Subscribe to our weekly newsletters for free

Subscribe to an email

If you want to subscribe to World & New World Newsletter, please enter
your e-mail

Defense & Security
Soldier UAV operator launches army drone with bomb to drop into enemy fortifications and trenches. Concept using military robots in modern warfare.

Unmanned aerial vehicle: geopolitical influence, industrial potential and future perspectives

by World & New World Journal

Introduction An unmanned aerial vehicle (UAV) or unmanned aircraft system (UAS), commonly known as drone, is an aircraft without a human pilot, crew or passenger on board, but rather controlled remotely or autonomously. Drones can be seen as cutting-edge technologies with tremendous ramifications across various fields, including military, security, economics, and logistics – ranging from lightweight consumer drones to advanced autonomous combat platforms – that have transformed global security economics and technological developments. Their proliferation marks a shift in the conduct of warfare, industrial processes, and urban infrastructure design. In this context, this article aims to analyze these dynamics across three domains: geopolitical and security implications, economics and industrial processes, and future technological transformation. I. Geopolitical and Security Perspective: "Game Changers" The Dawn of the Unmanned Warfare Era The past decade — and especially during the conflicts in Ukraine, Gaza, and the Caucasus —has showcased an irreversible shift toward unmanned warfare. Low-cost drones have enabled nations and non-state actors to conduct reconnaissance, precision strikes, and electronic warfare at a fraction of traditional military costs. The democratization of drone warfare erodes conventional military hierarchies by giving smaller nations and even non-state groups asymmetric capabilities (Kania, 2020), (Vision of Humanity, 2024). Figure 1: Use of drones by type. A major consequence of this shift is the emergence of continuous aerial presence, which fundamentally alters operational rhythm and tempo. Previously, only major powers could afford persistent surveillance through manned aircraft or satellites. Today, even insurgent groups can deploy swarms of commercial drones to maintain near-constant observation of enemy movements. This constant presence of drones on the battlefield forces militaries to make decisions much faster and operate as if they are always being watched. As drone technology becomes cheaper and more widely available, it also becomes easier for states or groups to launch low-risk, hard-to-trace attacks without putting their own people in danger. This reduces the barrier to starting or escalating conflicts and makes the overall situation far more unpredictable. On the other hand, despite automation, drone warfare remains heavily dependent on human adaptation, moreover, in practice, drones’ use is constrained by weather, terrain, and limited night capability (Newton, 2025). Nonetheless, and as seen in the Ukraine War, the adaptation, development and improvement of the designs and systems have skyrocketed and shortened from months to weeks. A Paradigm Shift in Modern Warfare Traditional doctrines built around armored vehicles, manned aircraft, and centralized command structures are giving way to distributed, networked, and automated operations. Drones allow for constant ISR (intelligence, surveillance, reconnaissance), rapid kill chains, and battlefield transparency that reduces the effectiveness of concealment and mass maneuver (Biddle & Oelrich, 2016). Swarm technology further accelerates this shift by overwhelming air defenses through algorithmic coordination. On a broader strategic level, unmanned systems are transforming operational art, forcing militaries to rethink how they structure campaigns. Instead of relying on a small number of high-value manned platforms, modern forces must integrate thousands of expendable, semi-autonomous assets into a coherent command-and-control ecosystem. This shift elevates the importance of data fusion, algorithms, and electronic warfare, as success increasingly depends on which side can process information more effectively rather than which side has heavier armor or more firepower. Furthermore, the psychological effects of drone warfare — constant monitoring, unpredictable strikes, and the invisibility of operators — alter the morale and behavior of both soldiers and civilians. In this sense, unmanned warfare not only changes tactics but reshapes the human dimension of conflict. Evolution of Defense Strategies States now are prioritizing anti-drone systems (C-UAS), electronic warfare, and resilient supply chains. Defense strategies emphasize dispersion, decoys, deception, and multi-layered air defense, recognizing that the cost ratio favors attackers using cheap drones against expensive assets. Militaries increasingly incorporate AI-enabled targeting, autonomous perimeter defense, and drone-versus-drone combat (Mehta, 2022). The rapid evolution of offensive drone capabilities has forced governments to pursue a new generation of integrated counter-unmanned systems, blending kinetic interceptors, directed-energy weapons, radio-frequency jamming, and cyber tools. However, the challenge is not merely technological — it is organizational. Modern militaries must revise procurement cycles, adopt flexible doctrine, and restructure units to counter the fast-changing drone threat. For example, some nations are creating dedicated “drone defense battalions” or embedding electronic warfare teams at lower echelons of command. Once more the Ukraine War is a good example: Ukraine’s early-warning systems (so called, “drone walls”) use layered reconnaissance UAVs to identify threats and enhance battlefield visibility, unfortunately, these are highly vulnerable to electronic warfare and radar destruction. More examples include the fiber-optic FPV drones as countermeasure of jamming, or decoy drones to lure air defenses and absorb munitions. (Newton, 2025) The rise of drone warfare also places huge demand on secure communications and resilient digital infrastructure; adversaries increasingly target supply chains, software vulnerabilities, and satellite links that control unmanned systems. Thus, the evolution of defense strategies represents a multi-domain effort that spans hardware, software, organizational culture, and national-level industrial capacity. Major Countries' Competition in Drone Weapon Development The United States, China, Israel, Turkey, and Iran dominate the global drone arms race, while Russia and Ukraine deserve a special mention too. • USA: it focuses on high-tech autonomous systems, for example the MQ-25, Collaborative Combat Aircraft. In addition, according to the Federal Aviation Administration they have an estimated 822,039 drones registered as of July 2025. (FAA, 2025)• China: leads in export volume, offering cost-competitive platforms like the Wing Loong series (Fischer, 2020).• Turkey: gained strategic influence through the Bayraktar TB2, proven in multiple regional conflicts like the Nagorno-Karabakh in 2020 or its use for strategic communications for Ukraine during the ongoing conflict. (Péria-Peigné, 2023)• Israel: its research, development and production of innovative drone technology and exports roughly $500 million worth of UAV-related products per year, have positioned Israel as a world leader in the area. Israel is well known for its indigenous and competitive manufacturing UAVs like the Hermes 450, the Searcher Mk II and the Heron. (Sadot, s.f.)• Iran: their Shahed-136 drone is a low-cost drone that has gained attention internationally as it has shown affordability, precision, long-range, and cheapness during the Ukraine War – deployed by Russia. (Kesteloo, 2025)• Ukraine: has emerged as a leader in tactical warfare, including mass quantities of low-cost First-Person View (FPV) drones for frontline and deep-strike operations. But also, it has implemented “Spider’s Web” operations, which strike deep inside Russia, while using low-cost assets but with strategic and punctual strikes. Ukraine has also expanded into the maritime domain with unmanned surface vessels (USVs) using them with a kamikaze-style operation targeting ships and critical offshore infrastructure in the Black Sea. (Newton, 2025)• Russia: the war has institutionalized an UAV doctrine with mass deployment of FPV drones (Newton, 2025) and the creation – similar to Ukraine – of an Unmanned System Force (USF) aiming to encompass aerial, land and surface drones. (Altman, 2025) II. Economic & Industrial Perspective: “Flying Industrial Revolution” Future Logistics and Delivery Systems Beyond the battlefield, drones are reshaping global economies and enabling new industrial ecosystems. For instance, drones are rapidly transforming last-mile delivery by reducing transportation time, bypassing road congestion, and enabling access to remote or disaster-affected areas. Companies like Amazon, Wing, and Zipline have already demonstrated how unmanned aircraft can deliver medical supplies, parcels, and consumer goods more efficiently than traditional vehicles. As autonomous navigation, battery technology, and payload capacity continue to improve, drones are expected to become critical components of global supply chains, especially in regions where infrastructure is limited or demand for ultra-fast delivery is increasing. Global drone delivery is expected to reach multi-billion-dollar scale by 2030 (PwC, 2023). In the longer term, logistics networks are expected to evolve into hybrid ground–air systems, where drones work alongside autonomous ground vehicles and smart warehouses. These systems could drastically reduce operational costs by automating pickup, sorting, and delivery processes. Integrating drones with AI-driven inventory management and predictive delivery algorithms will allow companies to anticipate demand and route products dynamically. As eVTOL cargo aircraft mature, the concept of “airborne logistics hubs” may also emerge, enabling rapid long-distance transport between distribution centers without the need for airports. Together, these developments point toward a future where aerial logistics are not just an add-on, but a central pillar of modern supply chains. Improving Industrial Efficiency Across agriculture, energy, construction, and mining drones significantly improve efficiency by automating tasks that previously required expensive equipment or manual labor. By replacing manned inspection systems, drones can reduce labor costs, increase safety, and provide data of unprecedented detail (McKinsey, 2022). For example, farmers use drones for precision spraying and crop monitoring, reducing fertilizer and water usage. Energy companies deploy unmanned systems for pipeline inspections and powerline surveys, minimizing downtime and enhancing worker safety. Construction and mining firms rely on drones for site mapping, progress tracking, and 3D modeling, improving project accuracy while lowering operational costs. Beyond task automation, drones are becoming essential to data-driven industrial optimization. Equipped with thermal sensors, LiDAR, and multispectral cameras, unmanned systems can capture high-resolution data that feeds directly into AI analytics platforms. This allows companies to detect inefficiencies, predict equipment failure, and optimize resource allocation in real time. As industries move toward digital twins — virtual models of physical assets — drones will play a key role in continuously updating these systems with accurate spatial and environmental data. The result is a more responsive, efficient, and resilient industrial ecosystem that leverages aerial automation for competitive advantage. Regulatory Environment and Market Growth Regulation remains the single most influential factor shaping the global drone market. Governments are gradually introducing frameworks to enable Beyond Visual Line of Sight (BVLOS) operations, Remote ID tracking, and certification standards for commercial drones. Regions like the European Union have adopted unified risk-based rules through EASA, while the United States continues to refine its Part 107 and UTM integration policies through the FAA. These regulatory milestones are essential for scaling commercial drone usage, as they provide clarity to manufacturers, operators, and investors. As regulatory frameworks mature, they are also becoming a competitive advantage for regions that adopt them early. Countries that implement drone-friendly ecosystems — such as Singapore, the UAE, and Rwanda — are rapidly emerging as hubs for drone research, testing, and deployment. This regulatory momentum encourages multinational companies to establish operations in these markets, accelerating local innovation and talent development. Furthermore, harmonized international standards will make it easier for drone manufacturers to reduce production complexity and expand globally. Ultimately, the pace of market growth will depend not just on technological advancement but on how effectively governments balance innovation with safety, privacy, and public acceptance. Investment Trends Investment in drone-related technologies has surged, driven by the convergence of autonomy, artificial intelligence, and advanced manufacturing. Venture capital firms increasingly fund companies developing autonomous navigation systems, UTM software, battery technology, and specialized industrial drones. Defense investors continue to expand their portfolios into dual-use drone companies, reflecting growing geopolitical interest and national security incentives. Meanwhile, major tech firms and automotive companies are exploring opportunities in cargo drones, eVTOL aircraft, and autonomous mobility ecosystems. Beyond private investment, government funding and public–private partnerships are accelerating drone adoption globally. Many nations are launching test corridors, innovation hubs, and subsidies to attract drone startups and support local manufacturing. This trend is particularly strong in Asia and the Middle East, where governments see drones as strategic tools for digital transformation and economic diversification. As markets mature, investment is shifting from hardware-heavy startups toward software, analytics, and integrated airspace management solutions — reflecting a broader transition from drone manufacturing to drone ecosystems. This shift signals a long-term, sustainable evolution of the drone industry from early experimental phases to full-scale commercial and civil integration. III. Future Technologies The Need for Unmanned Traffic Management (UTM) As drones and future eVTOL air taxis multiply, low-altitude airspace will become increasingly crowded. To prevent collisions and maintain order, UTM frameworks — already being developed by NASA, the FAA, EASA, and ICAO — aim to coordinate autonomous flights using real-time tracking, automated route planning, and digital air corridors (Kopardekar, 2016). These systems will act as the “air-traffic control of the future,” but designed for far larger numbers of smaller, faster-moving vehicles. In addition, as demand grows, it is likely that UTM will evolve into a fully automated, AI-driven airspace ecosystem capable of managing thousands of simultaneous flights with minimal human oversight. Future systems could incorporate weather prediction, dynamic rerouting, and AI-powered detect-and-avoid features, which more than a technical upgrade, would transform the air mobility in the cities worldwide. Global Standardization Competition The need for standard UTM, drone certifications, communication systems, and detect-and-avoid technology is critical, but it also represents a geopolitical contest. The U.S., the European Union, and China are each developing distinct technological ecosystems, hoping their standards will dominate global markets. Whichever region’s standards become the international norm will shape supply chains, aircraft design, and regulatory practices for decades. This competition mirrors earlier battles over telecommunications and 5G. Nations that establish widely adopted drone standards will gain strategic advantages, including influence over global manufacturing, software ecosystems, and aviation governance. As a result, UTM and drone certification are no longer just technical debates — they have become instruments of national power, economic leverage and somehow geopolitical importance. Urban Safety and Privacy Issues In addition, another major concern for cities is the widespread adoption of drones itself, which translates into surveillance risks, noise pollution from frequent flights, and vulnerability to cyberattacks that could compromise flight controls. Therefore, urban areas need strict rules governing data collection, flight paths, and liability in case of accidents to maintain public trust and safety. In the future, cities will also require integrated emergency response protocols, stronger cybersecurity defenses, and digital identity systems for all unmanned aircraft. Public engagement and transparent oversight will play a major role in ensuring that drones enhance urban life without creating new forms of intrusion or risk. Managing these challenges will be essential for the successful adoption of unmanned urban mobility. Integration with Future Urban Infrastructure In line with the previous section, smart cities could incorporate drones into their core infrastructure. For example, vertiports, rooftop landing pads, sensor-equipped air corridors, and digital twins could enable efficient navigation and real-time monitoring. In addition, drones will become essential for urban mobility and public services – from medical or any goods deliveries to emergency response like fire unit responses. As cities evolve, this integration will create a hybrid transportation ecosystem, where ground vehicles, aerial drones, and automated control systems would operate in sync. Urban planning will increasingly consider airspace as a valuable layer of infrastructure, much like roads or power grids. Therefore, collaboration between governments, industry, and technology providers to design cities capable of supporting high-density autonomous air mobility is required. Conclusion Unmanned systems are redefining the global balance of power, transforming industrial processes, and reshaping urban futures. The convergence of autonomy, AI, and networked airspace introduces both unprecedented opportunity and profound risk. Geopolitically, drones dilute traditional military dominance; economically, they catalyze a new airborne industrial revolution; technologically, they push societies toward complex management of shared automated airspace. Future policy, regulation, and innovation will determine whether unmanned systems become drivers of prosperity or vectors of instability. References Altman, H. (2025, November 13). Russia Creates New Military Branch Dedicated to Drone Warfare. The War Zone (TWZ). https://www.twz.com/news-features/russia-creates-new-military-branch-dedicated-to-drone-warfare Amazon. (2023). Prime Air: The Future of Drone Delivery. Amazon Corporate Publications. Biddle, S., & Oelrich, I. (2016). Future Warfare in the Age of Drones. Council on Foreign Relations. Deloitte. (2022). Drones in Industrial Operations: Transforming Asset Inspection and Performance. Deloitte Insights. FAA (Federal Aviation Administration). (2023). Integration of Unmanned Aircraft Systems into the National Airspace System. U.S. Department of Transportation. FAA (Federal Aviation Administration). (2025). Drones. https://www.faa.gov/uas Fischer, S. (2020). China’s Military–Civil Fusion Strategy: A View from Washington. U.S.–China Economic and Security Review Commission. Kania, E. B. (2020). Learning Warfare from the Laboratory: China’s Progress in Military Innovation. Center for a New American Security (CNAS). Kesteloo, H. (2025, September 29). Global Military Drone Race Intensifies as Nations Rush to Copy Iran’s Shahed Design. Medium. https://medium.com/@hayekesteloo/global-military-drone-race-intensifies-as-nations-rush-to-copy-irans-shahed-design-404badf482fb Kopardekar, P. (2016). Unmanned Aircraft System (UAS) Traffic Management (UTM) Concept of Operations. NASA Ames Research Center. McKinsey & Company. (2022). The Commercial Drone Market Outlook: Insights on Market Growth, Industrial Adoption, and Regulation. McKinsey Robotics & Automation Practice. Mehta, A. (2022). Counter-Drone Systems and the Future of Air Defense. Defense News. Newton, M. (2025, November 3). How Are Drones Changing War? The Future of the Battlefield. Center for European Policy Analysis (CEPA). https://cepa.org/article/how-are-drones-changing-war-the-future-of-the-battlefield/ Péria-Peigné, L. (2023, April 17). TB2 Bayraktar: Big Strategy for a Little Drone. IFRI. https://www.ifri.org/en/memos/tb2-bayraktar-big-strategy-little-drone PwC. (2023). Clarity from Above: Global Drone Market Analysis. PwC Global. Roland Berger. (2022). Urban Air Mobility: The Rise of the Drone Economy. Roland Berger Strategy Consultants. Rwanda Civil Aviation Authority. (2021). Regulatory Framework for Drone Delivery and BVLOS Operations. Government of Rwanda. Sadot, U. (n.d.). Proliferated Drones: A Perspective on Israel. Center for a New American Security (CNAS). https://drones.cnas.org/reports/a-perspective-on-israel/ Schmidt, E., Work, R., & Clyburn, M. (2021). Final Report: National Security Commission on Artificial Intelligence. U.S. Government Printing Office. Singer, P. W. (2009). Wired for War: The Robotics Revolution and Conflict in the 21st Century. Penguin Books. Statista. (2023). Global Drone Market Value and Investment Trends. Statista Market Outlook. Vision of Humanity. (2024, June 13). How Drones Have Shaped the Nature of Conflict. https://www.visionofhumanity.org/how-drones-have-shaped-the-nature-of-conflict/ Wing (Alphabet). (2023). Autonomous Delivery Networks and Future Logistics. Wing Technical Publications. Zipline. (2022). Operational Impact of Automated Medical Delivery by Drone. Zipline International Case Studies.

Defense & Security
AI US China Technology War as Chinese and American Technology competition for technological dominance and artificial intelligence trade war or national security risk as a 3D illustration.

The high-Tech Cold War: US-China Rivalry and the Battle for Global Innovation

by Eraj Farooqui

Since the 1970s, the US-China relationship has been defined by a combination of cooperative and competitive objectives. Competitive interests, however, have prevailed, resulting in a rising competition between the two countries. (Pillsbury, 2015) Candidates in the 2016 presidential election treated China as an adversary, with Donald Trump's China-bashing becoming a trademark of his campaign. Rivalry with China has become the organising premise of American foreign policy under Trump's administration. Republicans and Democrats differ on most issues, but they agree on the need to change America's approach towards China. This has sparked speculation about whether the US-China relationship has devolved into a possibly violent clash or a new Cold War. The Trump administration has openly announced a shift in US policy towards China, with Matt Pottinger claiming that the US has modified its China policy to emphasise competition. Former Vice President of Trump Pence stated that the United States will combat China aggressively on all fronts, including economic, military, diplomatic, political, and ideological. This statement is regarded as "the declaration of a new Cold War." (Pence’s, 2018) Former Trump advisor Stephen K. Bannon has declared economic war on China, blaming its exports on the American working and middle classes. Many people agree that China is economically dominating America, and the US government and industry have done little to solve the situation. Globalists such as Madeline Albright, Tom Friedman, and Fareed Zakaria have grown increasingly concerned about China's lack of reciprocity in economic dealings with the United States. David Lampton, a pro-engagement advocate, has criticised China's WTO membership for increasing bilateral trade surpluses. (Staff R. , 2017) The second stage began when Donald Trump determined to halt Chinese commercial and technological advancements, renouncing liberal internationalism in favor of a new grand strategy against China. (Drezner D. R., 2021) The growing view of Xi Jinping as a harsh leader with an aggressive foreign policy contributes to the sense of an ideological clash. China and the United States have initiated an unconstrained war for bilateral, regional, and global dominance, ushering in a new age of strategic conflict that has yet to be fully defined. (Rudd, 2020) The US-China conflict appears to be a Cold War, and any return to a pre-2017 environment of "strategic engagement" with Beijing is no longer politically viable. (Rudd, 2020)However, (Zakaria, 2019) does not feel that the liberal international order has deteriorated as much as is widely assumed, and China is far from a grave threat to the liberal international system. Despite the best intentions of both countries, the US-China relationship is more likely to devolve into economic and military competition. (Lake, 2018) China's strategy aims to modernize its industrial capacity and secure its position as a global powerhouse in high-tech industries. The strategy aims to reduce reliance on foreign technology imports, increase Chinese-domestic content of core materials, and upgrade its dominant position in major strategic industries, such as pharmaceutical, automotive, aerospace, semiconductors, and most importantly, IT and robotics. The 14th Five-Year Plan of China (2021-2025) emphasizes high-quality growth driven by green and high-tech industries, service sectors, and domestic consumption. The US judged China's old growth model as generating a somewhat balanced win-win relationship between the two economies, based on "comparative advantage" and "cost-benefit" evaluations. However, Beijing's new growth model, particularly the "Made in China 2025" aspiration, is perceived as competition with the US service and knowledge economy, resulting in trade and high-tech warfare between the two countries since 2018. (Bernal-Meza L. X., China-US rivalry: a new Cold War or capitalism’s intra-core competition?, 2021) The US business community, once a staunch supporter of engagement, has complained that China has hacked American industrial secrets, created barriers to American firms investing in China, enforced regulations that discriminate against foreigners, maintained high tariffs that should have been reduced decades ago, and blocked American Internet businesses. In a rare joint statement by the allies, the intelligence chiefs of the Five Eyes countries convened on Tuesday to charge China with stealing intellectual property and using artificial intelligence to hack and spy on the countries. (Bing, 2023) The officials from the United States,Britain,Canada,Australia and Huawei,for example,has tight relations with the Party and has been accused of stealing intellectual property as well as spying on Western countries. The United States is concerned about Huwaie's 5G supremacy, which is why it’s CEO, Meng Wan Zhou, was arrested in Canada. Indeed, its importance was highlighted when the United States imposed restrictions restricting, and in some cases prohibiting, Chinese telecoms operations in the American market, and launched a global effort to persuade friends, partners, and others to follow suit. Thus, while President Trump allowed one company (ZTE) a respite from what appeared to be a ban that would put it out of business, later American limitations on Huawei threatened to destroy China's premier international technology company's global viability. (Goldstein, 2020) When it comes to both green technology and chips, it is now at the center of American politics. The CHIPS Act, approved by Congress last year, included $52 billion in grants, tax credits, and other subsidies to stimulate American chip production. That's the kind of industrial policy that would make Hamilton gape and clap. Over the next few years and decades, China will pour vast sums of money into its own industrial strategy programmes, spanning a wide spectrum of cutting-edge technology. According to one Centre for Strategic and International Studies researcher, China already spends more than 12 times as much of its GDP on industrial programmes as the United States. (BROOKS, 2023) Certain social media sites, such as Facebook and Google, are prohibited in China.In the United States, there is a restriction on TIKTOK and WECHAT. To counter China, the United States has implemented a number of statutes, including the: 1.COMPETES Act 2020.: The House Science, Space, and Technology Committee decided to advance the America Competes Act of 2022, which intends to improve America's scientific and technology efforts in the twenty-first century in order to compete with China in vital fields. The bipartisan Act is divided into eleven sections, with Division K headed "Matters Related to Trade." Trade Adjustment Assistance, Import Security and Fairness Act, National Critical Capabilities Review, Modification and Extension of Generalized System of Preferences, Reauthorization of the American Manufacturing Competitiveness Act of 2016 and Other Matters, and Temporary Duty Suspensions and Reductions are the seven sections of the Act. President Joe Biden has indicated his support for the Act, arguing that it will strengthen America's supply chains and reenergize the economy's innovation engine, allowing it to compete with China and the rest of the globe for decades to come. 2.Chips and Science Act 2022: President Joe Biden signed the Chips and Science (or CHIPS) Act into law, promising local semiconductor producers more than $50 billion to expand home output and "counter China." (Cosgrove, 2023) 3.The United States passed the Inflation Reduction Act 2022: Although China now dominates clean technology manufacturing, the Inflation Reduction Act contains provisions geared primarily at strengthening the United States' clean energy supply chain. Furthermore, the global transition to clean technology such as solar panels and electric vehicles is unavoidable and ongoing as they become more affordable than fossil-fueled alternatives and countries take action to achieve their Paris climate obligations. (NUCCITELLI, 2023) CHIP War After failing to achieve an agreement with Chinese regulators, Intel cancelled a $5.4 billion takeover deal with Israel-based Tower Semiconductor. China is one of Intel's most important markets, and on July 3, Beijing announced a license requirement for exporters of gallium and germanium, rare-earth metals used in semiconductor manufacturing. The chip war is mostly motivated by the United States' concerns about China's military exploitation of semiconductor technology. However, China's military sector has a key weakness: most of its cutting-edge applications rely on foreign technological inputs, particularly microprocessor exports. China will be the world's largest buyer of semiconductor manufacturing equipment in 2021, accounting for 26% of worldwide demand. Biden established an export license requirement in October 2022, limiting China's access to semiconductor innovations manufactured by US corporations. In July 2023, Japan officially prohibited the sale of 23 types of semiconductor equipment to China, which is significantly more widespread than the US restriction, impeding China's development of advanced chips and basic chips used in technology such as automobiles and smartphones. The Netherlands Standing Committee on Foreign Trade and Development Cooperation said in September that it will begin limiting its semiconductor technology exports to China. According to Nikkie Asia, this new legislation would prohibit the Dutch ASML from exporting innovative chip manufacturing methods without first getting government-approved licenses. (CHENG TING-FANG, 2023) These export limitations have pushed Beijing to retaliate, with China's most recent regulation on gallium and germanium shipments serving as a direct retaliation to the US' global allies. According to the New York Times Magazine, Taiwan manufactures more than 90% of the world's most advanced microchips and could risk armed confrontation if China goes on the offensive in the future. (Palmer, 2023) Former national security advisor Robert O'Brien, on the other hand, believes that in the case of an impending invasion,the US would destroy Taiwan's semiconductor manufacturers rather than allow them to fall into the hands of China. The chip battle has further pushed Taiwan into an awkward position in the changing geopolitical landscape. (Carr, 2023) The Biden administration intends to restrict shipments of advanced artificial intelligence chips designed by Nvidia to China as part of a broader set of actions aimed at preventing Beijing from gaining advanced US technologies to enhance its military. The action is intended to address regulatory gaps and limit China's access to advanced semiconductors, which might feed AI advances and sophisticated computers crucial to Chinese military purposes. Gina Raimondo, Secretary of Commerce, emphasised that the administration's goal is not to harm Beijing economically. (Alexandra Alper, 2023) In the words of Lampton, "There was a widespread public perception that the Sino-American economic playing field had been unfair to Americans, with the assertion that the American economy was hollowed out, in part due to overt and covert technology transfer to China" (Lampton, 2015) . China's new growth strategy is leading to more rivalry than complementarity in the China-US economic partnership. The fact that "China's achievement in moving up in the global supply and value chains has led to Beijing's larger share of global surplus and the reduction of the profit margin for traditional core states" has disturbed the United States. (Li X. , 2020) As Lenin would have argued, the dynamics of the US-China rivalry are an inter-imperial rivalry driven by inter-capitalist struggle. Competition for the global market could quickly escalate into escalating confrontations of zones of influence, if not war. Conclusion The US-China rivalry is characterised by a complex interplay of economic, technological, and ideological issues. Although the relationship resembles a new Cold War, some argue that it is best understood as a capitalist intra-core competition driven by inter-imperial rivalry. As Lenin foresaw, competition for global markets may escalate into conflicts over areas of control. The contest is likely to last and have an impact on the global order for many years to come since both nations have made large investments in industrial strategy and technology. Advanced semi-conductors and AI chips are necessary for the next race for technological supremacy. 6G telecom and quantum computing. The globe was forced to protect the supply chain for rare earth materials due to this high-tech rivalry. Since they are currently the epicentre of the world's military and economic might. For many years to come, its influence will shape international politics, trade disputes, and technological advancements. Global struggle for these minerals is anticipated in the twenty-first century, much like the wars for oil and gas in the twentieth. Rare earths will be the focus of the twenty-first century. Mineral-rich nations like Brazil, India, Australia, and Vitenam will also become strategically significant for other reasons. As competition for these resources intensifies, international relations will shift and geopolitical alignment will result. 5Gs is no longer the focus of this new technical cold war. It now comes down to controlling the basic materials that enable technology. For this reason, JD Vance adds, "Give us your financial resources, and we'll take care of you." In the trade and technology conflict that has intensified since the Biden Administration increased the restrictions on sales of cutting-edge American technology to China, the Pentagon has designated rare earth as a strategic mineral that is essential for US defence.In response to US technology sanctions, China restricted the export of rare earth materials.It has nothing to do with economics, but rather with military supremacy on a worldwide scale. This is how the US sees the discovery of these rare earth minerals. Donald Trump is threatening Canada, Greenland, and Ukraine for this reason. Due to their large stockpiles of rare earth materials, they are able to protect the global supply chain in this way.Interestingly, however, China produces 63% of rare earth minerals and refines 83% of them. It can store 44 million metric tonnes of reserves in this manner. The US would still have 4-5 million tonnes of metric reserves if it were to seize the deposits of Greenland, Canada, and Ukraine.Thus, they are negligible compared to 44 million metric tonnes in China. If China wisely controls its rare earth export strategy, it will be powerful enough to remind the world of its might without being overly harsh. Then it can demonstrate that Beijing is just as adept at using resources as Washington is at using dollars or sanctions. However, if the world manages to get past it or if China's grip wanes, its greatest advantage may begin to diminish. The next few months are critical because tanks and missiles are not being used in the largest power fight this time. Minerals and magnets will be used to combat it. Bibliography Alexandra Alper, K. F. (2023, October 18). Biden cuts China off from more Nvidia chips, expands curbs to other countries. Retrieved from Reuters: https://www.reuters.com/technology/biden-cut-china-off-more-nvidia-chips-expand-curbs-more-countries-2023-10-17/Bernal-Meza, L. X. (2021, May 1). China-US rivalry: a new Cold War or capitalism’s intra-core competition? Revista Brasileira de Política Internacional, vol. 64, no. 1. Retrieved from https://www.redalyc.org/journal/358/35866229009/html/#B39Bing, Z. S. (2023, May 23). Chinese hackers spying on US critical infrastructure, Western intelligence says. Retrieved from Reuters: https://www.reuters.com/technology/microsoft-says-china-backed-hacker-targeted-critical-us-infrastructure-2023-05-24/BROOKS, D. (2023, March 23). The Cold War With China Is Changing Everything. Retrieved from The NewYork Times: https://www.nytimes.com/2023/03/23/opinion/cold-war-china-chips.htmlCarr, E. (2023, August 22). The 2023 US–China Chip War: The Nexus Of High Tech And Geopolitics. Retrieved from Forbes: https://www.forbes.com/sites/earlcarr/2023/08/22/uschina-chip-war-the-nexus-of-high-tech-and-international-relations/?sh=618bc5ed1bd3CHENG TING-FANG, L. L.-B. (2023, June 30). Netherlands unveils chip tool export curbs in fresh blow to China. Retrieved from Nikkei Asia: https://asia.nikkei.com/Business/Tech/Semiconductors/Netherlands-unveils-chip-tool-export-curbs-in-fresh-blow-to-ChinaCosgrove, L. (2023, May 5). Lawmakers Tout Effect of CHIPs Act in US Competition with China. Retrieved from THE EPOCH TIMES: https://www.theepochtimes.com/us/lawmakers-tout-effect-of-chips-act-in-us-competition-with-china-5243151Drezner, D. R. (2021, May/June 13). The end of grand strategy. Retrieved from Foreign Affairs,: https://www.foreignaffairs.com/articles/world/2020-04-13/end-grand-strategyGoldstein, A. (2020). US–China Rivalry in the twenty-first century: Déjà vu and Cold War II. China International Strategy Review volume 2,, 48-62.Kautsky, K. (1914, September 11). Ultra-imperialism. Der Imperialismus," Die Neue Zeit, 32 (1914), Vol. 2, 908-922. Retrieved from https://www.marxists.org/archive/kautsky/1914/09/ultra-imp.htmLake, D. A. (2018). Economic openness and great power competition: lessons for China and the United States. The Chinese Journal of International Politics 11, no. 3, 237-70.Lake, D. A. (2018). Economic openness and great power competition: lessons for China and the United States. The Chinese Journal of International Politics 11, no. 3, 237-270.Lampton, D. (2015, June 2). David Lampton on “A Tipping Point in U.S.-China Relations”. Retrieved from COUNCIL PACIFIC AFFAIRS: https://www.councilpacificaffairs.org/news-media/security-defense/dr-david-lampton-on-a-tipping-point-in-u-s-china-relations/Li, X. (2020). The rise of China and its impact on world economic stratification and re-stratification. Cambridge Review of International Affairs 34, no. 4 , 530-50.NUCCITELLI, D. (2023, September 20). The Inflation Reduction Act is reducing U.S. reliance on China. Retrieved from The YALE Climate Connection: https://yaleclimateconnections.org/2023/09/the-inflation-reduction-act-is-reducing-u-s-reliance-on-china/Palmer, A. W. (2023, August 11). An Act of War’: Inside America’s Silicon Blockade Against China. Retrieved from The NewYork Times Magazine : https://www.nytimes.com/2023/07/12/magazine/semiconductor-chips-us-china.htmlPence’s, P. J. (2018, October 5). China Speech Seen as Portent of ‘New Cold War’. Retrieved from New York Times. : https://www.nytimes.com/2018/10/05/world/asia/pence-china-speech-cold-war.htmlPillsbury, M. (2015). The Hundred-Year Marathon: China's Secret Strategy to Replace America as the Global Superpower . Henry Holt and Co.Rudd, K. (2020, May 6). The coming post-COVID anarchy. Retrieved from Foreign Affairs: https://www.foreignaffairs.com/articles/united-states/2020-05-06/coming-post-covid-anarchyStaff, R. (2017, August 17). Trump adviser Bannon says U.S. in economic war with China: media. Retrieved from Reuters: https://www.reuters.com/article/us-usa-china-bannon-idUSKCN1AX0DEZakaria, F. (2019, December 6). The new China Scare: why America shouldn’t panic about its latest challenger. Retrieved from Foreign Affairs: https://www.foreignaffairs.com/articles/china/2019-12-06/new-china-scare 

