Subscribe to our weekly newsletters for free

Subscribe to an email

If you want to subscribe to World & New World Newsletter, please enter
your e-mail

Defense & Security
Bricked wall with stop terrorism sign

Causes of women involement in terrorism

by Eraj Farooqui

AbstractThis paper explores the complex factors that contribute to women's participation in terrorism, a subject that has attracted more scholarly interest, particularly in the wake of 9/11. The discipline is nonetheless politicised and divided despite a great deal of study, which is frequently made worse by a lack of primary data. Women, who are typically thought of as quiet and non-violent, have taken on important roles in terrorist groups, especially during the 1990s, where they have participated in high-profile attacks and leadership roles. The study identifies the main factors: political, religious, personal, and gender equality—that motivate women's participation. Examples show how different organisations differ in that some encourage women to participate actively, while others limit their positions. The study also examines how terrorism has changed over time, with a particular emphasis on its gendered aspects, and assesses how contemporary organisations such as the Islamic State have reshaped the roles of women in terrorist networks. Finally, by illuminating the ideological, cultural, and societal factors that lead to women's radicalisation and involvement, this research offers an in-depth examination of the relationship between gender and terrorism.Keywords:  Terrorism , Women , Political , Religion , Personal , Gender-equality Introduction The reasons behind female terrorism have been extensively studied and debated by numerous academics. Even though there is a wealth of study, a substantial portion of it is contradictory or incomplete. Frequently, the highly politicised word of terrorism has led to contradictory claims in the research. To understand why individuals resort to women terrorism, scholars highlight political, religious, social, and personal causes. In our culture, women were seen as housewives and peaceful members of society, and terrorist groups were controlled by men. Research on women and terrorism can be done on a variety of subjects; however, this paper will mostly focus on the causes of why women participate in terrorism. After 9/11 the academic research on scholarly papers on terrorism have increased by 300% since 9/11.[1] The connection between terrorism and gender is often overlooked due to governments' reluctance to reveal the primary causes and the reluctance to provide reliable data. Researchers often avoid original sources for security reasons. A 2009 review by Karen Jacques and Paul J. Taylor found a reluctance to describe events, excessive narrative analysis, and reliance on secondary sources. [2] The word "terror" comes from the Latin verb "terrere" which means to frighten. It was originally used by the Romans in 105 B.C. to characterise the terror that engulfed Rome during the attack by the Cibri tribe. During the French Revolution’s Reign of Terror, Maximilien Robespierre incited fear among the people.[3]The word "terrorist" was used by Edmund Burkey in the Regicide Peace letter. With the end of Reign of Terror, the word ‘terrorism’ gained popularity.[4] Terrorism, a deliberate use of force or intimidation, is a significant issue in the 21st century, often driven by ideological, religious, or political factors. However, the term "terrorism" has no widely recognised definition. There are four distinct stages of modern terrorism. The first wave of terrorism began in Russia and spread to Western Europe and the United States, using revolutionary and anarchist beliefs.[5]  The final wave is founded on religious beliefs that the world is currently dealing with. This wave started in 1979 when Iran underwent an Islamic revolution. Because of gender norms, terrorists are frequently perceived as masculine attackers. Women are perceived as powerless, passive, and victims during times of conflict, but it is important to remember that if they participate in terrorism, they may pose a greater threat than men.[6]And since 1990, women have gained prominence in terrorist organisations, assuming leadership positions and taking part in more brutal assaults. More media attention is given to female attackers, and people are more curious about the motivations behind their actions. Additionally, terrorist organisations are recruiting more women as a result of this. Although they have historically been involved in terrorist organisations, women's numbers have been small. As an example, the number of female suicide attackers has surged from eight in the 1980s to well over 100 since 2000, indicating a growth in the involvement of women in terrorist actions.[7]  On the other hand as per Bloom’s report over 257 suicide attacks were carried out by female bombers between 1985 and 2010, accounting for 25% of all terrorist incidents. Since 2002, the proportion of female bombers in several nations has surpassed 50%.[8]The first known incidence of female political violence happened in 1878, when Zasulich shot Fedor Trepov, the governor of Saint Petersburg. David Rapoport identified this as one of the four waves of modern terrorism.[9] Weinberg and Eubank claim that women have primarily assumed leadership positions in left-wing revolutionary bands while being assigned to inferior positions in right-wing organisations. They mostly perform supporting and auxiliary functions for numerous religious institutions. [10]Gender, Palestinian Women, and Terrorism: Women's Liberation or Oppression? was written by Anat Berko and Edna Erez. stated that during his questioning, he discovered that many Palestinian men did not approve of women participating in suicide bombings because they saw them as inferior to men.