Subscribe to our weekly newsletters for free

Subscribe to an email

If you want to subscribe to World & New World Newsletter, please enter
your e-mail

Energy & Economics
Commodity and alternative asset, gold bar and crypto currency Bitcoin on rising price graph as financial crisis or war safe haven, investment asset or wealth concept.

Assessing Bitcoin and Gold as Safe Havens Amid Global Uncertainties: A Rolling Window DCC-GARCH Analysis

by Anoop S Kumar , Meera Mohan , P. S. Niveditha

Abstract We examine the roles of Gold and Bitcoin as a hedge, a safe haven, and a diversifier against the coronavirus disease 2019 (COVID-19) pandemic and the Ukraine War. Using a rolling window estimation of the dynamic conditional correlation (DCC)-based regression, we present a novel approach to examine the time-varying safe haven, hedge, and diversifier properties of Gold and Bitcoin for equities portfolios. This article uses daily returns of Gold, Bitcoin, S&P500, CAC 40, and NSE 50 from January 3, 2018, to October 15, 2022. Our results show that Gold is a better safe haven than the two, while Bitcoin exhibits weak properties as safe haven. Bitcoin can, however, be used as a diversifier and hedge. This study offers policy suggestions to investors to diversify their holdings during uncertain times. Introduction Financial markets and the diversity of financial products have risen in both volume and value, creating financial risk and establishing the demand for a safe haven for investors. The global financial markets have faced several blows in recent years. From the Global Financial Crisis (GFC) to the outbreak of the pandemic and uncertainty regarding economic policy measures of governments and central banks, the financial markets including equity markets around the world were faced with severe meltdowns. This similar behavior was observed in other markets including equity and commodity markets, resulting in overall uncertainty. In this scenario, the investors normally flock toward the safe-haven assets to protect their investment. In normal situations, investors seek to diversify or hedge their assets to protect their portfolios. However, the financial markets are negatively impacted when there are global uncertainties. Diversification and hedging methods fail to safeguard investors’ portfolios during instability because almost all sectors and assets are negatively affected (Hasan et al., 2021). As a result, investors typically look for safe-haven investments to safeguard their portfolios under extreme conditions (Ceylan, 2022). Baur and Lucey (2010) provide the following definitions of hedge, diversifier, and safe haven: Hedge: An asset that, on average, has no correlation or a negative correlation with another asset or portfolio. On average, a strict hedge has a (strictly) negative correlation with another asset or portfolio.Diversifier: An asset that, on average, has a positive correlation (but not perfect correlation) with another asset or portfolio. Safe haven: This is the asset that in times of market stress or volatility becomes uncorrelated or negatively associated with other assets or a portfolio. As was previously indicated, the significant market turbulence caused by a sharp decline in consumer spending, coupled with insufficient hedging opportunities, was a common feature of all markets during these times (Yousaf et al., 2022). Nakamoto (2008) suggested a remedy by introducing Bitcoin, a “digital currency,” as an alternative to traditional fiduciary currencies (Paule-Vianez et al., 2020). Bitcoin often described as “Digital Gold” has shown greater resilience during periods of crises and has highlighted the potential safe haven and hedging property against uncertainties (Mokni, 2021). According to Dyhrberg (2016), the GFC has eased the emergence of Bitcoin thereby strengthening its popularity. Bouri et al. (2017) in their study indicate that Bitcoin has been viewed as a shelter from global uncertainties caused by conventional banking and economic systems. Recent research has found that Bitcoin is a weak safe haven, particularly in periods of market uncertainty like the coronavirus disease 2019 (COVID-19) crisis (Conlon & McGee, 2020; Nagy & Benedek, 2021; Shahzad et al., 2019; Syuhada et al., 2022). In contrast to these findings, a study by Yan et al. (2022) indicates that it can function as a strong safe haven in favorable economic times and with low-risk aversion. Ustaoglu (2022) also supports the strong safe-haven characteristic of Bitcoin against most emerging stock market indices during the COVID-19 period. Umar et al. (2023) assert that Bitcoin and Gold are not reliable safe-havens. Singh et al. (2024) in their study reveal that Bitcoin is an effective hedge for investments in Nifty-50, Sensex, GBP–INR, and JPY–INR, at the same time a good diversifier for Gold. The study suggests that investors can incorporate Bitcoin in their portfolios as a good hedge against market volatility in equities and commodities markets. During the COVID-19 epidemic, Barbu et al. (2022) investigated if Ethereum and Bitcoin could serve as a short-term safe haven or diversifier against stock indices and bonds. The outcomes are consistent with the research conducted by Snene Manzli et al. (2024). Both act as hybrid roles for stock market returns, diversifiers for sustainable stock market indices, and safe havens for bond markets. Notably, Bhuiyan et al. (2023) found that Bitcoin provides relatively better diversification opportunities than Gold during times of crisis. To reduce risks, Bitcoin has demonstrated a strong potential to operate as a buffer against global uncertainty and may be a useful hedging tool in addition to Gold and similar assets (Baur & Lucey, 2010; Bouri et al., 2017; Capie et al., 2005; Dyhrberg, 2015). According to Huang et al. (2021), its independence from monetary policies and minimal association with conventional financial assets allow it to have a safe-haven quality. Bitcoins have a substantial speed advantage over other assets since they are traded at high and constant frequencies with no days when trading is closed (Selmi et al., 2018). Additionally, it has been demonstrated that the average monthly volatility of Bitcoin is higher than that of Gold or a group of international currencies expressed in US dollars; nevertheless, the lowest monthly volatility of Bitcoin is lower than the maximum monthly volatility of Gold and other foreign currencies (Dwyer, 2015). Leverage effects are also evident in Bitcoin returns, which show lower volatilities in high return periods and higher volatilities in low return times (Bouri et al., 2017; Liu et al., 2017). According to recent research, Bitcoins can be used to hedge S&P 500 stocks, which increases the likelihood that institutional and retail investors will build secure portfolios (Okorie, 2020). Bitcoin demonstrates strong hedging capabilities and can complement Gold in minimizing specific market risks (Baur & Lucey, 2010). Its high-frequency and continuous trading further enrich the range of available hedging tools (Dyhrberg, 2016). Moreover, Bitcoin spot and futures markets exhibit similarities to traditional financial markets. In the post-COVID-19 period, Zhang et al. (2021) found that Bitcoin futures outperform Gold futures.Gold, silver, palladium, and platinum were among the most common precious metals utilized as safe-haven investments. Gold is one such asset that is used extensively (Salisu et al., 2021). Their study tested the safe-haven property of Gold against the downside risk of portfolios during the pandemic. Empirical results have also shown that Gold functions as a safe haven for only 15 trading days, meaning that holding Gold for longer than this period would result in losses to investors. This explains why investors buy Gold on days of negative returns and sell it when market prospects turn positive and volatility decreases (Baur & Lucey, 2010). In their study, Kumar et al. (2023) tried to analyse the trends in volume throughout futures contracts and investigate the connection between open interest, volume, and price for bullion and base metal futures in India. Liu et al. (2016) in their study found that there is no negative association between Gold and the US stock market during times of extremely low or high volatility. Because of this, it is not a strong safe haven for the US stock market (Hood & Malik, 2013). Post-COVID-19, studies have provided mixed evidence on the safe-haven properties of Gold (Bouri et al., 2020; Cheema et al., 2022; Ji et al., 2020). According to Kumar and Padakandla (2022), Gold continuously demonstrates safe-haven qualities for all markets, except the NSE, both in the short and long term. During the COVID-19 episode, Gold’s effectiveness as a hedge and safe-haven instrument has been impacted (Akhtaruzzaman et al., 2021). Al-Nassar (2024) conducted a study on the hedge effectiveness of Gold and found that it is a strong hedge in the long run. Bhattacharjee et al. (2023) in their paper examined the symmetrical and asymmetrical linkage between Gold price levels and the Indian stock market returns by employing linear autoregressive distributed lag and nonlinear autoregressive distributed lag models. The results exhibit that the Indian stock market returns and Gold prices are cointegrated. According to the most recent study by Kaczmarek et al. (2022), Gold has no potential as a safe haven, despite some studies on the COVID-19 pandemic showing contradictory results. The co-movements of Bitcoin and the Chinese stock market have also normalized as a result of this epidemic (Belhassine & Karamti, 2021). Widjaja and Havidz (2023) verified that Gold was a safe haven asset during the COVID-19 pandemic, confirming the Gold’s safe-haven characteristic. As previously pointed out, investors value safe-haven investments in times of risk. Investors panic at these times when asset prices fall and move from less liquid (risky) securities to more liquid (safe) ones, such as cash, Gold, and government bonds. An asset must be bought and sold rapidly, at a known price, and for a reasonably modest cost to be considered truly safe (Smales, 2019). Therefore, we need to properly re-examine the safe-haven qualities of Gold and Bitcoin due to the mixed evidences regarding their safe-haven qualities and the impact of COVID-19 and the war in Ukraine on financial markets. This work contributes to and deviates from the body of existing literature in the following ways. We propose a novel approach in this work to evaluate an asset’s time-varying safe haven, hedge, and diversifier characteristics. This research examines the safe haven, hedging, and diversifying qualities of Gold and Bitcoin against the equity indices; S&P 500, CAC 40, and NSE 50. Through the use of rolling window estimation, we extend the methodology of Ratner and Chiu (2013) by estimating the aforementioned properties of the assets. Comparing rolling window estimation to other conventional techniques, the former will provide a more accurate representation of an asset’s time-varying feature. This study explores the conventional asset Gold’s time-varying safe haven, hedging, and diversifying qualities during crises like the COVID-19 pandemic and the conflict in Ukraine. We use Bitcoin, an unconventional safe-haven asset, for comparison. Data and Methodology We use the daily returns of three major equity indices; S&P500, CAC 40, and NSE 50 from January 3, 2018, to October 15, 2022. The equity indices were selected to represent three large and diverse markets namely the United States, France, and India in terms of geography and economic development. We assess safe-haven assets using the daily returns of Gold and Bitcoin over the same time. Equity data was collected from Yahoo Finance, Bitcoin data from coinmarketcap.com, and Gold data from the World Gold Council website. Engle (2002) developed the DCC (Dynamic Conditional Correlation)-GARCH model, which is frequently used to assess contagion amid pandemic uncertainty or crises. Time-varying variations in the conditional correlation of asset pairings can be captured using the DCC-GARCH model. Through employing this model, we can analyse the dynamic behavior of volatility spillovers. Engle’s (2002) DCC-GARCH model contains two phases; 1. Univariate GARCH model estimation2. Estimation of time-varying conditional correlation. For its explanation, mathematical characteristics, and theoretical development, see here [insert the next link in “the word here” https://journals.sagepub.com/doi/10.1177/09711023251322578] Results and Discussion The outcomes of the parameters under the DCC-GARCH model for each of the asset pairs selected for the investigation are shown in Table 1.   First, we look at the dynamical conditional correlation coefficient, ρ.The rho value is negative and insignificant for NSE 50/Gold, NSE 50 /BTC, S&P500/Gold, and S&P500/BTC indicating a negative and insignificant correlation between these asset pairs, showing Gold and Bitcoin as potential hedges and safe havens. The fact that ρ is negative and significant for CAC 40/Gold suggests that Gold can be a safe haven against CAC 40 swings. The asset pair CAC/BTC, on the other hand, has possible diversifier behavior with ρ being positive but statistically insignificant. Next, we examine the behavior of the DCC-GARCH parameters; α and β. We find that αDCC is statistically insignificant for all the asset pairs, while βDCC is statistically significant for all asset pairs. βDCC quantifies the persistence feature of the correlation and the extent of the impact of volatility spillover in a particular market’s volatility dynamics. A higher βDCC value implies that a major part of the volatility dynamics can be explained by the respective market’s own past volatility. For instance, the NSE 50/Gold’s βDCC value of 0.971 shows that there is a high degree of volatility spillover between these two assets, with about 97% of market volatility being explained by the assets’ own historical values and the remainder coming from spillover. Thus, we see that the volatility spillover is highly persistent (~0.8) for all the asset pairs except NSE 50/BTC. The results above show that the nature of the dynamic correlation between the stock markets, Bitcoin and Gold is largely negative, pointing toward the possibility of Gold and Bitcoin being hedge/safe haven. However, a detailed analysis is needed to confirm the same by employing rolling window analysis, and we present the results in the forthcoming section. We present the rolling window results for S&P500 first. We present the regression results for Gold in Figure 1 and Bitcoin in Figure 2   Figure 1. Rolling Window Regression Results for S&P500 and Gold.Note: Areas shaded under factor 1 represent significant regression coefficients. In Figure 1, we examine the behavior of β0 (intercept term), β1, β2, and β3 (partial correlation coefficients). The intercept term β0 will give an idea about whether the asset is behaving as a diversifier or hedge. Here, the intercept term shows significance most of the time. However, during 2018, the intercept was negative and significant, showing that it could serve as a hedge during geopolitical tensions and volatilities in the global stock market. However, during the early stages of COVID-19, we show that the intercept is negative and showing statistical significance, suggesting that Gold could serve as a hedge during the initial shocks of the pandemic. These findings are contrary to the results in the study by Tarchella et al. (2024) where they found hold as a good diversifier. Later, we find the intercept to be positive and significant, indicating that Gold could act as a potential diversifier. But during the Russia-Ukraine War, Gold exhibited hedge ability again. Looking into the behavior of β1, which is the partial correlation coefficient for the tenth percentile of return distribution shows negative and insignificant during 2018. Later, it was again negative and significant during the initial phases of COVID-19, and then negative in the aftermath, indicating that Gold could act as a weak safe haven during the COVID-19 pandemic. Gold could serve as a strong safe haven for the SP500 against volatility in the markets brought on by the war in Ukraine, as we see the coefficient to be negative and large during this time. From β2 and β3, the partial correlation coefficients of the fifth and first percentile, respectively, show that Gold possesses weak safe haven properties during COVID-19 and strong safe haven behavior during the Ukraine crisis. Next, we examine the characteristics of Bitcoin as a hedge/diversifier/safe haven against the S&P500 returns. We present the results in Figure 2.   