Defense & Security
Missiles in front EU flag. Air defense systems European Union. Cruise missiles in Europe. Concept weapons development in Europe. Stockpiles strategic missiles. Concrete wall in foreground. 3d image

Nuclear Sharing Between the U.S. and the EU. Benefits and Challenges.

by Krzysztof Śliwiński

Abstract This paper examines the NATO nuclear sharing arrangement, focusing on its benefits and challenges within the U.S.-EU security framework. Nuclear sharing involves the U.S. deploying B61 nuclear bombs in select European NATO countries, with host nations providing delivery systems and infrastructure while the U.S. retains full control, ensuring compliance with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The arrangement strengthens NATO's deterrence posture, promotes alliance cohesion, and supports non-proliferation by dissuading the development of independent nuclear arsenals. Recent geopolitical tensions, especially Russia's invasion of Ukraine, have intensified calls for expanding sharing to countries like Poland, enhancing deterrence on NATO's eastern flank. Exercises such as Steadfast Noon validate operational readiness and signal resolve. Critics, however, highlight legal and escalation risks, potential NPT violations, and domestic opposition in host countries. Despite these issues, nuclear sharing remains a crucial component of Euro-Atlantic security, adapting to evolving threats while balancing deterrence, alliance unity, and non-proliferation goals.  Key Words: International Security, Weapons of Mass Destruction, Nuclear Sharing, Alliances Introduction Nuclear sharing is a cornerstone of NATO's deterrence strategy, designed to distribute the benefits, responsibilities, and risks of nuclear deterrence across the Alliance. Under these arrangements, the United States deploys a limited number of B61 nuclear gravity bombs at bases in several European NATO member states. At the same time, those host countries provide the necessary infrastructure, security, and dual-capable aircraft (DCAs) to deliver weapons in a crisis. The weapons remain under full U.S. custody and control at all times, in compliance with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). A nuclear mission can only be authorised after explicit political approval from NATO's Nuclear Planning Group (NPG), which includes all NATO members, and the U.S. President (and potentially the UK Prime Minister). This setup ensures collective decision-making and underscores the U.S.'s extended deterrence commitments to its allies, helping prevent nuclear proliferation by giving non-nuclear states a stake in the Alliance's nuclear posture without independent arsenals.[1] The arrangements originated in the Cold War era, with the first U.S. atomic weapons arriving in Europe in 1954. By the 1960s, they were formalised through the NPG to allow non-nuclear allies input on nuclear policy. Today, approximately 100 B61 bombs are forward-deployed in Europe, hosted by five NATO countries: Belgium, Germany, Italy, the Netherlands, and Turkey. Seven NATO allies contribute DCA, including F-16s and F-35s, which serve dual roles in conventional operations and as potential nuclear delivery platforms. France and the UK maintain independent nuclear forces that complement the US-led sharing but operate outside the formal NATO structure. While the question references the EU, nuclear sharing is strictly a NATO framework; all host countries are EU members except Turkey, creating significant overlap but no direct EU-level involvement.[2] These arrangements serve multiple purposes: they enhance Alliance cohesion, provide tools for managing escalations in conflicts, and signal resolve to adversaries, such as Russia. Recent geopolitical tensions, including Russia's invasion of Ukraine, have prompted discussions about expanding sharing to strengthen deterrence on NATO's eastern flank.[3] Poland, a NATO member since 1999, has long advocated for a stronger role in the Alliance's nuclear mission amid heightened Russian threats, particularly following the 2022 invasion of Ukraine. In June 2023, Polish Prime Minister Mateusz Morawiecki first publicly expressed interest in hosting U.S. nuclear weapons under NATO's sharing policy, arguing it would bolster deterrence without violating the NPT. This push intensified in early 2025, driven by concerns over U.S. reliability under the second Trump administration and Russia's aggressive posture.[4]   On March 13, 2025, President Andrzej Duda explicitly urged the U.S. to deploy nuclear warheads on Polish territory, stating in interviews that NATO infrastructure—including nuclear assets — should "shift east" to match the eastward expansion of the Alliance's borders since 1999. He emphasised that such a move would enhance security guarantees and deter future Russian aggression, while also praising France's potential extension of its "atomic umbrella" as a complementary option. Duda's proposal carried domestic political weight, positioning Poland's conservative opposition as pro-U.S. ahead of the May 2025 presidential election, where candidates debated transatlantic ties versus European autonomy.[5] Proponents argue Poland is an ideal candidate: it spends 4.7% of GDP on defence (exceeding NATO's 2% target), has built one of Europe's strongest militaries, and hosts significant U.S. rotational forces. Analysts suggest that deployment could involve adapting Polish F-35s for DCA roles or constructing secure storage facilities. However, logistical and political hurdles remain, including a potential Russian backlash and the need for NPG consensus.[6] As of October 2025, however, no U.S. nuclear weapons have been deployed to Poland, and the proposal remains under discussion without a formal U.S. commitment. Instead, Poland has deepened integration through participation in NATO's annual Steadfast Noon nuclear exercise, which began on October 13, 2025, across Belgium, the Netherlands, and the North Sea — testing procedures for credibility and safety. Poland joined as a full participant alongside Finland, Germany, and the U.S., signalling growing involvement in nuclear planning but stopping short of hosting assets. Alternatives like a dedicated U.S. "nuclear umbrella" declaration for Poland have been floated to avoid escalation without physical deployment.[7] What academics say Academic experts agree that Nuclear sharing is a cornerstone of NATO's defence strategy. This arrangement refers to an agreement according to which the United States deploys non-strategic nuclear weapons on allied territory while maintaining ownership and peacetime custody.[8]This allows selected NATO members to participate in nuclear planning and provide delivery systems, creating a framework that extends American nuclear deterrence across the Alliance. The operational structure of nuclear sharing involves dual-key arrangements in which both U.S. and host-nation authorisation are required for weapon employment. The United States maintains absolute control and custody of its nuclear weapons forward-deployed in Europe, while Allies provide military support for the DCA mission with conventional forces and capabilities. Nuclear sharing arrangements play a vital role in the Alliance's interconnection and remain a key component of security guarantees and the indivisibility of security across the entire Euro-Atlantic area.[9] These arrangements are coordinated through NATO's Nuclear Planning Group, ensuring multilateral consultation on nuclear policy and targeting decisions. Currently, only five European NATO members have signed bilateral nuclear-sharing agreements with the U.S. These are: Belgium, Germany, Italy, the Netherlands, and Turkey, under which the U.S. stores B61 nuclear gravity bombs at their airbases and their dual-capable aircraft can deliver them in a NATO context. These arrangements, dating back to the Cold War and reaffirmed in subsequent treaties, involve approximately 100 U.S. warheads as of 2025.[10] Nuclear sharing serves multiple strategic purposes within the alliance framework. It strengthens extended deterrence by visibly integrating allied forces into NATO's nuclear posture, thereby reassuring front-line states of American commitment.[11] Experts claim that these arrangements helped prevent nuclear proliferation by reducing incentives for European allies to develop independent arsenals during the Cold War.[12] Additionally, nuclear sharing distributes the political and operational burdens of nuclear responsibility across participating members rather than concentrating them solely with the United States. However, nuclear sharing faces significant criticisms. Legal scholars argue that forward-deploying U.S. weapons on non-nuclear states potentially contravenes the Non-Proliferation Treaty's spirit, creating ongoing diplomatic tensions with Russia and other nations.[13] Domestic opposition within host countries and concerns about the escalation of crises further complicate these arrangements.[14] Despite these challenges, nuclear sharing remains integral to NATO's deterrence strategy, particularly as renewed great-power competition has reinforced alliance solidarity and commitment to collective defence in the contemporary security environment. Benefits of Nuclear Sharing Firstly, official sources from NATO and the U.S. government consistently highlight the benefits of their efforts in preserving peace, deterring aggression, fostering unity, and aligning with global non-proliferation norms. The primary official argument for nuclear sharing is its role in bolstering NATO's deterrence posture against evolving threats, particularly from nuclear-armed adversaries like Russia. NATO's 2022 Strategic Concept and related documents emphasise that the Alliance's nuclear capabilities, including U.S. forward-deployed weapons, serve to "preserve peace, prevent coercion and deter aggression". [15] The 2024 Washington Summit Declaration reaffirms this, stating that "nuclear deterrence is the cornerstone of Alliance security" and that NATO's capabilities provide the "supreme guarantee" for all members.[16] By integrating U.S. nuclear assets with European contributions, such as DCA from seven Allies, these arrangements complicate adversaries' planning and enhance crisis management. As noted in NATO's factsheet, "nuclear sharing provides military and political tools for deterrence and can be used to manage escalation in a crisis," with DCA serving as a "visible and valuable instrument for strategic communications" to signal resolve.[17] Accordingly, in a security environment marked by Russia's integration of nuclear forces into its military strategy and threats against Allies, nuclear sharing ensures credible deterrence without provoking conflict. NATO’s former Secretary General Jens Stoltenberg argued that "the purpose of NATO's nuclear weapons is not to provoke a conflict but to preserve peace, deter aggression and prevent coercion," underscoring that arrangements like those involving Germany are vital for the "security of the whole alliance".[18] The U.S. State Department echoes this rationale, claiming that with NATO "numerically outgunned on the central front," nuclear sharing maintains a "nuclear deterrent posture sufficient to deter the Soviet aggression," a logic that persists against modern threats.[19] Against this backdrop, exercises like Steadfast Noon[1] Further strengthen this by simulating nuclear scenarios, ensuring "the credibility, effectiveness, safety and security of the nuclear deterrent mission".[20] Overall, according to official sources, these mechanisms help preserve stability in the Euro-Atlantic area, reduce reliance on nuclear weapons, and adapt to challenges posed by actors such as China and North Korea. Secondly, nuclear sharing fosters unity and shared responsibility among NATO members, distributing the benefits, risks, and political burdens of deterrence more evenly among them. NATO's publications explicitly state that these arrangements "ensure that the benefits, responsibilities and risks of nuclear deterrence are shared across the Alliance," demonstrating "unity and cohesion amongst all Allies" through joint decision-making in the Nuclear Planning Group (NPG).[21] This shared approach, as NATO sources claim, reinforces the indivisibility of security, as outlined in NATO's nuclear policy: "Nuclear sharing arrangements play a vital role in the interconnection of the Alliance and remain one of the main components of security guarantees and the indivisibility of security of the whole Euro-Atlantic area".[22] The 2024 Summit Declaration commits to "modernising its nuclear capabilities" and "strengthening its nuclear planning capability," ensuring broader participation to "demonstrate Alliance unity and resolve".[23] By involving European Allies in Allied dual-capable aircraft (DCA) missions and infrastructure, nuclear sharing is intended to help mitigate disparities in capabilities, promote equitable burden-sharing, and prevent fragmentation within the Alliance. Thirdly, NATO posits that nuclear sharing supports non-proliferation efforts. Contrary to criticisms, official sources argue that nuclear sharing advances non-proliferation by reducing incentives for Allies to pursue independent nuclear programs. NATO's review of the NPT at 50 years notes that these arrangements "have contributed to security in Europe and non-proliferation as Allies under the U.S. nuclear umbrella have not felt pressure to develop their own weapons".[24] Codified during the 1960s negotiations, they comply fully with the Treaty, as both the U.S. and the USSR ensured that no prohibitions were placed on such setups.[25] The U.S. State Department details this compromise, which allowed for "wartime nuclear sharing" without requiring peacetime transfer, thereby reassuring allies like West Germany and dissuading proliferation.[26] Post-Cold War reductions — over 90% in NATO's nuclear stockpile — align with NPT Article VI disarmament goals while maintaining deterrence.[27] This balance facilitates peaceful nuclear cooperation under the IAEA (International Atomic Energy Agency) safeguards, thereby strengthening the global nuclear non-proliferation regime.[28] Finally, according to the U.S. State Department, nuclear sharing underscores the U.S. commitment to European security, countering fears of "decoupling" where allies doubt American resolve. The State Department describes it as addressing whether the U.S. would "sacrifice Chicago to save Hamburg," by making nuclear weapons available for Europe's defence.[29] NATO's policy affirms that U.S. strategic forces, supplemented by forward-deployed assets, provide the "supreme guarantee," with Allies contributing to ensure integration across domains.[30] To sum up, official arguments portray nuclear sharing as indispensable for deterrence, cohesion, non-proliferation, and transatlantic solidarity. These arrangements, according to Western policy-makers and experts, have sustained European stability for decades, with ongoing modernisation ensuring their relevance in an unpredictable world. Nuclear Sharing in the Face of an Ongoing War in Ukraine Nuclear sharing has allegedly bolstered NATO's overall deterrence posture, helping to prevent Russian escalation in Ukraine, including potential nuclear use. NATO's nuclear capabilities, including U.S. forward-deployed weapons in Europe, are described as essential to "preserve peace, prevent coercion and deter aggression" in the face of Russia's nuclear threats and integration of nuclear forces into its strategy.[31] This has indirectly supported Ukraine by signalling to Russia that any significant escalation — such as nuclear strikes or attacks on NATO territory — would invoke a collective response, thereby limiting Russia's options in the conflict. Russia's invasion has been accompanied by nuclear sabre-rattling to deter Western intervention, but nuclear sharing has helped counter this by maintaining credible deterrence without direct NATO involvement in Ukraine.[32] In that sense, the already mentioned exercises like Steadfast Noon simulate nuclear scenarios, reinforcing the "credibility, effectiveness, safety and security" of the deterrent, which has been crucial amid threats from Russia, China, and North Korea. Analysts note that this has made Russian nuclear signalling less credible over time, allowing the West to provide advanced weapons to Ukraine that were initially considered taboo.[33] However, Russia's threats have still delayed and limited the scale of Western aid, such as restrictions on long-range strikes into Russia, due to fears of crossing "red lines".[34] As mentioned before, nuclear sharing agreements have arguably fostered greater unity among NATO allies, enabling sustained military and economic support for Ukraine. By sharing the "benefits, responsibilities and risks of nuclear deterrence," nuclear sharing demonstrates Alliance solidarity and the "indivisibility of security" in the Euro-Atlantic area.[35] This has reassured European allies, particularly those near Russia, allowing them to commit resources to Ukraine without fearing abandonment. For example, Poland's push to join nuclear sharing reflects heightened threat perceptions from the war, aiming to strengthen deterrence and defence in a hostile environment. NATO's support, including intelligence sharing and strategic communications, has, at least in the eyes of Western policy-makers, deterred Russian use of chemical, biological, or nuclear weapons in Ukraine.[36] Without reassurance from nuclear sharing of U.S. commitment — countering fears of "decoupling" — it might have been harder for Europe to maintain this level of involvement.[37] From Russia's perspective, nuclear sharing exacerbates tensions, viewing it as part of NATO's eastward expansion that provoked the invasion.[38] Putin has used this to support claims behind "Russia's Special Military Operation" in Ukraine, framing Ukraine's potential NATO integration as a threat that could place U.S. nuclear weapons near Russia's borders, similar to the Cuban Missile Crisis in reverse. This rationale has fueled Russian nuclear threats, which aim to limit Western aid and prolong the conflict by raising escalation fears.[39] The war has heightened nuclear risks, with some analysts arguing it presents greater dangers than the Cuban Missile Crisis due to the potential for miscalculation.[40] Russia's deployment of tactical nuclear weapons in Belarus as a counter to NATO's sharing arrangements has further escalated postures.[41] Recent decisions by the U.S., UK, and France to allow Ukraine to use long-range missiles against Russian targets have prompted Putin to warn of a direct NATO-Russia war, indirectly tying into nuclear sharing's role in deterrence dynamics.[42] This has possibly complicated peace efforts, as Russia perceives Western escalation as existential, making negotiations harder. As mentioned earlier, nuclear sharing has arguably helped mitigate proliferation risks during the war. By providing a shared nuclear umbrella, it reduces the incentives for allies like Poland and Germany to pursue independent nuclear programs, thereby supporting the NPT.[43] Possibly then, the invasion has not sparked widespread proliferation, partly because NATO's deterrent reassures members. Interestingly, however, the debates over a "European nuclear deterrent" independent of the U.S. — spurred by uncertainties such as potential shifts in U.S. policy under Trump — could undermine this if not managed effectively.[44] The war has also renewed focus on modernising nuclear sharing, with NATO committing to enhancing capabilities at the 2024 Washington Summit.[45] This has indirectly affected Ukraine by diverting Russian resources and attention, though some argue it prolongs the stalemate without a decisive victory. In summary, nuclear sharing has possibly acted as a stabilising force for NATO, enabling robust support for Ukraine and deterring Russian nuclear escalation. However, it has also contributed to heightened tensions and Russian intransigence, complicating pathways to peace. As the war persists into 2025, proposals to expand sharing (e.g., to Poland) reflect its evolving role in countering ongoing threats. Conclusion The "Steadfast Noon" exercises are arguably a clear signal to any potential adversary, including Russia, that NATO is prepared to defend all its members against any threats, including nuclear ones. Such exercises involve the use of American non-strategic nuclear weapons stationed in Europe, although no real combat weapons are used during the drills. The exercises serve not only to practice deterrence against possible nuclear attacks but also to prepare for the potential use of nuclear weapons by NATO if necessary. The fact that these exercises involve nuclear deterrence indicates that NATO's defence strategy includes readiness to escalate to a nuclear response if provoked by a nuclear attack. The locations of these nuclear weapons are not publicly disclosed. Still, there is speculation about their presence in countries like Poland, particularly in light of recent secret agreements that allow foreign troops to enter Polish territory. On the other hand, one should also consider potential downsides, especially for countries in Central and Eastern Europe. Nuclear sharing for potential allied use in wartime poses significant risks despite its deterrence aims. One major downside is its incompatibility with the NPT, which violates Articles I and II.[2] Enabling the indirect transfer of control to non-nuclear states undermines global non-proliferation efforts and draws criticism from states such as China. This arrangement also heightens proliferation risks, as peacetime training and exercises normalise nuclear readiness, potentially inspiring similar setups in Asia-Pacific regions like Japan and South Korea, escalating regional tensions.[46] Security concerns include increased escalation dangers, where limited nuclear use could spiral into full-scale war, especially amid vulnerabilities at host bases like Incirlik in Türkiye during political instability. Expanding sharing, such as to Poland, fuels arms races with Russia and exposes more European sites to attacks, without adding credible deterrence given NATO's conventional superiority. Politically, it breeds divisiveness within NATO, fostering resentment among allies and diverting resources from conventional forces, while eroding U.S. control and complicating disarmament. Domestically, host nations face public backlash and moral burdens from anti-nuclear norms, straining alliance cohesion. Russia's objections in NPT forums further highlight how sharing provokes international backlash, risking broader conflicts. Notes [1] On Monday (October 13 2025), NATO began its annual nuclear deterrence exercise Steadfast Noon. The exercise is a long-planned, routine training activity and part of NATO’s broader efforts to maintain readiness and ensure transparency around its nuclear posture. It is not linked to any current world events, and no live weapons are used.[2] Article I - Each nuclear-weapon State Party to the Treaty undertakes not to transfer to any recipient whatsoever nuclear weapons or other nuclear explosive devices or control over such weapons or explosive devices directly, or indirectly; and not in any way to assist, encourage, or induce any non-nuclear-weapon State to manufacture or otherwise acquire nuclear weapons or other nuclear explosive devices, or control over such weapons or explosive devices. Article II - Each non-nuclear-weapon State Party to the Treaty undertakes not to receive the transfer from any transferor whatsoever of nuclear weapons or other nuclear explosive devices or of control over such weapons or explosive devices directly, or indirectly; not to manufacture or otherwise acquire nuclear weapons or other nuclear explosive devices; and not to seek or receive any assistance in the manufacture of nuclear weapons or other nuclear explosive devices. See more at: https://www.un.org/en/conf/npt/2005/npttreaty.html References [1] NATO’s Nuclear Sharing Arrangements. (2022, February). NATO. https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[2] Kristensen, H. M., Korda, M., Johns, E., & Knight-Boyle, M. (2023, November 8). Nuclear weapons sharing, 2023. Bulletin of the Atomic Scientists. https://thebulletin.org/premium/2023-11/nuclear-weapons-sharing-2023/[3] Johns, E. (2025, October 10). Incomplete Upgrades at RAF Lakenheath Raise Questions About Suspected US Nuclear Deployment. Federation of American Scientists. https://fas.org/publication/incomplete-upgrades-lakenheath-questions-nuclear/[4] Johns, E. (n.d.). Poland’s bid to participate in NATO nuclear sharing. IISS. Retrieved October 14, 2025, from https://fas.org/publication/incomplete-upgrades-lakenheath-questions-nuclear/[5] Poland’s president urges U.S. to move nuclear warheads to Polish territory, FT reports. (2025, March 13). Reuters. https://www.reuters.com/world/polands-president-urges-us-move-nuclear-warheads-polish-territory-ft-reports-2025-03-13/[6] Poland’s president vows to spend 4.7% of GDP on defence this year. (2025, February 5). Euronews. https://www.euronews.com/my-europe/2025/02/05/polands-president-vows-to-spend-47-of-gdp-on-defence-this-year[7] NATO’s annual nuclear exercise Steadfast Noon begins. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/news_238367.htm[8] von Hlatky, S., & Lambert-Deslandes, É. (2024). The Ukraine war and nuclear sharing in NATO. International Affairs, 100(2), 467-485. https://academic.oup.com/ia/article-abstract/100/2/509/7617216?redirectedFrom=fulltext[9] NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/fr/natohq/topics_50068.htm?selectedLocale=en#:~:text=Nuclear%20consultation,are%20members%20of%20the%20NPG[10] NATO’s Nuclear Sharing Arrangements. (2022, February). NATO. https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[11] von Hlatky, S., & Lambert-Deslandes, É. (2024). The Ukraine war and nuclear sharing in NATO. International Affairs, 100(2), 467-485. https://academic.oup.com/ia/article-abstract/100/2/509/7617216?redirectedFrom=fulltext[12] Khalessi, D. (2015). Strategic ambiguity: Nuclear sharing and the secret strategy for drafting articles I and II of the nonproliferation treaty. The Nonproliferation Review, 23(1-2), 81-103. https://doi.org/10.1080/10736700.2016.1155865 [13] Park, K. C., & Choo, J. (2022). NATO's nuclear sharing strategy and its implications for establishing a new strategy for strengthening extended deterrence on the Korean Peninsula. International Area Studies Review, 26(1), 51-78. https://doi.org/10.18327/jias.2022.1.26.1.51 [14] Smith, M. A. (2004). To neither use them nor lose them: NATO and nuclear weapons since the cold war. Contemporary Security Policy, 25(3), 485-514. https://doi.org/10.1080/1352326042000330637[15] NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/topics_50068.htm[16] Washington Summit Declaration. (2024, July 10). NATO. https://www.nato.int/cps/en/natohq/official_texts_227678.htm[17] NATO’s Nuclear Sharing Arrangements. (n.d.). NATO. Retrieved October 20, 2025, from https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[18] Germany’s support for nuclear sharing is vital to protect peace and freedom. (2020, May 11). NATO. https://www.nato.int/cps/en/natohq/opinions_175663.htm[19] Ford, C. A. (2019, December 9). Challenges of Policymaking in Responsible Nuclear Weapons Stewardship. US Department of State. https://2017-2021.state.gov/challenges-of-policymaking-in-responsible-nuclear-weapons-stewardship/[20] NATO’s annual nuclear exercise Steadfast Noon begins. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/news_238367.htm[21] NATO’s Nuclear Sharing Arrangements. (n.d.). NATO. Retrieved October 20, 2025, from https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[22] NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/topics_50068.htm[23] Washington Summit Declaration. (2024, July 10). NATO. https://www.nato.int/cps/en/natohq/official_texts_227678.htm[24] Durkalec, J. (2018, June 29). The Nuclear Non-proliferation Treaty at fifty: a midlife crisis. NATO. https://www.nato.int/docu/review/articles/2018/06/29/the-nuclear-non-proliferation-treaty-at-fifty-a-midlife-crisis/index.html[25] NATO’s Nuclear Sharing Arrangements. (n.d.). NATO. Retrieved October 20, 2025, from https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[26] Ford, C. A. (2019, December 9). Challenges of Policymaking in Responsible Nuclear Weapons Stewardship. US Department of State. https://2017-2021.state.gov/challenges-of-policymaking-in-responsible-nuclear-weapons-stewardship/[27] See more at: https://www.iaea.org/sites/default/files/publications/documents/infcircs/1970/infcirc140.pdf[28] See more at: https://www.iaea.org/[29] Ford, C. A. (2019, December 9). Challenges of Policymaking in Responsible Nuclear Weapons Stewardship. US Department of State. https://2017-2021.state.gov/challenges-of-policymaking-in-responsible-nuclear-weapons-stewardship/[30]NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/topics_50068.htm[31] NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/topics_50068.htm [32] Nuclear Stability and Escalation Risks in Europe. (2023, September 1). Foreign Policy Research Institute. https://www.fpri.org/article/2023/09/nuclear-stability-and-escalation-risks-in-europe/[33] Ibidem.[34] Kimball, D., & Bugos, S. (2022, February 28). Russia’s War on Ukraine and the Risk of Nuclear Escalation: Answers to Frequently Asked Questions. Arms Control Association. https://www.armscontrol.org/issue-briefs/2022-02/FAQ-russia-ukraine[35] NATO’s support for Ukraine. (2025, October 14). NATO. https://www.nato.int/cps/en/natohq/topics_192648.htm[36] Dickinson, P., Arick, R., & Lander Finch, N. (2025, October 15). How the US and Europe can deter and respond to Russia’s chemical, biological, and nuclear threats. Atlantic Council. https://www.atlanticcouncil.org/in-depth-research-reports/report/how-the-us-and-europe-can-deter-and-respond-to-russias-chemical-biological-and-nuclear-threats/[37] Dalton, T. (2022, April 8). Nuclear Nonproliferation After the Russia-Ukraine War. Georgetown Journal of International Affairs. https://gjia.georgetown.edu/2022/04/08/nuclear-nonproliferation-after-the-russia-ukraine-war/[38] Magnier, E. J. POST. X. Retrieved October 21, 2025, from https://x.com/ejmalrai/status/1796511588465201374[39] Ukraine: how nuclear weapons continue to increase the risks, two years on. (n.d.). ICAN (International Campaign to Abolish Nuclear Weapons). Retrieved October 21, 2025, from https://www.icanw.org/ukraine_two_years_how_nuclear_weapons_increase_the_risks[40] Kimballl, D., & Bugos, S. (2022, February 28). Russia’s War on Ukraine and the Risk of Nuclear Escalation: Answers to Frequently Asked Questions. Arms Control Association. https://www.armscontrol.org/issue-briefs/2022-02/FAQ-russia-ukraine [41] Kayali, L., Jungholt, T., & Fritz, P. (2024, July 4). Europe Is Quietly Debating a Nuclear Future Without the US. POLITICO. https://www.politico.com/news/magazine/2024/07/04/europe-us-nuclear-weapons-00166070[42] Katchanovski, I. (n.d.). POST. X. Retrieved October 21, 2025, from https://x.com/I_Katchanovski/status/1858244090909127000[43] Dalton, T. (2022, April 8). Nuclear Nonproliferation After the Russia-Ukraine War. Georgetown Journal of International Affairs. https://gjia.georgetown.edu/2022/04/08/nuclear-nonproliferation-after-the-russia-ukraine-war/[44] Samuelki, O. (2025, March 11). Europe going nuclear would be a catastrophic mistake. https://www.aljazeera.com/opinions/2025/3/11/europe-going-nuclear-would-be-a-catastrophic-mistake[45] NATO’s support for Ukraine. (2025, October 14). NATO. https://www.nato.int/cps/en/natohq/topics_192648.htm[46] Analysis of the Incompatibility of NATO’s Nuclear Sharing Arrangements with the Treaty on the Non-Proliferation of Nuclear Weapons. (2024). China Arms Control and Disarmament Association China Institute of Nuclear Industry Strategy. https://www.cinis.com.cn/zhzlghyjzy/yjbg/1446912/2024072914514738359.pdf 