[11] After doing study with a local terrorist organisation, Jacques and Taylor chose 30 male and female suicide bombers. He finished by studying the fact that males prefer to join terrorist organisations for religious and nationalistic reasons, but female suicide terrorists are motivated by personal ones. Mia Bloom’s book the Bombshell: Women and Terrorism examines the motivations of women who participate in terrorism,[12] with an emphasis on relationships, respect, revenge, and redemption. According to Vetter and Perlstein, one of the reasons why women join terrorist organisations is because of gender equality. However, Jacques and Taylor disagree with this notion.[13]The main reason women join the LTTE is to fight for gender equality; they participate in every aspect of the group and do so to avoid being discriminated against and repressed by the male-dominated society.  The following studies will provide an academic perspective on the causes of women's involvement in terrorism. The main focus will be on four causes: political, religious, personal, and gender equality, as well as a list of important terror occurrences conducted by female terrorists as a result of some key ideological beliefs. Religious Cause: Religious convictions have been the foundation of many terrorist organisations throughout history. The Crusaders can be categorised as a terrorist group. Although the Crusaders' main objective was to propagate Christianity, they also committed heinous acts of terrorism. The Iranian Revolution of 1979 was the fourth wave of contemporary terrorism, and David Rapport claims that it was the first instance of religious terrorism in the modern era. Religious terrorism's core principle is the promotion of violence in the name of furthering religious beliefs. For example, Al-Qaeda and ISIS promote an Islamic caliphate globally.[14] However, attempting to do so by using cruel and aggressive methods. Islam and terrorism have become more associated since 9/11, as terrorist organisations have posed a serious threat to Western ideologies and societal influences.[15] Gonzalez-Perez notes that suicide bombers frequently use the idea of martyrdom and benefits in the afterlife to lure people into justifying their acts.[16] Women are also part of religious terrorist organisations but there are two argument over women involvement in jihadi group. As explaind by Muhammad Khayr Haykal in his book Al-Jihad wa al-qital fi al-siyasah al-shar'iyyah. 1. Women were seen as having a responsibility in raising money for Jihadis, caring for children, and providing medical treatment.[17] 2.    The Islamic state should set up training facilities for women to learn how to wield weapons and combat techniques, according to Islamic legal expert Muhammad Khayr Haykal. According to him, all Muslims should be held accountable for jihad if it turns into fard ‘ayn, and women must be prepared for this possibility in order to perform their duty. This strategy permits the practice of female jihadism in martyrdom missions and on the battlefield.[18] Role of women in Al-Qaeda According to Robet Pape in his book Dying to Win: The Strategic Logic of Suicide Terrorism.[19]Highlights that male terrorists affiliated with Al-Qaeda oppose women's participation in terrorism. However the Tamil Tigers used twenty-three female attackers, the Palestinians used six, the Lebanese used six, the Chechens used fourteen, and the PKK used ten. Consequently, he concluded that Islamic fundamentalists oppose female fighters.[20] However, after the rise of the Islamic state, which encourages women to join their organisation and accept arms, the Pape argument is no longer regarded as legitimate. For example, some 200 women joined the Islamic State in Syria in 2014 after migrating from Western nations. Additionally, they more than doubled their numbers in 2015, reaching over 550 women.[21] This suggests that the Islamic State may assign women a direct role, such as suicide bombing, in a way that is different from that of many other jihadist organisations, such as the Taliban and Al Qaeda.  In Al-Qaeda the women played a secondary role for.e.g: Al Qaeda also benefited strategically from the assistance that women provided. For instance, the female terrorists of Al Qaeda were strongly using the internet to try to convince men to join the worldwide Jihad. Some males are inclined to join these groups because they feel ashamed of their masculinity as a result of these communication strategies.[22]Women's roles in jihadist organisations are valued in that they bear children and raise them to be potential recruits for terrorist organisations. Usama Bin Laden thanked women by saying: "You have inspired and encouraged [men] to join jihad, and you have raised all the men who fought in Palestine, Lebanon, Afghanistan, and Chechnya, and you are the ones who produced the squadron of heroic men who carried out the raids in New York and Washington."[23] On the other hand Ayman al-Zawahiri's wife, Umayma al-Zawahiri, also urged her "Muslim sisters" to raise their kids on the love of jihad in God's way and "to induce their brothers, husbands, and sons to protect Muslims' lands and properties. To support (male) jihadists with prayers and financial support. [24] Al Khansa'a was one of the authors of the online magazine that inspired Muslim sisters with her articles; while she did not advocate for women to fight in combat, she did counsel them to stay in shape and exercise so they would be prepared for jihad.