Figure 2. Rolling Window Regression Results for S&P500 and Bitcoin.Note: Areas shaded under factor 1 represent significant regression coefficients. Like in the previous case, we begin by analysing the behavior of the intercept coefficient, which is β0. As mentioned earlier the intercept term will give a clear picture of the asset’s hedging and diversifier property. In the period 2018–2019, the intercept term is positive but insignificant. This could be due to the large volatility in Bitcoin price movements during the period. It continues to be minimal (but positive) and insignificant during 2019–2020, indicating toward weak diversification possibility. Post-COVID-19 period, the coefficient shows the significance and positive value, displaying the diversification potential. We see that the coefficient remains positive throughout the analysis, confirming Bitcoin’s potential as a diversifier. Looking into the behavior of β1 (the partial correlation coefficient at tenth percentile), it is positive but insignificant during 2018. The coefficient is having negative sign and showing statistical significance in 2019, suggesting that Bitcoin could be a good safe haven in that year. This year was characterized by a long list of corporate scandals, uncertainties around Brexit, and tensions in global trade. We can observe that throughout the COVID-19 period, the coefficient is showing negative sign and negligible during the March 2020 market meltdown, suggesting inadequate safe-haven qualities. However, Bitcoin will regain its safe-haven property in the coming periods, as the coefficient is negative and significant in the coming months. The coefficient is negative and shows statistical significance during the Ukrainian crisis, suggesting strong safe-haven property. Only during the Ukrainian crisis could Bitcoin serve as a safe haven, according to the behavior of β2, which displays the partial correlation coefficient at the fifth percentile. Bitcoin was a weak safe haven during COVID-19 and the Ukrainian crisis, according to β3, the partial correlation coefficient for the first percentile (coefficient negative and insignificant). According to the overall findings, Gold is a stronger safe haven against the S&P 500’s swings. This result is consistent with the previous studies of Triki and Maatoug (2021), Shakil et al. (2018), Będowska-Sójka and Kliber (2021), Drake (2022), and Ghazali et al. (2020), etc. The same analysis was conducted for the CAC 40 and the NSE 50; the full analysis can be found here [insert the next link in “the word here” https://journals.sagepub.com/doi/10.1177/09711023251322578]. However, it is important to highlight the respective results: In general, we may say that Gold has weak safe-haven properties considering CAC40. We can conclude that Bitcoin’s safe-haven qualities for CAC40 are weak. We can say that Gold showed weak safe-haven characteristics during the Ukraine crisis and good safe-haven characteristics for the NSE50 during COVID-19. We may say that Bitcoin exhibits weak safe haven, but strong hedging abilities to NSE50. Concluding Remarks In this study, we suggested a new method to evaluate an asset’s time-varying hedge, diversifier, and safe-haven characteristics. We propose a rolling window estimation of the DCC-based regression of Ratner and Chiu (2013). Based on this, we estimate the conventional asset’s time-varying safe haven, hedging, and diversifying properties during crises like the COVID-19 pandemic and the conflict in Ukraine. For comparison purposes, we include Bitcoin, a nonconventional safe-haven asset. We evaluate Gold and Bitcoin’s safe haven, hedging, and diversifier properties to the S&P 500, CAC 40, and NSE 50 variations. We use a rolling window of length 60 to estimate the regression. From the results, we find that Gold can be considered as a better safe haven against the fluctuations of the S&P 500. In the case of CAC 40, Gold and Bitcoin have weak safe-haven properties. While Bitcoin demonstrated strong safe-haven characteristics during the Ukraine crisis, Gold exhibited strong safe-haven characteristics during COVID-19 for the NSE 50. Overall, the findings indicate that Gold is the better safe haven. This outcome is consistent with earlier research (Będowska-Sójka & Kliber, 2021; Drake, 2022; Ghazali et al., 2020; Shakil et al., 2018; Triki & Maatoug, 2021). When it comes to Bitcoin, its safe-haven feature is weak. Bitcoin, however, works well as a diversifier and hedge. Therefore, from a policy perspective, investing in safe-haven instruments is crucial to lower the risks associated with asset ownership. Policymakers aiming to enhance the stability of financial portfolios might encourage institutional investors and other market players to incorporate Gold into their asset allocations. Gold’s strong safe-haven qualities, proven across various market conditions, make it a reliable choice. Gold’s performance during crises like COVID-19 highlights its potential to mitigate systemic risks effectively. Further, Bitcoin could also play a complementary role as a hedge and diversifier, especially during periods of significant volatility such as the Ukraine crisis. While Bitcoin’s safe-haven characteristics are relatively weaker, its inclusion in a diversified portfolio offers notable value and hence it should not be overlooked. Further, policymakers may consider how crucial it is to monitor dynamic correlations and periodically rebalance portfolios to account for shifts in the safe haven and hedging characteristics of certain assets. Such measures could help reduce the risks of over-reliance on a single asset type and create more resilient portfolios that can better withstand global economic shocks. For future research, studies can be conducted on the estimation of the rolling window with different widths. This is important to understand how the safe-haven property changes across different holding periods. Further, more equity markets would be included to account for the differences in market capitalization and index constituents. This study can be extended by testing these properties for multi-asset portfolios as well. We intend to take up this study in these directions in the future. Data Availability StatementNot applicable.Declaration of Conflicting InterestsThe authors declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.FundingThe authors received no financial support for the research, authorship, and/or publication of this article.ReferencesAkhtaruzzaman M., Boubaker S., Lucey B. M., & Sensoy A. (2021). Is gold a hedge or a safe-haven asset in the COVID-19 crisis? Economic Modelling, 102, 105588. Crossref. Web of Science.Al-Nassar N. S. (2024). Can gold hedge against inflation in the UAE? A nonlinear ARDL analysis in the presence of structural breaks. PSU Research Review, 8(1), 151–166. Crossref.Barbu T. C., Boitan I. A., & Cepoi C. O. (2022). Are cryptocurrencies safe havens during the COVID-19 pandemic? A threshold regression perspective with pandemic-related benchmarks. Economics and Business Review, 8(2), 29–49. Crossref.Baur D. G., & Lucey B. M. (2010). Is gold a hedge or a safe haven? An analysis of stocks, bonds and gold. Financial Review, 45(2), 217–229. Crossref.Będowska-Sójka B., & Kliber A. (2021). Is there one safe-haven for various turbulences? The evidence from gold, Bitcoin and Ether. The North American Journal of Economics and Finance, Elsevier, 56, 101390. Crossref.Belhassine O., & Karamti C. (2021). Contagion and portfolio management in times of COVID-19. Economic Analysis and Policy, 72, 73–86. Crossref. PubMed. Web of Science.Bhattacharjee A., Das J., & Kumar S. (2023). Evaluating the symmetrical and asymmetrical linkage between gold price and Indian stock market in the presence of structural change. NMIMS Management Review, 31(4), 288–297. Crossref. Web of Science.Bhuiyan R. A., Husain A., & Zhang C. (2023). Diversification evidence of Bitcoin and Gold from wavelet analysis. Financial Innovation, 9(1), 100. Crossref. PubMed. Web of Science.Bouri E., Azzi G., & Dyhrberg A. H. (2017). On the return-volatility relationship in the Bitcoin market around the price crash of 2013. Economics, 11(1), 2. Crossref.Bouri E., Gupta R., Tiwari A. K., & Roubaud D. (2017). Does Bitcoin hedge global uncertainty? Evidence from wavelet-based quantile-in-quantile regressions. Finance Research Letters, 23, 87–95. Crossref. Web of Science.Bouri E., Shahzad S. J. H., Roubaud D., Kristoufek L., & Lucey B. (2020). Bitcoin, gold, and commodities as safe havens for stocks: New insight through wavelet analysis. The Quarterly Review of Economics and Finance, 77, 156–164. Crossref. Web of Science.Brenner M., & Galai D. (1989). New financial instruments for hedge changes in volatility. Financial Analysts Journal, 45(4), 61–65. Crossref.Capie F., Mills T. C., & Wood G. (2005). Gold as a hedge against the dollar. Journal of International Financial Markets, Institutions and Money, 15(4), 343–352. Crossref.Ceylan Ö. (2022). Hedging Effectiveness of the VIX ETPs: An analysis of the time-varying performance of the VXX. In Handbook of research on new challenges and global outlooks in financial risk management (pp. 384–401). IGI Global. Crossref.Cheema M. A., Faff R., & Szulczyk K. R. (2022). The 2008 global financial crisis and COVID-19 pandemic: How safe are the safe haven assets? International Review of Financial Analysis, 83, 102316. Crossref. PubMed. Web of Science.Conlon T., & McGee R. (2020). Safe haven or risky hazard? Bitcoin during the COVID-19 bear market. Finance Research Letters, 35, 101607. Crossref. PubMed. Web of Science.Demir E., Gozgor G., Lau C. K. M., & Vigne S. A. (2018). Does economic policy uncertainty predict the Bitcoin returns? An empirical investigation. Finance Research Letters, 26, 145–149. Crossref. Web of Science.Drake P. P. (2022). The gold-stock market relationship during COVID-19. Finance Research Letters, 44, 102111. Crossref. PubMed. Web of Science.Dwyer G. P. (2015). The economics of Bitcoin and similar private digital currencies. Journal of Financial Stability, 17, 81–91. Crossref. Web of Science.Dyhrberg A. H. (2015). Hedging capabilities of bitcoin. Is it the virtual gold? Finance Research Letters, 1–6. https://doi.org/10.1016/j.frl.2015.10.025Dyhrberg A. H. (2016). Hedging capabilities of bitcoin. Is it the virtual gold? Finance Research Letters, 16, 139–144. https://doi.org/10.1016/j.frl.2015.10.025 Web of Science.Engle R. (2002). Dynamic conditional correlation: A simple class of multivariate generalized autoregressive conditional heteroskedasticity models. Journal of Business & Economic Statistics, 20(3), 339–350. Crossref. Web of Science.Ghazali M. F., Lean H. H., & Bahari Z. (2020). Does gold investment offer protection against stock market losses? Evidence from five countries. The Singapore Economic Review, 65(02), 275–301. Crossref.Hasan M. B., Hassan M. K., Rashid M. M., & Alhenawi Y. (2021). Are safe haven assets really safe during the 2008 global financial crisis and COVID-19 pandemic? Global Finance Journal, 50, 100668. Crossref. PubMed.Hood M., & Malik F. (2013). Is gold the best hedge and a safe haven under changing stock market volatility? Review of Financial Economics, 22(2), 47–52. Crossref.Huang Y., Duan K., & Mishra T. (2021). Is Bitcoin really more than a diversifier? A pre-and post-COVID-19 analysis. Finance Research Letters, 43, 102016. Crossref.Ji Q., Zhang D., & Zhao Y. (2020). Searching for safe-haven assets during the COVID-19 pandemic. International Review of Financial Analysis, 71, 101526. Crossref. PubMed. Web of Science.Kaczmarek T., Będowska-Sójka B., Grobelny P., & Perez K. (2022). False safe haven assets: Evidence from the target volatility strategy based on recurrent neural network. Research in International Business and Finance, 60, 101610. Crossref. Web of Science.Kumar A. S., & Padakandla S. R. (2022). Testing the safe-haven properties of gold and bitcoin in the backdrop of COVID-19: A wavelet quantile correlation approach. Finance Research Letters, 47, 102707. Crossref. PubMed. Web of Science.Kumar M. A., Swathi J., Pallavi T. A., & Bavana S. (2023). Volume progression and price–volume relationship of commodity futures: Case of bullion and base metals. NMIMS Management Review, 31(4), 265–274. https://doi.org/10.1177/09711023241230463 Web of Science.Liu C. S., Chang M. S., Wu X., & Chui C. M. (2016). Hedges or safe havens—Revisit the role of gold and USD against stock: A multivariate extended skew-t copula approach. Quantitative Finance, 16(11), 1763–1789. Crossref.Liu R., Zhichao S., Wei G., & Wang W. (2017). GARCH model with fat-tailed distributions and Bitcoin exchange rate returns. Journal of Accounting, Business and Finance Research, 1(1), 71–75. https://doi.org/10.2139/ssrn.3666106 Crossref.Mokni K. (2021). When, where, and how economic policy uncertainty predicts Bitcoin returns and volatility? A quantiles-based analysis. The Quarterly Review of Economics and Finance, 80, 65–73. Crossref.Nagy B. Z., & Benedek B. (2021). Higher co-moments and adjusted Sharpe ratios for cryptocurrencies. Finance Research Letters, 39, 101543. Crossref. Web of Science.Nakamoto S. (2008). Bitcoin: A peer-to-peer electronic cash system. Bitcoin. https://bitcoin.org/bitcoin.pdfOkorie D. I. (2020). Could stock hedge Bitcoin risk(s) and vice versa? Digital Finance, 2(1), 117–136. Crossref.Paule-Vianez J., Prado-Román C., & Gómez-Martínez R. (2020). Economic policy uncertainty and Bitcoin. Is Bitcoin a safe-haven asset? European Journal of Management and Business Economics, 29(3), 347–363. Crossref.Ratner M., & Chiu C. C. J. (2013). Hedging stock sector risk with credit default swaps. International Review of Financial Analysis, 30, 18–25. Crossref. Web of Science.Salisu A. A., Raheem I. D., & Vo X. V. (2021). Assessing the safe haven property of the gold market during COVID-19 pandemic. International Review of Financial Analysis, 74, 101666. Crossref. PubMed. Web of Science.Saxena S., & Villar A. (2008). Hedging instruments in emerging market economies. Financial globalisation and emerging market capital flows. BIS Papers, 44, 71–87.Selmi R., Mensi W., Hammoudeh S., & Bouoiyour J. (2018). Is Bitcoin a hedge, a safe haven or a diversifier for oil price movements? A comparison with gold. Energy Economics, 74, 787–801. Crossref. Web of Science.Shahzad S. J. H., Bouri E., Roubaud D., Kristoufek L., & Lucey B. (2019). Is Bitcoin a better safe-haven investment than gold and commodities? International Review of Financial Analysis, 63, 322–330. Crossref. Web of Science.Shakil M. H., Mustapha I. H. M., Tasnia M., & Saiti B. (2018). Is gold a hedge or a safe haven? An application of ARDL approach. Journal of Economics, Finance and Administrative Science, 23(44), 60–76. Crossref.Singh V. V., Singh H., & Ansari A. (2024). Bitcoin as a distinct asset class for hedging and portfolio diversification: A DCC-GARCH model analysis. NMIMS Management Review, 32(1), 7–13. Crossref. Web of Science.Smales L. A. (2019). Bitcoin as a safe haven: Is it even worth considering? Finance Research Letters, 30, 385–393. Crossref. Web of Science.Snene Manzli Y., Alnafisah H., & Jeribi A. (2024). Safe haven ability of energy and agricultural commodities against G7 stock markets and banking indices during COVID-19, Russia–Ukraine War, and SVB collapse: Evidence from the wavelet coherence approach. Discrete Dynamics in Nature and Society, 2024(1), 2587000. Crossref.Syuhada K., Suprijanto D., & Hakim A. (2022). Comparing gold’s and Bitcoin’s safe-haven roles against energy commodities during the COVID-19 outbreak: A vine copula approach. Finance Research Letters, 46, 102471. Crossref. PubMed. Web of Science.Tarchella S., Khalfaoui R., & Hammoudeh S. (2024). The safe haven, hedging, and diversification properties of oil, gold, and cryptocurrency for the G7 equity markets: Evidence from the pre-and post-COVID-19 periods. Research in International Business and Finance, 67, 102125. Crossref. Web of Science.Triki M. B., & Maatoug A. B. (2021). The GOLD market as a safe haven against the stock market uncertainty: Evidence from geopolitical risk. Resources Policy, 70, 101872. Crossref. Web of Science.Umar Z., Bossman A., Choi S. Y., & Teplova T. (2023). The relationship between global risk aversion and returns from safe-haven assets. Finance Research Letters, 51, 103444. Crossref. Web of Science.Ustaoglu E. (2022). Safe-haven properties and portfolio applications of cryptocurrencies: Evidence from the emerging markets. Finance Research Letters, 47, 102716. Crossref. Web of Science.Widjaja M., & Havidz S. A. H. (2023). Are gold and cryptocurrency a safe haven for stocks and bonds? Conventional vs Islamic markets during the COVID-19 pandemic. European Journal of Management and Business Economics (ahead-of-print).Yan Y., Lei Y., & Wang Y. (2022). Bitcoin is a safe-haven asset and a medium of exchange. Axioms, 11(8), 415. Crossref.Yousaf I., Plakandaras V., Bouri E., & Gupta R. (2022). Hedge and safe haven properties of gold, US Treasury, Bitcoin, and Dollar/CHF against the FAANA companies and S&P 500 (Department of Economics, Working Paper Series No. 2022–27). University of Pretoria.Zhang Y., Zhu P., & Xu Y. (2021). Has COVID-19 changed the hedge effectiveness of bitcoin? Frontiers in Public Health, 9. https://doi.org/10.3389/fpubh.2021.704900