Defense & Security
USA and China competing in AI supremacy, represented by chess pieces on a world map highlighting technological rivalry. AI wars between USA and china concept.

Emerging global AI order: a comparative analysis of US and China's AI strategic vision

by Hammad Gillani

Introduction   The 21st century global politics has now taken a new shape with the advent of artificial intelligence (AI). The traditional nature of great power rivalry revolves around military maneuvers, defensive-offensive moves, and weapons deployment to challenge each other, maintaining their respective hegemony over the international arena. The revival of artificial intelligence has reshaped the conventional great power game.(Feijóo et al. 2020) From now onwards, whenever the strategic circles discuss the security paradigm, AI has to be its part and parcel. The emergence of AI has altered the status quo, where major powers are now shifting towards AI-based technology. As the most basic function of AI is to create such machines and platforms that can perform tasks more proficiently than humans, it has the ability to enhance decision-making, increase efficiency, and reduce the likely risk of human errors. But at the same time, risks are also lingering.   The United States (US) and the People's Republic of China (PRC) are considered to be the main players of great power politics. Their rivalry has long been centered around territorial conflicts and maritime contests. With the PRC claiming most of the territories in the South China Sea and East China Sea, the US, under its Indo-Pacific Strategy (2022), has challenged the Chinese assertion.(Hassan and Ali 2025) But what the world has witnessed is that both economic hegemons have been avoiding any direct military conflict with each other. The most prominent area where both the US and the PRC are now in a continuous competition is the technological domain. China has always maintained an edge over the US in the respective field due to the fact that it holds most of the world’s known rare earth minerals—a key to technological superiority. Through trade barriers, i.e., tariffs, quotas, etc., and restricting trade with prominent Chinese companies, the US has always tried to contain technological developments in China.(Wang and Chen 2018)   “The reality is that both China and the United States are focused on getting the infrastructure necessary to win the so-called AI race. Now, whether it’s actually a race is a separate question, but data, energy, and human capital are all critical inputs to this. The massive investment infrastructure is top of mind for leaders in both countries as they seek to do it. China’s access to the advanced technology and semiconductors is going to be a key cornerstone in this regard.”(Sacks, 2025) US and China have placed AI at the center of their national policies and global strategies. Both have been introducing various policy papers, strategies, and action plans for the advancements in the field of artificial intelligence and how to counter the side. Now, the international arena is witnessing two parallel AI setups: one created by the US and the other by China. As both are tremendously investing in research, development, and innovation in artificial intelligence, their national narratives and global plans are competing with each other, further exacerbating the international AI landscape.   This paper aims to critically analyze key policies highlighted under the national action plans and strategies launched by the US and the PRC, respectively. Applying the theoretical lens of constructivism, which deals with the role of ideas, norms, and values in shaping the international system, the paper will demonstrate key differences between the AI strategies of the US and China and how their ideological beliefs shape their respective AI policies. Moreover, the analysis will provide expert views on the future landscape of the AI race, its relation to the Great Game, and its political, economic, and military repercussions for the rest of the world. Furthermore, the analysis will mostly rely on expert interviews, key excerpts from official administrative documents, and research findings. This study will also provide insights into the Trump 2.0 administration’s policy outlooks vis-à-vis Beijing’s National AI policy.   America’s AI Action Plan 2025   President Trump unveiled his administration’s national strategy on artificial intelligence on 23rd July 2025. Entitled as “Winning the Race: America’s AI Action Plan”, this strategy is a long-term road map to counter and contain China’s growing profile in the tech world, in particular the AI.(White House, 2025) The title of the strategy explicitly announces that the US has entered into the global AI race. Under this strategy, the United States does not want to eliminate China, rather the US desires to lead the AI world as a core nation, while the PRC should operate as a periphery nation. On July 15 2025, while addressing the AI Summit in Pittsburgh, President Donald Trump stated, “The PRC is coming at par with us and we would not let it happen. We have the great chips and we have everything great. And, we will be fighting them in a friendly fashion. I have a great relationship with President Xi and we smile at the back and forth, but we are leading…...”(AFP, 2025)   America’s AI Action Plan: Key Pillars   A. Accelerate AI Innovation   This first pillar of the AI national strategy by the US deals with the fact that AI should be integrated into every sector of American lives. From the grassroots level to the national or international level, the US should be a leading AI power. AI innovation states that any type of barrier, i.e., legal, regulatory, or domestic constraints, must be eradicated at first to promote, enhance, and boost AI innovation in the US. The strategy clearly states the innovation in artificial intelligence to be the fundamental step towards AI global dominance. The American beliefs, values and norms hold much significance in this regard. This strategy laid down the framework where AI platforms and models should have to align with the US democratic principles, including free speech, equality, transparency, and recognition. This means that the US AI action plan will operate under the umbrella of capitalist ideology.(White House, 2025)   Another most important feature in the field of AI innovation is the conglomeration of public-private ventures. Both the governmental authorities and public institutions are provided with such policies and frameworks to integrate AI platforms into their day-to-day operations. Creating an AI ecosystem is the cornerstone of this strategy.(White House, 2025) It aims to build an American workforce mastered in AI capabilities, defense forces and their key platforms integrated with AI, and provide a secure and safe environment to national and international investors, thus encouraging them to increase their investments in the US. Last but not least, the development of various departments countering the unethical use of AI, i.e., deep fakes, thus securing the national sovereignty and integrity of the homeland.   Principal Deputy Director of the Office of Science and Technology Policy (OSTP), Lynne Parker, while highlighting the significance of the US 2025 AI Action Plan, stated, “The Trump Administration is committed to ensuring the United States is the undeniable leader in AI technology. This plan of action is our first move to enhance and preserve the US AI interest, and we are eager to receive our public perception and viewpoints in this regard.”(House, 2025) The AI innovation drive is indicative of the US being a liberal-democratic and entrepreneurial society. It has an innovation culture that focuses on open research, leadership in the private sector, and ethics based on its national myth of freedom, individualism and technological optimism.   B. Building the AI Infrastructure   This is the most crucial pillar of the US AI Action Plan 2025. From propagating the idea of AI innovation, the next step is to build a strong, secure, and renowned infrastructure to streamline the policy guidelines highlighted in the national AI strategy. This includes the development of indigenous AI factories, companies, data facilities, and their integration into the American energy infrastructure. The most significant step highlighted in this pillar is the construction of indigenous American semiconductor manufacturing units.(White House, 2025) Now what does it mean? As of today, China is considered to be the center of semiconductor manufacturing. Semiconductors are the basic units of any technology, i.e., weapons, aircraft, smartphones, etc. The US has long been importing semiconductor chips from China. Integration of the US energy infrastructure with that of the AI facilities is the ultimate objective of this strategy. Immense energy-producing units, i.e., electricity, under the ‘National Energy Emergency Act’ would be established to provide a continuous supply of electricity to AI data centers and facilities without any hindrance.(House, 2025)   But the Trump 2.0 administration, under its protectionist policies, aspires to restrict imports from China and build a domestic semiconductor processing unit. Highlighting the American dependence on Chinese chips, the American chemist and politician John Moolenaar stated, “The Trump administration has made one thing abundantly clear: we must reassert control over our own economic destiny. That’s not isolationism; that’s common sense. The Chip Security Act, outbound investment restrictions, and stronger export controls—those aren’t closing ourselves off. They are about ensuring America isn’t subsidizing or facilitating our own decline. The Chinese Communist Party (CCP) is using American capital to fund aircraft carriers, fighter jets, and AI systems that target our allies and threaten our freedoms.”(Moolenaar, 2025)   The norm of decentralized innovation is applied in developing the infrastructure, and it empowers universities, startups, and private corporations. This is an expression of confidence in market mechanisms and civil liberties, which is in line with its social values of open innovation and competition.   C. AI Diplomacy and Security   The last pillar of the US AI national action plan is to collaborate with international partners and allies. This simply means to export American AI technology to strategic partners and those with common interests. This will, as a result, give rise to new types of groupings known as ‘AI Alliances.”(White House, 2025) The Global Partnership on AI (GPAI), QUAI AI Mechanism, and US-EU Trade and Technology Council are some of its best manifestations. Like the security and defense partnerships, the AI alliances will enable the US and the West to encircle the PRC in the tech world, where strong western collaborations and partnerships would hinder the PRC from becoming the tech giant or from excelling in AI production. It Encourages responsible AI governance and a democratic form of AI standards of the US, which are based on its self-perception as a global governor of the liberal values.   Thus, in order to enhance AI-related exports to allies, the US has established various institutions, including the US International Development Finance Corporation (DFC). The US AI diplomacy aims to counter China’s growing footprints in the international bodies and institutions.(State 2023) As these global bodies are a key to spreading particular norms and values, shaping the public perception, and framing the global order, the US wants to challenge Chinese entrenchments in these organizations through political and diplomatic coalitions and groupings. Doing this, the West will be able to propagate their version of the global AI order. This means capitalism vs. communism will now be clearly visible in the global AI race between the economic hegemons.   The US Vice President J.D. Vance, while addressing the European Union (EU) leaders in Paris explicitly stated, “The US really wants to work with its European allies. And we wish to start the AI revolution with an attitude of cooperation and transparency. However, international regulatory frameworks that encourage rather than stifle the development of AI technology are necessary to establish that kind of trust. In particular, we need our European allies to view this new frontier with hope rather than fear.”(Sanger 2025) In case of security, the strategy aims to establish various AI Safety Institutes (AISIs) to reduce or eliminate the risk of AI-related accidents, which include errors in AI platforms, most specifically in the AI-operated weapon systems, and the unethical use of AI programs, i.e., generative AI or LLMs. Similarly, the strategy emphasized the danger posed by the non-state actors. These violent actors must be restrained from acquiring such advanced yet sophisticated technology.(White House, 2025)   China’s New Generation Artificial Intelligence Development Plan   For the first time in July 2017, the PRC launched its long-term national AI vision 2030, entitled “New Generation Artificial Intelligence Development Plan,” which is comprised of all the policies, guidelines, and measures to be taken by the Chinese Communist Party (CCP) to foster its AI developments.(Council 2017) China’s AI 2030 vision is none other than the extension of the idea that President Xi Jinping circulated in 2012 regarding China’s future role in the field of Artificial Intelligence (AI). This strategy aims to strengthen China’s AI footprints in the international arena. Ranging from investments to infrastructure, this plan of action explicitly declared to develop the PRC into the hub of AI innovation and investment by 2030. This plan of action is determined to bring about a profit of $160 billion by 2030.(O’Meara 2024) While addressing the Politburo Study Session on 25th April 2025, the Chinese President Xi Jinping noted, “To gain a head start and secure a competitive edge in AI, it is a must to achieve breakthroughs in basic theories, methodologies, and tools. By leveraging AI to drive the transformation of scientific research paradigms, we can speed up achieving breakthroughs in scientific and technological innovation in all sectors.”(Agency 2025)   China’s AI Vision 2030: Key Objectives   A. AI Leadership (2020)   The PRC has successfully accomplished this objective. Under this pillar, China has established significant AI infrastructure, including key facilities and data centers, coming at par with the US. Within this, the CCP urged the academic institutions to promote, enhance, and foster research in the AI domain, which resulted in the major developments in the sectors of big data, swarm intelligence, and super artificial intelligence.(Council 2017) China has successfully established its domestic AI industrial complex worth $22 billion. Various educational institutions, i.e., Tsinghua, Peking, etc., and major companies, i.e., Baidu, iFlyTek, etc., have now completely transformed into AI hubs where research, innovation, and practices are conducted through highly advanced AI platforms.   Commenting on the US-China AI leadership contest, Dr. Yasar Ayaz, the Chairman and Central Project Director of the National Center for AI at NUST, Islamabad, explicitly remarked, “Efficiency is the new name of the game now. Chinese AI inventions and developments clarify the fact that even with the smaller number of parameters, you could achieve the same kind of efficiency that others with an economic edge are achieving.”(Ayaz 2025) The AI leadership symbolically builds the socially constructed narrative of the Chinese Dream and national rejuvenation into the need to overcome the century of humiliation and take its place in the world order. Here, AI leadership is not just a technical objective but a discursive portrayal of the Chinese self-concept of being a technologically independent and morally oriented civilization.   B. AI Technology (2025)   The second most important objective of China’s AI Vision 2030 is to reach a level of tech supremacy in the international arena by 2025. Major work areas include localization of chip industries, advancements in semiconductors and robot manufacturing, etc. The first phase of 2020 basically laid the infrastructural foundation of the plan, while this phase deals with the development and innovation of key AI-operated platforms, including robots, health equipment, and quantum technology.(Council 2017) Another most crucial feature of the 2025 phase is to establish various AI labs throughout mainland China. This would result in the integration of AI into different public-private sectors, i.e., finance, medical, politics, agriculture, etc. Last but not least, a civil-military collaboration is described to be a cornerstone in this regard.   The AI-operated platforms would be utilized by both civil and military institutions, thus preserving the PRC’s national security and safety. Giving remarks over China’s technological edge, Syed Mustafa Bilal, a technology enthusiast and research assistant at the Centre for Aerospace and Security Studies (CASS), added, “China, which for the longest time has been criticized for having a technologically closed-off ecosystem, is now opting for an open-source approach. That was evident by the speeches of Chinese officials at the Global AI Action Summit, in which they tried to frame China’s AI strategy as being much more inclusive as compared to the West. And one illustration of that is the ironic way in which deep search is currently furthering OpenAI's initial selfless objective of increasing AI adoption worldwide.”(Bilal 2025) Thus, the AI vision of China reflects ideational promises of social order, central coordination, and a moral government, ideals that are based on its political culture and civilization background.   C. AI Innovation Hub (2030)   By 2030, China aims to be at the epicenter of global AI innovations, development, and investments. The PRC’s political, economic, and defense institutions will be governed under AI overhang. The most significant feature of this phase is to counter the US-led AI order by challenging the US and the West in various international bodies like the International Telecommunication Union (ITU). The main tenet of China’s 2030 vision is to transform it into a completely AI-driven economy—an AI economic giant.(Council 2017) As the PRC is ruled by the communist regime of President Xi Jinping, China aspires to counter the Western-led AI order through instigating its communist values, including high surveillance, strict national policies, and population control. By avoiding a completely liberal, free speech AI environment in mainland China, the CCP aims to come on par with the US by having authoritative control over its people, thus maintaining its doctrine of ‘techno self-reliance.’   Giving his insights on the new global AI order and the ideological rift between the US and China, Dr. Wajahat Mehmood Qazi, advisor on AI and digital transformation to the private tech companies and faculty member at the COMSATS University, Lahore, explicated, “Yes, there is a digital divide, but the interesting part over here is this: the world is evolving, so this big divide is no more about the decentralization or the centralization. If we look at how China is promoting openness by releasing its foundation models, at the same time the ecosystem of their LM models or AI is still in close proximity. Whereas, the western world is having a different narrative. They are talking about the openness of the models, but at the same time it’s more market-driven. In my view, we are entering into a world where innovation requires openness and closed methods simultaneously.”(Qazi 2025)   The concept of innovation with Chinese features is used to describe a socially constructed attempt to exemplify another approach to technological modernity, which combines dictatorial rule and developmental prosperity. It is a mirror image of self-concept in China as a norm entrepreneur that wants to legitimize its system of governance and impact the moral and technological discourse of AI at the global scale.   Conclusion   The constructivist perspective informs us that the competition between Washington and Beijing is not predetermined; it is being conditioned by the perceptions, suspicion, and competing versions that can be rebuilt through dialogue and mutual rules. The ideological divide can be overcome by creating inclusive tools of AI governance, with transparency, ethical principles, and shared responsibility in their focus. The common ground created through the establishment of a mutual conception of the threats and the ethical aspects of AI will enable the United States and China to leave the zero-sum game on AI and enter into a model of normative convergence and accountable innovation. Constructivism thereby teaches us that cooperation in AI is not just a strategic requirement but also a social option, which is constructed on shifting identities and the recognition of global interdependence with each other.   The great power competition is now in its transformative phase, bypassing the traditional arms race for a more nascent yet powerful AI race. In the context of the US-China contest, administrations on both sides are trying their utmost to launch, implement, and conclude critical national strategies and formulations in the field of artificial intelligence. Both are moving forward at a much greater pace, thus developing advanced technologies in the political, economic, and military domains. Be it China’s Deep Seek or the Western Chat GPT, be it Trump’s Stargate project or Xi’s AgiBot, both are investing heavily into the tech-AI sector. Despite this contest, both economic giants also need joint efforts and collaborations in various matters of concern. Until now, it’s been very difficult to declare which will lead the global AI order. The chances of a global AI standoff are there.ReferencesAFP. 2025. “Trump Vows to Keep US Ahead in AI Race with China.” The News International. Accessed July 24, 2025. https://www.thenews.com.pk/latest/1328672-trump-vows-to-keep-us-ahead-in-ai-race-with-china.Agency, Xinhua News. 2025. “20th Collective Study Session of the CCP Central Committee Politburo.” Center for Security and Emerging Technology, 1–3.Ayaz, Dr. Yasar. 2025. “Global AI Rivalry: U.S vs China.” PTV. Accessed July 24, 2025. https://www.youtube.com/watch?v=_82MMzI_g2c&t.Bilal, Syed Mustafa. 2025. “Global AI Rivalry: U.S vs China.” PTV. Accessed July 24, 2025. https://www.youtube.com/watch?v=_82MMzI_g2c&t.Council, State. 2017. “Next Generation Artificial Intelligence Development Plan.https://digichina.stanford.edu/work/full-translation-chinas-new-generation-artificial-intelligence-development-plan-2017/.Feijóo, Claudio, Youngsun Kwon, Johannes M. Bauer, Erik Bohlin, Bronwyn Howell, Rekha Jain, Petrus Potgieter, Khuong Vu, Jason Whalley, and Jun Xia. 2020. “Harnessing Artificial Intelligence (AI) to Increase Wellbeing for All: The Case for a New Technology Diplomacy.” Telecommunications Policy 44 (6). https://doi.org/10.1016/j.telpol.2020.101988.Hassan, Abid, and Syed Hammad Ali. 2025. “Evolving US Indo-Pacific Posture and Strategic Competition with China.” Policy Perspectives 22 (1). https://doi.org/10.13169/polipers.22.1.ra4.House, White. 2025. “Declaring a National Energy Emergency – The White House.” Accessed July 24, 2025. https://www.whitehouse.gov/presidential-actions/2025/01/declaring-a-national-energy-emergency/.House, White. 2025. “Public Comment Invited on Artificial Intelligence Action Plan – The White House.” Accessed July 24, 2025. https://www.whitehouse.gov/briefings-statements/2025/02/public-comment-invited-on-artificial-intelligence-action-plan/.Moolenaar, John. 2025. “The 2025 B.C. Lee Lecture Featuring Congressman John Moolenaar.” Accessed July 24, 2025. https://www.youtube.com/watch?v=QIIUZlaKofU.O’Meara, Sean. 2024. “China Ramps Up AI Push, Eyes $1.4tn Industry By 2030.” Asia Financial. Accessed July 24, 2025. https://www.asiafinancial.com/china-ramps-up-ai-push-eyes-1-4tn-industry-by-2030-xinhua.Qazi, Dr. Wajahat Mehmood. 2025. “Global AI Rivalry: U.S vs China.” PTV. Accessed July 24, 2025. https://www.youtube.com/watch?v=_82MMzI_g2c&t=.Sacks, Samm. 2025. “China’s Race for AI Supremacy - YouTube.” Accessed July 24, 2025. https://www.youtube.com/watch?v=xaccSxP8pOQ&t=8s.Sanger, David E. 2025. “Vance, in First Foreign Speech, Tells Europe That U.S. Will Dominate A.I.” THe NewYork Times. Accessed July 24, 2025. https://www.nytimes.com/2025/02/11/world/europe/vance-speech-paris-ai-summit.html.State, US Department of. 2023. “Enterprise Artificial Intelligence Strategy,” no. October, 103–13. https://www.state.gov/wp-content/uploads/2023/11/Department-of-State-Enterprise-Artificial-Intelligence-Strategy.pdfWang, You, and Dingding Chen. 2018. “Rising Sino-U.S. Competition in Artificial Intelligence.” China Quarterly of International Strategic Studies 4 (2): 241–58. https://doi.org/10.1142/S2377740018500148.White House. 2025. “Winning the Race: America’s AI Action Plan.” https://www.whitehouse.gov/wp-content/uploads/2025/07/Americas-AI-Action-Plan.pdf

Defense & Security
Soldier, CPU computer (central processing unit) US and Chinese flag on white background. US vs China chip war or tech war, semiconductor industry concept. US restrict and control chip export to China.

