak Agung Banyu Perwita, and Elphis Rudy. 2025. “Integrated Deterrence in Practice: The 2022 United States National Defense Strategy Towards the Russia-Ukraine War.” International Journal of Humanities, Education, and Social Sciences 3(3): 1030–48. doi:10.58578/ijhess.v3i3.7317.Matheny, Jason. 2024. “A National Security Insider Does the Math on the Dangers of AI | WIRED.” https://www.wired.com/story/jason-matheny-national-security-insider-dangers-of-ai/ (October 18, 2025).Mearsheimer, John. 2001. “S2-Mearsheimer-2001.” file:///C:/Users/sh/Downloads/s2-mearsheimer-2001.pdf.O’Hanlon, Michael. 2020. “Forecasting Change in Military Technology, 2020-2040 - Joint Air Power Competence Centre.” https://www.japcc.org/essays/forecasting-change-in-military-technology-2020-2040/ (October 18, 2025).Pavel, Barry, Ivana Ke, Michael Spirtas, James Ryseff, Lea Sabbag, Gregory Smith, Keller Scholl, and Domenique Lumpkin. 2023. “AI and Geopolitics: How Might AI Affect the Rise and Fall of Nations? | RAND.” https://www.rand.org/pubs/perspectives/PEA3034-1.html (October 18, 2025).Raymond, John W. 2021. “U.S. Leadership in Space: A Conversation With General John Raymond | Council on Foreign Relations.” https://www.cfr.org/event/us-leadership-space-conversation-general-john-raymond (October 18, 2025).Rooney, Bryan, Grant Johnson, Tobias Sytsma, and Miranda Priebe. 2022. Does the U.S. Economy Benefit from U.S. Alliances and Forward Military Presence? RAND Corporation. https://www.rand.org/content/dam/rand/pubs/research_reports/RRA700/RRA739-5/RAND_RRA739-5.pdf.Sakumar, Arun, Dennis Broeders, and Monica Kello. 2024. “Full Article: The Pervasive Informality of the International Cybersecurity Regime: Geopolitics, Non-State Actors and Diplomacy.” https://www.tandfonline.com/doi/full/10.1080/13523260.2023.2296739 (October 18, 2025).Samson, Victoria, and Laetitia Cesari. 2025. “Secure World Foundation: 2025 Global Counterspace Capabilities Report.” https://www.swfound.org/publications-and-reports/2025-global-counterspace-capabilities-report (October 18, 2025).Sherman, Justin. 2021. Cyber Defense across the Ocean Floor : The Geopolitics of Submarine Cable Security. Atlantic Council, Scowcroft Center for Strategy and Security.The State Council Information Office of the People’s Republic of China. 2019. China’s National Defense in the New Era. Foreign Languages Press. https://english.www.gov.cn/archive/whitepaper/201907/24/content_WS5d3941ddc6d08408f502283d.html.The State Council Information Office of the People’s Republic of China. 2022. “Full Text: China’s Space Program: A 2021 Perspective.” https://english.www.gov.cn/archive/whitepaper/202201/28/content_WS61f35b3dc6d09c94e48a467a.html (October 18, 2025)

Defense & Security
China Cyber Security Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured. 3d illustration

Chinese cyberespionage: The Invisible War That Threatens the West

by Gabriele Iuvinale

On March 4, the U.S. Department of Justice charged ten Chinese nationals with carrying out massive hacks against government agencies, media outlets, and dissidents in the United States and around the world. They allegedly acted on behalf of the Chinese company i-Soon, under contract from the Beijing government. Two officials from China’s Ministry of Public Security (MPS) were also indicted, identified as the ones “directing the attacks.” According to documents held by the U.S. justice system, China’s domestic intelligence services (MPS) and foreign intelligence (Ministry of State Security, MSS) relied on a vast network of private companies and domestic contractors to hack and steal information, thereby masking the Chinese government’s direct involvement. In some cases, the MPS and MSS paid private hackers to target specific victims. In many others, the attacks were speculative: hackers identified vulnerable computers, breached them, and extracted information that was later sold — either directly or indirectly — to the Chinese government. The Growth of Chinese Cyberespionage and Its Main Areas of Operation This is not an isolated case. Over the past decade, the People’s Republic of China’s (PRC) hacking program has expanded rapidly. In 2023, then-FBI Director Christopher Wray stated that it was larger than that of all other world powers combined. This increase in power and sophistication has led to success in three key areas: political interference, sabotage of critical infrastructure, and large-scale intellectual property