Diplomacy
Trump, Putin Alaska Arrival (9260680)

Why Peace in Ukraine Remains Elusive

by Nicholas Morieson , Ihsan Yilmaz

Donald Trump declared his Alaska summit with Vladimir Putin a success, despite contrasting evidence suggesting otherwise. On Truth Social, he said a peace agreement over Ukraine, not a mere ceasefire, was the right path, claims he echoed during follow-up talks in Washington with Volodymyr Zelensky and European leaders. “Potentially, millions of people’s lives will be saved,” Trump said. That optimism looks misplaced. For Putin, Ukraine is not merely a bargaining chip but a territory he views as part of a Russian “civilization-state.” When he meets with Western leaders, he is not negotiating over land; he frames the war as a defense of Russian civilization and its values. As a result, Putin cannot easily “make a deal” involving land swaps to end the conflict.  Russia’s civilisational project  In addition to civilisational rhetoric, other factors contribute to Putin’s intransigence. Strategic concerns about NATO, fears for regime security, and the material importance of Crimea and the Black Sea all shape Moscow’s stance. Yet the language of civilisation turns these into matters of identity and survival. It fuses practical interests with existential claims, making retreat even harder. Even if compromises were possible on security or economics, the civilisational frame casts them as betrayals of Russia’s destiny.  Some American policymakers have tended to read Russia as a state with interests that can be traded. However, Putin accounts for Russia not simply as a nation-state, but as a civilization rooted in Orthodoxy, empire, and the memory of Soviet power. Viewed through this prism, Ukraine is not a foreign neighbour, but an inseparable part of Russian history and identity, which must be defended against Western encroachment.  In his 2021 essay On the Historical Unity of Russians and Ukrainians, Putin claimed that Russians and Ukrainians are “one people,” and that Ukraine is “an inalienable part of our own history, culture, and spiritual space.” Whatever his private convictions, the function of this language is clear. It justifies annexation and occupation, and it raises the political cost of retreat by treating territorial issues as matters of civilisational survival.   Putin himself insists that “the West” does not understand that “the Ukraine crisis is not a territorial conflict … and not an attempt to establish regional geopolitical balance.” Instead, he says, it is rooted in “the principles underlying the new international order” he is building. Peace, in this new order, is possible only “when everyone feels safe and secure, understands that their opinions are respected” and when “no one can unilaterally force …others to live or behave as a hegemon pleases even when it contradicts the sovereignty …traditions, or customs of peoples and countries.”    This framing lets the Kremlin portray the West as the aggressor imposing alien norms on unwilling Ukrainians. Russia, by contrast, is said to be fighting for itself on behalf of all nations who wish to see western hegemony end and the birth of a new multipolar world. Moreover, it portrays Ukraine’s status as a civilisational question tied to identity and resistance to Western liberal norms. As a result, only a settlement that Putin present domestically as recognition of Russia’s civilisational standing is acceptable, which complicates compromise beyond what standard diplomatic formulas suggest.  Challenges to Trump’s pursuit of peace  Trump has made no secret of his desire to be remembered as a peacemaker. However, he also admires strong leaders and has shown sympathy for post-liberal arguments that liberal democracy is exhausted. These affinities bring him closer, at least rhetorically, to elements of Putin’s stance.  Admiration and aspiration alone are insufficient in bridging the gap between Putin and Trump’s positions on Ukraine’s independence. Putin frames the conflict as existential, defending Russian civilisation against Western encroachment. This  makes compromise especially difficult. If the war is understood in these terms, how can Moscow return occupied territories without undermining its own civilisational claim? How can it accept a Ukraine that leans towards the European Union, or tolerate an American presence on its soil?  Trump may want peace, but Putin has tied his legitimacy to a narrative that resists it. Unless that framing is abandoned, or radically reinterpreted, any settlement will remain elusive.  A wider trend  “Russia’s approach is part of a wider pattern in which civilisational claims have become central to how leaders justify power and resist compromise. Xi Jinping frames China as a five-thousand-year-old civilisation whose territory includes Taiwan and the South China Sea. He presents the Communist Party as the guardian of a civilisational tradition stretching back to Confucius, giving contemporary disputes an aura of timeless legitimacy. Narendra Modi portrays India as an ancient Hindu civilisation restoring its rightful place after centuries of foreign domination. Each case is distinct, but the message is similar: our civilisation is exceptional, our sovereignty absolute, and our values not up for negotiation.    A troubled summit  Against this backdrop, the Alaska meeting was never likely to produce more than gestures. Trump may genuinely want peace and to be remembered as the leader who ended the war. Yet he is dealing with a counterpart who has justified the invasion of Ukraine in civilisational and existential terms. For Putin, Ukraine is not only territory but a symbol of Russia’s identity and sovereignty, cast as a bulwark against Western encroachment. Within this frame, Russia would view restoring Ukraine’s borders, accepting its European orientation, or tolerating a long-term American presence in the region as defeats of principle rather than concessions of interest.  Trump’s ambition to end the war faces an almost insoluble dilemma. Europe will reject a settlement that rewards aggression, while Putin refuses to surrender territory he has cast as integral to Russian civilisation. Land swaps seem practical but please neither side. If the conflict were to remains frozen, Ukraine will be fractured and the deeper issues unresolved. Peace demands compromise, but compromise undermines the very narratives on which Moscow has built its legitimacy. As a result, unless Putin retreats from his civilisational framing of the war, any settlement will remain elusive and Ukraine’s future uncertain.  Dr Nicholas Morieson is a Research Fellow at the Deakin Institute for Citizenship and Globalisation, Deakin University, Melbourne. He is the author of three books, including Weaponizing Civilizationalism for Authoritarianism: How Turkey, India, Russia, and China Challenge Liberal Democracy (Palgrave 2025).  This article is published under a Creative Commons License and may be republished with attribution.