Superpowers Without Soldiers: Can Technology Replace Traditional Hegemony?

by Syeda Farani Fatima

Introduction Hegemony is the core principle in International Relations. It has been conceptualized through military strength, economic influence, and ideological control. The theory of cultural hegemony by Antonio Gramsci is based on assuming control but not necessarily through force, whereas realist theorists such as John Mearsheimer stress the relevance of military strength for ensuring global dominance (Mearsheimer 2001). The 21st century, though, brought into being a different era of transformation and technological breakthroughs that turned the existing arrangements on their head. With the advent of Artificial Intelligence (AI), cyber war, and space technology, great powers are transforming from traditional soldiers to cyberspace warriors. AI and other cyber tools are altering the strategic equation between major powers, providing avenues for countries like China and Russia to undermine US hegemony (Rooney et al. 2022). Hegemony in the past had been founded on military superiority, but at present, academics have discovered that technological hegemony is leading the way. Lethal Autonomous Weapons (LAWs) and AI have captivated researchers because they can transform war. Cyberspace has become the new battleground of power. The US and China are competing for cyber hegemony (Akdaǧ 2025). Space is increasingly regarded as a new battleground in geopolitics. The US Space Force and China’s BeiDou system illustrate how nations weave surveillance and communication in their strategic decision-making (O’Hanlon 2020). Thus, new technologies are reshaping the China-US rivalry. To counter this, countries are investing in tech-based industries, which will change the way human thinks. The analysis will explore whether emerging technologies can efficiently replace traditional tools of hegemony or not. Joseph Nye’s concept of smart power provides a critical framework in this modern era, where influence may flow from military boots to silicon chips. Global powers are moving towards influence and deterrence-based tech models, supplementing hard power. However, this transition has its risks, such as overdependence and ethical concerns. The paper argues that a complete transformation is not happening, but there will be dual-track hegemony where military and technology will coordinate to dominate. Policy implications of this shift are profound. Global powers must collaborate to draft international norms for AI and cyberwarfare, developing nations must develop their technology rather than dependency on global powers, as it will be easier for them to surveil and dominate, and international institutions must proactively govern the techno-political landscape to prevent destabilization. This study will use a qualitative approach, and it will be a case-based methodology combining theoretical perspectives of philosophers. This analysis is important as it delves into the transformation of the mechanics of global power from military hegemony to technology-oriented hegemony. It uses secondary sources like policy briefs, think tank reports, books, etc. Finally, this analysis concludes that soldiers may never be the first line of every fight, but the battle for global supremacy is firmly human-hinged in decisions on technology, ethics, and governance. Hegemony is a core concept in International Relations, grounded in military capacity, economic influence, and institutional influence. Historically, great civilizations like the Roman and British empires attained hegemony by dominating in naval power, making alliances and expanding their territories. In the post-World War II era, the US built dominance through overseas military bases and nuclear deterrence. Historical Foundations of Traditional Hegemony The Roman Empire, a classic example of past hegemony, attained this power by constructing roads, forts, and legions in the world's islands. Later, the British Empire sustained its dominance by modernizing the Royal Navy and the global trade network. The post-World War II era saw the hegemony of the United States with overseas military bases and security alliances. John Mearsheimer, in his book The Tragedy of Great Power Politics, says that according to great powers, hegemony is the best way to ensure their security (Mearsheimer 2001). Limitations of Traditional Hegemony The primary limitation of the traditional hegemonic model is the risk of overreach, entering into too many overseas agreements that become economically and politically unsustainable. Imperial overstretch, a model proposed by Paul Kennedy, explains the collapse of empires when they are unable to maintain their economy due to huge global aims (Kennedy 1988). Concurrently, we can see that after so many years have passed in the Vietnam, Afghanistan, and Iraq wars, the US is spending trillions. Approximately $3.68 trillion was spent on Iraq and Afghanistan (Costs of War | Brown University 2025). This highlights that military dominance can be costly and unsustainable. Mearsheimer, in an interview at the New York Times, claimed that ‘the United States is responsible for causing the Ukraine crisis’. Lack of legitimacy and local resistance is another great flaw in the traditional hegemonic pattern. For example, in Vietnam, soldiers used their knowledge of geography to push back against America's advanced weapons. Similarly, in Afghanistan and Iraq, foreign-led missions struggled with local insurgents. The New Tools of Technological Hegemony Cyber Power Cyber power has rapidly become a strategic field where states project their influence far beyond the geographic borders, often without soldiers. Cyber operations are dominating in this digital age, and the SolarWinds hack shows how states can achieve global influence through an Information Technology (IT) infrastructure breach. In March 2020, Russian hackers placed a secret backdoor in SolarWinds’ Orion software. This infected around 18000 users, including US major government departments (Cybersecurity 2021). The cyberattacks went undetected for several months, revealing vulnerabilities in the digital network. It was the worst cyber-espionage attack ever, an analyst described. Iran's 2019 cyberattack on the oil infrastructure of Saudi Arabia shows that the acquisition of digital superiority can help influence norms, command the critical infrastructure, and set global political narratives without foreign boots on the ground. To address this vulnerability, it is essential to know cyber deterrence theory. It discusses capability, attribution, and resolution. States should advance digital tools, modify their tracking system and enhance communication and transparency. The most lethal weapon today may not fire a projectile-it fires packets. This metaphor illustrates that state actors can erode adversary national infrastructure, banks and election systems without traditional warfare. The US Secretary of Defense Lloyd J. Austin III described the integrated Deterrence that integrates cyber with land, sea, and space under a unified strategy (Masitoh, Perwita, and Rudy 2025). Cybersecurity experts say that cyberpower is now a geopolitical power. And cyber warfare is not a sideshow; it’s a frontline strategy. Artificial Intelligence (AI) and Big Data AI’s strategic significance for national security has been emphasized by leaders like Jason Matheny, CEO of RAND Corporation. He warns that AI could make it easier to make harmful weapons and dangerous technologies (Matheny 2024). The 2023 report of RAND on AI and Geopolitics argues that AI may be the next frontier in US-China rivalry (Pavel et al. 2023). ChatGPT and Bard, like generative AI models, have humanitarian strategic applications, which makes fake news so believable that it feels like fact. This capability of AI can transform propaganda into scalable digital warfare. Beyond surveillance, AI has transformed military operations tactics. Military applications like drone swarming, algorithmic targeting, and predictive ISR create scenarios where the frontline shifts from kinetic zones to data centers. AI diplomacy is becoming the new foreign aid. Financial Times article notes that tech giants are deploying AI mechanisms in Africa not only for development but for their advantage as an influence tool. Thus, AI and big data are a new form of informational hegemony. Space Militarization and Satellite Dominance Space militarization emerged during the Cold War. States like the US, China, Russia, India, and Japan have developed anti-satellite (ASAT) capabilities (Samson and Cesari 2025). General John Jay Raymond at the US Space Command Launch said that, “Outer space is now recognized as a domain of military operations” (Raymond 2021). China’s 2007 ASAT test, which destroyed its own Fengyun-1C weather satellite, is still a thorn in the eyes of major powers. Russia has also launched missions like Kosmos-2553. Evolution from GPS to GNSS (Global Navigation Satellite Systems) reflects strategic change. The US has GPS, China has BeiDou, Elon Musk’s Starlink satellite constellation, and Europe has Galileo; each system highlights the sovereignty in digital positioning. China’s counterpart doctrine states in its 2021 Space White Paper that space-based assets are not crucial for renaissance only but for strategic deterrence without deploying soldiers or causing deaths of your military men (The State Council Information Office of the People’s Republic of China 2022). Undersea Cables and Digital Infrastructure Control Undersea cables carry over 95% of global data transmission (Sherman 2021). Disruption or surveillance of these cables can impact the worldwide flow of data and diplomatic communications. In developing countries like Pakistan, Kenya, and Ecuador, Huawei-funded infrastructure provides smart city services. Cable route is not just wiring undersea, it is influenced by encryption. The US and EU have Amazon Web Services (AWS), Microsoft Azure, and Google Cloud, like surveillance platforms. Cable-Landing zones (CLZs) are the chokepoints used for manipulation, Cloud interconnection policies allow control of traffic flow, and Surveillance software and firmware installed at data centers can be remotely controlled, bypassing local safeguards. Blocking connections can slow or disrupt foreign economic leverage. Digital infrastructure has become a domain for hegemony that is more insidious in strategic potential. This map exposes the physical foundations of digital power. Nations with greater cable landing nodes, like the U.S. and China, wield asymmetric influence, not through soldiers, but through network control. Disruption or surveillance of these cables can cripple economies or governance. Regional chokepoints also reflect strategic leverage in geo-economics and cyber diplomacy, making this infrastructure as consequential as traditional military bases. Figure 1: This map shows the physical foundations of digital power, nations with greater cable landing nodes, like the U.S. and China, wield asymmetric influence, not through soldiers, but through network control.Superpowers’ Technological Footprint United States Silicon Valley is the heart of US technological hegemony, and some other government agencies, like Defense Advanced Research Projects Agency (DARPA), are contributing to maintaining US technological hegemony. Lethal Autonomous Weapons (LAWs), drones, and defense-grade AI-powered decision-support systems are a tech-military hybrid force. Furthermore, the US controls major pillars of technology like operating systems (Microsoft, Apple, Google dominate desktops and mobile devices), and Satellites. Advanced technologies have enabled remote force projection like drone strikes, executing surgical operations, Cyber Command operations from SolarWinds retaliation, deployment of Overhead Persistent Infrared (OPIR) and Space Based Kill Assessment (SKA), enhancing deterrence. China Made in China 2025 vision aims to displace US techno-hegemony. China’s centralized Social Credit System reflects a template of techno-surveillance hegemony. Beijing is now selling surveillance systems to developing countries, highlighting its tech supremacy. China is controlling telecommunications architecture by promoting Huawei’s 5G worldwide. China’s cyber army, the People’s Liberation Army Strategic Support Force (PLASSF), specializes in offensive and defensive cybertech warfare (The State Council Information Office of the People’s Republic of China 2019). China’s Digital Silk Road links infrastructure investments in Asia and Africa with national encryption systems and cloud data centers. Ethiopian Prime Minister Abiy Ahmed, in a bilateral dialogue, said that ‘our fiber networks and data exchanges are now integrated with Beijing’s national infrastructure policy’. Thus, acquiring such a position in technology will prove China’s hegemony and can make it a superpower, making the world again a bipolar one. China’s strategic doctrine focuses on autonomous systems and digital authoritarian export over occupancy and geopolitical projection, respectively. Russia Russia’s global strategy remains rooted in a hybrid doctrine that combines cyber tools, space capabilities and disinformation operations. The Gerasimov Doctrine, Vladimir Putin’s strategic vision, emphasizes the blend of political, cyber, and economic tools to achieve strategic goals without casualties. The Ukraine conflict is a great example of cyber dominance. Russia has cyber units such as APT28 (Fancy Bears), Satellite Spoofing and Jamming, and the Internet Research Agency (IRA), which have executed targeted hacks against North Atlantic Treaty Organization (NATO), disrupted Global Positioning System (GPS) signals, and led disinformation campaigns. Russia’s power formula centers on dense cyber capacity, economic coercion, and unpredictability (making deterrence harder). Risks and Criticism of Tech-Based Hegemony Technology provides tools for security and influence, but overdependence causes strategic vulnerability, which leads to ethical dilemmas and raises questions about digital sovereignty. Overdependence and System Vulnerability A fundamental flaw of technological hegemony is its fragility. Systems are dependent on infrastructure (cloud servers, AI control nodes, etc.). The UN Group of Governmental Experts (GGE) says that lethal autonomous weapons are the cause of escalation in conflicts (CCW 2022). Take the SolarWinds breach of 2020, in which an update exposed thousands of sensitive pieces of information. Ethical Concerns China, Ethiopia, and some other states have AI-powered surveillance regimes. China exports networked camera systems and facial recognition tools to states that use them to suppress dissent. A senior researcher at Amnesty noted that, ‘delegating life and death decisions to software is ethically unjustifiable’. Global South Dependency and Digital Colonialism Due to technological influence, digital dependency has increased in the Global South. Digital dependency without regulatory safeguards leads to digital colonialism. Countries lacking advanced technology are reliant on digital ecosystems developed by superpowers. It is said by Dr Ruha Benjamin that ‘when code becomes law, and pipelines become policy enforcers, sovereignty is outsourced’. Hegemony Without Consent Soldiers are a visible force, but technology imposes itself quietly via platforms, which results in domination without democracy. Tech-enabled coercion doesn’t need tanks; it needs standards embedded in devices, laws baked into algorithms. This contradicts liberal norms of International Relations (IR), where hegemony should rest on consent for international legitimacy (Sakumar, Broeders, and Kello 2024). Future Power Projections: Domain-wise Breakdown There are five interconnected domains of future power projections: land, air, sea, cyber, and space. Land Domain In traditional combat, troops were used to counter enemy force, but now in the third digital era, surveillance grids, AI-powered motion detection systems, and autonomous land robots are replacing soldiers. The Israeli military is testing unmanned ground vehicles (UGVs), which they have named Jaguar, to patrol borders, and this will reduce human casualties. The diagram illustrates the interaction or the coordination between a human coordinator and an autonomous weapon system (AWS), and the target within a given environment. At first, the operator gives a high-level command which activates the controller, and the system provides feedback to the operator, such as mission success or failure. The controller is the brain of this system. It monitors the environment, processes data and controls the weapons. It operates in loops, evaluating the environment and updating the decision. Once the target is detected autonomously, the gun acts, which includes missile launch or gunfire. This entire process takes place in a dynamic environment. Figure 2: The coordination between a human coordinator and an autonomous weapon system (AWS) Air Domain Traditional manned fighter jets were dominating in aerial combat. Now, aerial dominance is shifted towards hypersonic weapons and AI-enabled drone swarms. Russia’s Zircon and China’s DF-ZF are hypersonic missiles that can travel at Mach 5+ speeds. AI drone swarms are rendering conventional missile defense systems obsolete. The US Air Force’s “Golden Horde” project and China’s GJ-11 stealth drone exemplifies this shift. Sea Domain Sea powers used to refer to blue-water navies and submarine fleets. They remain the core of maritime protection, but unmanned underwater vehicles (UUVs) are quickly supplanting aircraft carriers. UUVs are being used to surveil for months on their own, and they will not be detected. Subsea data cables, which transport 95% of internet traffic, are a strategic resource; such cables are undersea digital arteries. Securing the sea in the 21st century means controlling what is beneath it. The diagram illustrates major elements of an autonomous underwater vehicle (AUV). It is an important element in current naval battles and marine monitoring. The GPS/RF module is situated at the top of the AUV, through which the vehicle can position itself beneath the water. The propeller motor is the mobility unit of an AUV, driven by lithium-ion batteries. It provides thrust and directional movements. An electronic aid container serves as a housing store; it includes an onboard computer, a mission processor, a power distribution unit, and communication interfaces. AUVs have sensors which detect how deep the AUV is in the water column by measuring hydrostatic pressure. Acoustic Doppler Current Profile (ADCP), is a sonar device that uses Doppler shift in acoustic signals to measure the speed of water currents. An AUV manage its vertical position with a buoyancy tank. AUVs use an inertial navigation system; they determine the position of the AUV based on prior data. AUVs also contain forward-looking (Sound Navigation and Ranging) SONARs and Altimeters that scan and detect any obstacles in front of them and maintain a safe height from the seabed, respectively. Transducers are the mouth and ears of AUVs; they transmit and receive acoustic signals. They are crucial for clandestine communication and sensing of the environment. These AUVs are extremely crucial in contested sea areas such as the South China Sea or the Arctic. Therefore, AUVs are revolutionizing maritime operations by enlarging surveillance, exploration, and undersea warfighting capabilities. As technology evolves, AUVs will define the future of naval strategy and oceanographic study. Figure 3: Major elements of an autonomous underwater vehicle (AUV). Cyber Domain Cyberspace has no borders. Global powers like the US, China and Russia have developed cyber command units to disrupt the power grids of the opposite side. Russia’s cyber interference in the 2016 U.S. elections, China’s alleged breach of U.S. personnel databases (OPM hack), and the Stuxnet worm targeting Iran’s nuclear program exemplify how software has become a strategic weapon. According to NATO’s 2025 Cyber Doctrine, ‘A cyberattack triggering Article 5 [mutual defense] is not just theoretical—it’s a matter of time.’ Space Domain Traditionally, space power was limited to spy satellites, but now anti-satellite weapons (ASAT), Starlink and military satellite systems have transformed into a combat zone. The US created its Space Force in 2019 to dominate in space militarization. In the Ukraine war, SpaceX’s Starlink became crucial for Ukrainian battlefield communication, prompting Elon Musk to limit military use to avoid escalation. Table 1 (figure 4): Old model versus new model comparison in each domain of future power projection. Done by the author. Domain Old Model New Model Land Troop deployment - Armored divisions - Occupation warfare AI-enabled surveillance grids - Unmanned Ground Vehicles (UGVs) - Real-time satellite + sensor networks Air Fighter jets - Airbases - Strategic bombers Hypersonic missiles (e.g., DF-ZF, Zircon) - Drone swarms with AI autonomy - Human-out-of-loop air dominance Sea Naval fleets - Aircraft carriers Submarines Unmanned Underwater Vehicles (ORCA UUV) - Seafloor cable warfare - Autonomous maritime surveillance Cyber (No traditional equivalent) State-sponsored hacking - Data theft & disinformation ops - Cyber jamming, spoofing in kinetic war Space Reconnaissance satellites Missile early-warning systems ASAT weapons (China, Russia tests) - Satellite internet constellations (Starlink) - Real-time warfighting integration (JADC2) Can Technology Fully Replace Military Power? The emergence of advanced technologies like AI, autonomous weapons and space militarization has sparked the debate about whether technology can replace military power, wholly or not? Strategic autonomy, in which a nation’s ability to defend its interests independently requires both technology and military. Technology acts as a critical enabler but not a substitute. AI can analyze satellite data in seconds, but only trained personnel can conduct peacekeeping missions in fragile regions. Modern warfare is shifting towards grey zone conflicts that fall below the threshold of open combat. Russian operations in Crimea in 2014 blended cyberattacks and physical deployments of troops, due to which the line between technology and military became blurry. This incident shows that technology without boots is of no advantage. In addition, technology needs regular upgrades and educated users, and excessive reliance upon these systems may cause interruptions such as electronic warfare (EW) and electromagnetic pulse (EMP) attacks. In a time of humanitarian crisis, disaster response, and counterinsurgency, forces are indispensable. To defeat an enemy or to dominate, one must employ both technology and an educated military. Unmanned aerial vehicles (drones) have altered the character of air war. Great powers are investing heavily in military AI and quantum communication to improve battlefield awareness, minimize human loss of life, and enhance decision-making, but note that international decisions do not depend on a machine. They don't aim to replace the military, but they want to develop their technology. Thus, the emerging model of global power is not soldiering versus technology, but it is soldiers plus technology. It is known as dual-track hegemony, and a nation that acquires it will dominate shortly. A tech-savvy soldier, supported by AI and robotics, is the face of tomorrow’s war. Conclusion The United States, China and the EU are global powers of the modern era. These states possess the technological capital and military infrastructure that shape the regulation of engagement in cyberspace and AI. Firstly, they must strengthen international norms for cyber operations and AI governance. UNGGE has made some progress relevant to this, but this needs a broader enforcement mechanism like the Geneva Conventions. Secondly, global powers must invest in ethical and auditable technology. As AI is dangerous due to biased surveillance systems, facial recognition abuses, and it is also used in predicting policies, which is a major ethical concern. Algorithmic transparency, data protection, and privacy rights must be enforced as soon as possible. Lastly, multilateralism must extend to outer space. As space is becoming a battlefield, complicating geopolitical rivalry, to counter it, multilateralism must be encouraged. For developing countries like Pakistan, Indonesia, or Nigeria, the emergence of technological hegemony is both a threat and an opportunity. These countries should enforce digital sovereignty policies. These nations should avoid digital dependency, as it will be easier for global powers to surveil and dominate. Emerging powers should build defensive cyber infrastructure instead of offensive. They should build secure networks and legal protection against espionage on their own. Defensive strategy will serve as a strategic safeguard and can be used as a pawn in great power rivalries. Emerging powers should pursue a multilateral coalition among Muslim majority states to enhance their connectivity and ties. South-south cooperation must be promoted. The UN, G20 and other international bodies must move towards digital governance mechanisms instead of vague declarations. UN should form a Global Charter on Tech Governance, similar to a Digital Magna Carta. The charter should have ethical limits on the establishment and use of Artificial Intelligence and Lethal Autonomous Weapons. They should increase their coordination with the G20 to amplify these efforts. G20 should create a Tech and Ethics working Group, which can bridge the trust gap between Developed and developing countries in the digital arena. Global order continues to evolve in the 21st century, and the foundations of power projection are rewritten. There is a paradigm shift from boots to bots. This research demonstrates that while technology has transformed, it cannot entirely replace traditional modes of combat. Technology can only help the military to dominate in a region or conflict, but cannot fully replace it. There will be dual track hegemony, and the one who will acquire this hegemony will control world islands, and controlling world islands means ruling the world. However, this transformation comes with serious risks like AI miscalculations, vulnerabilities of digital infrastructure and ethical concerns. But we should keep in mind that military power is no longer sufficient, nor is technology alone a guarantee of dominance, in post-silo, where military, technological, and normative tools must function together to sustain leadership.ReferencesAkdaǧ, Yavuz. 2025. “Great Power Cyberpolitics and Global Cyberhegemony.” Perspectives on Politics. doi:10.1017/S1537592725000040.CCW. 2022. “Document Viewer.” : 16. https://docs.un.org/en/CCW/GGE.1/2021/3 (October 18, 2025).“Costs of War | Brown University.” https://costsofwar.watson.brown.edu/ (October 18, 2025).Cybersecurity, Centre for. 2021. SolarWinds: State-Sponsored Global Software Supply Chain Attack. https://www.cfcs.dk/globalassets/cfcs/dokumenter/rapporter/en/CFCS-solarwinds-report-EN.pdf.Kennedy, Paul. 1988. “Paul-Kennedy-the-Rise-and-Fall-of-the-Great-Powers-19891.” : 704. https://cheirif.wordpress.com/wp-content/uploads/2015/08/paul-kennedy-the-rise-and-fall-of-the-great-powers-19891.pdf.Masitoh, Yuniar Tri, Anak Agung Banyu Perwita, and Elphis Rudy. 2025. “Integrated Deterrence in Practice: The 2022 United States National Defense Strategy Towards the Russia-Ukraine War.” International Journal of Humanities, Education, and Social Sciences 3(3): 1030–48. doi:10.58578/ijhess.v3i3.7317.Matheny, Jason. 2024. “A National Security Insider Does the Math on the Dangers of AI | WIRED.” https://www.wired.com/story/jason-matheny-national-security-insider-dangers-of-ai/ (October 18, 2025).Mearsheimer, John. 2001. “S2-Mearsheimer-2001.” file:///C:/Users/sh/Downloads/s2-mearsheimer-2001.pdf.O’Hanlon, Michael. 2020. “Forecasting Change in Military Technology, 2020-2040 - Joint Air Power Competence Centre.” https://www.japcc.org/essays/forecasting-change-in-military-technology-2020-2040/ (October 18, 2025).Pavel, Barry, Ivana Ke, Michael Spirtas, James Ryseff, Lea Sabbag, Gregory Smith, Keller Scholl, and Domenique Lumpkin. 2023. “AI and Geopolitics: How Might AI Affect the Rise and Fall of Nations? | RAND.” https://www.rand.org/pubs/perspectives/PEA3034-1.html (October 18, 2025).Raymond, John W. 2021. “U.S. Leadership in Space: A Conversation With General John Raymond | Council on Foreign Relations.” https://www.cfr.org/event/us-leadership-space-conversation-general-john-raymond (October 18, 2025).Rooney, Bryan, Grant Johnson, Tobias Sytsma, and Miranda Priebe. 2022. Does the U.S. Economy Benefit from U.S. Alliances and Forward Military Presence? RAND Corporation. https://www.rand.org/content/dam/rand/pubs/research_reports/RRA700/RRA739-5/RAND_RRA739-5.pdf.Sakumar, Arun, Dennis Broeders, and Monica Kello. 2024. “Full Article: The Pervasive Informality of the International Cybersecurity Regime: Geopolitics, Non-State Actors and Diplomacy.” https://www.tandfonline.com/doi/full/10.1080/13523260.2023.2296739 (October 18, 2025).Samson, Victoria, and Laetitia Cesari. 2025. “Secure World Foundation: 2025 Global Counterspace Capabilities Report.” https://www.swfound.org/publications-and-reports/2025-global-counterspace-capabilities-report (October 18, 2025).Sherman, Justin. 2021. Cyber Defense across the Ocean Floor : The Geopolitics of Submarine Cable Security. Atlantic Council, Scowcroft Center for Strategy and Security.The State Council Information Office of the People’s Republic of China. 2019. China’s National Defense in the New Era. Foreign Languages Press. https://english.www.gov.cn/archive/whitepaper/201907/24/content_WS5d3941ddc6d08408f502283d.html.The State Council Information Office of the People’s Republic of China. 2022. “Full Text: China’s Space Program: A 2021 Perspective.” https://english.www.gov.cn/archive/whitepaper/202201/28/content_WS61f35b3dc6d09c94e48a467a.html (October 18, 2025)