theft. Beijing integrates computer networks, electronic warfare, economic, diplomatic, legal, military, intelligence, psychological, and military deception resources, along with security operations, to weaken states, make them economically dependent on China, and more receptive to a “new authoritarian world order with Chinese characteristics.” For this reason, unlike traditional interpretations, Chinese state-sponsored hacking should be understood within a broader context — where control over technology, strategic infrastructure, and global supply chains is part of “trans-military” and “non-military” warfare operations, as described by two People’s Liberation Army (PLA) colonels in the 1999 book “Unrestricted Warfare”. This approach is known as liminal warfare — an escalating conflict in which the spectrum of competition and confrontation with the West is so wide that the battlefield is, quite literally, everywhere. Cyberespionage as a Tool of Electronic Warfare In electronic warfare, hacking is used for sabotage during times of crisis or conflict. These actions are led by the People’s Liberation Army (PLA), the armed wing of the Chinese Communist Party. In 2023, it was discovered that a hacker group linked to the PLA, known as “Volt Typhoon”, had infiltrated a wide range of critical infrastructure in the U.S. for years, including ports, factories, and water treatment plants — both on the mainland and in strategic locations like Guam. “Volt Typhoon is a military operation with political and potentially military strategic purposes,” explained Ciaran Martin, former director of the UK’s cybersecurity agency. Led by the PLA’s cyber unit, the operation involved installing readiness capabilities — “digital traps,” as some call them — within critical U.S. infrastructure. In addition to a sustained attack in 2023 on a power company in Massachusetts, which aimed to extract sensitive data about its operational technology (OT) infrastructure, “Volt Typhoon” gained notoriety for multiple attacks on telecommunications systems in the U.S. and other critical infrastructures globally. One of its subunits, “Voltzite”, targeted the Littleton Electric and Water Departments, prompting the FBI and cybersecurity firm Dragos to respond jointly and publish a detailed report on the attack and its mitigation. Intellectual Property Theft Through Cyberespionage The most damaging channel for intellectual property theft is cyberespionage. These intrusions allow Chinese companies — sometimes with direct support from the Communist Party or the state — to access information on operations, projects, and technology from foreign firms. China has used state-backed and coordinated cyberespionage campaigns to steal information from companies in strategic sectors such as oil, energy, steel, and aviation. These actions serve both to acquire science and technology and to gather intelligence useful for future attacks on military, government, or technical systems. In the United States, there have been numerous precedents: • In 2014, five PLA hackers were indicted for economic espionage.• In 2017, three hackers linked to the Chinese firm Boyusec were charged with stealing confidential business information.• In 2018, two Chinese nationals were indicted for intellectual property theft.• In 2020, two hackers connected to the MSS were charged with targeting COVID-19 research. Among these, the 2018 indictment stands out as part of a broader U.S. effort to raise awareness about Chinese cyberespionage. On that occasion, Chinese hackers carried out a campaign known as “Cloud Hopper”, which involved a supply chain attack on service providers like Hewlett Packard and IBM. The defendants worked for Huaying Haitai and collaborated with the Tianjin State Security Bureau of the MSS. In 2017, the U.S. Commission on the Theft of American Intellectual Property estimated that such crimes cost the U.S. economy up to $600 billion annually — a figure comparable to the Pentagon’s defense budget and greater than the combined profits of the 50 largest companies in the Fortune 500. Beyond the United States: The Global Impact of Chinese Cyberespionage In June 2024, Dutch military intelligence (MIVD) warned that Chinese cyberespionage was broader than previously believed, affecting Western governments and defense companies. A 2023 cyberattack on the Dutch Ministry of Defense reportedly affected at least 20,000 people within a few months. In 2018, the Czech Republic’s National