Energy & Economics
Global business connection concept. Double exposure world map on capital financial city and trading graph background. Elements of this image furnished by NASA

Liaison countries as foreign trade bridge builders in the geo-economic turnaround

by Eva Willer

Introduction Geopolitical tensions are making global trade increasingly difficult. In order to reduce the associated risk of default, companies are shifting their trade relations to trading partners that are politically similar to them. In the course of the beginnings of geo-economic fragmentation, politically and economically like-minded countries are also gaining in importance for German and European decision-makers. Liaison countries1 in particular can form a counterforce to the trend towards polarization in foreign trade - especially between the USA and China: they are characterized by a pronounced economic and trade policy openness that overrides differences between geopolitical or ideological camps. Consequently, the question arises: How can relevant connecting countries for Germany and Europe be identified? What opportunities and risks do closer trade relations with these countries offer in order to strengthen foreign trade resilience in geopolitically uncertain times?  With a high degree of openness - defined as the sum of imports and exports in relation to gross domestic product - of over 80 percent2 , the German economy is strongly integrated into global trade. Accordingly, the disruptive effect of geo-economic fragmentation on the German economy would be above average. The defensive strategy to strengthen Germany's economic security by pushing for trade policy independence would only reinforce geo-economic fragmentation. Against the backdrop of comparatively high economic vulnerability, it is necessary to focus on those potential partner countries with which German and European foreign trade could be developed and expanded even under the condition of increasing fragmentation.  Geoeconomic Fragmentation  The term "geo-economic fragmentation" is used to describe the politically motivated reorganization of global goods and financial flows, in which strategic, economic and political interests primarily determine the choice of countries of origin and destination for trade flows.3 In the scenario of geo-economic fragmentation, the result would be the formation of a bloc within the global community of states, which would fundamentally change the regulatory structure of global economic networking. In this case, trade and investment would probably concentrate from a previously diverse range of economic partner countries - prior to the formation of the bloc - on those countries that now - since the formation of the bloc - belong to the same bloc.  The likelihood of this scenario occurring and leading to an increased fragmentation of the global economic order has increased again in the recent past. For example, Donald Trump's second term as US president is causing increasing geopolitical uncertainty worldwide.  Statements on the concrete form of a possible demarcation of potential blocs are subject to a great deal of uncertainty. However, the division of a large part of the global economy into a "US bloc" and a "China bloc" is a conceivable scenario for which German politics and business should prepare.  Data already shows that, at a global level, foreign trade openness has decreased in the recent past. Data from the World Trade Organization (WTO) illustrates the increasing hurdles in global trade in goods. While 3.1% of global imports were still affected by tariff or non-tariff barriers to trade in 2016 - including under WTO rules - this figure rose to 11.8% in 2024 over the following years.4 This development goes hand in hand with a noticeable loss of importance and enforcement of the WTO since the 2010s, which previously played a central role as the guardian of the rules-based global economic order.  Studies by the International Monetary Fund (IMF) have already found indications of an incipient geo-economic fragmentation along potential bloc borders. It shows that trade in goods and foreign direct investment between countries that would belong to the opposing camp in the event of a bloc formation declined on average in 2022 and 2023 - in contrast to foreign trade between countries that are geopolitically close.5  In this initial phase of geo-economic fragmentation, liaison countries are beginning to establish themselves as a counterforce, holding the fragmenting global community of states together with new trade and investment routes.  Identification of liaison countries Specifically, liaison countries have the following characteristics: a pronounced openness to foreign trade in the form of a high foreign trade quota and low tariff and non-tariff trade barriers, as well as pronounced economic relations with partner countries from different geopolitical camps. The geopolitical orientation of countries can be examined using data on voting behavior within the United Nations.6 This involves analyzing whether a country can be assigned to the US or Chinese camp - or whether there is no pronounced proximity and therefore political neutrality or "non-alignment" in the sense of ideological independence. The data-based identification of connecting countries is relatively new. Empirical analyses are also limited to connecting countries in the context of US-Chinese foreign trade - specifically US imports from China. In this case, the characteristics of a connecting country can be broken down into (1) "non-alignment" - i.e. a geopolitical distance to both a Western and an Eastern bloc - as well as (2) an increase in imports and foreign investment from China and (3) a simultaneous increase in exports to the United States. In a narrower sense, this is an evasive reaction to trade restrictions, i.e. circumventing trade. If the foreign trade indicators - specifically the trade and investment data relating to the US and China - of "non-aligned" countries for the period from 2017 to 2020 show corresponding characteristic-related changes compared to previous years, these can be identified as countries connecting the US and China.  The analysis of trade data shows that the value of direct exports from China to the USA fell during Donald Trump's first term in office. At the same time, both Chinese exports to some of the "non-aligned" countries and exports from these countries to the USA have increased significantly. These countries have presumably stepped in as a link on the export route from China to the US after the previously direct trade flow was interrupted by trade barriers and had to find a new route. Companies producing in China are therefore likely to have sought new, indirect ways to maintain access to the US sales market.  A certain statistical inaccuracy in the foreign trade data makes it difficult to draw a definitive conclusion in this context. It should be noted: No single commodity can be tracked across national borders in trade data collection. Whether the additional goods imported from China actually found their way to the United States can only be assumed approximately. However, if the trade flows are aggregated, a clearer picture emerges and the circumvention trade via selected connecting countries - including Vietnam and Mexico - becomes visible.  Data on foreign direct investment rounds off the analysis.7 "Non-aligned" countries in which an increase in Chinese investment can be seen between 2016 and 2020 in addition to trade flows can be identified as connecting countries. Here, too, available data suggests that the companies concerned either exported their goods to the United States via a stopover or even outsourced parts of their production destined for the US market to connecting countries. Five connecting countries between the US and China Based on the 2017-2020 study period, various connecting countries can be empirically identified that were used to indirectly maintain access to the US market. In terms of foreign trade volume, the economically most important connecting countries include Mexico, Vietnam, Poland, Morocco and Indonesia.8 All five countries are characterized by the fact that both their exports of goods to the US and their imports of goods from China increased significantly between 2017 and 2020. In addition, greenfield investments (foreign direct investment to set up a new production facility) have risen significantly compared to the period before 2017.  However, the five countries show different priorities in their development, which differentiate them in their role as connecting countries between the USA and China. In Vietnam, exports to the USA in particular have risen sharply. China has been the most important procurement market for Vietnamese companies for years. Poland, Mexico and Indonesia are characterized as connecting countries primarily by the significant increase in imports from China. Morocco, in turn, was able to attract more Chinese foreign investment in particular. Greenfield investments have almost tripled here since 2017. However, Poland - a rather surprising candidate for the role of liaison country, as it is intuitively assigned to the US-oriented bloc - is positioned fairly centrally between the US and China according to the analysis of voting behavior within the United Nations9. In addition, Poland qualifies primarily due to the sharp rise in greenfield investments from China, primarily in the expansion of domestic battery production.10  It cannot be concluded from the previous studies on the USA and China whether German companies are also circumventing trade barriers from the USA via the countries identified. As the trade policy conflicts between the US and China differ significantly from those between the EU and China, there has been a lack of comparable empirical data to analyze connecting countries in the EU context. Opportunities and challenges As the German economy is strongly oriented towards foreign trade and is closely networked with both the USA and China, German companies play a particularly exposed role in the area of tension between the USA and China. Increased economic exchange with potential connecting countries would offer German companies an opportunity to mitigate the expected shock of a geopolitical bloc. They could at least maintain international trade to a certain extent and thus secure some of the endangered sales and procurement markets. On the other hand, there are also costs associated with expanding foreign trade relations with potential connecting countries. The greater complexity also increases the risk in the value chains. Companies that position themselves wisely within this trade-off buy themselves valuable time in the event of a shock to reorganize themselves against the backdrop of changed foreign trade conditions.  From the perspective of foreign trade policy, it is also possible to examine the extent to which stronger foreign trade cooperation with (potential) connecting countries could have advantages. The trade-off between resilience and complexity must then be assessed at a macroeconomic level, beyond individual company interests. In order to make it easier for companies to connect to potential connecting countries and to create appropriate framework conditions, German and European policy can build on existing comprehensive strategies at national and European level. Both the China Strategy11 and the National Security Strategy12 focus foreign policy on connecting countries as part of a stronger economic and political risk diversification. There is also a similar framework at European level with the EU's Strategic Compass13 . Following on from this, the German government could create targeted incentives to open up new markets in liaison countries, which would diversify critical supply chains and reduce one-sided dependencies.  At the same time, connecting countries pose a challenge. These can be used to circumvent foreign trade measures such as sanctions if flows of goods can find alternative routes via connecting countries more easily than before.  In order to realize opportunities and overcome challenges, close cooperation between science, politics and companies is required. This first requires the identification of a selection of potential connecting countries through scientifically sound analysis. This creates the basis for the subsequent steps in which European and German policymakers work closely with companies to create attractive framework conditions for trade with potential connecting countries - for example through bilateral trade agreements.  Attractive foreign trade framework conditions can create the necessary incentive to actually expand trade relations with potential connecting countries. Companies need to weigh up individual cases and make forward-looking decisions: To what extent is there a risk of a loss of production triggered by geopolitical conflicts? And how much would the complexity of the value chain increase if more potential connecting countries were included? Ultimately, the actual choice of preferred sales and procurement markets lies with the individual companies. LicenseThis work is licensed under CC BY 4.0 References1. Verbindungsländer werden im Sinne von Connectors verstanden, vgl. Gita Gopinath/Pierre-Olivier Gourinchas/Andrea F Presbitero/Petia Topalova, Changing Global Linkages: A New Cold War?, Washington, D.C.: IMF, April 2024 (IMF Working Paper) <https://www.imf.org/en/Publications/WP/Issues/2024/04/05/Changing-Global-Linkages-A-New-ColdWar-547357/>. 2. Statistisches Bundesamt (Destatis), Außenwirtschaft. 2025, <https://www.destatis.de/DE/Themen/Wirtschaft/Globalisierungsindikatoren/aussenwirtschaft.html#246 078/>.  3. Shekahar Aiyar/Franziska Ohnsorge, Geoeconomic Fragmentation and ‚Connector’ Countries, Online verfügbar unter:  <https://mpra.ub.uni-muenchen.de/121726/1/MPRA_paper_121726.pdf>.4. WTO, WTO Trade Monitoring Report, Genf, November 2024, <https://www.wto.org/english/tratop_e/tpr_e/factsheet_dec24_e.pdf/>. 5. Gita Gopinath/Pierre-Olivier Gourinchas/Andrea F Presbitero/Petia Topalova, Changing Global Linkages: A New Cold War?, Washington, D.C.: IMF, April 2024 (IMF Working Paper) <https://www.imf.org/en/Publications/WP/Issues/2024/04/05/Changing-Global-Linkages-A-New-ColdWar-547357/>.  6. Michael A. Bailey/Anton Strezhnev/Erik Voeten, »Estimating Dynamic State Preferences from United Nations Voting Data«, Journal of Conflict Resolution, 61 (2017) 2, S. 430-456, <https://journals.sagepub.com/doi/10.1177/0022002715595700/>.7. Gita Gopinath/Pierre-Olivier Gourinchas/Andrea F Presbitero/Petia Topalova, Changing Global Linkages: A New Cold War?, Washington, D.C.: IMF, April 2024 (IMF Working Paper) <https://www.imf.org/en/Publications/WP/Issues/2024/04/05/Changing-Global-Linkages-A-New-ColdWar-547357/>. War-547357. 8. Enda Curran/Shawn Donnan/Maeva Cousin, »These Five Countries are Key Economic ‚Connectors‘ in a Fragmenting World«, in Bloomberg (online), 1.11.2023, <https://www.bloomberg.com/news/articles/2023-1102/vietnam-poland-mexico-morocco-benefit-from-us-china-tensions/>.9. Michael A. Bailey/Anton Strezhnev/Erik Voeten, »Estimating Dynamic State Preferences from United Nations Voting Data«, Journal of Conflict Resolution, 61 (2017) 2, S. 430-456, <https://journals.sagepub.com/doi/10.1177/0022002715595700/>.  10. Enda Curran/Shawn Donnan/Maeva Cousin, »These Five Countries are Key Economic ‚Connectors‘ in a Fragmenting World«, in Bloomberg (online), 1.11.2023, <https://www.bloomberg.com/news/articles/202311-02/vietnam-poland-mexico-morocco-benefit-from-us-china-tensions/>.11. Auswärtiges Amt, China‐Strategie der Bundesregierung, Berlin, Juli 2023, <https://www.auswaertigesamt.de/resource/blob/2608578/810fdade376b1467f20bdb697b2acd58/china-strategie-data.pdf/>.  12. Auswärtiges Amt, Integrierte Sicherheit für Deutschland: Nationale Sicherheitsstrategie, Berlin, Juni 2023, <https://www.bmvg.de/resource/blob/5636374/38287252c5442b786ac5d0036ebb237b/nationalesicherheitsstrategie-data.pdf/>.  13. Rat der Europäischen Union, Ein Strategischer Kompass für Sicherheit und Verteidigung, Brüssel, März 2022, <https://data.consilium.europa.eu/doc/document/ST-7371-2022-INIT/de/pdf/>.