Defense & Security
Bricked wall with stop terrorism sign

Causes of women involement in terrorism

by Eraj Farooqui

AbstractThis paper explores the complex factors that contribute to women's participation in terrorism, a subject that has attracted more scholarly interest, particularly in the wake of 9/11. The discipline is nonetheless politicised and divided despite a great deal of study, which is frequently made worse by a lack of primary data. Women, who are typically thought of as quiet and non-violent, have taken on important roles in terrorist groups, especially during the 1990s, where they have participated in high-profile attacks and leadership roles. The study identifies the main factors: political, religious, personal, and gender equality—that motivate women's participation. Examples show how different organisations differ in that some encourage women to participate actively, while others limit their positions. The study also examines how terrorism has changed over time, with a particular emphasis on its gendered aspects, and assesses how contemporary organisations such as the Islamic State have reshaped the roles of women in terrorist networks. Finally, by illuminating the ideological, cultural, and societal factors that lead to women's radicalisation and involvement, this research offers an in-depth examination of the relationship between gender and terrorism.Keywords:  Terrorism , Women , Political , Religion , Personal , Gender-equality Introduction The reasons behind female terrorism have been extensively studied and debated by numerous academics. Even though there is a wealth of study, a substantial portion of it is contradictory or incomplete. Frequently, the highly politicised word of terrorism has led to contradictory claims in the research. To understand why individuals resort to women terrorism, scholars highlight political, religious, social, and personal causes. In our culture, women were seen as housewives and peaceful members of society, and terrorist groups were controlled by men. Research on women and terrorism can be done on a variety of subjects; however, this paper will mostly focus on the causes of why women participate in terrorism. After 9/11 the academic research on scholarly papers on terrorism have increased by 300% since 9/11.[1] The connection between terrorism and gender is often overlooked due to governments' reluctance to reveal the primary causes and the reluctance to provide reliable data. Researchers often avoid original sources for security reasons. A 2009 review by Karen Jacques and Paul J. Taylor found a reluctance to describe events, excessive narrative analysis, and reliance on secondary sources. [2] The word "terror" comes from the Latin verb "terrere" which means to frighten. It was originally used by the Romans in 105 B.C. to characterise the terror that engulfed Rome during the attack by the Cibri tribe. During the French Revolution’s Reign of Terror, Maximilien Robespierre incited fear among the people.[3]The word "terrorist" was used by Edmund Burkey in the Regicide Peace letter. With the end of Reign of Terror, the word ‘terrorism’ gained popularity.[4] Terrorism, a deliberate use of force or intimidation, is a significant issue in the 21st century, often driven by ideological, religious, or political factors. However, the term "terrorism" has no widely recognised definition. There are four distinct stages of modern terrorism. The first wave of terrorism began in Russia and spread to Western Europe and the United States, using revolutionary and anarchist beliefs.[5]  The final wave is founded on religious beliefs that the world is currently dealing with. This wave started in 1979 when Iran underwent an Islamic revolution. Because of gender norms, terrorists are frequently perceived as masculine attackers. Women are perceived as powerless, passive, and victims during times of conflict, but it is important to remember that if they participate in terrorism, they may pose a greater threat than men.[6]And since 1990, women have gained prominence in terrorist organisations, assuming leadership positions and taking part in more brutal assaults. More media attention is given to female attackers, and people are more curious about the motivations behind their actions. Additionally, terrorist organisations are recruiting more women as a result of this. Although they have historically been involved in terrorist organisations, women's numbers have been small. As an example, the number of female suicide attackers has surged from eight in the 1980s to well over 100 since 2000, indicating a growth in the involvement of women in terrorist actions.[7]  On the other hand as per Bloom’s report over 257 suicide attacks were carried out by female bombers between 1985 and 2010, accounting for 25% of all terrorist incidents. Since 2002, the proportion of female bombers in several nations has surpassed 50%.[8]The first known incidence of female political violence happened in 1878, when Zasulich shot Fedor Trepov, the governor of Saint Petersburg. David Rapoport identified this as one of the four waves of modern terrorism.[9] Weinberg and Eubank claim that women have primarily assumed leadership positions in left-wing revolutionary bands while being assigned to inferior positions in right-wing organisations. They mostly perform supporting and auxiliary functions for numerous religious institutions. [10]Gender, Palestinian Women, and Terrorism: Women's Liberation or Oppression? was written by Anat Berko and Edna Erez. stated that during his questioning, he discovered that many Palestinian men did not approve of women participating in suicide bombings because they saw them as inferior to men.[11] After doing study with a local terrorist organisation, Jacques and Taylor chose 30 male and female suicide bombers. He finished by studying the fact that males prefer to join terrorist organisations for religious and nationalistic reasons, but female suicide terrorists are motivated by personal ones. Mia Bloom’s book the Bombshell: Women and Terrorism examines the motivations of women who participate in terrorism,[12] with an emphasis on relationships, respect, revenge, and redemption. According to Vetter and Perlstein, one of the reasons why women join terrorist organisations is because of gender equality. However, Jacques and Taylor disagree with this notion.[13]The main reason women join the LTTE is to fight for gender equality; they participate in every aspect of the group and do so to avoid being discriminated against and repressed by the male-dominated society.  The following studies will provide an academic perspective on the causes of women's involvement in terrorism. The main focus will be on four causes: political, religious, personal, and gender equality, as well as a list of important terror occurrences conducted by female terrorists as a result of some key ideological beliefs. Religious Cause: Religious convictions have been the foundation of many terrorist organisations throughout history. The Crusaders can be categorised as a terrorist group. Although the Crusaders' main objective was to propagate Christianity, they also committed heinous acts of terrorism. The Iranian Revolution of 1979 was the fourth wave of contemporary terrorism, and David Rapport claims that it was the first instance of religious terrorism in the modern era. Religious terrorism's core principle is the promotion of violence in the name of furthering religious beliefs. For example, Al-Qaeda and ISIS promote an Islamic caliphate globally.[14] However, attempting to do so by using cruel and aggressive methods. Islam and terrorism have become more associated since 9/11, as terrorist organisations have posed a serious threat to Western ideologies and societal influences.[15] Gonzalez-Perez notes that suicide bombers frequently use the idea of martyrdom and benefits in the afterlife to lure people into justifying their acts.[16] Women are also part of religious terrorist organisations but there are two argument over women involvement in jihadi group. As explaind by Muhammad Khayr Haykal in his book Al-Jihad wa al-qital fi al-siyasah al-shar'iyyah. 1. Women were seen as having a responsibility in raising money for Jihadis, caring for children, and providing medical treatment.[17] 2.    The Islamic state should set up training facilities for women to learn how to wield weapons and combat techniques, according to Islamic legal expert Muhammad Khayr Haykal. According to him, all Muslims should be held accountable for jihad if it turns into fard ‘ayn, and women must be prepared for this possibility in order to perform their duty. This strategy permits the practice of female jihadism in martyrdom missions and on the battlefield.[18] Role of women in Al-Qaeda According to Robet Pape in his book Dying to Win: The Strategic Logic of Suicide Terrorism.[19]Highlights that male terrorists affiliated with Al-Qaeda oppose women's participation in terrorism. However the Tamil Tigers used twenty-three female attackers, the Palestinians used six, the Lebanese used six, the Chechens used fourteen, and the PKK used ten. Consequently, he concluded that Islamic fundamentalists oppose female fighters.[20] However, after the rise of the Islamic state, which encourages women to join their organisation and accept arms, the Pape argument is no longer regarded as legitimate. For example, some 200 women joined the Islamic State in Syria in 2014 after migrating from Western nations. Additionally, they more than doubled their numbers in 2015, reaching over 550 women.[21] This suggests that the Islamic State may assign women a direct role, such as suicide bombing, in a way that is different from that of many other jihadist organisations, such as the Taliban and Al Qaeda.  In Al-Qaeda the women played a secondary role for.e.g: Al Qaeda also benefited strategically from the assistance that women provided. For instance, the female terrorists of Al Qaeda were strongly using the internet to try to convince men to join the worldwide Jihad. Some males are inclined to join these groups because they feel ashamed of their masculinity as a result of these communication strategies.[22]Women's roles in jihadist organisations are valued in that they bear children and raise them to be potential recruits for terrorist organisations. Usama Bin Laden thanked women by saying: "You have inspired and encouraged [men] to join jihad, and you have raised all the men who fought in Palestine, Lebanon, Afghanistan, and Chechnya, and you are the ones who produced the squadron of heroic men who carried out the raids in New York and Washington."[23] On the other hand Ayman al-Zawahiri's wife, Umayma al-Zawahiri, also urged her "Muslim sisters" to raise their kids on the love of jihad in God's way and "to induce their brothers, husbands, and sons to protect Muslims' lands and properties. To support (male) jihadists with prayers and financial support. [24] Al Khansa'a was one of the authors of the online magazine that inspired Muslim sisters with her articles; while she did not advocate for women to fight in combat, she did counsel them to stay in shape and exercise so they would be prepared for jihad.[25] Al-Qaeda Iraq's founder and Al-Qaeda member Abu Musab al Zarqawi urged Iraqi women to join the military. In Talafa, Iraq, a US military recruiting centre was the target of the first female suicide bomber. According to the announcement made by al Qaeda in Iraq on its website, "A blessed sister carried out a brave strike defending her beliefs. May God include our sister among the group of martyrs.’’[26]According to Mia Bloom the attack was carried out under the alias "ghost group" because it was still forbidden for Al Qaeda Central to collaborate with women on suicide bombings.[27] The identities of male suicide bombers are mentioned by AQI members, but the names of female suicide bombers are never mentioned. As a result, it is challenging to determine the purpose or driving force for their membership in terrorist organisations. Despite the lack of data regarding female suicide bombers, certain enquiries and interviews provide us with comparable reasons why they chose to join AQI as female terrorists. After losing a loved one, women join terrorist organisations in order to kill the offender and get revenge for the deaths of their husbands and brothers. Furthermore, AQI members urged young females to die as martyrs, claiming that they would immediately enter heaven and be the prophet Muhammad's neighbours.[28] Al-Qaeda is therefore mostly a male organisation that discourages women from engaging in violent activities. Women's roles are limited to becoming teachers, fund-raisers, social media advocates, and moms of potential jihadists. Role of women in Islamic State(IS) Islamic State was founded in 1999. The Islamic State had the greatest number of foreign terrorist fighters in history, making it a unique terrorist organisation. About 41,490 foreign nationals from 8 nations joined the Islamic State with the goal of restoring the caliphate. Of the foreign terrorist fighters, about 4761 (13%) were female. Following Eastern Europe (44%), Western Europe (42%), the Americas, Australia, and New Zealand (36%), and other regions, Eastern Asia had the greatest percentage (70%) of women connected with the Islamic State.[29] The biggest motivation for joining an Islamic terrorist organisation is religion. Women typically played a supporting role in Islamic terrorist organisations prior to the rise of the Islamic State. However, the role of women in these organisations has grown stronger after the fall of Al-Qaeda and the rise of Islamic State in the Middle East. Muriel Dagauque, a Muslim woman who converted to Islam and was married to a Muslim man, was one of the Islamic State suicide bombers. She moved to Iraq with her spouse from Europe in order to become a martyr, and on November 9, 2005, she bombed herself.[30] Many jihadist suicide bombers are comforted by the assurance that they will be sitting next to God (Allah), experiencing only joy and no agony, before the first drop of their blood ever hits the earth.[31]Women joined the Islamic State mostly for religious reasons. Umm Layth, also known as Aqsa Mahmood, was a 21 year old Scottish university student who travelled to Syria to take part in Islamic State terrorist activities. Mahmood expressed her opinions on jihad with the following sentences.: "If not you, then your grandkids or their grandchildren. But do not worry, our cubs will eventually shed your blood. This Islamic dominion will become well-known and dreaded all over the world. Choose a side; this is a fight against Islam. You may either support them or support us.''[32] Role of women Chechnya Terrorism: Islam is the predominant religion in Chechnya, and Wahhabist terror ideology is linked to Chechen terrorism, particularly suicide terrorism.[33]The Wahhabi sect appears to have spread to the Chechen territories through other terror cells in the Middle East, such as al Qaeda.[34] This ideology which glorifies martyrdom and promotes jihad in order to establish a worldwide Muslim caliphate is a rationale for carrying out acts of retaliation and acting on behalf of a national separatist movement.[35] Chechen women, due to their Islamic influence, often wear black and traditional Muslim clothing, such as a head scarf or jilbab, which allows them to conceal weapons and bombs, as seen in the Dulbrov theatre incident.[36] Religion is one factor that contributes to women joining terrorist organisations, but it is not the only one; other factors also play a role. Political Cause According to Gus Martin, terrorism can occur under a variety of circumstances when there is political repression. First, the group is resentful of the injustices they perceive in society. The group also believes that their social dissent is insignificant. Last but not least, the group believes that there are problems with the system that can be fixed, which leads them to confront the conflict.[37] Despite the widespread belief that women do not participate in political violence, women have been planning attacks and taking part in political violence since 1800.[38] Violence is a tactic used by women who are dissatisfied with the government, have their opinions ignored, and are under-represented in organisational structures With anarchist and revolutionary beliefs, anarchism was the beginning point of the first wave of contemporary terrorism, which swept from Western Europe to America. Nonetheless, women's political motive persisted until the second wave of terrorism, when nationalism emerged as the primary driver of women's participation in terrorism.[39] However, they were only allowed to serve as scouts and messengers during the second wave of terrorism. David Rapoport claims that because women once again assumed leadership roles, there are some similarities between the first and second waves.[40] Vera Zasulich shot the governor of St. Petersburg; she said that she had a political purpose for doing so because the governor was well-known for his Polish insurrection and had ordered to execute political prisoner Arkhip Bogolyubov. This infuriated the revolutionary forces, and six people made the decision to kill the governor, but Zasulich was the first to take the initiative. This was the beginning of the first wave of terrorism. Despite the fact that women participated in political violence, her case is notable as the first instance of female political violence in the modern era or the first to be acknowledged. [41] Russian university students founded the group, which specifically targeted political figures. Vera Figner and Gesia Gelfman, Sofia Perovskaya, and three ladies from Narodnaya Volya had a key role in the March 13, 1881, assassination of Russian Emperor Alexander II in St. Petersburg.[42] The reason behind this act was that Tsar Alexander II released his renowned Emancipation Manifesto in 1861 after the Russian intellectuals struggled to achieve their demands. This was intended to end the peasantry's enslavement and, if feasible, bring about a new, more liberal era. Perovskaya and other disappointed reformers decided to accelerate change as it became evident that this new age was a false dawn. As a result, hundreds of revolutionaries left St Petersburg in 1874 to tour the Russian countryside and read pamphlets to the peasants about socialism, nihilism, and anarchism in an attempt to educate them for the day when they would destroy the Tsar.[43] In 1954 the Algerian muslim formed a group called National Liberation Front. Their major goal was to achieve independence from the colonial power France. FLN rose to prominence thanks to its female members, Zohra Drif, Dajmila Bouhard, and Samia Lakhdar. They were able to cross the French checkpoint and leave bombs in various locations, and as a result, three people died in an explosion on September 3, 1956, and several others were injured.[44]This movement occurred at the time of second wave of contemporary terrorism which was based on the idea of nationalism and anticolonialism. As per reports between 1970 and 1984, 451 Italian women joined terrorist organisations and then engaged in political violence. The bulk of these women had degrees and performed identical duties to those of male terrorists, they found, with 35% of them being students, 23% being clerks, secretaries, nurses, technicians, and 20% being instructors. A paramilitary group called Red Brigade was established in 1970 and was engaged in terrorist activities around the nation. Because it supported Italy's withdrawal from NATO and dominated the Marixist-Leninist worldview. Known for its kidnapping and murderous activities, Red Brigades also killed former Italian Prime Minister Aldo Moro and abducted James L. Dozier, a senior US officer at NATO. Barbara Balzerian had murdered him. Many female members of the Red Brigades participated in the group's violent assaults, and Margherita Cagol (Mara), one of the Red Brigade's co-founders and one of the first victim in an armed conflict with the police, became a symbol of the left-wing movement.[45]The most violent communist organisation throughout the 1970s and 1980s was the Red Army Faction which engaged in ideologically motivated terrorism in West Germany. Ulrike Meinhof and Gudrun Ensslin, co-founders, protested consumerism by burning a department store in Frankfurt in 1968.[46] A major problem is the Chechen people's desire for independence from Russia, which is driven by their nationalist and separatist beliefs. In the lengthy history of the Chechen Republic, Russians, have been the target of several violent attacks. Since June 7, 2000, Khava Barayeva and Luisa Magomadova stormed the temporary headquarters of an elite OMON (Russian Special Forces) squad in Alkhan Yurt, Chechnya, sparking the start of Chechnya's "Black Widows" movement. With two fatalities and five injuries, the incident brought attention to the group's notorious actions.[47]According to the report, women were responsible for 47% of all terrorist incidents and 81% of suicide attacks in the Chechen region between 2000 and 2005.[48] For more than 30 years, the Liberation Tigers of Tamil Eelam (LTTE) battled the Sri Lankan central government, mostly because of the Tamil minority's ethnic oppression. Their goal was to establish their own nation in Sri Lanka's north and east.[49] The use of female suicide bombers and the LTTE's high proportion of female members were well-known. The proportion of female LTTE members varied between 20 and 30 percent, with some estimates reaching as high as 50 percent in certain years.[50]According to LTTE theorist Anton Balasingham's wife, Adele Ann, a Tamil woman's decision to join the group was a sign to society that she was dissatisfied with the status quo and had the ability to rebel against authority.[51]To sum up, female revolutionaries have contested the idea that they are less capable of committing acts of terrorism or have less political clout, and. Additionally, nationalism and revolution are the main goals of the majority of terrorist organisations that are focused on women. Personal reason Personal causes, such as revenge, family instability, rape, personal tragedy, and revenge, are important motivations for the individual to join terrorism. Women are more likely to cite these as their original motivation in joining terrorist organizations than men. Mia Bloom, Jaques and Taylor, and Robert Pape have all proposed that the reasons behind female terrorists are different from those of male terrorists. According to them, the emotions of female terrorists such as family problems, discontent, and the desire to commit suicide are what motivate them. These motivations are further divided by Bloom into four categories: respect, relationship, revenge, and redemption. [52] 1. Women who experience sexual assault, including rape, may retaliate violently; some may even choose suicide bombing as a last resort. After women were raped in Iraq, Samira Ahmad Jassim, dubbed the "mother" of suicide bombers, was accused of encouraging rape victims to commit honour suicide and conducting 28 suicide attacks, according to the Die Welt article..[53] 2. During the Chechen War, Russian soldiers sexually assaulted many Chechen women. According to estimates from Doctors Without Borders, 85 percent of Chechen women experienced sexual assault at the hands of law enforcement and military during the Chechen War. Journalist Svetlana Makunina claims that after being drugged and raped, Chechen women were left with no choice but to commit suicide bombing.On the evening of May 21, 1991, LTTE suicide bomber Dhanu killed former Indian Prime Minister Rajiv Gandhi at an election rally in Sriperumbudur, Tamil Nadu. She clarified that she took this action after being gang-raped by Indian peacekeeping troops. 3. Another crucial element that encourages women to join terrorist groups is relationships. Family members and relatives, who are important in the recruitment process, could function as a conduit between the terror group and women. Sidney Jones claims that while some women freely choose to wed male terrorists, others are coerced by their relatives.[54] Many women join ISIS for a variety of reasons, including a desire to contribute to the caliphate, a desire for friendship with like-minded individuals, or direct pressure by family members and acquaintances.[55] For e.g., Shamima Begum was influenced by her friend Sharmena to join IS. Barbara Victor, Army of Roses: Inside the World of Palestinian Women Suicide Bombers stated that instead of acting on their own initiative, female Palestinian suicide bombers are “at the mercy of, or in love with, their handlers.”[56] (women join terrorist organisations because they are forced by male) 4. Guillermo Galdos, and “Eliana Gonzales,” points out that male influence is not an essential prerequisite for recruiting women into violent organizations. In order to join revolutionary movements, women have reported willingly leaving their boyfriends, husbands, and kids. The oldest woman in Columbia's Fuerzas Armadas Revolucionarias de Colombia (FARC), Eliana Gonzales Acosta, for instance, abandoned her husband, sister, and daughter to join the group.[57] 5. Many people who have been directly impacted by the acts of another group resort to terrorism. The revenge theory is the name given to this. An individual is more inclined to engage in terrorism if they have lost a friend or loved one to a terrorist organisation or the military.[58] Additionally, according to Jacques and Taylor, revenge influences people's decision to join terrorist groups.[59] In literature and art, the stereotype that women are more revengeful than males is mirrored. According to William Cosgrove's The Mourning Bride, "Heaven is furious, like love turned to hate, and Hell is furious, like a woman scorned.”[60]Russian negotiator suggests the difference between men and women is that “[Chechen women] are ‘zombified’ by their own sorrow and grief.[61] The Russian and international press called Chechen women bombers "Black Widows" as it was revealed that many were acting in retribution for the deaths of their husbands, kids, and brothers.[62]Since the takeover of the Dubrovka Theatre in October 2002, nineteen female bombers have appeared in black mourning garments with bombs attached to their bodies. They held 850 people hostage for two and a half days. Until Russian forces imposed persecution on the people and executed the terrorist. While these motivations were not limited to revenge or family difficulties, they were also gender specific. There are more men killed in these battles, resulting in an imbalance of women battling for retribution. Furthermore, women constitute the majority of rape victims in these communities, which motivates them to join. Gender Equality: According to Vetter and Perlstein, one of the reasons why women join terrorist organisations is because of gender equality. However, Jacques and Taylor disagree with this notion.[63]FARC, or Revolutionary Armed Forces of Colombia, was established to combat societal inequality and provide women with opportunities for advancement. Despite being predominantly dominated by women, the organization offers women's rights, sexual freedom, and opportunities for advancement in a patriarchal society.[64] FARC recruits in rural areas, where women often have fewer opportunities, highlighting the organization's societal focus on women's rights.[65]A woman who had spent many years of her life in the FARC (Fuerzas Armadas Revolucionarias de Colombia—Ejército del Pueblo, or Revolutionary Armed Forces of Colombia—People's Army) was interviewed by Anne Phillips in 2012.[66]For the numerous reasons mentioned above, this woman, code-named "Athena," joined the FARC before turning thirteen. She explains why she joined this group  as it provides gender equality. She had economic reasons because she was from a rural area and lacked access to economic and educational opportunities. Women in Colombia's rural communities face a lack of opportunities, which leads to prostitution. Many women turn to the FARC as a viable alternative to prostitution. The FARC gives women a stable income. Women turn to the FARC because they are guaranteed food and other requirements. They are given the same opportunities as males and are able to support themselves. Also, by women joining terrorist organizations they are challenging gender stereotypes in their societies. O’Rourke says that women dislike these gender norms and rise out against them in opposition of the stereotyped female in their culture.[67]The LTTE gives women the same incentive to advance gender equality. According to LTTE women, they felt liberated and empowered within the organisation. By establishing sexual limitations and providing equal training chances, the LTTE established an environment that was equal for men and women. Women held leadership roles inside the LTTE and believed they were on par with the men themselves. Often, women join these groups to either learn about or escape gender inequality. CONCLUSION: The primary goal of this article was to examine the primary motivator for women to join terrorist organisations. For more than a century, women have been participating in terrorist activities, but only in recent decades have studies of terrorism examined female terrorists. Political, religious, personal, and gender equality are some of the motivations for women to join terrorist groups and participate in liberation movements. Since the 19th century, women have joined a variety of terrorist organisations; some conduct these horrible deeds to defend their beliefs or territory. Religion is another reason these women wish to sacrifice themselves in the name of Islam. They act in this way because they believe that, despite their crimes, they will be admitted to heaven if they commit murder for Islam. Women's terrorist operations might occasionally be motivated by personal issues. Although forced marriage, family issues, rape, the death of a loved one, and defiance of the patriarchal society are some of the main causes, other traumas could also influence their choices. However, each of the four factors has a major impact on women's decision to participate in terrorism. Al-Qaeda and Islamic State, for example, are heavily influenced by religion. The Tamil Tigers and FARC, on the other hand, are primarily driven by personal motives and gender equality. Furthermore, the political cause of Red Brigade and the National Liberation Front has been their main source of motivation. "Personal, political, and religious motivations are the main cause behind women's involvement in terrorism," claim Cunningham and Bloom. In order to curb terrorists' actions in the modern world, it is critical to comprehend their objectives and the reason behind their organisation. Furthermore, since many highly educated women have joined terrorist organisations, we cannot claim that education may have a major influence. There is extremely little research on gender and terrorism, particularly on women's participation in terrorist actions. To determine the primary reason women, participate in terrorism, we must conduct additional research in this field. Due to the fact that the information offered is highly generalised. What steps should the government take to prevent women from joining terrorist organisations? What other variables might encourage women to join terrorist organisations? Researchers from all social science fields should conduct some research on these pressing concerns as political scientists alone are unable to provide these answers. Bibliography[1] Jessica Shepherd, “The Rise and Rise of Terrorism Studies,” last modified July 3, 2007, accessed December 10, 2024, https://www.theguardian.com/education/2007/jul/03/highereducation.research.[2] Jessica Shepherd, “The Rise and Rise of Terrorism Studies,” last modified July 3, 2007, accessed December 10, 2024, https://www.theguardian.com/education/2007/jul/03/highereducation.research.[3] Ariel Merari, Driven to Death: Psychological and Social Aspects of Suicide Terrorism, 1st ed. (NewYork: Oxford University Press, 2010).[4]Zeynep Bayar, “The Role of Women in Terrorism,” City University of New York (CUNY) , accessed December 15, 2024, https://academicworks.cuny.edu/cgi/viewcontent.cgi?article=4346&context=gc_etds.[5] David Rapoport, The Four Waves of Modern Terrorism (Washington DC: Georgetown University Press, 2004), 46–73.[6] “Women and Terrorist Radicalization Final Report,” Organization for Security and Co-Operation in Europe (Organization for Security and Co-operation in Europe, January 1, 2013), last modified January 1, 2013, accessed December 13, 2024, https://www.osce.org/files/f/documents/4/a/99919.pdf.[7] LindseyA O’Rourke, “What’s Special about Female Suicide Terrorism?,” Security Studies 18, no. 4 (December 2, 2009): 682.[8] Mia Bloom, “What’s Special about Female Suicide Terrorism,” Gender Studies 28, no. 1–2 (June 1, 2011): 682.[9] David Rapopart, The Four Waves of Modern Terrorism (Washington DC: Georgetown University, 2004).[10] Leonard Weinberg and William L Eubank, “Women’s Involvement in Terrorism,” Gender Studies 28, no. 2 (June 2011): 22–49.[11] Anat Berko, “Gender Palestinian Women, and Terrorism: Women’s Liberation or Oppression?,” ed. Edna Erez, Studies in Conflict and Terrorism 30, no. 6 (April 27, 2007): 493–519.[12] Mia Bloom, Bombshell: Women and Terrorism (Philadelphia: University of Pennsylvania Press, 2011).[13] Karen Jacques and Paul J. Taylor, “Male and Female Suicide Bombers: Different Sexes, Different Reasons?,” Studies in Conflict and Terrorism 31, no. 4 (April 10, 2008).[14] Rosemarie Skaine , Female Suicide Bombers (United Kingdom: McFarland, 2006).[15] Graham Bird, Brock Blomberg, and Gregory Hess, “International Terrorism: Causes, Consequences and Cures,” World Economy 31 (2008): 259.[16] Rosemarie Skaine , Female Suicide Bombers (United Kingdom: McFarland, 2006), 12.[17] Ibn al Bukhari, Sahih Al- Bukhari. Trans Muhammad Muhsin Khan (United States: Islamic University, 1979).[18] Muhammad Khayr Haykal, Jihad and Fighting according to the Shar‘ia Policy (Beirut: Dar al-Barayiq, 1993).[19] Robert A. Pape, Dying to Win: The Strategic Logic of Suicide Terror (NewYork: Random House Books, 2005).[20] Rosemarie Skaine , Female Suicide Bombers (United Kingdom: McFarland, 2006).[21] Erin Marie Saltman and Melanie Smith, Till Martyrdom Do Us Part’: Gender and the ISIS Phenomenon (Institute for Strategic Dialogue, May 22, 2015).[22] Zeynep Bayar, “The Role of Women in Terrorism,” City University of New York (CUNY) , accessed December 15, 2024, https://academicworks.cuny.edu/cgi/viewcontent.cgi?article=4346&context=gc_etds.[23] Nelly Lahoud, “The Neglected Sex: The Jihadis’ Exclusion of Women from Jihad,” Terrorism and Political Violence 26, no. 5 (February 20, 2014).[24] Nelly Lahoud, “Umayma Al-Zawahiri on Women’s Role in Jihad,” Jihadica, last modified February 26, 2010, https://commons.lib.jmu.edu/cgi/viewcontent.cgi?article=1422&context=honors201019.[25] Mia Bloom, “What’s Special about Female Suicide Terrorism,” Gender Studies 28, no. 1–2 (June 1, 2011).[26] “Woman Suicide Bomber Strikes Iraq,” BB, last modified September 28, 2005, http://news.bbc.co.uk/2/hi/middle_east/4289168.stm. [27]Ibid[28] Aqeel Hussein and Damien McElroy, “Mother of All Suicide Bombers’ Warns of Rise in Attacks,” The Telegraph, last modified November 15, 2008, https://www.telegraph.co.uk/news/worldnews/middleeast/iraq/3464411/Mother-of-all-suicide-bombers-warns-of-rise-in-attacks.html.[29] Joana Cook and Gina Vale, From Daesh to “Diaspora”: Tracing the Women and Minors of Islamic State (International Centre for the Study of Radicalisation, 2018).[30] Zeynep Bayar, “The Role of Women in Terrorism,” City University of New York (CUNY) , accessed December 15, 2024, https://academicworks.cuny.edu/cgi/viewcontent.cgi?article=4346&context=gc_etds.[31] Mia Bloom, Bombshell: Women and Terrorism (Philadelphia: University of Pennsylvania Press, 2011).[32] Susan Swarbrick, “Scots ‘Jihadi Bride’ Talks of ‘Revenge’ in Hate-Filled Blog,” The Herald, last modified July 6, 2015, https://www.heraldscotland.com/news/13415875.scots-jihadi-bride-talks-of-revenge-in-hate-filled-blog/.[33] W. Andy Knight and Tanya Narozhna, “Social Contagion and the Female Face of Terror: New Trends in the Culture of Political Violence,” Canadian Foreign Policy Journal 12, no. 1 (March 14, 2011).[34] Ibid.,33[35] Ibid.,33[36] LindseyA O’Rourke, “What’s Special about Female Suicide Terrorism?,” Security Studies 18, no. 4 (December 2, 2009): 690.[37] Gus Martin , Understanding Terrorism: Challenges, Perspectives, and Issues , 8th ed. (SAGE Publications, Inc, 2024), 60.[38] Maha Butt, “Feminist IR Theory and Terrorism,” International Affairs Forum, accessed December 16, 2024, https://www.ia-forum.org/Content/ViewInternal_Document.cfm?contenttype_id=0&ContentID=9152#:~:text=Analyzing%20terrorism%20from%20a%20feminist's,female%20terrorists%20as%20'women%20terrorists..[39] David Rapoport, The Four Waves of Modern Terrorism (Washington DC: Georgetown University Press, 2004), 46–73.[40] Elena Gapova, “Gender Equality vs. Difference and What Post-Socialism Can Teach Us,” Womens Studies International Forum 59 (November 1, 2016).[41] “Vera Zasulich,” Wikipedia, https://en.wikipedia.org/wiki/Vera_Zasulich#cite_note-5.[42]Elena Gapova, “Gender Equality vs. Difference and What Post-Socialism Can Teach Us,” Womens Studies International Forum 59 (November 1, 2016).[43] James Crossland, “The Women Who Ended an Emperor,” History Workshop, last modified April 21, 2021, https://www.mybib.com/#/projects/39m8D0/citations/new/webpage.[44] Zeynep Bayar, “The Role of Women in Terrorism,” City University of New York (CUNY) , accessed December 15, 2024, https://academicworks.cuny.edu/cgi/viewcontent.cgi?article=4346&context=gc_etds.[45] Ruth Glynn , Approaching Women, Terror, and Trauma in Cultural Perspective, 2013.[46] “Andreas Baader and Ulrike Meinhof,” Encyclopedia.com, accessed January 2, 2025, https://www.encyclopedia.com/history/encyclopedias-almanacs-transcripts-and-maps/andreas-baader-and-ulrike-meinhof.[47] Anne Speckhard and Khapta Akhmedova, “Black Widows: The Chechen Female Suicide Terrorists,” The Institute for National Security Studies, last modified August 2006, https://www.inss.org.il/wp-content/uploads/2017/08/Female-Suicide-Bombers-63-80.pdf.[48] Anne Speckhard and Khapta Ahkmedova, “The Making of a Martyr: Chechen Suicide Terrorism,” Studies in Conflict & Terrorism 29, no. 5 (September 22, 2006).[49]Peng Wang, “Women in the LTTE: Birds of Freedom or Cogs in the Wheel?,” Journal of Politics and Law 4, no. 1 (2011).[50] Karla J. Cunningham, “Cross-Regional Trends in Female Terrorism,” Studies in Conflict and Terrorism 26, no. 3 (May 2003).[51]“Liberation Tigers of Tamil Eelam (LTTE),” South Asia Terrorism Portal, https://www.satp.org/satporgtp/countries/srilanka/terroristoutfits/ltte.htm.[52] Karen Jacques and Paul J. Taylor, “Male and Female Suicide Bombers: Different Sexes, Different Reasons?,” Studies in Conflict & Terrorism 31, no. 4 (2008).[53]Mia Bloom, “What’s Special about Female Suicide Terrorism,” Gender Studies 28, no. 1–2 (June 1, 2011).[54] Sidney Jones, “Inherited Jihadism: Like Father, like Son,” International Crisis Group, last modified July 4, 2007, https://www.crisisgroup.org/asia/south-east-asia/indonesia/inherited-jihadism-father-son.[55] Daniel Milton and Brian Dodwell, “Jihadi Brides? Examining a Female Guesthouse Registry from the Islamic State’s Caliphate,” Combating Terrorism Center 11, no. 5 (May 2018).[56]Edward E. Azar, “Protracted International Conflicts: Ten Propositions,” International Interaction 12, no. 1 (January 9, 2008).[57]“GENDER and TERRORISM: MOTIVATIONS of FEMALE TERRORISTS ,” DNI.gov, https://www.dni.gov/files/documents/FOIA/DF-2023-00139-Gender_and_Terrorism_Thesis.pdf.[58]LindseyA O’Rourke, “What’s Special about Female Suicide Terrorism?,” Security Studies 18, no. 4 (December 2, 2009): 710.[59]Karen Jacques and Paul J. Taylor, “Male and Female Suicide Bombers: Different Sexes, Different Reasons?,” Studies in Conflict & Terrorism 31, no. 4 (2008): 322[60] “GENDER and TERRORISM: MOTIVATIONS of FEMALE TERRORISTS ,” DNI.gov, https://www.dni.gov/files/documents/FOIA/DF-2023-00139-Gender_and_Terrorism_Thesis.pdf.[61]Ibid.,63[62] Anne Speckhard and Khapta Ahkmedova, “The Making of a Martyr: Chechen Suicide Terrorism,” Studies in Conflict & Terrorism 29, no. 5 (September 22, 2006).[63]Karen Jacques and Paul J. Taylor, “Male and Female Suicide Bombers: Different Sexes, Different Reasons?,” Studies in Conflict & Terrorism 31, no. 4 (2008).[64]Natalia Herrera and Douglas Porch, “‘Like Going to a Fiesta’ – the Role of Female Fighters in Colombia’s FARC-EP,” Small Wars & Insurgencies 19, no. 4 (January 26, 2009).[65]Mia Kazman, “Women of the FARC,” William J.Perry Center, accessed December 23, 2024, https://wjpcenter.org/wp-content/uploads/2023/09/Women-of-the-FARC.pdf[66]Christine Balling, “Why Women Turn to the FARC -- and How the FARC Turns on Them,” Foreign Affairs, last modified June 1, 2012, accessed December 23, 2024, https://www.foreignaffairs.com/articles/colombia/2012-06-01/fighting-mad.[67]LindseyA O’Rourke, “What’s Special about Female Suicide Terrorism?,” Security Studies 18, no. 4 (December 2, 2009): 702