[25] Al-Qaeda Iraq's founder and Al-Qaeda member Abu Musab al Zarqawi urged Iraqi women to join the military. In Talafa, Iraq, a US military recruiting centre was the target of the first female suicide bomber. According to the announcement made by al Qaeda in Iraq on its website, "A blessed sister carried out a brave strike defending her beliefs. May God include our sister among the group of martyrs.’’[26]According to Mia Bloom the attack was carried out under the alias "ghost group" because it was still forbidden for Al Qaeda Central to collaborate with women on suicide bombings.[27] The identities of male suicide bombers are mentioned by AQI members, but the names of female suicide bombers are never mentioned. As a result, it is challenging to determine the purpose or driving force for their membership in terrorist organisations. Despite the lack of data regarding female suicide bombers, certain enquiries and interviews provide us with comparable reasons why they chose to join AQI as female terrorists. After losing a loved one, women join terrorist organisations in order to kill the offender and get revenge for the deaths of their husbands and brothers. Furthermore, AQI members urged young females to die as martyrs, claiming that they would immediately enter heaven and be the prophet Muhammad's neighbours.[28] Al-Qaeda is therefore mostly a male organisation that discourages women from engaging in violent activities. Women's roles are limited to becoming teachers, fund-raisers, social media advocates, and moms of potential jihadists. Role of women in Islamic State(IS) Islamic State was founded in 1999. The Islamic State had the greatest number of foreign terrorist fighters in history, making it a unique terrorist organisation. About 41,490 foreign nationals from 8 nations joined the Islamic State with the goal of restoring the caliphate. Of the foreign terrorist fighters, about 4761 (13%) were female. Following Eastern Europe (44%), Western Europe (42%), the Americas, Australia, and New Zealand (36%), and other regions, Eastern Asia had the greatest percentage (70%) of women connected with the Islamic State.[29] The biggest motivation for joining an Islamic terrorist organisation is religion. Women typically played a supporting role in Islamic terrorist organisations prior to the rise of the Islamic State. However, the role of women in these organisations has grown stronger after the fall of Al-Qaeda and the rise of Islamic State in the Middle East. Muriel Dagauque, a Muslim woman who converted to Islam and was married to a Muslim man, was one of the Islamic State suicide bombers. She moved to Iraq with her spouse from Europe in order to become a martyr, and on November 9, 2005, she bombed herself.[30] Many jihadist suicide bombers are comforted by the assurance that they will be sitting next to God (Allah), experiencing only joy and no agony, before the first drop of their blood ever hits the earth.[31]Women joined the Islamic State mostly for religious reasons. Umm Layth, also known as Aqsa Mahmood, was a 21 year old Scottish university student who travelled to Syria to take part in Islamic State terrorist activities. Mahmood expressed her opinions on jihad with the following sentences.: "If not you, then your grandkids or their grandchildren. But do not worry, our cubs will eventually shed your blood. This Islamic dominion will become well-known and dreaded all over the world. Choose a side; this is a fight against Islam. You may either support them or support us.''[32] Role of women Chechnya Terrorism: Islam is the predominant religion in Chechnya, and Wahhabist terror ideology is linked to Chechen terrorism, particularly suicide terrorism.[33]The Wahhabi sect appears to have spread to the Chechen territories through other terror cells in the Middle East, such as al Qaeda.[34] This ideology which glorifies martyrdom and promotes jihad in order to establish a worldwide Muslim caliphate is a rationale for carrying out acts of retaliation and acting on behalf of a national separatist movement.[35] Chechen women, due to their Islamic influence, often wear black and traditional Muslim clothing, such as a head scarf or jilbab, which allows them to conceal weapons and bombs, as seen in the Dulbrov theatre incident.[36] Religion is one factor that contributes to women joining terrorist organisations, but it is not the only one; other factors also play a role. Political Cause According to Gus Martin, terrorism can occur under a variety of circumstances when there is political repression. First, the group is resentful of the injustices they perceive in society. The group also believes that their social dissent is insignificant. Last but not least, the group believes that there are problems with the system that can be fixed, which leads them to confront the conflict.[37] Despite the widespread belief that women do not participate in political violence, women have been planning attacks and taking part in political violence since 1800.[38] Violence is a tactic used by women who are dissatisfied with the government, have their opinions ignored, and are under-represented in organisational structures With anarchist and revolutionary beliefs, anarchism was the beginning point of the first wave of contemporary terrorism, which swept from Western Europe to America. Nonetheless, women's political motive persisted until the second wave of terrorism, when nationalism emerged as the primary driver of women's participation in terrorism.[39] However, they were only allowed to serve as scouts and messengers during the second wave of terrorism. David Rapoport claims that because women once again assumed leadership roles, there are some similarities between the first and second waves.