Defense & Security
Bricked wall with stop terrorism sign

Causes of women involement in terrorism

by Eraj Farooqui

AbstractThis paper explores the complex factors that contribute to women's participation in terrorism, a subject that has attracted more scholarly interest, particularly in the wake of 9/11. The discipline is nonetheless politicised and divided despite a great deal of study, which is frequently made worse by a lack of primary data. Women, who are typically thought of as quiet and non-violent, have taken on important roles in terrorist groups, especially during the 1990s, where they have participated in high-profile attacks and leadership roles. The study identifies the main factors: political, religious, personal, and gender equality—that motivate women's participation. Examples show how different organisations differ in that some encourage women to participate actively, while others limit their positions. The study also examines how terrorism has changed over time, with a particular emphasis on its gendered aspects, and assesses how contemporary organisations such as the Islamic State have reshaped the roles of women in terrorist networks. Finally, by illuminating the ideological, cultural, and societal factors that lead to women's radicalisation and involvement, this research offers an in-depth examination of the relationship between gender and terrorism.Keywords:  Terrorism , Women , Political , Religion , Personal , Gender-equality Introduction The reasons behind female terrorism have been extensively studied and debated by numerous academics. Even though there is a wealth of study, a substantial portion of it is contradictory or incomplete. Frequently, the highly politicised word of terrorism has led to contradictory claims in the research. To understand why individuals resort to women terrorism, scholars highlight political, religious, social, and personal causes. In our culture, women were seen as housewives and peaceful members of society, and terrorist groups were controlled by men. Research on women and terrorism can be done on a variety of subjects; however, this paper will mostly focus on the causes of why women participate in terrorism. After 9/11 the academic research on scholarly papers on terrorism have increased by 300% since 9/11.[1] The connection between terrorism and gender is often overlooked due to governments' reluctance to reveal the primary causes and the reluctance to provide reliable data. Researchers often avoid original sources for security reasons. A 2009 review by Karen Jacques and Paul J. Taylor found a reluctance to describe events, excessive narrative analysis, and reliance on secondary sources. [2] The word "terror" comes from the Latin verb "terrere" which means to frighten. It was originally used by the Romans in 105 B.C. to characterise the terror that engulfed Rome during the attack by the Cibri tribe. During the French Revolution’s Reign of Terror, Maximilien Robespierre incited fear among the people.[3]The word "terrorist" was used by Edmund Burkey in the Regicide Peace letter. With the end of Reign of Terror, the word ‘terrorism’ gained popularity.[4] Terrorism, a deliberate use of force or intimidation, is a significant issue in the 21st century, often driven by ideological, religious, or political factors. However, the term "terrorism" has no widely recognised definition. There are four distinct stages of modern terrorism. The first wave of terrorism began in Russia and spread to Western Europe and the United States, using revolutionary and anarchist beliefs.[5]  The final wave is founded on religious beliefs that the world is currently dealing with. This wave started in 1979 when Iran underwent an Islamic revolution. Because of gender norms, terrorists are frequently perceived as masculine attackers. Women are perceived as powerless, passive, and victims during times of conflict, but it is important to remember that if they participate in terrorism, they may pose a greater threat than men.[6]And since 1990, women have gained prominence in terrorist organisations, assuming leadership positions and taking part in more brutal assaults. More media attention is given to female attackers, and people are more curious about the motivations behind their actions. Additionally, terrorist organisations are recruiting more women as a result of this. Although they have historically been involved in terrorist organisations, women's numbers have been small. As an example, the number of female suicide attackers has surged from eight in the 1980s to well over 100 since 2000, indicating a growth in the involvement of women in terrorist actions.[7]  On the other hand as per Bloom’s report over 257 suicide attacks were carried out by female bombers between 1985 and 2010, accounting for 25% of all terrorist incidents. Since 2002, the proportion of female bombers in several nations has surpassed 50%.[8]The first known incidence of female political violence happened in 1878, when Zasulich shot Fedor Trepov, the governor of Saint Petersburg. David Rapoport identified this as one of the four waves of modern terrorism.[9] Weinberg and Eubank claim that women have primarily assumed leadership positions in left-wing revolutionary bands while being assigned to inferior positions in right-wing organisations. They mostly perform supporting and auxiliary functions for numerous religious institutions. [10]Gender, Palestinian Women, and Terrorism: Women's Liberation or Oppression? was written by Anat Berko and Edna Erez. stated that during his questioning, he discovered that many Palestinian men did not approve of women participating in suicide bombings because they saw them as inferior to men.[11] After doing study with a local terrorist organisation, Jacques and Taylor chose 30 male and female suicide bombers. He finished by studying the fact that males prefer to join terrorist organisations for religious and nationalistic reasons, but female suicide terrorists are motivated by personal ones. Mia Bloom’s book the Bombshell: Women and Terrorism examines the motivations of women who participate in terrorism,[12] with an emphasis on relationships, respect, revenge, and redemption. According to Vetter and Perlstein, one of the reasons why women join terrorist organisations is because of gender equality. However, Jacques and Taylor disagree with this notion.[13]The main reason women join the LTTE is to fight for gender equality; they participate in every aspect of the group and do so to avoid being discriminated against and repressed by the male-dominated society.  The following studies will provide an academic perspective on the causes of women's involvement in terrorism. The main focus will be on four causes: political, religious, personal, and gender equality, as well as a list of important terror occurrences conducted by female terrorists as a result of some key ideological beliefs. Religious Cause: Religious convictions have been the foundation of many terrorist organisations throughout history. The Crusaders can be categorised as a terrorist group. Although the Crusaders' main objective was to propagate Christianity, they also committed heinous acts of terrorism. The Iranian Revolution of 1979 was the fourth wave of contemporary terrorism, and David Rapport claims that it was the first instance of religious terrorism in the modern era. Religious terrorism's core principle is the promotion of violence in the name of furthering religious beliefs. For example, Al-Qaeda and ISIS promote an Islamic caliphate globally.[14] However, attempting to do so by using cruel and aggressive methods. Islam and terrorism have become more associated since 9/11, as terrorist organisations have posed a serious threat to Western ideologies and societal influences.[15] Gonzalez-Perez notes that suicide bombers frequently use the idea of martyrdom and benefits in the afterlife to lure people into justifying their acts.[16] Women are also part of religious terrorist organisations but there are two argument over women involvement in jihadi group. As explaind by Muhammad Khayr Haykal in his book Al-Jihad wa al-qital fi al-siyasah al-shar'iyyah. 1. Women were seen as having a responsibility in raising money for Jihadis, caring for children, and providing medical treatment.[17] 2.    The Islamic state should set up training facilities for women to learn how to wield weapons and combat techniques, according to Islamic legal expert Muhammad Khayr Haykal. According to him, all Muslims should be held accountable for jihad if it turns into fard ‘ayn, and women must be prepared for this possibility in order to perform their duty. This strategy permits the practice of female jihadism in martyrdom missions and on the battlefield.[18] Role of women in Al-Qaeda According to Robet Pape in his book Dying to Win: The Strategic Logic of Suicide Terrorism.[19]Highlights that male terrorists affiliated with Al-Qaeda oppose women's participation in terrorism. However the Tamil Tigers used twenty-three female attackers, the Palestinians used six, the Lebanese used six, the Chechens used fourteen, and the PKK used ten. Consequently, he concluded that Islamic fundamentalists oppose female fighters.[20] However, after the rise of the Islamic state, which encourages women to join their organisation and accept arms, the Pape argument is no longer regarded as legitimate. For example, some 200 women joined the Islamic State in Syria in 2014 after migrating from Western nations. Additionally, they more than doubled their numbers in 2015, reaching over 550 women.[21] This suggests that the Islamic State may assign women a direct role, such as suicide bombing, in a way that is different from that of many other jihadist organisations, such as the Taliban and Al Qaeda.  In Al-Qaeda the women played a secondary role for.e.g: Al Qaeda also benefited strategically from the assistance that women provided. For instance, the female terrorists of Al Qaeda were strongly using the internet to try to convince men to join the worldwide Jihad. Some males are inclined to join these groups because they feel ashamed of their masculinity as a result of these communication strategies.[22]Women's roles in jihadist organisations are valued in that they bear children and raise them to be potential recruits for terrorist organisations. Usama Bin Laden thanked women by saying: "You have inspired and encouraged [men] to join jihad, and you have raised all the men who fought in Palestine, Lebanon, Afghanistan, and Chechnya, and you are the ones who produced the squadron of heroic men who carried out the raids in New York and Washington."[23] On the other hand Ayman al-Zawahiri's wife, Umayma al-Zawahiri, also urged her "Muslim sisters" to raise their kids on the love of jihad in God's way and "to induce their brothers, husbands, and sons to protect Muslims' lands and properties. To support (male) jihadists with prayers and financial support. [24] Al Khansa'a was one of the authors of the online magazine that inspired Muslim sisters with her articles; while she did not advocate for women to fight in combat, she did counsel them to stay in shape and exercise so they would be prepared for jihad.[25] Al-Qaeda Iraq's founder and Al-Qaeda member Abu Musab al Zarqawi urged Iraqi women to join the military. In Talafa, Iraq, a US military recruiting centre was the target of the first female suicide bomber. According to the announcement made by al Qaeda in Iraq on its website, "A blessed sister carried out a brave strike defending her beliefs. May God include our sister among the group of martyrs.’’[26]According to Mia Bloom the attack was carried out under the alias "ghost group" because it was still forbidden for Al Qaeda Central to collaborate with women on suicide bombings.[27] The identities of male suicide bombers are mentioned by AQI members, but the names of female suicide bombers are never mentioned. As a result, it is challenging to determine the purpose or driving force for their membership in terrorist organisations. Despite the lack of data regarding female suicide bombers, certain enquiries and interviews provide us with comparable reasons why they chose to join AQI as female terrorists. After losing a loved one, women join terrorist organisations in order to kill the offender and get revenge for the deaths of their husbands and brothers. Furthermore, AQI members urged young females to die as martyrs, claiming that they would immediately enter heaven and be the prophet Muhammad's neighbours.[28] Al-Qaeda is therefore mostly a male organisation that discourages women from engaging in violent activities. Women's roles are limited to becoming teachers, fund-raisers, social media advocates, and moms of potential jihadists. Role of women in Islamic State(IS) Islamic State was founded in 1999. The Islamic State had the greatest number of foreign terrorist fighters in history, making it a unique terrorist organisation. About 41,490 foreign nationals from 8 nations joined the Islamic State with the goal of restoring the caliphate. Of the foreign terrorist fighters, about 4761 (13%) were female. Following Eastern Europe (44%), Western Europe (42%), the Americas, Australia, and New Zealand (36%), and other regions, Eastern Asia had the greatest percentage (70%) of women connected with the Islamic State.[29] The biggest motivation for joining an Islamic terrorist organisation is religion. Women typically played a supporting role in Islamic terrorist organisations prior to the rise of the Islamic State. However, the role of women in these organisations has grown stronger after the fall of Al-Qaeda and the rise of Islamic State in the Middle East. Muriel Dagauque, a Muslim woman who converted to Islam and was married to a Muslim man, was one of the Islamic State suicide bombers. She moved to Iraq with her spouse from Europe in order to become a martyr, and on November 9, 2005, she bombed herself.[30] Many jihadist suicide bombers are comforted by the assurance that they will be sitting next to God (Allah), experiencing only joy and no agony, before the first drop of their blood ever hits the earth.[31]Women joined the Islamic State mostly for religious reasons. Umm Layth, also known as Aqsa Mahmood, was a 21 year old Scottish university student who travelled to Syria to take part in Islamic State terrorist activities. Mahmood expressed her opinions on jihad with the following sentences.: "If not you, then your grandkids or their grandchildren. But do not worry, our cubs will eventually shed your blood. This Islamic dominion will become well-known and dreaded all over the world. Choose a side; this is a fight against Islam. You may either support them or support us.''[32] Role of women Chechnya Terrorism: Islam is the predominant religion in Chechnya, and Wahhabist terror ideology is linked to Chechen terrorism, particularly suicide terrorism.[33]The Wahhabi sect appears to have spread to the Chechen territories through other terror cells in the Middle East, such as al Qaeda.[34] This ideology which glorifies martyrdom and promotes jihad in order to establish a worldwide Muslim caliphate is a rationale for carrying out acts of retaliation and acting on behalf of a national separatist movement.[35] Chechen women, due to their Islamic influence, often wear black and traditional Muslim clothing, such as a head scarf or jilbab, which allows them to conceal weapons and bombs, as seen in the Dulbrov theatre incident.[36] Religion is one factor that contributes to women joining terrorist organisations, but it is not the only one; other factors also play a role. Political Cause According to Gus Martin, terrorism can occur under a variety of circumstances when there is political repression. First, the group is resentful of the injustices they perceive in society. The group also believes that their social dissent is insignificant. Last but not least, the group believes that there are problems with the system that can be fixed, which leads them to confront the conflict.[37] Despite the widespread belief that women do not participate in political violence, women have been planning attacks and taking part in political violence since 1800.[38] Violence is a tactic used by women who are dissatisfied with the government, have their opinions ignored, and are under-represented in organisational structures With anarchist and revolutionary beliefs, anarchism was the beginning point of the first wave of contemporary terrorism, which swept from Western Europe to America. Nonetheless, women's political motive persisted until the second wave of terrorism, when nationalism emerged as the primary driver of women's participation in terrorism.[39] However, they were only allowed to serve as scouts and messengers during the second wave of terrorism. David Rapoport claims that because women once again assumed leadership roles, there are some similarities between the first and second waves.[40] Vera Zasulich shot the governor of St. Petersburg; she said that she had a political purpose for doing so because the governor was well-known for his Polish insurrection and had ordered to execute political prisoner Arkhip Bogolyubov. This infuriated the revolutionary forces, and six people made the decision to kill the governor, but Zasulich was the first to take the initiative. This was the beginning of the first wave of terrorism. Despite the fact that women participated in political violence, her case is notable as the first instance of female political violence in the modern era or the first to be acknowledged. [41] Russian university students founded the group, which specifically targeted political figures. Vera Figner and Gesia Gelfman, Sofia Perovskaya, and three ladies from Narodnaya Volya had a key role in the March 13, 1881, assassination of Russian Emperor Alexander II in St. Petersburg.[42] The reason behind this act was that Tsar Alexander II released his renowned Emancipation Manifesto in 1861 after the Russian intellectuals struggled to achieve their demands. This was intended to end the peasantry's enslavement and, if feasible, bring about a new, more liberal era. Perovskaya and other disappointed reformers decided to accelerate change as it became evident that this new age was a false dawn. As a result, hundreds of revolutionaries left St Petersburg in 1874 to tour the Russian countryside and read pamphlets to the peasants about socialism, nihilism, and anarchism in an attempt to educate them for the day when they would destroy the Tsar.[43] In 1954 the Algerian muslim formed a group called National Liberation Front. Their major goal was to achieve independence from the colonial power France. FLN rose to prominence thanks to its female members, Zohra Drif, Dajmila Bouhard, and Samia Lakhdar. They were able to cross the French checkpoint and leave bombs in various locations, and as a result, three people died in an explosion on September 3, 1956, and several others were injured.[44]This movement occurred at the time of second wave of contemporary terrorism which was based on the idea of nationalism and anticolonialism. As per reports between 1970 and 1984, 451 Italian women joined terrorist organisations and then engaged in political violence. The bulk of these women had degrees and performed identical duties to those of male terrorists, they found, with 35% of them being students, 23% being clerks, secretaries, nurses, technicians, and 20% being instructors. A paramilitary group called Red Brigade was established in 1970 and was engaged in terrorist activities around the nation. Because it supported Italy's withdrawal from NATO and dominated the Marixist-Leninist worldview. Known for its kidnapping and murderous activities, Red Brigades also killed former Italian Prime Minister Aldo Moro and abducted James L. Dozier, a senior US officer at NATO. Barbara Balzerian had murdered him. Many female members of the Red Brigades participated in the group's violent assaults, and Margherita Cagol (Mara), one of the Red Brigade's co-founders and one of the first victim in an armed conflict with the police, became a symbol of the left-wing movement.[45]The most violent communist organisation throughout the 1970s and 1980s was the Red Army Faction which engaged in ideologically motivated terrorism in West Germany. Ulrike Meinhof and Gudrun Ensslin, co-founders, protested consumerism by burning a department store in Frankfurt in 1968.[46] A major problem is the Chechen people's desire for independence from Russia, which is driven by their nationalist and separatist beliefs. In the lengthy history of the Chechen Republic, Russians, have been the target of several violent attacks. Since June 7, 2000, Khava Barayeva and Luisa Magomadova stormed the temporary headquarters of an elite OMON (Russian Special Forces) squad in Alkhan Yurt, Chechnya, sparking the start of Chechnya's "Black Widows" movement. With two fatalities and five injuries, the incident brought attention to the group's notorious actions.