Defense & Security
China Cyber Security Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured. 3d illustration

Chinese cyberespionage: The Invisible War That Threatens the West

by Gabriele Iuvinale

On March 4, the U.S. Department of Justice charged ten Chinese nationals with carrying out massive hacks against government agencies, media outlets, and dissidents in the United States and around the world. They allegedly acted on behalf of the Chinese company i-Soon, under contract from the Beijing government. Two officials from China’s Ministry of Public Security (MPS) were also indicted, identified as the ones “directing the attacks.” According to documents held by the U.S. justice system, China’s domestic intelligence services (MPS) and foreign intelligence (Ministry of State Security, MSS) relied on a vast network of private companies and domestic contractors to hack and steal information, thereby masking the Chinese government’s direct involvement. In some cases, the MPS and MSS paid private hackers to target specific victims. In many others, the attacks were speculative: hackers identified vulnerable computers, breached them, and extracted information that was later sold — either directly or indirectly — to the Chinese government. The Growth of Chinese Cyberespionage and Its Main Areas of Operation This is not an isolated case. Over the past decade, the People’s Republic of China’s (PRC) hacking program has expanded rapidly. In 2023, then-FBI Director Christopher Wray stated that it was larger than that of all other world powers combined. This increase in power and sophistication has led to success in three key areas: political interference, sabotage of critical infrastructure, and large-scale intellectual property theft. Beijing integrates computer networks, electronic warfare, economic, diplomatic, legal, military, intelligence, psychological, and military deception resources, along with security operations, to weaken states, make them economically dependent on China, and more receptive to a “new authoritarian world order with Chinese characteristics.” For this reason, unlike traditional interpretations, Chinese state-sponsored hacking should be understood within a broader context — where control over technology, strategic infrastructure, and global supply chains is part of “trans-military” and “non-military” warfare operations, as described by two People’s Liberation Army (PLA) colonels in the 1999 book “Unrestricted Warfare”. This approach is known as liminal warfare — an escalating conflict in which the spectrum of competition and confrontation with the West is so wide that the battlefield is, quite literally, everywhere. Cyberespionage as a Tool of Electronic Warfare In electronic warfare, hacking is used for sabotage during times of crisis or conflict. These actions are led by the People’s Liberation Army (PLA), the armed wing of the Chinese Communist Party. In 2023, it was discovered that a hacker group linked to the PLA, known as “Volt Typhoon”, had infiltrated a wide range of critical infrastructure in the U.S. for years, including ports, factories, and water treatment plants — both on the mainland and in strategic locations like Guam. “Volt Typhoon is a military operation with political and potentially military strategic purposes,” explained Ciaran Martin, former director of the UK’s cybersecurity agency. Led by the PLA’s cyber unit, the operation involved installing readiness capabilities — “digital traps,” as some call them — within critical U.S. infrastructure. In addition to a sustained attack in 2023 on a power company in Massachusetts, which aimed to extract sensitive data about its operational technology (OT) infrastructure, “Volt Typhoon” gained notoriety for multiple attacks on telecommunications systems in the U.S. and other critical infrastructures globally. One of its subunits, “Voltzite”, targeted the Littleton Electric and Water Departments, prompting the FBI and cybersecurity firm Dragos to respond jointly and publish a detailed report on the attack and its mitigation. Intellectual Property Theft Through Cyberespionage The most damaging channel for intellectual property theft is cyberespionage. These intrusions allow Chinese companies — sometimes with direct support from the Communist Party or the state — to access information on operations, projects, and technology from foreign firms. China has used state-backed and coordinated cyberespionage campaigns to steal information from companies in strategic sectors such as oil, energy, steel, and aviation. These actions serve both to acquire science and technology and to gather intelligence useful for future attacks on military, government, or technical systems. In the United States, there have been numerous precedents: • In 2014, five PLA hackers were indicted for economic espionage.• In 2017, three hackers linked to the Chinese firm Boyusec were charged with stealing confidential business information.• In 2018, two Chinese nationals were indicted for intellectual property theft.• In 2020, two hackers connected to the MSS were charged with targeting COVID-19 research. Among these, the 2018 indictment stands out as part of a broader U.S. effort to raise awareness about Chinese cyberespionage. On that occasion, Chinese hackers carried out a campaign known as “Cloud Hopper”, which involved a supply chain attack on service providers like Hewlett Packard and IBM. The defendants worked for Huaying Haitai and collaborated with the Tianjin State Security Bureau of the MSS. In 2017, the U.S. Commission on the Theft of American Intellectual Property estimated that such crimes cost the U.S. economy up to $600 billion annually — a figure comparable to the Pentagon’s defense budget and greater than the combined profits of the 50 largest companies in the Fortune 500. Beyond the United States: The Global Impact of Chinese Cyberespionage In June 2024, Dutch military intelligence (MIVD) warned that Chinese cyberespionage was broader than previously believed, affecting Western governments and defense companies. A 2023 cyberattack on the Dutch Ministry of Defense reportedly affected at least 20,000 people within a few months. In 2018, the Czech Republic’s National Cyber and Information Security Agency (NUKIB) issued a warning about risks linked to China. Since then, the country has strengthened its capabilities and controls against Beijing and has worked on mechanisms to counter foreign information manipulation. According to U.S. prosecutors, dozens of European parliamentarians have been targeted by Chinese attacks. In March 2024, the U.S. Department of Justice indicted hackers linked to the MSS for attacking “all EU members” of the Inter-Parliamentary Alliance on China (IPAC), a coalition critical of Beijing. In 2021, the hackers sent over a thousand emails to around 400 accounts linked to IPAC, attempting to spy on their internet activity and devices. In addition, ASML, the Dutch leader in semiconductor lithography, suffers “thousands of security incidents per year,” including several successful infiltration attempts by Chinese actors. Research centers like Imec (Belgium) are also frequent targets. Belgium has expelled Chinese researchers suspected of espionage. The European Union has reinforced security and identified advanced semiconductors as one of four critical technologies requiring risk assessments and enhanced protection. Notably, APT41 is one of the most active and sophisticated Chinese cyberespionage groups, based in the PRC and linked to the MSS. According to Google’s Threat Intelligence Group, APT41 combines state espionage with ransomware attacks — malicious programs that encrypt files and demand financial ransom to restore them — making attribution more difficult. Unlike other PLA-aligned groups whose operations are region-specific, APT41 acts globally, attacking strategic sectors in the U.S., Europe, Latin America, and the Caribbean. It also carries out financially motivated operations, particularly in the gaming industry. Mandiant, a global cybersecurity leader, highlights APT41’s technical capabilities: it frequently exploits zero-day and n-day vulnerabilities and uses techniques like phishing, social engineering, and SQL injections. Since 2020, APT41 has conducted large-scale campaigns against over 75 companies in more than 20 countries. It is responsible for compromising supply chains, such as in the “ShadowHammer” campaign targeting ASUS, which affected over 50,000 systems in 2018. APT41 is also linked to the use of “MESSAGETAP” malware in telecommunications networks. The Role of Chinese Universities in Cyberespionage Chinese universities also collaborate with the PLA and MSS in state-sponsored cyberespionage operations. Shanghai Jiao Tong University works directly with the Chinese military on such operations. Zhejiang University and the Harbin Institute of Technology are key centers for recruiting hackers. Xidian University offers students hands-on experience at provincial MSS offices and previously maintained ties with the Third Department of the PLA’s General Staff before its reorganization in 2015 into the Network Systems Department. One of its graduate programs is co-directed with the Guangdong Office of the Chinese Information Technology Security Evaluation Center (ITSEC), an MSS-run office that leads an active team of contractor hackers. Southeast University also maintains links with security services and co-manages the “Purple Mountain Lab” with the PLA’s Strategic Support Force. There, researchers collaborate on “critical strategic requirements,” operating systems, and interdisciplinary cybersecurity studies. The university also receives funding from the PLA and MSS to develop China’s cyber capabilities. The Cybersecurity undergraduate program at Shanghai Jiao Tong University (SJTU) is taught at a PLA information engineering base. Within this program, SJTU claims to work on “network and information systems testing and evaluation, security testing for connected smart networks, APT attack and defense testing, and key technologies for cyber ranges.” Universities associated with the MSS for talent recruitment include the University of Science and Technology of China, Shanghai Jiao Tong University, Xi’an Jiao Tong University, Beijing Institute of Technology, Nanjing University, and the Harbin Institute of Technology. In addition, some cybersecurity firms — such as Beijing TopSec — collaborate with the PLA in hacking campaigns, operator training, and developing future hackers. This article was originally published by Agenda Digitale and later by Expediente Abierto, who granted us permission for its translation and republication.

Defense & Security
Chess made from USA, EU and China flags on a white background. Chess made from China, Europe Union and United States of America flags. Trade, tariffs, duty and customs war

Europe’s transatlantic China challenge

by Gesine Weber

Abstract European states currently lack a clear joint strategy on China and a coordinated approach to US–China competition. This article offers a novel perspective on the challenges for European approaches to this issue due to an omnipresent transatlantic component and the risk of an alliance dilemma. Illustratively focusing on France, Germany and the UK, it demonstrates that Europeans are facing a transatlantic alliance dilemma with the risks of abandonment and entrapment. It argues that Europe needs to strike a balance between its dependence on Washington, especially with regard to European security, while fearing entrapment by the US approach towards Beijing as it aims to maintain economic ties with China. The article concludes that the ramifications of this dilemma can be mitigated through a distinctly European approach to China, strengthening European coordination on China and bolstering European strategic autonomy. As a conceptual piece rather than a full empirical analysis, this article therefore unpacks the strategic challenge and lays the groundwork for further empirical works on the topic. Introduction Strategic competition between the US and China plays out in many realms of international affairs, ranging from global trade to security in the Indo-Pacific. European states are directly affected by this dynamic as they maintain critical ties with both sides. Albeit allies of the US through NATO, Europeans have been reluctant to align with the US on its approach to the Indo-Pacific and China, which is currently characterised by the quest to win the strategic competition with Beijing in all areas of international affairs (see Leoni 2023). Furthermore, Europe maintains close economic ties with Beijing, and imports from China to the EU have most recently increased (Lovely and Yan 2024). European governments certainly do not pursue an approach of maintaining equidistance between the US and China: not only do they regularly emphasise their strategic proximity to Washington, but more recent events, such as the willingness of European allies to publicly adopt the wording of the communiqué from NATO’s Washington summit (NATO 2024) describing China as an ‘enabler of Russia’s war effort in Ukraine’, clearly demonstrate that the tone is changing in European capitals (Politi 2023). However, Europeans still tend to emphasise China’s role in global affairs and the importance of including it in multilateral cooperation formats. With the re-election of Donald Trump as US president, European policy on China and its approach to US–China competition will increasingly be a focus of the US administration. While the exact approach of the new US government still remains to be defined, there are good reasons to anticipate a more hawkish China policy from Washington, through which the US might seek not only to further compete with China, but to actually win this competition (see Pottinger and Gallagher 2023). When designing their approaches towards China—which, among the key European states, only Germany has done so far, with the publication of its China strategy in 2023—Europeans always face a transatlantic elephant in the room. US–China competition, a structuring feature of international relations shaping the global order today through the increasing emergence of geopolitical blocs (see Leoni and Tzinieris 2024), and China’s rising global influence in almost all areas of international affairs—ranging from climate to economics, the rules-based order and security—are forcing European states to reflect on their approach vis-à-vis Beijing (for a full discussion, see Oertel 2023; García-Herrero and Vasselier 2024). As NATO members, European states also need to adapt their strategy in light of the partnership with the US as their key ally. This article argues that European approaches towards China, as shown in the examples of France, Germany and the UK, have a distinctly transatlantic component. It illustrates how these three European states find themselves in an alliance dilemma with the US, and how the risks associated with alliances also define European approaches to China and US–China competition more broadly. As the US administration regularly refers to China as a ‘challenge’ (US Department of Defense 2022), this article alludes to this formulation through the coining of the term ‘transatlantic China challenge’ to describe the strategic challenges Europeans are facing with regard to defining their approach vis-à-vis China and US–China competition more broadly. It offers a conceptual understanding of the strategic challenges for Europe in this context and thereby constitutes a basis for a more thorough empirical analysis. The alliance dilemma and European strategy in US–China competition Originating in realist international relations theory, the alliance dilemma generally describes a situation in which states face risks resulting from joining an alliance. As demonstrated by Snyder (1984), smaller allies especially face a parallel risk of abandonment and entrapment by a hegemon, that is, the dominating power, after joining an alliance. Abandonment, in these circumstances, implies that the hegemon has no further interest in defending or supporting the smaller allies, whereas entrapment refers to a situation in which a state is ‘dragged into a conflict over an ally’s interests that [it] does not share, or shares only partially’ (see Snyder 1984, 466–8). In the context of alliances, a small state is ‘the weaker part in an asymmetric relationship, which is unable to change the nature or functioning of the relationship on its own’ (Wivel et al. 2014, 9), and hence has more limited space for action than the great powers (Wivel and Thorhallsson 2018, 267). This definition arguably applies to Europe in its partnership with the US, as demonstrated by the excessive military and economic dominance of the US as compared to the European states (see Stockholm International Peace Research Institute n.d.; International Monetary Fund 2025). The re-election of Trump as US president now presents the risk of an increased alliance dilemma for Europeans. On the one hand, Trump has announced several times that he does not value the alliance commitments within NATO and potentially would not defend European allies (Sullivan 2024), threatening Europe with abandonment. This scenario is being taken seriously in European capitals, and reflections on how ‘defending Europe with less America’ (Grand 2024) could shape up have gained traction, especially in 2024. Similarly, defence initiatives within the EU to enhance the European contribution to the continent’s security have leapt forward in recent years (see Scazzieri 2025). On the other hand, even the Biden administration had pushed Europe to align with the US approach on China (see Lynch et al. 2023). However, France and Germany in particular, as the big EU member states, have been hesitant to do so, as reflected in France’s opposition to the opening of a NATO liaison office in Tokyo (McCurry 2023) and Germany’s vote against tariffs on Chinese electric vehicles, fearing reprisals from Beijing (Demarais 2024). Trump’s foreign policy might be strongly characterised by issue linkage, which means that policies in one area will be linked to those in another area. Through this strategy, the new US administration might force Europeans into alignment and thereby entrap them, making them accept policies they are not eager to support (see Barkin and Kratz 2025). The exact policies of the Trump administration vis-à-vis European allies remain to be seen, but it is not hard to imagine a scenario in which abandonment and entrapment could emerge or increase, namely when the threat of abandonment is used to entrap allies and force them to support certain policy decisions. The alliance dilemma could play out for Europeans specifically when designing their approaches towards China (see Barkin and Kratz 2025) and formulating their response to US–China competition more generally. As noted above, among the big European states, only Germany has formally adopted a strategy on China, in 2023 (The Federal Government of Germany 2023). However, China and the response to US–China competition takes a prominent place in France’s Indo-Pacific Strategy and its strategy review (Government of France 2021; Secrétariat général de la défense et de la sécurité nationale 2022), and the UK systematically included the dimension of strategic competition in its Integrated Review and its refresh (Government of the United Kingdom 2021, 2023) and has announced an ‘audit’ of its China policy under the new government (Taylor 2024). While these strategies emphasise their individual approaches towards China and the risks stemming from US–China competition, the US has increasingly pressured Europe to align with its approach (Lynch et al. 2023) and can be expected to continue this pressure (Barkin and Kratz 2025). Through the potential issue linkage of security (openly questioned by President Trump) and China policy, Europe therefore finds itself in a new form of alliance security dilemma. European approaches to US–China competition: strategic hedging How can Europe respond to the alliance dilemma of the risks of abandonment and entrapment when it comes to its approaches to China? Reviewing the theoretical literature on the alliance dilemma, one can imagine different strategies. According to Snyder, members of alliances can choose between strategies that strengthen or weaken their commitment to the alliance. To demonstrate commitment, actions could include reassurances for the ally or demonstrations of loyalty, whereas actions to weaken the commitment to the alliance could consist of restraining the ally (mostly to reduce the risk of entrapment in a conflict), increasing bargaining power over the ally or preserving options for realignment outside the existing alliance (for a full discussion, see Snyder 1984, 466–9). Alternative strategies include hiding from cooperation, that is, ‘seeking to maximize autonomy by opting out of specific aspects of the cooperation or by setting up “bastions” in the cooperation’, or bandwagoning, through which states pursue strategies of adaptation ‘to the more powerful actors in the cooperation’ (Pedersen 2023, 442). At the moment, it seems that France, Germany and the UK ‘drive on sight’ rather than approaching the question holistically. The following analysis aims to unpack how the three European states see US–China competition, the risk of the alliance dilemma and how these reflections have played out so far in their strategies. The strategies of France, Germany and the UK on China demonstrate that their approaches are influenced by a distinctly transatlantic component and reflect the transatlantic alliance dilemma. This is visible in their (1) high awareness of the risks stemming from great power competition, (2) approaches to managing the risk of short-term abandonment, and (3) hedging to mitigate the medium- and long-term risks of abandonment and entrapment. The empirical evidence for this analysis was gathered through a qualitative analysis of European strategic documents, statements and policy decisions taken mostly during the period of the Biden administration. However, in light of the risk of a scaling-up of the alliance dilemma under the Trump administration, sources and evidence accessible by the end of January 2025 were included to illustrate the European approaches. In addition to publicly available documents and the sources mentioned above, this paper draws on conversations with policymakers and experts under the Chatham House rule. Mitigating risks from US–China competition: multilateralism instead of alignment That France, Germany and the UK are close allies with the US is clearly visible in their respective strategies on China, not least because of references they make to the importance of the alliance and their descriptions of their own positions between the two great powers. Overall, France, Germany and the UK share the perception of US–China competition and the emergence of blocs as potentially harmful to their interests. As a consequence, all three call for an inclusive multilateral order instead of falling into a logic of blocs, as the increasing competition is seen as a risk for Europe (Secrétariat général de la défense et de la sécurité nationale 2022, 9–15; The Federal Government of Germany 2020, 24–6; Government of the United Kingdom 2023, 22–6). The response of all three European powers to the emergence of blocs is multilateralism: instead of clearly aligning with the US, the French, German and British strategies call for building broader multilateral coalitions, which should, eventually, also include China (The Federal Government of Germany 2020, 23–6; Government of the United Kingdom 2023). The tone in Paris, Berlin and London towards Beijing has clearly changed over recent years; accordingly, the European capitals were also willing to support strong wording on China in the 2024 NATO summit declaration, which describes China as a ‘critical enabler’ of Russia’s ongoing war against Ukraine (NATO 2024). Albeit also recognised as a critical partner for key issues such as climate policy and trade, European states openly describe China as a ‘systemic rival’ and occasionally call out China’s behaviour, as they did, for example, in the case of a note verbale on the South China Sea (UN 2020). Nevertheless, Europe has not (yet) given in to US pressure to align with Washington’s more confrontational approach towards China (Etienne 2024). Even if European states and Washington have moved closer to each other, especially on economic security (Meyers and Reinsch 2023), the European positions on US–China competition demonstrate that Europeans are not willing to fully endorse or follow Washington’s approach—not least because European imports from China have increased in recent years (Lovely and Yan 2024). Managing the risk of short-term abandonment Since Trump’s election, the risk of abandonment by the US has been seen as increasingly high in Paris, Berlin and London.1 This is not least because Trump has openly questioned his willingness to adhere to Article 5 of the North Atlantic Treaty in the case of an armed attack on Europeans (Sullivan 2024). Europeans are especially concerned about issue linkage in this context, meaning that demands in a policy area other than security could be used as a condition. Concretely, Trump could use the threat of abandonment as leverage to compel Europe to align with the US on China policy.2 Barkin and Kratz (2025) suggest that Europe adopt a ‘carrot and stick’ approach, whereby Europe could start with an offer to the US: buying more liquified natural gas, defence goods and agricultural products from the US could mitigate the risk of abandonment. However, there is awareness among European states that coercion from the US to align on US–China policy, especially when linked to the threat of abandonment, might best be mitigated through enhancing European military capabilities—which would still leave the continent exposed to these threats, though to a lesser extent.3 Addressing the risk of medium- and long-term abandonment and entrapment: transatlantic hedging However, the risk of at least partial abandonment is not a new challenge for European strategy, and had already infused earlier strategic thinking. The shift of US strategic priorities away from Europe and to the Indo-Pacific has already been demonstrated in the allocation of resources to the different theatres. Moreover, European states have increasingly become aware that US forces will be withdrawn from their territories in the future and have concluded that they will have to step up their own commitment to European security (see Grand 2024). In parallel, there is an awareness in European capitals that showing more interest in the Indo-Pacific and giving more importance to policy on China is also a way for Europeans to demonstrate an understanding of their ally’s strategic priorities.4 Accordingly, the approaches of France, Germany and the UK to China and the Indo-Pacific also have to be understood as a commitment to the priorities of the US in order to keep this ally engaged in the European theatre and mitigate the risk of abandonment; however, European states abstain from fully aligning with the US approach, as their capabilities and strategic goals are perceived as diverging from those of the US. In this way, Europe aims to avoid entrapment over the medium term through slightly distancing itself from US policy. While all three European states also call for de-risking from China and diversification of their supply chains, maintaining strong economic ties with Beijing is a key component of their respective approaches—which contrasts with the US calls for decoupling. Furthermore, these states have never formally endorsed the US policy on China (Etienne 2024). Nevertheless, enhancing European capabilities would not only send a signal to Washington, but also qualify as hedging, understood as an ‘insurance policy’ to avoid a deterioration in US–Europe relations if the US opted for abandonment, or even as part of a move towards emancipation to reduce strategic dependencies on Washington (see Fiott 2018, 4–6). Conclusion: a transatlantic China challenge Designing their approaches to China and to US–China competition more broadly constitutes a complex strategic dilemma for European states. Paris, Berlin and London do not fully align with Washington’s approach, and it remains to be seen whether they will be willing to do so under the second Trump administration. To manage the risk of abandonment and entrapment, European states pursue different individual approaches to strategic hedging: their strategies on China and US–China competition are designed in a way that allows them to mitigate the risk of abandonment which might stem from significant transatlantic divergence, and to avoid automatic entrapment through their slight distancing from the US approach. From a theoretical perspective, this article has demonstrated that the alliance dilemma, along with the parallel fear of abandonment and entrapment by the US, is a major factor accounting for Europe’s limited strategies on China and its hedging behaviour. This article offers a conceptual analysis of the structural forces explaining European strategies, but other strategic cultures and relationships with the US could offer important complementary insights. To further analyse how individual European states design their strategies vis-à-vis China in light of the alliance dilemma and potential domestic constraints and specificities, neoclassical realism could offer an interesting analytical concept. This approach posits that structural forces set the parameters for foreign policy and treats domestic factors, including strategic culture, as intervening variables (see Rose 1998). Accordingly, it appears well suited for foreign policy analysis, and has indeed gained popularity in the field in recent years (see, for example, Martill and Sus 2024; Meibauer et al. 2021; Weber 2024). Empirically, this article constitutes a conceptual starting point rather than an exhaustive analysis of the strategy-making processes of European states with regard to China and US–China competition and makes a more comprehensive assessment desirable. The findings of this article have broader implications for policymaking. First, they demonstrate the necessity for Europe to determine its place in the increasing US–China competition. European coordination on the respective approaches vis-à-vis the US—especially in light of potential coercion to align—and China is of paramount importance to ensure that foreign policy strategies are mutually reinforcing and not undermining European objectives. Second, the article demonstrates that Europe currently responds to the ‘transatlantic China challenge’ through transatlantic hedging: while this strategy seems to be promising in the short term, it is questionable to what extent the strategy is sustainable and could help European states to navigate the parallel challenges of abandonment and entrapment. Unless Europe decides to fully align with the US—and it is questionable whether this decision would be in its interest—European states would be well advised to develop a sustainable long-term approach to China. A transatlantic dialogue on China, in which Europe and the US openly discuss synergies and divergences, could help prevent misunderstandings and decrease the risk of coercion or issue linkage due to a misreading of European approaches in Washington. Third, as the risks of (at least partial) abandonment and entrapment are systemic challenges due to the current composition of the transatlantic alliance, a logical step for European states to decrease their dependence on the US as the hegemon in the alliance would be to significantly strengthen European capabilities. Stronger military capabilities could help mitigate the ramifications of abandonment, and the aforementioned distinctly European strategy could allow Europe to avoid strategic entrapment in relation to China imposed by Washington. As Europe remains the junior partner in the transatlantic alliance, the parallel risks of abandonment and entrapment, as well as issue linkage, are highly likely to influence its approaches towards China in the long term, but there are certainly ways to render this ‘transatlantic China challenge’ less challenging. ORCID iDGesine Weber https://orcid.org/0009-0008-2643-0400Footnotes1. Conversation with French, German and British experts in Berlin, January 2025.2. Conversation with French, German and British experts in Berlin, January 2025.3. Conversation with French, German and British experts in Berlin, January 2025; conversation with European experts and officials in Paris, January 2025.4. Conversation with officials from Germany and France in Paris, November 2024; conversation with French, German and British experts in Berlin, January 2025.ReferencesBarkin N., Kratz A. (2025). Trump and the Europe–US–China Triangle. Rhodium Group, 16 January. https://rhg.com/research/trump-and-the-europe-us-china-triangle/. Accessed 18 January 2025.Demarais A. (2024). Divided we stand: The EU votes on Chinese electric vehicle tariffs. European Council on Foreign Relations, 9 October. https://ecfr.eu/article/divided-we-stand-the-eu-votes-on-chinese-electric-vehicle-tariffs/. Accessed 25 January 2025.Etienne P. (2024). The European Union between the United States and China: Should we choose between equidistance and following? Fondation Robert Schuman, 8 October. https://www.robert-schuman.eu/en/european-issues/763-the-european-union-between-the-united-states-and-china-should-we-choose-between-equidistance-and-following. Accessed 22 December 2024.Fiott D. (2018). Strategic autonomy and the defence of Europe. European Union Institute for Security Studies, Brief 12/2018. https://www.iss.europa.eu/sites/default/files/EUISSFiles/Brief%2012__Strategic%20Autonomy.pdf. Accessed 25 January 2025.García-Herrero A., Vasselier A. (2024). Updating EU strategy on China: Co-existence while de-risking through partnerships. Mercator Institute for China Studies. https://merics.org/en/external-publication/updating-eu-strategy-china-co-existence-while-de-risking-through-partnerships. Accessed 30 January 2025.Government of France. (2021). France’s Indo-Pacific strategy. https://www.diplomatie.gouv.fr/IMG/pdf/en_dcp_a4_indopacifique_022022_v1-4_web_cle878143.pdf. Accessed 31 January 2025.Government of the United Kingdom. (2021). Global Britain in a competitive age: The integrated review of security, defence, development and foreign policy. London: The Stationery Office. https://www.gov.uk/government/publications/global-britain-in-a-competitive-age-the-integrated-review-of-security-defence-development-and-foreign-policy. Accessed 18 January 2025.Government of the United Kingdom. (2023). Integrated review refresh 2023: Responding to a more contested and volatile world. London: The Stationery Office. https://www.gov.uk/government/publications/integrated-review-refresh-2023-responding-to-a-more-contested-and-volatile-world. Accessed 18 January 2025.Grand C. (2024). Defending Europe with less America. European Council on Foreign Relations, 3 July. https://ecfr.eu/publication/defending-europe-with-less-america/. Accessed 18 January 2025.International Monetary Fund. (2025). World economic outlook: GDP data mapper [Map]. https://www.imf.org/external/datamapper/NGDPD@WEO/OEMDC/ADVEC/WEOWORLD. Accessed 23 January 2025.Leoni Z. (2023). Grand strategy and the rise of China: Made in America. Agenda Publishing.Leoni Z., Tzinieris S. (2024). The return of geopolitical blocs. Survival, 66(2), 37–54.Lovely M. E., Yan J. (2024). As the US has relied less on imports from China, the EU has imported more. Pederson Institute for International Economics, 24 August. https://www.piie.com/research/piie-charts/2024/us-has-relied-less-imports-china-eu-has-imported-more. Accessed 22 December 2024.Lynch S., Toosi N., Moens B., Banco E. (2023). The U.S. wants Europe to stand up to China. Europe says: Not so fast. Politico, 3 August. https://www.politico.com/news/2023/03/08/us-europe-china-00086204. Accessed 18 January 2025.Martill B., Sus M. (2024). Winds of change? Neoclassical realism, foreign policy change, and European responses to the Russia-Ukraine War. British Journal of Politics & International Relations.McCurry J. (2023). France opposed to opening of Nato liaison office in Japan, official says. The Guardian, 7 June. https://www.theguardian.com/world/2023/jun/07/france-opposed-to-opening-of-nato-liaison-office-in-japan-official-says. Accessed 25 January 2025.Meibauer G., Desmaele L., Onea T., Kitchen N., Foulon M., Reichwein A., Sterling-Folker J. (2021). Forum: Rethinking neoclassical realism at theory’s end. International Studies Review, 23(1), 268–95.Meyers E., Reinsch W. A. (2023). The push for U.S.–EU convergence on economic security policy. Center for Strategic and International Studies, 7 July. https://www.csis.org/analysis/push-us-eu-convergence-economic-security-policy. Accessed 26 January 2025.NATO. (2024). Washington Summit declaration. https://www.nato.int/cps/cn/natohq/official_texts_227678.htm. Accessed 18 January 2025.Oertel J. (2023). Ende der China-Illusion: Wie wir mit Pekings Machtanspruch umgehen müssen. Munich: Piper Verlag.Pedersen R. B. (2023). Small states shelter diplomacy: Balancing costs of entrapment and abandonment in the alliance dilemma. Cooperation and Conflict, 58(4), 441–59.Politi A. (2023). The paradigm shift in EU–China relations and the limits of the EU’s current strategy towards China: A relational perspective. Asian Affairs 54(4), 670–93.Pottinger M., Gallagher M. (2024). No substitute for victory: America’s competition with China must be strategic and ideological. Foreign Affairs, 10 April. https://www.foreignaffairs.com/united-states/no-substitute-victory-pottinger-gallagher. Accessed 18 January 2025.Rose G. (1998). Neoclassical realism and theories of foreign policy. World Politics, 51(1), 144–72.Scazzieri L. (2025). Towards an EU ‘defence union’? Centre for European Reform, 30 January. https://www.cer.eu/publications/archive/policy-brief/2025/towards-eu-defence-union. Accessed 30 January 2025.Secrétariat général de la défense et de la sécurité nationale. (2022). Revue nationale stratégique 2022. https://www.sgdsn.gouv.fr/publications/revue-nationale-strategique-2022. Accessed 18 January 2025.Snyder G. H. (1984). The security dilemma in alliance politics. World Politics, 36(4), 461–95.Stockholm International Peace Research Institute. (n.d.). SIPRI Military Expenditure Database.Sullivan K. (2024). Trump says he would encourage Russia to ‘do whatever the hell they want’ to any NATO country that doesn’t pay enough. CNN, 11 February. https://edition.cnn.com/2024/02/10/politics/trump-russia-nato/index.html. Accessed 29 January 2025.Taylor R. (2024). UK government policy towards China. https://lordslibrary.parliament.uk/uk-government-policy-towards-china/. Accessed 18 January 2025.The Federal Government of Germany. (2020). Policy guidelines for the Indo-Pacific. www.auswaertiges-amt.de/blob/2380514/f9784f7e3b3fa1bd7c5446d274a4169e/200901-indo-pazifik-leitlinien–1–data.pdf. Accessed 21 December 2024.The Federal Government of Germany. (2023). China-Strategie der Bundesregierung. Berlin: Auswärtiges Amt. https://www.auswaertiges-amt.de/blueprint/servlet/resource/blob/2608578/810fdade376b1467f20bdb697b2acd58/china-strategie-data.pdf. Accessed 18 January 2025.UN (2020). Note verbale, UK NV No. 162/20, 16 September. https://www.un.org/Depts/los/clcs_new/submissions_files/mys_12_12_2019/2020_09_16_GBR_NV_UN_001.pdf. Accessed 25 January 2025.US Department of Defense. (2022). National Defense Strategy of the United States of America. https://media.defense.gov/2022/Oct/27/2003103845/-1/-1/1/2022-NATIONAL-DEFENSE-STRATEGY-NPR-MDR.pdf. Accessed 25 January 2025.Weber G. (2024). Zeitenwende à la française: Continuity and change in French foreign policy after Russia’s invasion of Ukraine. British Journal of Politics & International Relations.Wivel A., Bailes A. J. K., Archer C. (2014). Setting the scene: Small states and international security. In Archer C., Bailes A. J. K., Wivel A. (eds.), Small states and international security: Europe and beyond (pp. 3–25). London: Routledge.Wivel A., Thorhallsson B. (2018). Brexit and small states in Europe: Hedging, hiding or seeking shelter? In Rosamond B., Nedergaard P., Diamond P. (eds.), The Routledge handbook of the politics of Brexit, 1st edn. (pp. 266–77). Abingdon-on-Thames: Routledge.