Cyber and Information Security Agency (NUKIB) issued a warning about risks linked to China. Since then, the country has strengthened its capabilities and controls against Beijing and has worked on mechanisms to counter foreign information manipulation. According to U.S. prosecutors, dozens of European parliamentarians have been targeted by Chinese attacks. In March 2024, the U.S. Department of Justice indicted hackers linked to the MSS for attacking “all EU members” of the Inter-Parliamentary Alliance on China (IPAC), a coalition critical of Beijing. In 2021, the hackers sent over a thousand emails to around 400 accounts linked to IPAC, attempting to spy on their internet activity and devices. In addition, ASML, the Dutch leader in semiconductor lithography, suffers “thousands of security incidents per year,” including several successful infiltration attempts by Chinese actors. Research centers like Imec (Belgium) are also frequent targets. Belgium has expelled Chinese researchers suspected of espionage. The European Union has reinforced security and identified advanced semiconductors as one of four critical technologies requiring risk assessments and enhanced protection. Notably, APT41 is one of the most active and sophisticated Chinese cyberespionage groups, based in the PRC and linked to the MSS. According to Google’s Threat Intelligence Group, APT41 combines state espionage with ransomware attacks — malicious programs that encrypt files and demand financial ransom to restore them — making attribution more difficult. Unlike other PLA-aligned groups whose operations are region-specific, APT41 acts globally, attacking strategic sectors in the U.S., Europe, Latin America, and the Caribbean. It also carries out financially motivated operations, particularly in the gaming industry. Mandiant, a global cybersecurity leader, highlights APT41’s technical capabilities: it frequently exploits zero-day and n-day vulnerabilities and uses techniques like phishing, social engineering, and SQL injections. Since 2020, APT41 has conducted large-scale campaigns against over 75 companies in more than 20 countries. It is responsible for compromising supply chains, such as in the “ShadowHammer” campaign targeting ASUS, which affected over 50,000 systems in 2018. APT41 is also linked to the use of “MESSAGETAP” malware in telecommunications networks. The Role of Chinese Universities in Cyberespionage Chinese universities also collaborate with the PLA and MSS in state-sponsored cyberespionage operations. Shanghai Jiao Tong University works directly with the Chinese military on such operations. Zhejiang University and the Harbin Institute of Technology are key centers for recruiting hackers. Xidian University offers students hands-on experience at provincial MSS offices and previously maintained ties with the Third Department of the PLA’s General Staff before its reorganization in 2015 into the Network Systems Department. One of its graduate programs is co-directed with the Guangdong Office of the Chinese Information Technology Security Evaluation Center (ITSEC), an MSS-run office that leads an active team of contractor hackers. Southeast University also maintains links with security services and co-manages the “Purple Mountain Lab” with the PLA’s Strategic Support Force. There, researchers collaborate on “critical strategic requirements,” operating systems, and interdisciplinary cybersecurity studies. The university also receives funding from the PLA and MSS to develop China’s cyber capabilities. The Cybersecurity undergraduate program at Shanghai Jiao Tong University (SJTU) is taught at a PLA information engineering base. Within this program, SJTU claims to work on “network and information systems testing and evaluation, security testing for connected smart networks, APT attack and defense testing, and key technologies for cyber ranges.” Universities associated with the MSS for talent recruitment include the University of Science and Technology of China, Shanghai Jiao Tong University, Xi’an Jiao Tong University, Beijing Institute of Technology, Nanjing University, and the Harbin Institute of Technology. In addition, some cybersecurity firms — such as Beijing TopSec — collaborate with the PLA in hacking campaigns, operator training, and developing future hackers. This article was originally published by Agenda Digitale and later by Expediente Abierto, who granted us permission for its translation and republication.