[47]According to the report, women were responsible for 47% of all terrorist incidents and 81% of suicide attacks in the Chechen region between 2000 and 2005.[48] For more than 30 years, the Liberation Tigers of Tamil Eelam (LTTE) battled the Sri Lankan central government, mostly because of the Tamil minority's ethnic oppression. Their goal was to establish their own nation in Sri Lanka's north and east.[49] The use of female suicide bombers and the LTTE's high proportion of female members were well-known. The proportion of female LTTE members varied between 20 and 30 percent, with some estimates reaching as high as 50 percent in certain years.[50]According to LTTE theorist Anton Balasingham's wife, Adele Ann, a Tamil woman's decision to join the group was a sign to society that she was dissatisfied with the status quo and had the ability to rebel against authority.[51]To sum up, female revolutionaries have contested the idea that they are less capable of committing acts of terrorism or have less political clout, and. Additionally, nationalism and revolution are the main goals of the majority of terrorist organisations that are focused on women. Personal reason Personal causes, such as revenge, family instability, rape, personal tragedy, and revenge, are important motivations for the individual to join terrorism. Women are more likely to cite these as their original motivation in joining terrorist organizations than men. Mia Bloom, Jaques and Taylor, and Robert Pape have all proposed that the reasons behind female terrorists are different from those of male terrorists. According to them, the emotions of female terrorists such as family problems, discontent, and the desire to commit suicide are what motivate them. These motivations are further divided by Bloom into four categories: respect, relationship, revenge, and redemption. [52] 1. Women who experience sexual assault, including rape, may retaliate violently; some may even choose suicide bombing as a last resort. After women were raped in Iraq, Samira Ahmad Jassim, dubbed the "mother" of suicide bombers, was accused of encouraging rape victims to commit honour suicide and conducting 28 suicide attacks, according to the Die Welt article..[53] 2. During the Chechen War, Russian soldiers sexually assaulted many Chechen women. According to estimates from Doctors Without Borders, 85 percent of Chechen women experienced sexual assault at the hands of law enforcement and military during the Chechen War. Journalist Svetlana Makunina claims that after being drugged and raped, Chechen women were left with no choice but to commit suicide bombing.On the evening of May 21, 1991, LTTE suicide bomber Dhanu killed former Indian Prime Minister Rajiv Gandhi at an election rally in Sriperumbudur, Tamil Nadu. She clarified that she took this action after being gang-raped by Indian peacekeeping troops. 3. Another crucial element that encourages women to join terrorist groups is relationships. Family members and relatives, who are important in the recruitment process, could function as a conduit between the terror group and women. Sidney Jones claims that while some women freely choose to wed male terrorists, others are coerced by their relatives.[54] Many women join ISIS for a variety of reasons, including a desire to contribute to the caliphate, a desire for friendship with like-minded individuals, or direct pressure by family members and acquaintances.[55] For e.g., Shamima Begum was influenced by her friend Sharmena to join IS. Barbara Victor, Army of Roses: Inside the World of Palestinian Women Suicide Bombers stated that instead of acting on their own initiative, female Palestinian suicide bombers are “at the mercy of, or in love with, their handlers.”[56] (women join terrorist organisations because they are forced by male) 4. Guillermo Galdos, and “Eliana Gonzales,” points out that male influence is not an essential prerequisite for recruiting women into violent organizations. In order to join revolutionary movements, women have reported willingly leaving their boyfriends, husbands, and kids. The oldest woman in Columbia's Fuerzas Armadas Revolucionarias de Colombia (FARC), Eliana Gonzales Acosta, for instance, abandoned her husband, sister, and daughter to join the group.[57] 5. Many people who have been directly impacted by the acts of another group resort to terrorism. The revenge theory is the name given to this. An individual is more inclined to engage in terrorism if they have lost a friend or loved one to a terrorist organisation or the military.[58] Additionally, according to Jacques and Taylor, revenge influences people's decision to join terrorist groups.[59] In literature and art, the stereotype that women are more revengeful than males is mirrored. According to William Cosgrove's The Mourning Bride, "Heaven is furious, like love turned to hate, and Hell is furious, like a woman scorned.”[60]Russian negotiator suggests the difference between men and women is that “[Chechen women] are ‘zombified’ by their own sorrow and grief.[61] The Russian and international press called Chechen women bombers "Black Widows" as it was revealed that many were acting in retribution for the deaths of their husbands, kids, and brothers.[62]Since the takeover of the Dubrovka Theatre in October 2002, nineteen female bombers have appeared in black mourning garments with bombs attached to their bodies. They held 850 people hostage for two and a half days. Until Russian forces imposed persecution on the people and executed the terrorist. While these motivations were not limited to revenge or family difficulties, they were also gender specific. There are more men killed in these battles, resulting in an imbalance of women battling for retribution. Furthermore, women constitute the majority of rape victims in these communities, which motivates them to join. Gender Equality: According to Vetter and Perlstein, one of the reasons why women join terrorist organisations is because of gender equality. However, Jacques and Taylor disagree with this notion.[63]FARC, or Revolutionary Armed Forces of Colombia, was established to combat societal inequality and provide women with opportunities for advancement. Despite being predominantly dominated by women, the organization offers women's rights, sexual freedom, and opportunities for advancement in a patriarchal society.[64] FARC recruits in rural areas, where women often have fewer opportunities, highlighting the organization's societal focus on women's rights.[65]A woman who had spent many years of her life in the FARC (Fuerzas Armadas Revolucionarias de Colombia—Ejército del Pueblo, or Revolutionary Armed Forces of Colombia—People's Army) was interviewed by Anne Phillips in 2012.[66]For the numerous reasons mentioned above, this woman, code-named "Athena," joined the FARC before turning thirteen. She explains why she joined this group  as it provides gender equality. She had economic reasons because she was from a rural area and lacked access to economic and educational opportunities. Women in Colombia's rural communities face a lack of opportunities, which leads to prostitution. Many women turn to the FARC as a viable alternative to prostitution. The FARC gives women a stable income. Women turn to the FARC because they are guaranteed food and other requirements. They are given the same opportunities as males and are able to support themselves. Also, by women joining terrorist organizations they are challenging gender stereotypes in their societies. O’Rourke says that women dislike these gender norms and rise out against them in opposition of the stereotyped female in their culture.[67]The LTTE gives women the same incentive to advance gender equality. According to LTTE women, they felt liberated and empowered within the organisation. By establishing sexual limitations and providing equal training chances, the LTTE established an environment that was equal for men and women. Women held leadership roles inside the LTTE and believed they were on par with the men themselves. Often, women join these groups to either learn about or escape gender inequality. CONCLUSION: The primary goal of this article was to examine the primary motivator for women to join terrorist organisations. For more than a century, women have been participating in terrorist activities, but only in recent decades have studies of terrorism examined female terrorists. Political, religious, personal, and gender equality are some of the motivations for women to join terrorist groups and participate in liberation movements. Since the 19th century, women have joined a variety of terrorist organisations; some conduct these horrible deeds to defend their beliefs or territory. Religion is another reason these women wish to sacrifice themselves in the name of Islam. They act in this way because they believe that, despite their crimes, they will be admitted to heaven if they commit murder for Islam. Women's terrorist operations might occasionally be motivated by personal issues. Although forced marriage, family issues, rape, the death of a loved one, and defiance of the patriarchal society are some of the main causes, other traumas could also influence their choices. However, each of the four factors has a major impact on women's decision to participate in terrorism. Al-Qaeda and Islamic State, for example, are heavily influenced by religion. The Tamil Tigers and FARC, on the other hand, are primarily driven by personal motives and gender equality. Furthermore, the political cause of Red Brigade and the National Liberation Front has been their main source of motivation. "Personal, political, and religious motivations are the main cause behind women's involvement in terrorism," claim Cunningham and Bloom. In order to curb terrorists' actions in the modern world, it is critical to comprehend their objectives and the reason behind their organisation. Furthermore, since many highly educated women have joined terrorist organisations, we cannot claim that education may have a major influence. There is extremely little research on gender and terrorism, particularly on women's participation in terrorist actions. To determine the primary reason women, participate in terrorism, we must conduct additional research in this field. Due to the fact that the information offered is highly generalised. What steps should the government take to prevent women from joining terrorist organisations? What other variables might encourage women to join terrorist organisations? Researchers from all social science fields should conduct some research on these pressing concerns as political scientists alone are unable to provide these answers. Bibliography[1] Jessica Shepherd, “The Rise and Rise of Terrorism Studies,” last modified July 3, 2007, accessed December 10, 2024, https://www.theguardian.com/education/2007/jul/03/highereducation.research.[2] Jessica Shepherd, “The Rise and Rise of Terrorism Studies,” last modified July 3, 2007, accessed December 10, 2024, https://www.theguardian.com/education/2007/jul/03/highereducation.research.[3] Ariel Merari, Driven to Death: Psychological and Social Aspects of Suicide Terrorism, 1st ed. (NewYork: Oxford University Press, 2010).[4]Zeynep Bayar, “The Role of Women in Terrorism,” City University of New York (CUNY) , accessed December 15, 2024, https://academicworks.cuny.edu/cgi/viewcontent.cgi?article=4346&context=gc_etds.[5] David Rapoport, The Four Waves of Modern Terrorism (Washington DC: Georgetown University Press, 2004), 46–73.[6] “Women and Terrorist Radicalization Final Report,” Organization for Security and Co-Operation in Europe (Organization for Security and Co-operation in Europe, January 1, 2013), last modified January 1, 2013, accessed December 13, 2024, https://www.osce.org/files/f/documents/4/a/99919.pdf.[7] LindseyA O’Rourke, “What’s Special about Female Suicide Terrorism?,” Security Studies 18, no. 4 (December 2, 2009): 682.[8] Mia Bloom, “What’s Special about Female Suicide Terrorism,” Gender Studies 28, no. 1–2 (June 1, 2011): 682.[9] David Rapopart, The Four Waves of Modern Terrorism (Washington DC: Georgetown University, 2004).[10] Leonard Weinberg and William L Eubank, “Women’s Involvement in Terrorism,” Gender Studies 28, no. 2 (June 2011): 22–49.[11] Anat Berko, “Gender Palestinian Women, and Terrorism: Women’s Liberation or Oppression?,” ed. Edna Erez, Studies in Conflict and Terrorism 30, no. 6 (April 27, 2007): 493–519.[12] Mia Bloom, Bombshell: Women and Terrorism (Philadelphia: University of Pennsylvania Press, 2011).[13] Karen Jacques and Paul J. Taylor, “Male and Female Suicide Bombers: Different Sexes, Different Reasons?,” Studies in Conflict and Terrorism 31, no. 4 (April 10, 2008).[14] Rosemarie Skaine , Female Suicide Bombers (United Kingdom: McFarland, 2006).[15] Graham Bird, Brock Blomberg, and Gregory Hess, “International Terrorism: Causes, Consequences and Cures,” World Economy 31 (2008): 259.[16] Rosemarie Skaine , Female Suicide Bombers (United Kingdom: McFarland, 2006), 12.[17] Ibn al Bukhari, Sahih Al- Bukhari. Trans Muhammad Muhsin Khan (United States: Islamic University, 1979).[18] Muhammad Khayr Haykal, Jihad and Fighting according to the Shar‘ia Policy (Beirut: Dar al-Barayiq, 1993).[19] Robert A. Pape, Dying to Win: The Strategic Logic of Suicide Terror (NewYork: Random House Books, 2005).[20] Rosemarie Skaine , Female Suicide Bombers (United Kingdom: McFarland, 2006).[21] Erin Marie Saltman and Melanie Smith, Till Martyrdom Do Us Part’: Gender and the ISIS Phenomenon (Institute for Strategic Dialogue, May 22, 2015).[22] Zeynep Bayar, “The Role of Women in Terrorism,” City University of New York (CUNY) , accessed December 15, 2024, https://academicworks.cuny.edu/cgi/viewcontent.cgi?article=4346&context=gc_etds.[23] Nelly Lahoud, “The Neglected Sex: The Jihadis’ Exclusion of Women from Jihad,” Terrorism and Political Violence 26, no. 5 (February 20, 2014).[24] Nelly Lahoud, “Umayma Al-Zawahiri on Women’s Role in Jihad,” Jihadica, last modified February 26, 2010, https://commons.lib.jmu.edu/cgi/viewcontent.cgi?article=1422&context=honors201019.[25] Mia Bloom, “What’s Special about Female Suicide Terrorism,” Gender Studies 28, no. 1–2 (June 1, 2011).[26] “Woman Suicide Bomber Strikes Iraq,” BB, last modified September 28, 2005, http://news.bbc.co.uk/2/hi/middle_east/4289168.stm. [27]Ibid[28] Aqeel Hussein and Damien McElroy, “Mother of All Suicide Bombers’ Warns of Rise in Attacks,” The Telegraph, last modified November 15, 2008, https://www.telegraph.co.uk/news/worldnews/middleeast/iraq/3464411/Mother-of-all-suicide-bombers-warns-of-rise-in-attacks.html.[29] Joana Cook and Gina Vale, From Daesh to “Diaspora”: Tracing the Women and Minors of Islamic State (International Centre for the Study of Radicalisation, 2018).[30] Zeynep Bayar, “The Role of Women in Terrorism,” City University of New York (CUNY) , accessed December 15, 2024, https://academicworks.cuny.edu/cgi/viewcontent.cgi?article=4346&context=gc_etds.[31] Mia Bloom, Bombshell: Women and Terrorism (Philadelphia: University of Pennsylvania Press, 2011).[32] Susan Swarbrick, “Scots ‘Jihadi Bride’ Talks of ‘Revenge’ in Hate-Filled Blog,” The Herald, last modified July 6, 2015, https://www.heraldscotland.com/news/13415875.scots-jihadi-bride-talks-of-revenge-in-hate-filled-blog/.[33] W. Andy Knight and Tanya Narozhna, “Social Contagion and the Female Face of Terror: New Trends in the Culture of Political Violence,” Canadian Foreign Policy Journal 12, no. 1 (March 14, 2011).[34] Ibid.,33[35] Ibid.,33[36] LindseyA O’Rourke, “What’s Special about Female Suicide Terrorism?,” Security Studies 18, no. 4 (December 2, 2009): 690.[37] Gus Martin , Understanding Terrorism: Challenges, Perspectives, and Issues , 8th ed. (SAGE Publications, Inc, 2024), 60.[38] Maha Butt, “Feminist IR Theory and Terrorism,” International Affairs Forum, accessed December 16, 2024, https://www.ia-forum.org/Content/ViewInternal_Document.cfm?contenttype_id=0&ContentID=9152#:~:text=Analyzing%20terrorism%20from%20a%20feminist's,female%20terrorists%20as%20'women%20terrorists..[39] David Rapoport, The Four Waves of Modern Terrorism (Washington DC: Georgetown University Press, 2004), 46–73.[40] Elena Gapova, “Gender Equality vs. Difference and What Post-Socialism Can Teach Us,” Womens Studies International Forum 59 (November 1, 2016).[41] “Vera Zasulich,” Wikipedia, https://en.wikipedia.org/wiki/Vera_Zasulich#cite_note-5.[42]Elena Gapova, “Gender Equality vs. Difference and What Post-Socialism Can Teach Us,” Womens Studies International Forum 59 (November 1, 2016).[43] James Crossland, “The Women Who Ended an Emperor,” History Workshop, last modified April 21, 2021, https://www.mybib.com/#/projects/39m8D0/citations/new/webpage.[44] Zeynep Bayar, “The Role of Women in Terrorism,” City University of New York (CUNY) , accessed December 15, 2024, https://academicworks.cuny.edu/cgi/viewcontent.cgi?article=4346&context=gc_etds.[45] Ruth Glynn , Approaching Women, Terror, and Trauma in Cultural Perspective, 2013.[46] “Andreas Baader and Ulrike Meinhof,” Encyclopedia.com, accessed January 2, 2025, https://www.encyclopedia.com/history/encyclopedias-almanacs-transcripts-and-maps/andreas-baader-and-ulrike-meinhof.[47] Anne Speckhard and Khapta Akhmedova, “Black Widows: The Chechen Female Suicide Terrorists,” The Institute for National Security Studies, last modified August 2006, https://www.inss.org.il/wp-content/uploads/2017/08/Female-Suicide-Bombers-63-80.pdf.[48] Anne Speckhard and Khapta Ahkmedova, “The Making of a Martyr: Chechen Suicide Terrorism,” Studies in Conflict & Terrorism 29, no. 5 (September 22, 2006).[49]Peng Wang, “Women in the LTTE: Birds of Freedom or Cogs in the Wheel?,” Journal of Politics and Law 4, no. 1 (2011).[50] Karla J. Cunningham, “Cross-Regional Trends in Female Terrorism,” Studies in Conflict and Terrorism 26, no. 3 (May 2003).[51]“Liberation Tigers of Tamil Eelam (LTTE),” South Asia Terrorism Portal, https://www.satp.org/satporgtp/countries/srilanka/terroristoutfits/ltte.htm.[52] Karen Jacques and Paul J. Taylor, “Male and Female Suicide Bombers: Different Sexes, Different Reasons?,” Studies in Conflict & Terrorism 31, no. 4 (2008).[53]Mia Bloom, “What’s Special about Female Suicide Terrorism,” Gender Studies 28, no. 1–2 (June 1, 2011).[54] Sidney Jones, “Inherited Jihadism: Like Father, like Son,” International Crisis Group, last modified July 4, 2007, https://www.crisisgroup.org/asia/south-east-asia/indonesia/inherited-jihadism-father-son.[55] Daniel Milton and Brian Dodwell, “Jihadi Brides? Examining a Female Guesthouse Registry from the Islamic State’s Caliphate,” Combating Terrorism Center 11, no. 5 (May 2018).[56]Edward E. Azar, “Protracted International Conflicts: Ten Propositions,” International Interaction 12, no. 1 (January 9, 2008).[57]“GENDER and TERRORISM: MOTIVATIONS of FEMALE TERRORISTS ,” DNI.gov, https://www.dni.gov/files/documents/FOIA/DF-2023-00139-Gender_and_Terrorism_Thesis.pdf.[58]LindseyA O’Rourke, “What’s Special about Female Suicide Terrorism?,” Security Studies 18, no. 4 (December 2, 2009): 710.[59]Karen Jacques and Paul J. Taylor, “Male and Female Suicide Bombers: Different Sexes, Different Reasons?,” Studies in Conflict & Terrorism 31, no. 4 (2008): 322[60] “GENDER and TERRORISM: MOTIVATIONS of FEMALE TERRORISTS ,” DNI.gov, https://www.dni.gov/files/documents/FOIA/DF-2023-00139-Gender_and_Terrorism_Thesis.pdf.[61]Ibid.,63[62] Anne Speckhard and Khapta Ahkmedova, “The Making of a Martyr: Chechen Suicide Terrorism,” Studies in Conflict & Terrorism 29, no. 5 (September 22, 2006).[63]Karen Jacques and Paul J. Taylor, “Male and Female Suicide Bombers: Different Sexes, Different Reasons?,” Studies in Conflict & Terrorism 31, no. 4 (2008).[64]Natalia Herrera and Douglas Porch, “‘Like Going to a Fiesta’ – the Role of Female Fighters in Colombia’s FARC-EP,” Small Wars & Insurgencies 19, no. 4 (January 26, 2009).[65]Mia Kazman, “Women of the FARC,” William J.Perry Center, accessed December 23, 2024, https://wjpcenter.org/wp-content/uploads/2023/09/Women-of-the-FARC.pdf[66]Christine Balling, “Why Women Turn to the FARC -- and How the FARC Turns on Them,” Foreign Affairs, last modified June 1, 2012, accessed December 23, 2024, https://www.foreignaffairs.com/articles/colombia/2012-06-01/fighting-mad.[67]LindseyA O’Rourke, “What’s Special about Female Suicide Terrorism?,” Security Studies 18, no. 4 (December 2, 2009): 702