Defense & Security
flag country Europe defense army

European Union Strategic Autonomy. Necessary but potentially problematic?

by Krzysztof Śliwiński

Abstract This paper examines the evolving concept of European Union Strategic Autonomy (EU-SA) within the context of contemporary geopolitical challenges, with a particular focus on EU-Russia and EU-China relations. EU-SA reflects the EU's aspiration to act independently in foreign policy, security, defence, and economic affairs, moving from a rule-taker to a rule-maker in global politics. The study outlines the historical development of EU-SA from 2013 to the present, highlighting key milestones such as the Strategic Compass and the impact of the Ukraine War, which accelerated efforts toward defence collaboration, energy independence, and economic resilience. It explores the transatlantic dynamics, noting growing uncertainties in the U.S. commitment to NATO and the resulting push for a more autonomous European defence posture. Additionally, it addresses the complex EU-China relationship, marked by both cooperation and competition, as well as the strained EU-Russia ties amid ongoing conflict. The paper concludes by questioning the economic feasibility and political risks of deeper EU strategic autonomy, especially regarding security centralisation and Germany's leadership role. Key Words: EU, Strategic Autonomy, Security, Geopolitics, U.S, China, Russia Introduction At the 2025 North Atlantic Treaty Organisation (NATO) Summit in The Hague, member states (Allies) committed to investing 5% of their Gross Domestic Product (GDP) annually in core defence requirements and defence- and security-related spending by 2035. They will allocate at least 3.5% of GDP annually, based on the agreed-upon definition of NATO defence expenditure, by 2035 to resource core defence requirements and meet the NATO Capability Targets. Allies agreed to submit annual plans that show a credible, incremental path to achieving this goal.[1] At the same time, Spain secured a special compromise, committing to meet core requirements with just 2.1% of GDP, making it the only exception to the broader 5% target. Previously, in 2014, NATO Heads of State and Government had agreed to commit 2% of their national GDP to defence spending, to help ensure the Alliance's continued military readiness. This decision was taken in response to Russia's illegal annexation of Crimea, and amid broader instability in the Middle East. The 2014 Defence Investment Pledge was built on an earlier commitment to meeting this 2% of GDP guideline, agreed in 2006 by NATO Defence Ministers. In light of the increase in defence spending, given that 23 out of 32 NATO Allies are EU member states, the idea of European Union strategic autonomy (EU-SA) comes to mind. This paper will explore the issue of EU-SA with a specific reference to EU-Russia and EU-China relations.[2] A Brief History of EU Strategic Autonomy European Union strategic autonomy is an evolving concept that reflects its ambition to act independently in strategically important policy areas, including foreign policy, security, defence, and economic relations. Strong strategic autonomy, according to Barbara Lippert, Nicolai von Ondarza and Volker Perthes, means being able to set, modify and enforce international rules, as opposed to (unwillingly) obeying rules set by others. The opposite of strategic autonomy is being a rule-taker, subject to strategic decisions made by others, such as the United States, China, or Russia.[3] The concept was first prominently discussed in the context of defence in 2013 and has since expanded to encompass a broader range of policy areas. Historically speaking, one can identify numerous phases during which EU-SA evolved. - 2013-2016: During this period, EU-SA focused on security and defence, with initiatives like the Permanent Structured Cooperation (PESCO) and the European Defence Fund, aiming to strengthen the EU's defence capabilities.[4]  - 2017-2019: During this period, the EU-SA shifted its focus to defending European interests in a hostile geopolitical environment, influenced by events such as Brexit, the Trump presidency, and China's growing assertiveness.- 2020: The COVID-19 pandemic highlighted economic vulnerabilities, prompting a focus on mitigating dependence on foreign supply chains, particularly in critical sectors like health and technology.- Since 2021: The scope widened to virtually all EU policy areas, including digital, energy, and values, with terminology evolving to include "open strategic autonomy," "strategic sovereignty," "capacity to act," and "resilience".- 2022: The Ukraine War and Accelerated Implementation. Russia's invasion of Ukraine catalysed concrete actions toward EU-SA, notably in defence, energy independence, and economic resilience. The European Council's Versailles Declaration (March 2022) expressed strong political will to increase EU-SA, calling for collaborative investments in defence, phasing out dependency on Russian energy, and reducing reliance on critical raw materials, semiconductors, health, digital technologies, and food imports.[5] - The Strategic Compass for security and defence policy (endorsed March 2022) outlines a roadmap to 2030, emphasising strengthened EU defence capacities. Among others, it includes: o   Establishment of a strong EU Rapid Deployment Capacity of up to 5000 troops for different types of crises.o   Ready to deploy 200 fully equipped Common Security and Defence Policy (CSDP) mission experts within 30 days, including in complex environments.[6]o   Conducting regular live exercises on land and at sea.o   Enhanced military mobility.o   Reinforcement of the EU's civilian and military CSDP missions and operations by promoting a rapid and more flexible decision-making process, acting more robustly and ensuring greater financial solidarity.o   Making full use of the European Peace Facility to support partners.[7] According to the EU itself, the EU-SA is not a zero-sum game, but rather a sliding scale between complete autonomy and full dependency, with different results for different policy areas. What is more, when compared to the famous Maslow's hierarchy of needs (European Parliament briefing's language), the EU is not only perceived as an economic power, but it is also seen as a normative power. Therefore, the EU is recognised for its core values of democracy, human rights and the rule of law. Ultimately, Maslow's “self-actualisation” could mean the achievement of an EU in which citizens recognise their European identity and which has realised its full autonomous policy potential.[8]   As if this is not enough, the same source introduces the concept of the 360° strategic autonomy wheel, which reportedly illustrates policy areas in which the EU aims for greater strategic autonomy, as well as the connections between them. Mutual influence between policy areas can happen across the wheel, but is particularly strong in adjacent areas. Military action, for example, can cause migration, health is linked to food quality, energy policy influences the climate, and misinformation undermines democracy. The wheel can help to understand links, set priorities and view potential conflicts. More autonomy in the digital green economy will, for example, require vast quantities of “rare earth” materials, making the EU more (instead of less) dependent on imports. Reductions in energy consumption achieved through the digitalisation of the economy (for example, by reducing transport) will be partly offset by the increase in energy consumption by electronic devices and data centres.   Global Context The significance of EU-SA lies in ensuring the EU's political survival and global influence in a multipolar world where its relative power is diminishing. The EU's long-term economic outlook is bleak: its share of global GDP, now at 17% (at current prices), could nearly halve by 2050. According to the World Economic Forum, this economic backsliding not only threatens Europe's ability to fund its social model but also risks weighing on the bloc's global influence, leaving it even more dependent on the U.S. and China.[9] Moreover, the COVID-19 pandemic highlighted the conflictual nature of economic interdependence, as reliance on foreign supply chains for critical goods exposed vulnerabilities. Soft power has become an instrument of hard power, necessitating autonomy in trade, finance, and investment.  The U.S.'s strategic pivot to Asia, the exclusion of Europe in conflicts like Nagorno-Karabakh, Libya, and Syria (termed Astanisation[10], which favours Russia and Turkey), the sidelining of the EU in EU-Russia negotiations regarding the war in Ukraine, and China's state-led economic model have all pushed the EU towards the sidelines. Transatlantic divide Security is a critical dimension, with significant uncertainty surrounding the U.S. commitment to NATO under the Trump administration. Reports indicate Trump has questioned NATO's Article 5 guarantees, with actions like withdrawing military personnel from a Ukraine aid hub in Poland on April 8, 2025, and proposing to stand down 10,000 light infantry troops in Poland, Romania, and the Baltic states by 2025.[11] This has led to fears of a "NATO-minus" scenario, where the EU must fill security gaps without full U.S. backing. In response, the EU is pushing for greater strategic autonomy in defence. Initiatives like ReArm EU are mentioned, with calls for the EU to develop a stand-alone, integrated military capacity to stabilise the global economy. As Jean-Pierre Maulny, Deputy Director of the French Institute for International and Strategic Affairs (IRIS), adequately observes "The risk is now clear: a form of bilateral agreement between the United States and Russia, benefiting the interests of both countries, could leave Ukraine severely weakened and an easy prey for Moscow, thereby weakening other European countries consequently. As a consolation prize, we will have to ensure Europe's conventional security, as U.S. Secretary of Defence Pete Hegseth announced to Europeans at the opening of the NATO ministerial meeting held in Brussels on 12–13 February 2025. This situation will place Europeans in a terrible dilemma: Either they do not wish to provide security guarantees to Ukraine and risk completely discrediting themselves in the eyes of powers such as the United States, Russia, and China, as Europeans will have demonstrated that they are unable to defend the continent, while also creating a significant long-term risk to Europe's security. Alternatively, they could provide security guarantees to Ukraine, accepting the financial burden that would impact the European Union's long-term competitiveness. In light of this situation, some advocate for the establishment of a European pillar within NATO. If one considers that the United States is negotiating peace in Europe without and against the Europeans, and that they no longer wish to defend Europe with conventional military means (will they respect the NATO Defence Planning Process?), Europeans should take on Europe's security fully. This would mean taking control of NATO. It will also be easier to make NATO and the European Union work together with a more Europeanised organisation".[12] Economically, there are several issues that contemporary demand addresses, but the most pressing is, of course, the Tariffs. The U.S. and European Union are running out of time to strike a deal on trade tariffs. Negotiations have been slow since both the U.S. and EU temporarily cut duties on each other until July 9. If an agreement is not achieved by then, full reciprocal import tariffs of 50% on EU goods, and the bloc's wide-spanning countermeasures are set to come into effect.[13] According to Almut Möller, Director for European and Global Affairs and head of the Europe in the World programme (European Policy Centre), "for the first time in decades, Europeans can no longer rely on a benign partner on the other side of the Atlantic, leaving them dangerously exposed and acutely vulnerable, including on the very foundations of liberal democracy. Until recently, the U.S. dominated a world order that provided a favourable environment for the EU to extend its membership, further develop, and leverage its strengths, particularly as a trading power, without having to worry much about geopolitics. Suddenly, liberal Europe looks very lonely, and is struggling to keep up with a world of change".[14] Other problems arguably include digital regulation and data protection, antitrust policy and digital taxation, fiscal policy and social protection, geopolitical rivalries, China's rise, and competition and trade policy. EU–China conundrum Both the EU and the U.S. are concerned about China's growing economic and technological influence, but they have differing approaches to addressing this challenge. The EU has sought to maintain a balance between cooperation and competition with China, while the U.S. has adopted a more confrontational approach.[15] These differences have led to tensions in areas such as trade policy and technology regulation. For example, the EU has been critical of the U.S.'s unilateral approach to addressing China's trade practices, while the U.S. has accused the EU of being too lenient towards China. These disagreements have made it difficult to achieve a coordinated transatlantic response to China's rise.[16] According to German experts, the balance of power between China and the EU and its member states is developing increasingly asymmetrically to Europe's disadvantage. Only in trade policy – and partially in investment – can the EU maintain its position in a manner respected by China.[17] Europe holds significant importance for China across various dimensions: economically, as its top supplier and second-largest export destination; technologically, as a source of advanced technology; institutionally, as a model to emulate; politically, to advance its objectives concerning other nations, particularly the United States; and selectively, as a collaborator in areas like global health and regional stabilisation. Unlike Russia and the United States, China perceives a vital interest in the EU's continued existence and unity within a multipolar world; yet, it employs a "divide and rule" strategy. China selectively rewards or penalises individual EU countries based on their political and economic significance and their compliance with China's expectations on key issues. These issues include arms sales to Taiwan, meetings with the Tibetan Dalai Lama, and positions on the Uighurs, human rights in China, and the South China Sea. China engages with Europe on multiple levels — political, economic, technological, cultural, and academic — using various political channels (such as strategic partnerships with the EU and individual EU member states), dialogue formats (like the 16+1 format with sixteen Central and Eastern European countries), and high-level bilateral intergovernmental consultations with Germany, France, and the United Kingdom. China's hopes that the European Union would emerge as an independent and comprehensive player in global politics, serving as a counterbalance to the United States, have diminished. However, China would be supportive of any European efforts towards achieving strategic autonomy, provided it does not translate into a confrontational approach towards China itself. In contrast, Europe's political priorities—such as ensuring peace and stability in East Asia, China's role in global stability, development, environmental issues, climate change, and non-proliferation, as well as improving human rights in China — are often considered secondary and are not actively pursued by all EU member states. Europe lacks a unified and assertive foreign policy stance regarding the geopolitical rivalry between the United States and China for dominance in the Asia-Pacific region. There is also an absence of a clear position on China's authoritarian vision of order. Even in trade and investment disputes, Europe struggles to establish a unified approach to resolving these issues. The EU member states are too diverse in terms of size, profiles, and interests in their dealings with China: Economically, there is a divide between countries that are appealing industrial and technological partners for China and those that compete for favour in Beijing. Some nations have a clear interest in global governance. Additionally, the United Kingdom and France maintain their respective military presences in the Asia region. In this context, ReArm EU and its financial instrument SAFE (analysed here https://worldnewworld.com/page/content.php?no=5384 ) have the potential to provide the EU with meaningful strategic autonomy and invite genuine geopolitical actorness. EU–Russia conundrum Since Donald Trump took office as the U.S. president, the coordination of transatlantic policies regarding Russia has largely disintegrated. The White House's openness to a comprehensive "deal" with Russian President Vladimir Putin contrasts with Congress's attempts to limit Trump's foreign policy options with Russia, resulting in the marginalisation of coordination with European allies. This situation is further complicated by Washington's increasing reliance on extraterritorial sanctions, a trend that began before Trump's presidency. Consequently, according to European foreign and security experts, Europe must achieve greater strategic autonomy in its dealings with Russia. However, this relationship is particularly strained by significant conflicts of interest. Russia's invasion of Ukraine significantly disrupted the previously peaceful and liberal democratic relations among European nations. Putin's "special military operation" compelled the EU to introduce seventeen (so far) escalating economic sanction packages aimed at undermining the Russian economy and ultimately limiting Russia's capacity to continue the war. In a gesture of solidarity with Ukraine, the EU has also allocated billions of euros to both EU member states and Ukraine to avert a humanitarian disaster and ensure the provision of essential needs for Ukrainians fleeing the conflict.[18] After three and a half years from the outset of the war, Russia continues to pose a complex challenge that the EU and European nations cannot address independently in the foreseeable future. If the U.S. security guarantee weakens before Europe can bolster its own capabilities, the EU could face new vulnerabilities that Russia might exploit along its external borders, such as in the Baltic states, and elsewhere. Currently, the EU and its member states lack sufficient means to deter Russia from pursuing its interests aggressively and recklessly in the shared neighbourhood.[19] Critics, on the other hand, argue that calls for EU strategic autonomy, particularly the creation of a European Army and a significant increase in military spending, are a double-edged sword. First, the primary official rationale is that the EU must prepare itself for a possible attack on EU member states by Russia. The legacy media are full of European leaders claiming that Russia will sooner or later attack Europe.[20] Yet, this claim is not substantiated with much evidence. The proponents of the European army completely disregard numerous doubts surrounding the 2013/2014 "Euromaidan" and the role of the CIA in the events.[21] Second, according to the Office of the High Commissioner for Human Rights (OHCHR) 's estimations, the total number of conflict-related casualties in Ukraine from April 14, 2014, to December 31, 2021, stood at 51,000 – 54,000. These numbers are broken down as follows: 14,200 - 14,400 killed (at least 3,404 civilians, estimated 4,400 Ukrainian forces, and estimated 6,500 members of armed groups), and 37,000 - 39,000 injured (7,000 – 9,000 civilians, 13,800 – 14,200 Ukrainian forces and 15,800 - 16,200 members of armed groups).[22] In short, the situation was chaotic, with many casualties among civilians. Third, it was allegedly Europeans who torpedoed a first chance of peace negotiations as early as April 2014 in Istanbul.[23] Fourth, many European leaders seem to be utterly oblivious to the fact that the prolongation of the war adds to the destruction of Ukraine and Ukrainian society, deaths and emigration. Last but not least, given the fact that it is Germany that calls for both the European Army and the federalisation of Europe (with some assistance from France), one should be extra careful given the role of Germans during the WWII and the fact that neither has there been any official peace treaty with Germany nor have they recompensated countries such as Poland. Conclusion Strategic autonomy may be a necessity for Europe, given the dynamics of transatlantic relationships. The questions, however, that have to be pondered (and it does not seem that anyone in the legacy media or mainstream academia is ready to ask them) are numerous. Who will pay for that? Can Europeans afford such expenses under the current economic circumstances, and even worse economic prospects? Is the centralisation of security and military a Pandora's box? Should Europeans allow Germany (of all EU member states) to take special responsibility for this project? Isn't the pro-war rhetoric of Western political leaders making relations with Russia even more tense and dangerous, in other words, leading to escalation? History has solemnly proven that when left to their own devices, the Europeans inevitably create disastrous conflicts that have lasting consequences for generations. The American pivot to Asia and the consequent withdrawal from Europe may therefore have tragic ramifications for the European continent. References[1] Defence expenditures and NATO’s 5% commitment. (2025, June 27). North Atlantic Treaty Organization. https://www.nato.int/cps/en/natohq/topics_49198.htm[2] NATO and the EU have 23 members in common: Belgium, Bulgaria, Croatia, Czechia, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Italy, Latvia, Lithuania, Luxembourg, the Netherlands, Poland, Portugal, Romania, Slovakia, Slovenia, Spain and Sweden. See more at: https://www.consilium.europa.eu/en/policies/eu-nato-cooperation/#0[3] Lippert, B., von Ondarza, N., & Perthes, V. (2019, March). European Strategic Autonomy. Actors, Issues, Conflicts of Interests. Stiftung Wissenschaft Un Politic. Deutches Institut für Politik Und Sicherheit. https://www.swp-berlin.org/ doi:10.18449/2019RP04/#hd-d14204e263[4] Damen, M. (2022, July). EU strategic autonomy 2013-2023: From concept to capacity (EU Strategic Autonomy Monitor). European Parliamentary Research Service. https://www.eprs.ep.parl.union.eu[5] Informal meeting of the Heads of State or Government Versailles Declaration. (2022, March 10–11). Stiftung Wissenschaft Un Politic. Deutches Institut Fur Politik Und Sicherheit. https://www.consilium.europa.eu/media/54773/20220311-versailles-declaration-en.pdf[6] See more at: https://www.eeas.europa.eu/eeas/csdp-structure-instruments-and-agencies_en[7] See more at: https://fpi.ec.europa.eu/what-we-do/european-peace-facility_en[8] Damen, M. (2022, July). EU strategic autonomy 2013-2023: From concept to capacity (EU Strategic Autonomy Monitor). European Parliamentary Research Service. https://www.eprs.ep.parl.union.eu[9] Open but Secure:  Europe’s Path to Strategic Interdependence. INSIGHT REPORT. (2025). World Economic Forum. https://reports.weforum.org/docs/WEF_Open_but_Secure_Europe%E2%80%99s_Path_to_Strategic_Interdependence_2025.pdf[10] In reference to the Astana format on Syria) which leads to the exclusion of Europe from the settlement of regional conflicts in favour of Russia and Turkey. See more: https://www.eeas.europa.eu/eeas/why-european-strategic-autonomy-matters_en[11] Tilles, D. (2025, April 8). US to withdraw military from Ukraine aid hub in Poland. Notes from Poland. https://notesfrompoland.com/2025/04/08/us-to-withdraw-military-from-ukraine-aid-hub-in-poland/[12] Maulny, J.-P. (2025, February 13). United States – Europe: Our Paths Are Splitting. The French Institute for International and Strategic Affairs (IRIS). https://www.iris-france.org/en/united-states-europe-our-paths-are-splitting/[13] Kiderlin, S. (2025, June 18). These are the sticking points holding up a U.S.-EU trade deal. CNBC. https://www.cnbc.com/2025/06/18/these-are-the-sticking-points-holding-up-a-us-eu-trade-deal.html#:~:text=The%20EU%20and%20US%20flags,Poland%20on%20March%206%2C%202025.&text=Afp%20%7C%20Getty%20Images-,The%20U.S.%20and%20European%20Union%20are%20running%20out%20of%20time,($1.93%20trillion)%20in%202024?[14] Möller, A. (2025, February 26). Europe in the World in 2025: Navigating a perilous world with realism and ambition. European Policy Centre. https://www.epc.eu/publication/Europe-in-the-World-in-2025-Navigating-a-perilous-world-with-realism-625da4/#:~:text=2025%20will%20be%20a%20year,with%20a%20world%20of%20change[15] Bradford, A. (2023). When Rights, Markets, and Security Collide (pp. 221–254). Oxford University Press. https://doi.org/10.1093/oso/9780197649268.003.0007[16] Portanskiy, A. (2023). UE - US: new barriers to trade. Современная Европа. https://doi.org/10.31857/s020170832304006x[17] Lippert, B., von Ondarza, N., & Perthes, V. (2019, March). European Strategic Autonomy. Actors, Issues, Conflicts of Interests. Stiftung Wissenschaft Un Politic. Deutches Institut für Politik Und Sicherheit. https://www.swp-berlin.org/ doi:10.18449/2019RP04/#hd-d14204e263 [18] Klüver, L. (2025, April 18). Putin’s War on Ukraine: What can the EU actually do? European Careers Association. https://ecamaastricht.org/blueandyellow-knowyourunion/putins-war-on-ukraine-what-can-the-eu-actually-do#:~:text=Similarly%2C%20the%20Strategic%20Compass%2C%20the%20most%20recent,its%20interests%20and%20promote%20its%20values%20internationally.[19] Lippert, B., von Ondarza, N., & Perthes, V. (2019, March). European Strategic Autonomy. Actors, Issues, Conflicts of Interests. Stiftung Wissenschaft Un Politic. Deutches Institut für Politik Und Sicherheit. https://www.swp-berlin.org/ doi:10.18449/2019RP04/#hd-d14204e263 [20] ochecová, K. (2025, February 11). Russia could start a major war in Europe within 5 years, Danish intelligence warns. Politico. https://www.politico.eu/article/russia-war-threat-europe-within-5-years-danish-intelligence-ddis-warns/[21] Katchanovski, I. (2024). The Maidan Massacre in Ukraine The Mass Killing that Changed the World. Palgrave Macmillan. https://doi.org/https://doi.org/10.1007/978-3-031-67121-0[22] Office of the United Nations High Commissioner for Human Rights. (2022, January 27). Conflict-related civilian casualties in Ukraine: December 2021 update. United Nations Human Rights Monitoring Mission in Ukraine. https://ohchr.org[23] Johnson, J. (2022, May 6). Boris Johnson Pressured Zelenskyy to Ditch Peace Talks With Russia: Ukrainian Paper. Common Dreams. https://www.commondreams.org/news/2022/05/06/boris-johnson-pressured-zelenskyy-ditch-peace-talks-russia-ukrainian-paper