Defense & Security
Missiles in front EU flag. Air defense systems European Union. Cruise missiles in Europe. Concept weapons development in Europe. Stockpiles strategic missiles. Concrete wall in foreground. 3d image

Nuclear Sharing Between the U.S. and the EU. Benefits and Challenges.

by Krzysztof Śliwiński

Abstract This paper examines the NATO nuclear sharing arrangement, focusing on its benefits and challenges within the U.S.-EU security framework. Nuclear sharing involves the U.S. deploying B61 nuclear bombs in select European NATO countries, with host nations providing delivery systems and infrastructure while the U.S. retains full control, ensuring compliance with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The arrangement strengthens NATO's deterrence posture, promotes alliance cohesion, and supports non-proliferation by dissuading the development of independent nuclear arsenals. Recent geopolitical tensions, especially Russia's invasion of Ukraine, have intensified calls for expanding sharing to countries like Poland, enhancing deterrence on NATO's eastern flank. Exercises such as Steadfast Noon validate operational readiness and signal resolve. Critics, however, highlight legal and escalation risks, potential NPT violations, and domestic opposition in host countries. Despite these issues, nuclear sharing remains a crucial component of Euro-Atlantic security, adapting to evolving threats while balancing deterrence, alliance unity, and non-proliferation goals.  Key Words: International Security, Weapons of Mass Destruction, Nuclear Sharing, Alliances Introduction Nuclear sharing is a cornerstone of NATO's deterrence strategy, designed to distribute the benefits, responsibilities, and risks of nuclear deterrence across the Alliance. Under these arrangements, the United States deploys a limited number of B61 nuclear gravity bombs at bases in several European NATO member states. At the same time, those host countries provide the necessary infrastructure, security, and dual-capable aircraft (DCAs) to deliver weapons in a crisis. The weapons remain under full U.S. custody and control at all times, in compliance with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). A nuclear mission can only be authorised after explicit political approval from NATO's Nuclear Planning Group (NPG), which includes all NATO members, and the U.S. President (and potentially the UK Prime Minister). This setup ensures collective decision-making and underscores the U.S.'s extended deterrence commitments to its allies, helping prevent nuclear proliferation by giving non-nuclear states a stake in the Alliance's nuclear posture without independent arsenals.[1] The arrangements originated in the Cold War era, with the first U.S. atomic weapons arriving in Europe in 1954. By the 1960s, they were formalised through the NPG to allow non-nuclear allies input on nuclear policy. Today, approximately 100 B61 bombs are forward-deployed in Europe, hosted by five NATO countries: Belgium, Germany, Italy, the Netherlands, and Turkey. Seven NATO allies contribute DCA, including F-16s and F-35s, which serve dual roles in conventional operations and as potential nuclear delivery platforms. France and the UK maintain independent nuclear forces that complement the US-led sharing but operate outside the formal NATO structure. While the question references the EU, nuclear sharing is strictly a NATO framework; all host countries are EU members except Turkey, creating significant overlap but no direct EU-level involvement.[2] These arrangements serve multiple purposes: they enhance Alliance cohesion, provide tools for managing escalations in conflicts, and signal resolve to adversaries, such as Russia. Recent geopolitical tensions, including Russia's invasion of Ukraine, have prompted discussions about expanding sharing to strengthen deterrence on NATO's eastern flank.[3] Poland, a NATO member since 1999, has long advocated for a stronger role in the Alliance's nuclear mission amid heightened Russian threats, particularly following the 2022 invasion of Ukraine. In June 2023, Polish Prime Minister Mateusz Morawiecki first publicly expressed interest in hosting U.S. nuclear weapons under NATO's sharing policy, arguing it would bolster deterrence without violating the NPT. This push intensified in early 2025, driven by concerns over U.S. reliability under the second Trump administration and Russia's aggressive posture.[4]   On March 13, 2025, President Andrzej Duda explicitly urged the U.S. to deploy nuclear warheads on Polish territory, stating in interviews that NATO infrastructure—including nuclear assets — should "shift east" to match the eastward expansion of the Alliance's borders since 1999. He emphasised that such a move would enhance security guarantees and deter future Russian aggression, while also praising France's potential extension of its "atomic umbrella" as a complementary option. Duda's proposal carried domestic political weight, positioning Poland's conservative opposition as pro-U.S. ahead of the May 2025 presidential election, where candidates debated transatlantic ties versus European autonomy.[5] Proponents argue Poland is an ideal candidate: it spends 4.7% of GDP on defence (exceeding NATO's 2% target), has built one of Europe's strongest militaries, and hosts significant U.S. rotational forces. Analysts suggest that deployment could involve adapting Polish F-35s for DCA roles or constructing secure storage facilities. However, logistical and political hurdles remain, including a potential Russian backlash and the need for NPG consensus.[6] As of October 2025, however, no U.S. nuclear weapons have been deployed to Poland, and the proposal remains under discussion without a formal U.S. commitment. Instead, Poland has deepened integration through participation in NATO's annual Steadfast Noon nuclear exercise, which began on October 13, 2025, across Belgium, the Netherlands, and the North Sea — testing procedures for credibility and safety. Poland joined as a full participant alongside Finland, Germany, and the U.S., signalling growing involvement in nuclear planning but stopping short of hosting assets. Alternatives like a dedicated U.S. "nuclear umbrella" declaration for Poland have been floated to avoid escalation without physical deployment.[7] What academics say Academic experts agree that Nuclear sharing is a cornerstone of NATO's defence strategy. This arrangement refers to an agreement according to which the United States deploys non-strategic nuclear weapons on allied territory while maintaining ownership and peacetime custody.[8]This allows selected NATO members to participate in nuclear planning and provide delivery systems, creating a framework that extends American nuclear deterrence across the Alliance. The operational structure of nuclear sharing involves dual-key arrangements in which both U.S. and host-nation authorisation are required for weapon employment. The United States maintains absolute control and custody of its nuclear weapons forward-deployed in Europe, while Allies provide military support for the DCA mission with conventional forces and capabilities. Nuclear sharing arrangements play a vital role in the Alliance's interconnection and remain a key component of security guarantees and the indivisibility of security across the entire Euro-Atlantic area.[9] These arrangements are coordinated through NATO's Nuclear Planning Group, ensuring multilateral consultation on nuclear policy and targeting decisions. Currently, only five European NATO members have signed bilateral nuclear-sharing agreements with the U.S. These are: Belgium, Germany, Italy, the Netherlands, and Turkey, under which the U.S. stores B61 nuclear gravity bombs at their airbases and their dual-capable aircraft can deliver them in a NATO context. These arrangements, dating back to the Cold War and reaffirmed in subsequent treaties, involve approximately 100 U.S. warheads as of 2025.[10] Nuclear sharing serves multiple strategic purposes within the alliance framework. It strengthens extended deterrence by visibly integrating allied forces into NATO's nuclear posture, thereby reassuring front-line states of American commitment.[11] Experts claim that these arrangements helped prevent nuclear proliferation by reducing incentives for European allies to develop independent arsenals during the Cold War.[12] Additionally, nuclear sharing distributes the political and operational burdens of nuclear responsibility across participating members rather than concentrating them solely with the United States. However, nuclear sharing faces significant criticisms. Legal scholars argue that forward-deploying U.S. weapons on non-nuclear states potentially contravenes the Non-Proliferation Treaty's spirit, creating ongoing diplomatic tensions with Russia and other nations.[13] Domestic opposition within host countries and concerns about the escalation of crises further complicate these arrangements.[14] Despite these challenges, nuclear sharing remains integral to NATO's deterrence strategy, particularly as renewed great-power competition has reinforced alliance solidarity and commitment to collective defence in the contemporary security environment. Benefits of Nuclear Sharing Firstly, official sources from NATO and the U.S. government consistently highlight the benefits of their efforts in preserving peace, deterring aggression, fostering unity, and aligning with global non-proliferation norms. The primary official argument for nuclear sharing is its role in bolstering NATO's deterrence posture against evolving threats, particularly from nuclear-armed adversaries like Russia. NATO's 2022 Strategic Concept and related documents emphasise that the Alliance's nuclear capabilities, including U.S. forward-deployed weapons, serve to "preserve peace, prevent coercion and deter aggression". [15] The 2024 Washington Summit Declaration reaffirms this, stating that "nuclear deterrence is the cornerstone of Alliance security" and that NATO's capabilities provide the "supreme guarantee" for all members.[16] By integrating U.S. nuclear assets with European contributions, such as DCA from seven Allies, these arrangements complicate adversaries' planning and enhance crisis management. As noted in NATO's factsheet, "nuclear sharing provides military and political tools for deterrence and can be used to manage escalation in a crisis," with DCA serving as a "visible and valuable instrument for strategic communications" to signal resolve.[17] Accordingly, in a security environment marked by Russia's integration of nuclear forces into its military strategy and threats against Allies, nuclear sharing ensures credible deterrence without provoking conflict. NATO’s former Secretary General Jens Stoltenberg argued that "the purpose of NATO's nuclear weapons is not to provoke a conflict but to preserve peace, deter aggression and prevent coercion," underscoring that arrangements like those involving Germany are vital for the "security of the whole alliance".[18] The U.S. State Department echoes this rationale, claiming that with NATO "numerically outgunned on the central front," nuclear sharing maintains a "nuclear deterrent posture sufficient to deter the Soviet aggression," a logic that persists against modern threats.[19] Against this backdrop, exercises like Steadfast Noon[1] Further strengthen this by simulating nuclear scenarios, ensuring "the credibility, effectiveness, safety and security of the nuclear deterrent mission".[20] Overall, according to official sources, these mechanisms help preserve stability in the Euro-Atlantic area, reduce reliance on nuclear weapons, and adapt to challenges posed by actors such as China and North Korea. Secondly, nuclear sharing fosters unity and shared responsibility among NATO members, distributing the benefits, risks, and political burdens of deterrence more evenly among them. NATO's publications explicitly state that these arrangements "ensure that the benefits, responsibilities and risks of nuclear deterrence are shared across the Alliance," demonstrating "unity and cohesion amongst all Allies" through joint decision-making in the Nuclear Planning Group (NPG).[21] This shared approach, as NATO sources claim, reinforces the indivisibility of security, as outlined in NATO's nuclear policy: "Nuclear sharing arrangements play a vital role in the interconnection of the Alliance and remain one of the main components of security guarantees and the indivisibility of security of the whole Euro-Atlantic area".[22] The 2024 Summit Declaration commits to "modernising its nuclear capabilities" and "strengthening its nuclear planning capability," ensuring broader participation to "demonstrate Alliance unity and resolve".[23] By involving European Allies in Allied dual-capable aircraft (DCA) missions and infrastructure, nuclear sharing is intended to help mitigate disparities in capabilities, promote equitable burden-sharing, and prevent fragmentation within the Alliance. Thirdly, NATO posits that nuclear sharing supports non-proliferation efforts. Contrary to criticisms, official sources argue that nuclear sharing advances non-proliferation by reducing incentives for Allies to pursue independent nuclear programs. NATO's review of the NPT at 50 years notes that these arrangements "have contributed to security in Europe and non-proliferation as Allies under the U.S. nuclear umbrella have not felt pressure to develop their own weapons".[24] Codified during the 1960s negotiations, they comply fully with the Treaty, as both the U.S. and the USSR ensured that no prohibitions were placed on such setups.[25] The U.S. State Department details this compromise, which allowed for "wartime nuclear sharing" without requiring peacetime transfer, thereby reassuring allies like West Germany and dissuading proliferation.[26] Post-Cold War reductions — over 90% in NATO's nuclear stockpile — align with NPT Article VI disarmament goals while maintaining deterrence.[27] This balance facilitates peaceful nuclear cooperation under the IAEA (International Atomic Energy Agency) safeguards, thereby strengthening the global nuclear non-proliferation regime.[28] Finally, according to the U.S. State Department, nuclear sharing underscores the U.S. commitment to European security, countering fears of "decoupling" where allies doubt American resolve. The State Department describes it as addressing whether the U.S. would "sacrifice Chicago to save Hamburg," by making nuclear weapons available for Europe's defence.[29] NATO's policy affirms that U.S. strategic forces, supplemented by forward-deployed assets, provide the "supreme guarantee," with Allies contributing to ensure integration across domains.[30] To sum up, official arguments portray nuclear sharing as indispensable for deterrence, cohesion, non-proliferation, and transatlantic solidarity. These arrangements, according to Western policy-makers and experts, have sustained European stability for decades, with ongoing modernisation ensuring their relevance in an unpredictable world. Nuclear Sharing in the Face of an Ongoing War in Ukraine Nuclear sharing has allegedly bolstered NATO's overall deterrence posture, helping to prevent Russian escalation in Ukraine, including potential nuclear use. NATO's nuclear capabilities, including U.S. forward-deployed weapons in Europe, are described as essential to "preserve peace, prevent coercion and deter aggression" in the face of Russia's nuclear threats and integration of nuclear forces into its strategy.[31] This has indirectly supported Ukraine by signalling to Russia that any significant escalation — such as nuclear strikes or attacks on NATO territory — would invoke a collective response, thereby limiting Russia's options in the conflict. Russia's invasion has been accompanied by nuclear sabre-rattling to deter Western intervention, but nuclear sharing has helped counter this by maintaining credible deterrence without direct NATO involvement in Ukraine.[32] In that sense, the already mentioned exercises like Steadfast Noon simulate nuclear scenarios, reinforcing the "credibility, effectiveness, safety and security" of the deterrent, which has been crucial amid threats from Russia, China, and North Korea. Analysts note that this has made Russian nuclear signalling less credible over time, allowing the West to provide advanced weapons to Ukraine that were initially considered taboo.[33] However, Russia's threats have still delayed and limited the scale of Western aid, such as restrictions on long-range strikes into Russia, due to fears of crossing "red lines".[34] As mentioned before, nuclear sharing agreements have arguably fostered greater unity among NATO allies, enabling sustained military and economic support for Ukraine. By sharing the "benefits, responsibilities and risks of nuclear deterrence," nuclear sharing demonstrates Alliance solidarity and the "indivisibility of security" in the Euro-Atlantic area.[35] This has reassured European allies, particularly those near Russia, allowing them to commit resources to Ukraine without fearing abandonment. For example, Poland's push to join nuclear sharing reflects heightened threat perceptions from the war, aiming to strengthen deterrence and defence in a hostile environment. NATO's support, including intelligence sharing and strategic communications, has, at least in the eyes of Western policy-makers, deterred Russian use of chemical, biological, or nuclear weapons in Ukraine.[36] Without reassurance from nuclear sharing of U.S. commitment — countering fears of "decoupling" — it might have been harder for Europe to maintain this level of involvement.[37] From Russia's perspective, nuclear sharing exacerbates tensions, viewing it as part of NATO's eastward expansion that provoked the invasion.[38] Putin has used this to support claims behind "Russia's Special Military Operation" in Ukraine, framing Ukraine's potential NATO integration as a threat that could place U.S. nuclear weapons near Russia's borders, similar to the Cuban Missile Crisis in reverse. This rationale has fueled Russian nuclear threats, which aim to limit Western aid and prolong the conflict by raising escalation fears.[39] The war has heightened nuclear risks, with some analysts arguing it presents greater dangers than the Cuban Missile Crisis due to the potential for miscalculation.[40] Russia's deployment of tactical nuclear weapons in Belarus as a counter to NATO's sharing arrangements has further escalated postures.[41] Recent decisions by the U.S., UK, and France to allow Ukraine to use long-range missiles against Russian targets have prompted Putin to warn of a direct NATO-Russia war, indirectly tying into nuclear sharing's role in deterrence dynamics.[42] This has possibly complicated peace efforts, as Russia perceives Western escalation as existential, making negotiations harder. As mentioned earlier, nuclear sharing has arguably helped mitigate proliferation risks during the war. By providing a shared nuclear umbrella, it reduces the incentives for allies like Poland and Germany to pursue independent nuclear programs, thereby supporting the NPT.[43] Possibly then, the invasion has not sparked widespread proliferation, partly because NATO's deterrent reassures members. Interestingly, however, the debates over a "European nuclear deterrent" independent of the U.S. — spurred by uncertainties such as potential shifts in U.S. policy under Trump — could undermine this if not managed effectively.[44] The war has also renewed focus on modernising nuclear sharing, with NATO committing to enhancing capabilities at the 2024 Washington Summit.[45] This has indirectly affected Ukraine by diverting Russian resources and attention, though some argue it prolongs the stalemate without a decisive victory. In summary, nuclear sharing has possibly acted as a stabilising force for NATO, enabling robust support for Ukraine and deterring Russian nuclear escalation. However, it has also contributed to heightened tensions and Russian intransigence, complicating pathways to peace. As the war persists into 2025, proposals to expand sharing (e.g., to Poland) reflect its evolving role in countering ongoing threats. Conclusion The "Steadfast Noon" exercises are arguably a clear signal to any potential adversary, including Russia, that NATO is prepared to defend all its members against any threats, including nuclear ones. Such exercises involve the use of American non-strategic nuclear weapons stationed in Europe, although no real combat weapons are used during the drills. The exercises serve not only to practice deterrence against possible nuclear attacks but also to prepare for the potential use of nuclear weapons by NATO if necessary. The fact that these exercises involve nuclear deterrence indicates that NATO's defence strategy includes readiness to escalate to a nuclear response if provoked by a nuclear attack. The locations of these nuclear weapons are not publicly disclosed. Still, there is speculation about their presence in countries like Poland, particularly in light of recent secret agreements that allow foreign troops to enter Polish territory. On the other hand, one should also consider potential downsides, especially for countries in Central and Eastern Europe. Nuclear sharing for potential allied use in wartime poses significant risks despite its deterrence aims. One major downside is its incompatibility with the NPT, which violates Articles I and II.[2] Enabling the indirect transfer of control to non-nuclear states undermines global non-proliferation efforts and draws criticism from states such as China. This arrangement also heightens proliferation risks, as peacetime training and exercises normalise nuclear readiness, potentially inspiring similar setups in Asia-Pacific regions like Japan and South Korea, escalating regional tensions.[46] Security concerns include increased escalation dangers, where limited nuclear use could spiral into full-scale war, especially amid vulnerabilities at host bases like Incirlik in Türkiye during political instability. Expanding sharing, such as to Poland, fuels arms races with Russia and exposes more European sites to attacks, without adding credible deterrence given NATO's conventional superiority. Politically, it breeds divisiveness within NATO, fostering resentment among allies and diverting resources from conventional forces, while eroding U.S. control and complicating disarmament. Domestically, host nations face public backlash and moral burdens from anti-nuclear norms, straining alliance cohesion. Russia's objections in NPT forums further highlight how sharing provokes international backlash, risking broader conflicts. Notes [1] On Monday (October 13 2025), NATO began its annual nuclear deterrence exercise Steadfast Noon. The exercise is a long-planned, routine training activity and part of NATO’s broader efforts to maintain readiness and ensure transparency around its nuclear posture. It is not linked to any current world events, and no live weapons are used.[2] Article I - Each nuclear-weapon State Party to the Treaty undertakes not to transfer to any recipient whatsoever nuclear weapons or other nuclear explosive devices or control over such weapons or explosive devices directly, or indirectly; and not in any way to assist, encourage, or induce any non-nuclear-weapon State to manufacture or otherwise acquire nuclear weapons or other nuclear explosive devices, or control over such weapons or explosive devices. Article II - Each non-nuclear-weapon State Party to the Treaty undertakes not to receive the transfer from any transferor whatsoever of nuclear weapons or other nuclear explosive devices or of control over such weapons or explosive devices directly, or indirectly; not to manufacture or otherwise acquire nuclear weapons or other nuclear explosive devices; and not to seek or receive any assistance in the manufacture of nuclear weapons or other nuclear explosive devices. See more at: https://www.un.org/en/conf/npt/2005/npttreaty.html References [1] NATO’s Nuclear Sharing Arrangements. (2022, February). NATO. https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[2] Kristensen, H. M., Korda, M., Johns, E., & Knight-Boyle, M. (2023, November 8). Nuclear weapons sharing, 2023. Bulletin of the Atomic Scientists. https://thebulletin.org/premium/2023-11/nuclear-weapons-sharing-2023/[3] Johns, E. (2025, October 10). Incomplete Upgrades at RAF Lakenheath Raise Questions About Suspected US Nuclear Deployment. Federation of American Scientists. https://fas.org/publication/incomplete-upgrades-lakenheath-questions-nuclear/[4] Johns, E. (n.d.). Poland’s bid to participate in NATO nuclear sharing. IISS. Retrieved October 14, 2025, from https://fas.org/publication/incomplete-upgrades-lakenheath-questions-nuclear/[5] Poland’s president urges U.S. to move nuclear warheads to Polish territory, FT reports. (2025, March 13). Reuters. https://www.reuters.com/world/polands-president-urges-us-move-nuclear-warheads-polish-territory-ft-reports-2025-03-13/[6] Poland’s president vows to spend 4.7% of GDP on defence this year. (2025, February 5). Euronews. https://www.euronews.com/my-europe/2025/02/05/polands-president-vows-to-spend-47-of-gdp-on-defence-this-year[7] NATO’s annual nuclear exercise Steadfast Noon begins. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/news_238367.htm[8] von Hlatky, S., & Lambert-Deslandes, É. (2024). The Ukraine war and nuclear sharing in NATO. International Affairs, 100(2), 467-485. https://academic.oup.com/ia/article-abstract/100/2/509/7617216?redirectedFrom=fulltext[9] NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/fr/natohq/topics_50068.htm?selectedLocale=en#:~:text=Nuclear%20consultation,are%20members%20of%20the%20NPG[10] NATO’s Nuclear Sharing Arrangements. (2022, February). NATO. https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[11] von Hlatky, S., & Lambert-Deslandes, É. (2024). The Ukraine war and nuclear sharing in NATO. International Affairs, 100(2), 467-485. https://academic.oup.com/ia/article-abstract/100/2/509/7617216?redirectedFrom=fulltext[12] Khalessi, D. (2015). Strategic ambiguity: Nuclear sharing and the secret strategy for drafting articles I and II of the nonproliferation treaty. The Nonproliferation Review, 23(1-2), 81-103. https://doi.org/10.1080/10736700.2016.1155865 [13] Park, K. C., & Choo, J. (2022). NATO's nuclear sharing strategy and its implications for establishing a new strategy for strengthening extended deterrence on the Korean Peninsula. International Area Studies Review, 26(1), 51-78. https://doi.org/10.18327/jias.2022.1.26.1.51 [14] Smith, M. A. (2004). To neither use them nor lose them: NATO and nuclear weapons since the cold war. Contemporary Security Policy, 25(3), 485-514. https://doi.org/10.1080/1352326042000330637[15] NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/topics_50068.htm[16] Washington Summit Declaration. (2024, July 10). NATO. https://www.nato.int/cps/en/natohq/official_texts_227678.htm[17] NATO’s Nuclear Sharing Arrangements. (n.d.). NATO. Retrieved October 20, 2025, from https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[18] Germany’s support for nuclear sharing is vital to protect peace and freedom. (2020, May 11). NATO. https://www.nato.int/cps/en/natohq/opinions_175663.htm[19] Ford, C. A. (2019, December 9). Challenges of Policymaking in Responsible Nuclear Weapons Stewardship. US Department of State. https://2017-2021.state.gov/challenges-of-policymaking-in-responsible-nuclear-weapons-stewardship/[20] NATO’s annual nuclear exercise Steadfast Noon begins. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/news_238367.htm[21] NATO’s Nuclear Sharing Arrangements. (n.d.). NATO. Retrieved October 20, 2025, from https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[22] NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/topics_50068.htm[23] Washington Summit Declaration. (2024, July 10). NATO. https://www.nato.int/cps/en/natohq/official_texts_227678.htm[24] Durkalec, J. (2018, June 29). The Nuclear Non-proliferation Treaty at fifty: a midlife crisis. NATO. https://www.nato.int/docu/review/articles/2018/06/29/the-nuclear-non-proliferation-treaty-at-fifty-a-midlife-crisis/index.html[25] NATO’s Nuclear Sharing Arrangements. (n.d.). NATO. Retrieved October 20, 2025, from https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[26] Ford, C. A. (2019, December 9). Challenges of Policymaking in Responsible Nuclear Weapons Stewardship. US Department of State. https://2017-2021.state.gov/challenges-of-policymaking-in-responsible-nuclear-weapons-stewardship/[27] See more at: https://www.iaea.org/sites/default/files/publications/documents/infcircs/1970/infcirc140.pdf[28] See more at: https://www.iaea.org/[29] Ford, C. A. (2019, December 9). Challenges of Policymaking in Responsible Nuclear Weapons Stewardship. US Department of State. https://2017-2021.state.gov/challenges-of-policymaking-in-responsible-nuclear-weapons-stewardship/[30]NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/topics_50068.htm[31] NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/topics_50068.htm [32] Nuclear Stability and Escalation Risks in Europe. (2023, September 1). Foreign Policy Research Institute. https://www.fpri.org/article/2023/09/nuclear-stability-and-escalation-risks-in-europe/[33] Ibidem.[34] Kimball, D., & Bugos, S. (2022, February 28). Russia’s War on Ukraine and the Risk of Nuclear Escalation: Answers to Frequently Asked Questions. Arms Control Association. https://www.armscontrol.org/issue-briefs/2022-02/FAQ-russia-ukraine[35] NATO’s support for Ukraine. (2025, October 14). NATO. https://www.nato.int/cps/en/natohq/topics_192648.htm[36] Dickinson, P., Arick, R., & Lander Finch, N. (2025, October 15). How the US and Europe can deter and respond to Russia’s chemical, biological, and nuclear threats. Atlantic Council. https://www.atlanticcouncil.org/in-depth-research-reports/report/how-the-us-and-europe-can-deter-and-respond-to-russias-chemical-biological-and-nuclear-threats/[37] Dalton, T. (2022, April 8). Nuclear Nonproliferation After the Russia-Ukraine War. Georgetown Journal of International Affairs. https://gjia.georgetown.edu/2022/04/08/nuclear-nonproliferation-after-the-russia-ukraine-war/[38] Magnier, E. J. POST. X. Retrieved October 21, 2025, from https://x.com/ejmalrai/status/1796511588465201374[39] Ukraine: how nuclear weapons continue to increase the risks, two years on. (n.d.). ICAN (International Campaign to Abolish Nuclear Weapons). Retrieved October 21, 2025, from https://www.icanw.org/ukraine_two_years_how_nuclear_weapons_increase_the_risks[40] Kimballl, D., & Bugos, S. (2022, February 28). Russia’s War on Ukraine and the Risk of Nuclear Escalation: Answers to Frequently Asked Questions. Arms Control Association. https://www.armscontrol.org/issue-briefs/2022-02/FAQ-russia-ukraine [41] Kayali, L., Jungholt, T., & Fritz, P. (2024, July 4). Europe Is Quietly Debating a Nuclear Future Without the US. POLITICO. https://www.politico.com/news/magazine/2024/07/04/europe-us-nuclear-weapons-00166070[42] Katchanovski, I. (n.d.). POST. X. Retrieved October 21, 2025, from https://x.com/I_Katchanovski/status/1858244090909127000[43] Dalton, T. (2022, April 8). Nuclear Nonproliferation After the Russia-Ukraine War. Georgetown Journal of International Affairs. https://gjia.georgetown.edu/2022/04/08/nuclear-nonproliferation-after-the-russia-ukraine-war/[44] Samuelki, O. (2025, March 11). Europe going nuclear would be a catastrophic mistake. https://www.aljazeera.com/opinions/2025/3/11/europe-going-nuclear-would-be-a-catastrophic-mistake[45] NATO’s support for Ukraine. (2025, October 14). NATO. https://www.nato.int/cps/en/natohq/topics_192648.htm[46] Analysis of the Incompatibility of NATO’s Nuclear Sharing Arrangements with the Treaty on the Non-Proliferation of Nuclear Weapons. (2024). China Arms Control and Disarmament Association China Institute of Nuclear Industry Strategy. https://www.cinis.com.cn/zhzlghyjzy/yjbg/1446912/2024072914514738359.pdf 

Defense & Security
Soldier UAV operator launches army drone with bomb to drop into enemy fortifications and trenches. Concept using military robots in modern warfare.

Unmanned aerial vehicle: geopolitical influence, industrial potential and future perspectives

by World & New World Journal

Introduction An unmanned aerial vehicle (UAV) or unmanned aircraft system (UAS), commonly known as drone, is an aircraft without a human pilot, crew or passenger on board, but rather controlled remotely or autonomously. Drones can be seen as cutting-edge technologies with tremendous ramifications across various fields, including military, security, economics, and logistics – ranging from lightweight consumer drones to advanced autonomous combat platforms – that have transformed global security economics and technological developments. Their proliferation marks a shift in the conduct of warfare, industrial processes, and urban infrastructure design. In this context, this article aims to analyze these dynamics across three domains: geopolitical and security implications, economics and industrial processes, and future technological transformation. I. Geopolitical and Security Perspective: "Game Changers" The Dawn of the Unmanned Warfare Era The past decade — and especially during the conflicts in Ukraine, Gaza, and the Caucasus —has showcased an irreversible shift toward unmanned warfare. Low-cost drones have enabled nations and non-state actors to conduct reconnaissance, precision strikes, and electronic warfare at a fraction of traditional military costs. The democratization of drone warfare erodes conventional military hierarchies by giving smaller nations and even non-state groups asymmetric capabilities (Kania, 2020), (Vision of Humanity, 2024). Figure 1: Use of drones by type. A major consequence of this shift is the emergence of continuous aerial presence, which fundamentally alters operational rhythm and tempo. Previously, only major powers could afford persistent surveillance through manned aircraft or satellites. Today, even insurgent groups can deploy swarms of commercial drones to maintain near-constant observation of enemy movements. This constant presence of drones on the battlefield forces militaries to make decisions much faster and operate as if they are always being watched. As drone technology becomes cheaper and more widely available, it also becomes easier for states or groups to launch low-risk, hard-to-trace attacks without putting their own people in danger. This reduces the barrier to starting or escalating conflicts and makes the overall situation far more unpredictable. On the other hand, despite automation, drone warfare remains heavily dependent on human adaptation, moreover, in practice, drones’ use is constrained by weather, terrain, and limited night capability (Newton, 2025). Nonetheless, and as seen in the Ukraine War, the adaptation, development and improvement of the designs and systems have skyrocketed and shortened from months to weeks. A Paradigm Shift in Modern Warfare Traditional doctrines built around armored vehicles, manned aircraft, and centralized command structures are giving way to distributed, networked, and automated operations. Drones allow for constant ISR (intelligence, surveillance, reconnaissance), rapid kill chains, and battlefield transparency that reduces the effectiveness of concealment and mass maneuver (Biddle & Oelrich, 2016). Swarm technology further accelerates this shift by overwhelming air defenses through algorithmic coordination. On a broader strategic level, unmanned systems are transforming operational art, forcing militaries to rethink how they structure campaigns. Instead of relying on a small number of high-value manned platforms, modern forces must integrate thousands of expendable, semi-autonomous assets into a coherent command-and-control ecosystem. This shift elevates the importance of data fusion, algorithms, and electronic warfare, as success increasingly depends on which side can process information more effectively rather than which side has heavier armor or more firepower. Furthermore, the psychological effects of drone warfare — constant monitoring, unpredictable strikes, and the invisibility of operators — alter the morale and behavior of both soldiers and civilians. In this sense, unmanned warfare not only changes tactics but reshapes the human dimension of conflict. Evolution of Defense Strategies States now are prioritizing anti-drone systems (C-UAS), electronic warfare, and resilient supply chains. Defense strategies emphasize dispersion, decoys, deception, and multi-layered air defense, recognizing that the cost ratio favors attackers using cheap drones against expensive assets. Militaries increasingly incorporate AI-enabled targeting, autonomous perimeter defense, and drone-versus-drone combat (Mehta, 2022). The rapid evolution of offensive drone capabilities has forced governments to pursue a new generation of integrated counter-unmanned systems, blending kinetic interceptors, directed-energy weapons, radio-frequency jamming, and cyber tools. However, the challenge is not merely technological — it is organizational. Modern militaries must revise procurement cycles, adopt flexible doctrine, and restructure units to counter the fast-changing drone threat. For example, some nations are creating dedicated “drone defense battalions” or embedding electronic warfare teams at lower echelons of command. Once more the Ukraine War is a good example: Ukraine’s early-warning systems (so called, “drone walls”) use layered reconnaissance UAVs to identify threats and enhance battlefield visibility, unfortunately, these are highly vulnerable to electronic warfare and radar destruction. More examples include the fiber-optic FPV drones as countermeasure of jamming, or decoy drones to lure air defenses and absorb munitions. (Newton, 2025) The rise of drone warfare also places huge demand on secure communications and resilient digital infrastructure; adversaries increasingly target supply chains, software vulnerabilities, and satellite links that control unmanned systems. Thus, the evolution of defense strategies represents a multi-domain effort that spans hardware, software, organizational culture, and national-level industrial capacity. Major Countries' Competition in Drone Weapon Development The United States, China, Israel, Turkey, and Iran dominate the global drone arms race, while Russia and Ukraine deserve a special mention too. • USA: it focuses on high-tech autonomous systems, for example the MQ-25, Collaborative Combat Aircraft. In addition, according to the Federal Aviation Administration they have an estimated 822,039 drones registered as of July 2025. (FAA, 2025)• China: leads in export volume, offering cost-competitive platforms like the Wing Loong series (Fischer, 2020).• Turkey: gained strategic influence through the Bayraktar TB2, proven in multiple regional conflicts like the Nagorno-Karabakh in 2020 or its use for strategic communications for Ukraine during the ongoing conflict. (Péria-Peigné, 2023)• Israel: its research, development and production of innovative drone technology and exports roughly $500 million worth of UAV-related products per year, have positioned Israel as a world leader in the area. Israel is well known for its indigenous and competitive manufacturing UAVs like the Hermes 450, the Searcher Mk II and the Heron. (Sadot, s.f.)• Iran: their Shahed-136 drone is a low-cost drone that has gained attention internationally as it has shown affordability, precision, long-range, and cheapness during the Ukraine War – deployed by Russia. (Kesteloo, 2025)• Ukraine: has emerged as a leader in tactical warfare, including mass quantities of low-cost First-Person View (FPV) drones for frontline and deep-strike operations. But also, it has implemented “Spider’s Web” operations, which strike deep inside Russia, while using low-cost assets but with strategic and punctual strikes. Ukraine has also expanded into the maritime domain with unmanned surface vessels (USVs) using them with a kamikaze-style operation targeting ships and critical offshore infrastructure in the Black Sea. (Newton, 2025)• Russia: the war has institutionalized an UAV doctrine with mass deployment of FPV drones (Newton, 2025) and the creation – similar to Ukraine – of an Unmanned System Force (USF) aiming to encompass aerial, land and surface drones. (Altman, 2025) II. Economic & Industrial Perspective: “Flying Industrial Revolution” Future Logistics and Delivery Systems Beyond the battlefield, drones are reshaping global economies and enabling new industrial ecosystems. For instance, drones are rapidly transforming last-mile delivery by reducing transportation time, bypassing road congestion, and enabling access to remote or disaster-affected areas. Companies like Amazon, Wing, and Zipline have already demonstrated how unmanned aircraft can deliver medical supplies, parcels, and consumer goods more efficiently than traditional vehicles. As autonomous navigation, battery technology, and payload capacity continue to improve, drones are expected to become critical components of global supply chains, especially in regions where infrastructure is limited or demand for ultra-fast delivery is increasing. Global drone delivery is expected to reach multi-billion-dollar scale by 2030 (PwC, 2023). In the longer term, logistics networks are expected to evolve into hybrid ground–air systems, where drones work alongside autonomous ground vehicles and smart warehouses. These systems could drastically reduce operational costs by automating pickup, sorting, and delivery processes. Integrating drones with AI-driven inventory management and predictive delivery algorithms will allow companies to anticipate demand and route products dynamically. As eVTOL cargo aircraft mature, the concept of “airborne logistics hubs” may also emerge, enabling rapid long-distance transport between distribution centers without the need for airports. Together, these developments point toward a future where aerial logistics are not just an add-on, but a central pillar of modern supply chains. Improving Industrial Efficiency Across agriculture, energy, construction, and mining drones significantly improve efficiency by automating tasks that previously required expensive equipment or manual labor. By replacing manned inspection systems, drones can reduce labor costs, increase safety, and provide data of unprecedented detail (McKinsey, 2022). For example, farmers use drones for precision spraying and crop monitoring, reducing fertilizer and water usage. Energy companies deploy unmanned systems for pipeline inspections and powerline surveys, minimizing downtime and enhancing worker safety. Construction and mining firms rely on drones for site mapping, progress tracking, and 3D modeling, improving project accuracy while lowering operational costs. Beyond task automation, drones are becoming essential to data-driven industrial optimization. Equipped with thermal sensors, LiDAR, and multispectral cameras, unmanned systems can capture high-resolution data that feeds directly into AI analytics platforms. This allows companies to detect inefficiencies, predict equipment failure, and optimize resource allocation in real time. As industries move toward digital twins — virtual models of physical assets — drones will play a key role in continuously updating these systems with accurate spatial and environmental data. The result is a more responsive, efficient, and resilient industrial ecosystem that leverages aerial automation for competitive advantage. Regulatory Environment and Market Growth Regulation remains the single most influential factor shaping the global drone market. Governments are gradually introducing frameworks to enable Beyond Visual Line of Sight (BVLOS) operations, Remote ID tracking, and certification standards for commercial drones. Regions like the European Union have adopted unified risk-based rules through EASA, while the United States continues to refine its Part 107 and UTM integration policies through the FAA. These regulatory milestones are essential for scaling commercial drone usage, as they provide clarity to manufacturers, operators, and investors. As regulatory frameworks mature, they are also becoming a competitive advantage for regions that adopt them early. Countries that implement drone-friendly ecosystems — such as Singapore, the UAE, and Rwanda — are rapidly emerging as hubs for drone research, testing, and deployment. This regulatory momentum encourages multinational companies to establish operations in these markets, accelerating local innovation and talent development. Furthermore, harmonized international standards will make it easier for drone manufacturers to reduce production complexity and expand globally. Ultimately, the pace of market growth will depend not just on technological advancement but on how effectively governments balance innovation with safety, privacy, and public acceptance. Investment Trends Investment in drone-related technologies has surged, driven by the convergence of autonomy, artificial intelligence, and advanced manufacturing. Venture capital firms increasingly fund companies developing autonomous navigation systems, UTM software, battery technology, and specialized industrial drones. Defense investors continue to expand their portfolios into dual-use drone companies, reflecting growing geopolitical interest and national security incentives. Meanwhile, major tech firms and automotive companies are exploring opportunities in cargo drones, eVTOL aircraft, and autonomous mobility ecosystems. Beyond private investment, government funding and public–private partnerships are accelerating drone adoption globally. Many nations are launching test corridors, innovation hubs, and subsidies to attract drone startups and support local manufacturing. This trend is particularly strong in Asia and the Middle East, where governments see drones as strategic tools for digital transformation and economic diversification. As markets mature, investment is shifting from hardware-heavy startups toward software, analytics, and integrated airspace management solutions — reflecting a broader transition from drone manufacturing to drone ecosystems. This shift signals a long-term, sustainable evolution of the drone industry from early experimental phases to full-scale commercial and civil integration. III. Future Technologies The Need for Unmanned Traffic Management (UTM) As drones and future eVTOL air taxis multiply, low-altitude airspace will become increasingly crowded. To prevent collisions and maintain order, UTM frameworks — already being developed by NASA, the FAA, EASA, and ICAO — aim to coordinate autonomous flights using real-time tracking, automated route planning, and digital air corridors (Kopardekar, 2016). These systems will act as the “air-traffic control of the future,” but designed for far larger numbers of smaller, faster-moving vehicles. In addition, as demand grows, it is likely that UTM will evolve into a fully automated, AI-driven airspace ecosystem capable of managing thousands of simultaneous flights with minimal human oversight. Future systems could incorporate weather prediction, dynamic rerouting, and AI-powered detect-and-avoid features, which more than a technical upgrade, would transform the air mobility in the cities worldwide. Global Standardization Competition The need for standard UTM, drone certifications, communication systems, and detect-and-avoid technology is critical, but it also represents a geopolitical contest. The U.S., the European Union, and China are each developing distinct technological ecosystems, hoping their standards will dominate global markets. Whichever region’s standards become the international norm will shape supply chains, aircraft design, and regulatory practices for decades. This competition mirrors earlier battles over telecommunications and 5G. Nations that establish widely adopted drone standards will gain strategic advantages, including influence over global manufacturing, software ecosystems, and aviation governance. As a result, UTM and drone certification are no longer just technical debates — they have become instruments of national power, economic leverage and somehow geopolitical importance. Urban Safety and Privacy Issues In addition, another major concern for cities is the widespread adoption of drones itself, which translates into surveillance risks, noise pollution from frequent flights, and vulnerability to cyberattacks that could compromise flight controls. Therefore, urban areas need strict rules governing data collection, flight paths, and liability in case of accidents to maintain public trust and safety. In the future, cities will also require integrated emergency response protocols, stronger cybersecurity defenses, and digital identity systems for all unmanned aircraft. Public engagement and transparent oversight will play a major role in ensuring that drones enhance urban life without creating new forms of intrusion or risk. Managing these challenges will be essential for the successful adoption of unmanned urban mobility. Integration with Future Urban Infrastructure In line with the previous section, smart cities could incorporate drones into their core infrastructure. For example, vertiports, rooftop landing pads, sensor-equipped air corridors, and digital twins could enable efficient navigation and real-time monitoring. In addition, drones will become essential for urban mobility and public services – from medical or any goods deliveries to emergency response like fire unit responses. As cities evolve, this integration will create a hybrid transportation ecosystem, where ground vehicles, aerial drones, and automated control systems would operate in sync. Urban planning will increasingly consider airspace as a valuable layer of infrastructure, much like roads or power grids. Therefore, collaboration between governments, industry, and technology providers to design cities capable of supporting high-density autonomous air mobility is required. Conclusion Unmanned systems are redefining the global balance of power, transforming industrial processes, and reshaping urban futures. The convergence of autonomy, AI, and networked airspace introduces both unprecedented opportunity and profound risk. Geopolitically, drones dilute traditional military dominance; economically, they catalyze a new airborne industrial revolution; technologically, they push societies toward complex management of shared automated airspace. Future policy, regulation, and innovation will determine whether unmanned systems become drivers of prosperity or vectors of instability. References Altman, H. (2025, November 13). Russia Creates New Military Branch Dedicated to Drone Warfare. The War Zone (TWZ). https://www.twz.com/news-features/russia-creates-new-military-branch-dedicated-to-drone-warfare Amazon. (2023). Prime Air: The Future of Drone Delivery. Amazon Corporate Publications. Biddle, S., & Oelrich, I. (2016). Future Warfare in the Age of Drones. Council on Foreign Relations. Deloitte. (2022). Drones in Industrial Operations: Transforming Asset Inspection and Performance. Deloitte Insights. FAA (Federal Aviation Administration). (2023). Integration of Unmanned Aircraft Systems into the National Airspace System. U.S. Department of Transportation. FAA (Federal Aviation Administration). (2025). Drones. https://www.faa.gov/uas Fischer, S. (2020). China’s Military–Civil Fusion Strategy: A View from Washington. U.S.–China Economic and Security Review Commission. Kania, E. B. (2020). Learning Warfare from the Laboratory: China’s Progress in Military Innovation. Center for a New American Security (CNAS). Kesteloo, H. (2025, September 29). Global Military Drone Race Intensifies as Nations Rush to Copy Iran’s Shahed Design. Medium. https://medium.com/@hayekesteloo/global-military-drone-race-intensifies-as-nations-rush-to-copy-irans-shahed-design-404badf482fb Kopardekar, P. (2016). Unmanned Aircraft System (UAS) Traffic Management (UTM) Concept of Operations. NASA Ames Research Center. McKinsey & Company. (2022). The Commercial Drone Market Outlook: Insights on Market Growth, Industrial Adoption, and Regulation. McKinsey Robotics & Automation Practice. Mehta, A. (2022). Counter-Drone Systems and the Future of Air Defense. Defense News. Newton, M. (2025, November 3). How Are Drones Changing War? The Future of the Battlefield. Center for European Policy Analysis (CEPA). https://cepa.org/article/how-are-drones-changing-war-the-future-of-the-battlefield/ Péria-Peigné, L. (2023, April 17). TB2 Bayraktar: Big Strategy for a Little Drone. IFRI. https://www.ifri.org/en/memos/tb2-bayraktar-big-strategy-little-drone PwC. (2023). Clarity from Above: Global Drone Market Analysis. PwC Global. Roland Berger. (2022). Urban Air Mobility: The Rise of the Drone Economy. Roland Berger Strategy Consultants. Rwanda Civil Aviation Authority. (2021). Regulatory Framework for Drone Delivery and BVLOS Operations. Government of Rwanda. Sadot, U. (n.d.). Proliferated Drones: A Perspective on Israel. Center for a New American Security (CNAS). https://drones.cnas.org/reports/a-perspective-on-israel/ Schmidt, E., Work, R., & Clyburn, M. (2021). Final Report: National Security Commission on Artificial Intelligence. U.S. Government Printing Office. Singer, P. W. (2009). Wired for War: The Robotics Revolution and Conflict in the 21st Century. Penguin Books. Statista. (2023). Global Drone Market Value and Investment Trends. Statista Market Outlook. Vision of Humanity. (2024, June 13). How Drones Have Shaped the Nature of Conflict. https://www.visionofhumanity.org/how-drones-have-shaped-the-nature-of-conflict/ Wing (Alphabet). (2023). Autonomous Delivery Networks and Future Logistics. Wing Technical Publications. Zipline. (2022). Operational Impact of Automated Medical Delivery by Drone. Zipline International Case Studies.

Diplomacy
Russia US Peace Plan as Russian American and Ukrainian deal to end the war as an agreement of Moscow and Washington Kyiv on the outside in negotiations.

Peace in Ukraine? Believe it when you see it, especially if demands are prioritized

by Oleksa Drachewych

The United States recently — and suddenly — announced a 28-point peace plan to end Russia’s war in Ukraine, seemingly jointly written with Russian delegates, and presented it to Ukraine. The leaked contents of the peace plan caused concerns for Ukrainian representatives, European leaders and some American politicians. Yet it has nonetheless led to “meaningful progress”, according to the White House, on a revised peace proposal drafted by Ukrainian and American delegates in Geneva. Ukraine has reportedly agreed to the deal, with minor tweaks, while Russia says it’s premature to say a resolution is close, even as Russian representatives met with U.S. delegates in Abu Dhabi to discuss the revised plan. What was in the first plan? The leaked initial 28-point plan was criticized for asserting many Russian demands that date back to the initial peace negotiations of March and April 2022: • It placed a limit of 600,000 troops on Ukraine’s military; • It prevented Ukraine from having long-range missiles; • It placed a permanent ban on Ukrainian membership in NATO; • It included protections of Russian language and the Russian Orthodox Church in Ukraine. It also explicitly gave the entire Donbas region of eastern Ukraine to Russia, and called on the international community to recognize full Russian control of the Donbas and Crimea and control of Kherson and Zaporizhzhia on the front lines. In return, there would be “reliable security guarantees” envisioned by U.S. President Donald Trump: a NATO-style “Article 5” for Ukraine. This would mean if Ukraine was purposefully attacked by Russia in the future, the U.S. and other parties involved would come to Ukraine’s defence through sanctions, diplomatic pressure and military support, if necessary. In many of the economic and security arrangements that could emerge from the agreement, Russia and the United States would manage them together under the terms of the 28-point plan. The original plan also offered amnesty to all parties for any crimes and atrocities committed during the war, meaning Russia would not be brought to justice for war crimes. It also called for Russia’s return to European and global affairs, ending its political isolation with the West by reforming the G8. In short, the agreement would essentially act as if the war in Ukraine never happened. Was this a joint U.S.-Russia plan? The origins of the peace plan have been widely debated. The stilted language in the English version has led some to speculate it was translated from Russian. American senators said U.S. Secretary of State Marco Rubio, when briefing them, called the deal a “Russian wish list.” The draft reportedly came as a result of meetings held in Florida between Trump’s son-in-law, Jared Kushner, special envoy Steve Witkoff and Russian envoy Kirill Dmitriev, a noted Putin supporter. Rubio has insisted it was a U.S.-crafted document while Russian President Vladimir Putin said Russia could accept the peace plan. The fact that the document tended to mirror many of Russia’s demands immediately put Ukraine, and Europe, on the defensive. Trump declared that Ukraine would have until American Thanksgiving — Thursday, Nov. 27 — to agree to the plan. He has since softened his stance. But he’s also lambasted Ukraine’s leadership for not showing sufficient “gratitude” for American efforts to bring peace to Ukraine. Details of Europe’s plan In response, European leaders offered their own peace plan. They largely removed some of Russia’s most egregious demands, keeping some of the 28 points, while placing sensitive issues like NATO membership as something to be determined by NATO members and Ukraine. But it also acceded to some Russian demands, including accepting a cap on Ukraine’s military and offering Russia re-entry into the G8. It included a provision for territorial swaps with negotiations starting from the current front lines instead of recognizing Russia’s annexations. European proposals include using frozen Russian assets as reparations for Russia’s aggression, eliminating any of the amnesty clauses and making the European Union and NATO the key players in any future political, economic and military security arrangements. The European deal also removes key qualifiers in the original 28-point plan that could be manipulated by Russian misinformation — namely that Ukraine would be forced to face Russia alone if it struck either St. Petersburg or Moscow with a missile or it failed to “de-Nazify”, a common and erroneous Russian line of attack against Ukraine. The Kremlin rejected the European counter-plan outright. Where does the deal stand now? Ukrainian and American officials recently met in Geneva to discuss the peace plan. Emerging from the meeting, European leaders were cautiously optimistic while insisting a lot more work needed to be done. Trump stated that “something good just may be happening.” So, what resulted from that meeting? Few details have been leaked. Sources have shared that the 28-point plan has now been pared down to 19. It has also been suggested that key issues like territorial swaps and NATO accession have been left for Trump and Ukraine’s Volodymyr Zelenskyy to discuss at a future meeting. Ukrainian officials have said the plan has been substantially revised and reflects Ukraine’s concerns. The Russian response has been cagey, to say the least. Since there’s been no formal presentation of any revised peace plan, they are electing to say nothing firm. But U.S. Army Secretary Dan Driscoll recently met with Russian delegates in Abu Dhabi. Russian sources, meanwhile, have restated their preference for the original 28-point plan. Seeing is believing While this appears to be the most notable progress in the peace process in months, expectations should be tempered until there’s a presidential summit between Zelenskyy and Putin and until their signatures are on a treaty. Such momentum for peace has happened in the past. And it has often been scuttled by the key sticking points of both nations. Ukraine has continued to demand extensive security guarantees, justice for Russian war crimes, and has rejected territorial swaps. Russia has wanted a pliable Ukraine and one that could remain in its orbit politically and economically. Fundamentally, these positions haven’t changed. At this point, it appears the Ukrainians have managed to bring the Americans to their side in the latest peace talks, which reflects the importance Ukraine places on U.S. support in their fight against Russia. Russia has elected to say little, but if it was to agree to the revised deal, it would represent a seismic shift. For those reasons, believe in success in the peace process when you actually see it.