Defense & Security
Main img

Gaza 2023-2025: Israel, Hamas and the shadow of the U.S.

by Javier Fernando Luchetti

한국어로 읽기 Leer en español In Deutsch lesen Gap اقرأ بالعربية Lire en français Читать на русском Introduction Strategically located on the eastern shore of the Mediterranean, the Gaza Strip is a crucially important enclave in the Levant. Its proximity to Israel and Egypt places it in an area of high strategic sensitivity, and it is deeply involved in the decades-long Israeli-Palestinian conflict. Territorial disputes, rooted in sovereignty claims, overlap with the involvement of international actors with different economic and strategic interests.This territory, which is no more than 12 kilometers wide and a little more than 40 kilometers long, has been the scene of a confrontation between the State of Israel and the political, military and social organization Hamas (Harakat al-Muqawama al-Islamiya, Islamic Resistance Movement) for the last two years. In this war scenario, three main actors can be mentioned. On the one hand, the State of Israel, created in 1948, which has a great military and technological capacity thanks to the help of the United States. Israel distinguishes that Hamas is a permanent threat to the Israelis, hence its policy of land, naval and maritime blockade, arguing that it must defend itself from the aggressions of this group which has repeatedly launched missiles in this century. Secondly, Hamas, an organization created in 1987 during the first Intifada (rebellion or uprising), which exercises control of the Gaza Strip and leads the resistance to the State of Israel seeking the creation of a Palestinian State. Hamas' capabilities range from military development with the launching of missiles, to public administration and social work in the area. Third, the United States is an external actor in the region, but one that wields considerable influence, for while it sees itself as an arbiter in the Israeli-Palestinian issue, it has done little more than deploy over the decades military, political and financial support for the State of Israel. The choice of the period of analysis from 2023 to early 2025 is due to the succession of events in the area that have demanded specific attention, since the military escalation has denoted a more radical change in the posture of the main actors. Given this situation, the central research question is the following: How have the power dynamics between Israel, Hamas and the United States manifested themselves in the Gaza Strip during the period 2023-2025, and what have been the main implications of their actions. Hence, the main objective of this paper is to analyze the interactions between these three main actors from 2023 to early 2025. Israel, founded in 1948 and with great military and technological power thanks to U.S. support. Hamas, established in 1987, controls the Gaza Strip and leads the resistance, seeking the creation of a Palestinian state that does not recognize Israel. The United States, while presenting itself as an arbiter, has historically provided substantial military, political and financial support to Israel. The October 7, 2023 Hamas's attack, "Operation Al-Aqsa Storm," provoked the Israeli "Iron Swords" counteroffensive. This response included heavy aerial and ground bombardment throughout Gaza, causing widespread destruction and a severe humanitarian crisis. Israel seeks to dismantle Hamas' military capability, eliminate its leadership and release hostages, in addition to the establishment of a security zone. The U.S. position under the administrations of Joseph Biden and Donald Trump has been supportive of Israel, justifying its right to defend itself. However, concerns about civilian casualties and the humanitarian crisis in Gaza have led to calls for "humanitarian pauses." The "cease-fire" that is announced from time to time has not served to definitively stop the fighting; on the contrary, after its termination, the Israeli Defense Forces continue to gain ground. The fighting between Israel and Hamas in the Gaza Strip Israel's blockade of the Gaza Strip has been imposed since 2007, and its level of intensity has varied over the years, but what has not changed is the justification for it, which is related to security issues, to prevent the entry of arms and supplies that could be used by Hamas to attack Israeli territory. According to the State of Israel, the air, naval and land blockade is a fundamental part of its defense to protect its people from rockets launched from the Gaza Strip. On the other hand, the Hamas takeover came after Fatah (Palestine National Liberation Movement, a Palestinian political and military organization founded in the late 1950s, and a leading member of the Palestine Liberation Organization, PLO) lost the 2006 parliamentary elections, and Hamas fighters fought against them. Both parties claim to represent the Palestinians. The battle won by Hamas meant the dissolution of the existing unity government and the division of the Palestinian territories: West Bank for Fatah and the Gaza Strip for Hamas. Hamas' stated goal is the creation of a Palestinian state occupying the entire territory of Palestine, which means non-recognition of the State of Israel. The region has been characterized by rocket fire from Gaza into Israel and Israeli military incursions into Gaza, all within the framework of the Israeli naval, land and sea blockade, although Hamas rearmament has continued due to tunnels linking Gaza to Egypt. Background to the escalation of Violence The escalation of violence between Palestinians and Israelis in 2023, has been a process of accumulation of facts between both parties for decades. One of them has been the stalemate of the Peace Process that has promoted a radicalization of the parties' positions encouraging armed struggle. Secondly, the increasing expansion of Israeli settlements in the West Bank, considered illegal by a large part of the international community, which causes, on the one hand, the fragmentation of Palestinian sovereignty in the territory due to the inability to establish a related communication infrastructure between Palestinian lands, and on the other hand, resentment towards the Israeli occupation, which manifests itself in an armed resistance that is seen as the only solution in the absence of a political settlement. Thirdly, the problem of Jerusalem and the Holy Places (Al-Aqsa Mosque, the Dome of the Rock and other mosques), where there are restrictions on entering the mosque area by Israeli security. This is seen as a violation of religious rights. Jerusalem is claimed to be the capital of the future Palestinian state. Israel denies this because it declared it as the eternal and indivisible capital in 1980 through a law passed by the Knesset (Assembly).Fourthly, the blockade of the Gaza Strip with the resulting humanitarian crisis has generated a lot of poverty, high unemployment, limited access to basic services such as water, electricity and health, which has increased the radicalization of the population.Fifth, the situation of Palestinian prisoners in Israeli jails, some of whom have no open criminal cases, whereby hunger strikes and the conditions in which they live are a cause for protest by Palestinians in Gaza and the West Bank. Finally, the competition between Hamas and Fatah, one in Gaza and the other in the West Bank, only encourages violence to see who represents the Palestinians more, i.e., to settle the representation of the Palestinian people, thereby increasing attacks on Israel, which in turn responds militarily: "Israeli forces need to wrest territorial control from Hamas to demonstrate to Palestinians in Gaza and the West Bank that they do not guarantee their security from Israel, just as Hamas's assault has called into question Israeli confidence in its Armed Forces" (Arteaga, 2023, 3). Israel may not need to occupy the entire Gaza Strip, but what it needs is to "dismantle as much of Hamas' military prestige as it can to challenge its Palestinian leadership, otherwise Hamas will increase its ability to influence the rest of the factions in Gaza and the West Bank to the detriment of the Palestine Liberation Organization (PLO)" (ibidem). Hamas attack on Israel in 2023 During 2023, incidents in the Jerusalem area in front of mosques increased, prompting Israeli security forces to intervene, with Palestinians considering it an attack on all Muslims. Simultaneously, Israeli attacks on the West Bank increased to dismantle cells considered terrorists hiding in refugee camps or villages. Israeli settlers living in the West Bank also attacked Palestinian communities, causing damage and casualties. Israeli targeted assassinations of militants in Gaza or the West Bank, leading to hunger strikes in prisons and rebellions by the Palestinian population, should be placed in this context.Faced with this situation, on October 7, 2023, Hamas developed the operation "Al-Aqsa Storm" which involved the infiltration and coordination of fighters using paragliders, attacking Israeli security posts and using boats to infiltrate Israeli communities near the Gaza Strip. The attacks were carried out on villages, military bases, including a music festival, resulting in an estimated death toll of more than 1,200 Israelis and 250 prisoners of whom more than 50 remain in Hamas hands. The release of the hostages has been a strategy to obtain the release of Palestinian prisoners in Israeli jails. Israel's response The Israeli counter-offensive, called "Iron Swords", included intensive aerial bombardments against Hamas military targets in the Gaza Strip, but affected thousands of Palestinian civilians who were killed or wounded and their homes destroyed. The Israelis mobilized reservists for an all-out offensive against the entire Gaza Strip to completely eliminate Hamas, while imposing a total blockade on the supply of water, food, medicine and fuel, increasing the already humanitarian crisis. The destruction reached Hamas military infrastructure and civilian infrastructure such as public buildings, through ground and naval artillery and aerial bombardment. The Israeli ground incursions reached the entire Gaza Strip, because they are aimed at dismantling Hamas' military capacity, tunnels, missile launcher bases, supply sites, arsenals, etcetera. They also aim to dismantle Hamas by eliminating its leaders and the militants responsible for the offensive, to rescue the Israeli hostages, and to establish a future security zone to prevent further Palestinian attacks. Israel has been criticized for the disproportionate response of the Israel Defense Forces (IDF) to the Hamas attack, the failure to distinguish between civilian and military targets and to plan the attacks in such a way as to avoid civilian casualties. Israel has responded that Hamas uses the civilian population as a shield, and that the territory is densely populated so that war casualties could not be avoided, however, despite having the advantage in war material, so far it has not been enough to defeat Hamas militarily. Guerrilla warfare is the tactic employed by Hamas and that has been a complication for Israel, as it had been for the United States in Afghanistan and Iraq. In addition, Hamas blends in among civilians making it even more difficult to locate its fighters, while the Israeli response causes collateral damage among civilians and what little infrastructure is left standing after nearly two years of conflict: "Gaza's demographic characteristics as a 'soft' factor are an advantage against Israel's 'hard' capabilities, where Hamas operatives can intrude into the population to set up ambushes against IDF armored columns" (Trujillo Borrego, 2025, 16). The government of Benjamin Netanyahu gained a great deal of public support for the military operation, however, the rising number of casualties along with the destruction caused in Gaza, brought down support. The families of the hostages are urging the government to enter into negotiations with Hamas to get them back, which clashes with the government's objectives. The mobilization of the reservists, together with the prolongation of the war, has generated social and economic problems, questioning the Netanyahu government, and also the intelligence agencies that were surprised by the preparation and the surprise of the Hamas attack. The position of the United States Historically, the United States has supported Israel economically, politically and militarily based on strategic and geopolitical interests. The Israeli lobby in the US Congress, the veto to UN Security Council Resolutions and the presidential statements, have strengthened the bond between both countries: "Israel remains the main recipient of US aid, an aid that has allowed it to transform its Armed Forces and maintain the "qualitative military edge" (QME) against its neighbors. It has always been guaranteed by the US Congress and has had the support of both major parties, in part thanks to the promotion at the domestic level of organizations in defense of Israel since the Yom Kippur War in 1973 (García Encina, 2023, 3). The US justification during the administration of President Joseph Biden (2021-2025), was that Israel had the right to defend itself by condemning Hamas in solidarity with its traditional ally. Support was maintained until the US administration began to worry about civilian casualties and the humanitarian crisis. Hence the calls for a "humanitarian pause" and a "cease-fire" for the hostage exchange. The position of current US President Donald Trump has been one of absolute support for Israel. While he has stated that "a lot of people are starving" and that "bad things are happening", his relationship with the Israeli Prime Minister has not changed despite mentioning that humanitarian aid is needed. In that sense, he has stated that Hamas has to be completely disarmed in order for the Gaza Strip to be a territory without weapons. Also, one of his proposals is that the United States take control of Gaza and relocate Palestinians to other countries because it is a pile of rubble, violating international law by the principle of self-determination of peoples and determining a forced displacement of Palestinians: “Despite its support for a two-state solution, the lack of effective pressure on Israel and the focus on Israeli security over justice for Palestinians have hindered significant progress toward peace. U.S. policy in the region has oscillated between attempts at mediation and unconditional support for Israel, making it impossible for the U.S. to act as an impartial mediator.” (Donoso, 2025, pp. 27–28) However, Trump has hinted at Israel's unwillingness to negotiate an end to the war, and has expressed that hunger should not be used as a weapon. In addition, he has lifted sanctions against a historical enemy of Israel, Syria, whose president Ahmed al-Sharaa, was linked to Al Qaeda, although he now belongs to another group called Hayat Tahrir al Sham (HTS) (Organization or Life for the Liberation of the Levant). Israel has opposed the lifting of sanctions and has bombed Syria. Trump’s tour of the Middle East this past May demonstrated that the Israeli-Palestinian conflict has taken a back seat due to the intransigence of both Hamas and Israel. For this reason, the U.S. president—who did not visit Israel—traveled to Saudi Arabia, Qatar, and the United Arab Emirates, seeking to invest in the oil sector and encouraging those countries to invest in the United States or purchase American products. For example, Saudi Arabia agreed to buy $142 billion worth of military equipment, including missiles, communication systems, and more. The total deal amounts to $600 billion, covering trade, investments, and arms purchases. Meanwhile, in contrast to the U.S. position of keeping control over the Gaza Strip, there is another initiative led by regional countries such as the United Arab Emirates to invest in Gaza’s reconstruction—without relocating Gazan residents to other countries in the region. Final Considerations The Gaza Strip, a narrow territory located on the eastern shore of the Mediterranean, stands as an epicenter of the Israeli-Palestinian conflict. Surrounded by Israel and Egypt, it represents a strategic geographic point in the region, and has witnessed violence, blockades and a complex interplay between local, regional and international actors, with Israel, Hamas and the United States playing crucial roles. Israel has exerted overwhelming influence with ground and aerial bombardments throughout the Strip to not only eliminate Hamas, but also to secure the release of the hostages. Although at the beginning Israeli society supported this campaign, the cost in lives is being negatively evaluated, in addition to the call for reservists. This call-up has damaged the Israeli economy by extracting more than 300,000 reservists, affecting the labor force in different sectors of the economy. Israel, supported by the United States, has so far declared that it will not end the operation until the elimination of Hamas, the latest [Hamas] has demonstrated a great defensive and organizational capacity, which has been beneficial to the international community that has begun to criticize the Israeli attack due to the high cost in Palestinian victims and the precarious situation of the Gazans. According to the Hamas-controlled Ministry of Health in the Gaza Strip, more than 50,000 Gazans had been killed and more than 100,000 wounded as of March this year, but Israel contradicts these figures, while not allowing impartial observers and journalists into the area. In addition, more than 70% of the infrastructure and homes have been destroyed by Israeli air, land and naval bombardments. This has been compounded by the collapse of industrial production, rising inflation due to food and manufactured goods shortages, and an increase in both overall                 and youth unemployment—factors that further fuel resentment toward those considered responsible, namely the Israelis. Likewise, both exports (such as scrap metal, tropical fruits, and olive oil) and imports (especially food) have declined as a result of the conflict. The United States supported Israel's position from the beginning, but President Trump is now calling for the opening of a humanitarian corridor for the residents of Gaza. While Israel has managed to dismantle most of Hamas’ operational infrastructure, it has not succeeded in defeating the organization, nor in freeing all the hostages, and now is facing mounting international condemnation and accusations of war crimes. At the same time, Israel's public spending has increased significantly, primarily due to military operations, while the country's economic development and employment rates have fluctuated over the past two years. Naturally, the Palestinian economy has suffered far more than Israel’s.The escalation of violence between Palestinians and Israelis since 2023 is the result of a series of long-standing events and processes. Rocket attacks from Gaza, assaults by Israeli settlers on Palestinians in the West Bank, Israeli responses to missile fire, incidents near the mosques in East Jerusalem, the deplorable health conditions in Gaza due to the Israeli blockade, and the destruction of Gazan infrastructure have all prolonged the conflict and deepened tensions. In short, the intransigence of both parties—along with unwavering U.S. support for Israel and diplomatic efforts that have so far failed—has prolonged the conflict, preventing the achievement of a fair and lasting political solution for both sides. This has caused a high number of civilian casualties in Gaza, where a collapsing health system struggles to respond and food is scarce. At the same time, Palestinians living in the West Bank continue to suffer from attacks and displacement by Israeli settlers expanding their areas of control. Bibliography Arteaga, F. (2023). The war between Hamas and Israel: long and hard. Real Instituto Elcano, pp. 1-5. https://media.realinstitutoelcano.org/wp-content/uploads/2023/10/la-guerra-entre-hamas-e-israel-larga-y-dura.pdfBBC News World (2020). West Bank: 6 questions to understand the situation and Israel's plans to annex part of this Palestinian territory. https://www.bbc.com/mundo/noticias-internacional-53142850BBC News World (2021). Israeli-Palestinian conflict: 6 maps showing how the Palestinian territory has changed over the past decades. https://www.bbc.com/mundo/noticias-internacional-54162476BBC News World (2025). "Bullets raining down on us like a deluge": Israel attacks southern Gaza and already over 50,000 dead. https://www.bbc.com/mundo/articles/c0l1r6xdl9koBBC News World (2025). The history of the Gaza Strip, the former territory of the Ottoman Empire destroyed by Israel and from which Trump wants to evict Palestinians. https://www.bbc.com/mundo/articles/c06r7nlr84koDonoso, C. (2025). The United States: a partial and weak mediator in the Israel-Hamas conflict. In, Velasco, C. M. Á., Saint-Pierre, H. L., Mei, E., Borrego, E. T., Donoso, C., & Botta, P. Central theme: Reflections on a year of conflict: Israel and Palestine in the spotlight. Instituto de Altos Estudios del Estado, Paralelo Cero, Estudios estratégicos, geopolíticos y de seguridad, n° 8, pp. 23-30. https://editorial.iaen.edu.ec/wp-content/uploads/sites/12/2025/01/PARALELO-0-Boletin-8-Final-1.pdfDoucet, L. (2025). What is the $53 billion plan for Gaza presented by Arab countries. BBC News World. https://www.bbc.com/mundo/articles/c5yx07841v9oGarcía Encina, C. (2023). USA and Israel: the strength of a relationship. Real Instituto Elcano, pp. 1-9. https://media.realinstitutoelcano.org/wp-content/uploads/2023/11/eeuu-e-israel-la-fortaleza-de-una-relacion.pdfGoldman, A., Bergman, R., Kingsley, P., Koplewitz, G., (2024). Israel's subway war against Hamas tunnels in Gaza. Infobae. https://www.infobae.com/america/the-new-york-times/2024/01/17/la-guerra-subterranea-de-israel-contra-los-tuneles-de-hamas-en-gaza/Gómez Díaz, L. (2023). Hamas and Fatah, rivals with different visions of Israel and the future of the Palestinians. Corporación de Radio y Televisión Española. https://www.rtve.es/noticias/20231020/hamas-fatah-rivales-politicos-palestinos-israel-diferencias/2458571.shtml.Hamdar, M., Razek, H. (2023). The aerial operation Hamas used to infiltrate Israel undetected. BBC News Arabic. https://www.bbc.com/mundo/articles/cv20n56p5ynoInfobae. (2025). With the flag flying in Damascus after 13 years the U.S. embassy in Syria was reopened. https://www.infobae.com/estados-unidos/2025/05/29/reabrieron-la-residencia-del-embajador-de-estados-unidos-en-damasco-mientras-washington-repara-los-lazos-con-siria/Infobae. (2025). Donald Trump spoke about the situation in the Gaza Strip: Many people are starving. https://www.infobae.com/estados-unidos/2025/05/16/donald-trump-hablo-sobre-la-situacion-en-la-franja-de-gaza-mucha-gente-esta-muriendo-de-hambre/Knickmeyer, E. (2025). Trump's Mideast trip highlights deals and diplomacy, but shuts up on human rights. Los Angeles Times. https://www.latimes.com/espanol/eeuu/articulo/2025-05-16/viaje-de-trump-a-oriente-medio-destaca-por-acuerdos-y-diplomacia-pero-calla-sobre-derechos-humanosMerino, A. (2023). The map of the Israeli blockade of Gaza or how to make a territory uninhabitable. https://elordenmundial.com/mapas-y-graficos/mapa-bloqueo-israeli-gaza-territorio-inhabitable/United Nations (2024). Gaza crimes, pollution deaths, Haiti...Wednesday's news. News United Nations. https://news.un.org/es/story/2024/06/1530656Radio France Internationale (2025). Hamas releases three hostages and defies Trump's Gaza plan. https://www.bbc.com/mundo/articles/c06r7nlr84koSaul, J., Farrell, S. (2023). The complex network of Hamas tunnels facing the Israeli army in Gaza. Infobae. https://www.infobae.com/america/mundo/2023/10/26/la-compleja-red-de-tuneles-de-hamas-de-cientos-de-kilometros-de-largo-a-la-que-se-enfrenta-el-ejercito-israeli-en-gaza/Seddon, S., Palumbo, D. (2023). How Hamas staged a blitz attack on Israel that no one thought possible. BBC News World. https://www.bbc.com/mundo/articles/c25we958pwqoTrujillo Borrego, E. (2025). The implicit goals of Israel in its war operations in the Gaza Strip. In, Velasco, C. M. Á., Saint-Pierre, H. L., Mei, E., Borrego, E. T., Donoso, C., & Botta, P. Central theme: Reflections on a year of conflict: Israel and Palestine in the crosshairs. Instituto de Altos Estudios del Estado, Paralelo Cero, Estudios estratégicos, geopolíticos y de seguridad, no. 8, pp. 13-22. https://editorial.iaen.edu.ec/wp-content/uploads/sites/12/2025/01/PARALELO-0-Boletin-8-Final-1.pdf