[40] Vera Zasulich shot the governor of St. Petersburg; she said that she had a political purpose for doing so because the governor was well-known for his Polish insurrection and had ordered to execute political prisoner Arkhip Bogolyubov. This infuriated the revolutionary forces, and six people made the decision to kill the governor, but Zasulich was the first to take the initiative. This was the beginning of the first wave of terrorism. Despite the fact that women participated in political violence, her case is notable as the first instance of female political violence in the modern era or the first to be acknowledged. [41] Russian university students founded the group, which specifically targeted political figures. Vera Figner and Gesia Gelfman, Sofia Perovskaya, and three ladies from Narodnaya Volya had a key role in the March 13, 1881, assassination of Russian Emperor Alexander II in St. Petersburg.[42] The reason behind this act was that Tsar Alexander II released his renowned Emancipation Manifesto in 1861 after the Russian intellectuals struggled to achieve their demands. This was intended to end the peasantry's enslavement and, if feasible, bring about a new, more liberal era. Perovskaya and other disappointed reformers decided to accelerate change as it became evident that this new age was a false dawn. As a result, hundreds of revolutionaries left St Petersburg in 1874 to tour the Russian countryside and read pamphlets to the peasants about socialism, nihilism, and anarchism in an attempt to educate them for the day when they would destroy the Tsar.[43] In 1954 the Algerian muslim formed a group called National Liberation Front. Their major goal was to achieve independence from the colonial power France. FLN rose to prominence thanks to its female members, Zohra Drif, Dajmila Bouhard, and Samia Lakhdar. They were able to cross the French checkpoint and leave bombs in various locations, and as a result, three people died in an explosion on September 3, 1956, and several others were injured.[44]This movement occurred at the time of second wave of contemporary terrorism which was based on the idea of nationalism and anticolonialism. As per reports between 1970 and 1984, 451 Italian women joined terrorist organisations and then engaged in political violence. The bulk of these women had degrees and performed identical duties to those of male terrorists, they found, with 35% of them being students, 23% being clerks, secretaries, nurses, technicians, and 20% being instructors. A paramilitary group called Red Brigade was established in 1970 and was engaged in terrorist activities around the nation. Because it supported Italy's withdrawal from NATO and dominated the Marixist-Leninist worldview. Known for its kidnapping and murderous activities, Red Brigades also killed former Italian Prime Minister Aldo Moro and abducted James L. Dozier, a senior US officer at NATO. Barbara Balzerian had murdered him. Many female members of the Red Brigades participated in the group's violent assaults, and Margherita Cagol (Mara), one of the Red Brigade's co-founders and one of the first victim in an armed conflict with the police, became a symbol of the left-wing movement.[45]The most violent communist organisation throughout the 1970s and 1980s was the Red Army Faction which engaged in ideologically motivated terrorism in West Germany. Ulrike Meinhof and Gudrun Ensslin, co-founders, protested consumerism by burning a department store in Frankfurt in 1968.[46] A major problem is the Chechen people's desire for independence from Russia, which is driven by their nationalist and separatist beliefs. In the lengthy history of the Chechen Republic, Russians, have been the target of several violent attacks. Since June 7, 2000, Khava Barayeva and Luisa Magomadova stormed the temporary headquarters of an elite OMON (Russian Special Forces) squad in Alkhan Yurt, Chechnya, sparking the start of Chechnya's "Black Widows" movement. With two fatalities and five injuries, the incident brought attention to the group's notorious actions.[47]According to the report, women were responsible for 47% of all terrorist incidents and 81% of suicide attacks in the Chechen region between 2000 and 2005.[48] For more than 30 years, the Liberation Tigers of Tamil Eelam (LTTE) battled the Sri Lankan central government, mostly because of the Tamil minority's ethnic oppression. Their goal was to establish their own nation in Sri Lanka's north and east.[49] The use of female suicide bombers and the LTTE's high proportion of female members were well-known. The proportion of female LTTE members varied between 20 and 30 percent, with some estimates reaching as high as 50 percent in certain years.[50]According to LTTE theorist Anton Balasingham's wife, Adele Ann, a Tamil woman's decision to join the group was a sign to society that she was dissatisfied with the status quo and had the ability to rebel against authority.[51]To sum up, female revolutionaries have contested the idea that they are less capable of committing acts of terrorism or have less political clout, and. Additionally, nationalism and revolution are the main goals of the majority of terrorist organisations that are focused on women. Personal reason Personal causes, such as revenge, family instability, rape, personal tragedy, and revenge, are important motivations for the individual to join terrorism. Women are more likely to cite these as their original motivation in joining terrorist organizations than men. Mia Bloom, Jaques and Taylor, and Robert Pape have all proposed that the reasons behind female terrorists are different from those of male terrorists. According to them, the emotions of female terrorists such as family problems, discontent, and the desire to commit suicide are what motivate them. These motivations are further divided by Bloom into four categories: respect, relationship, revenge, and redemption. [52] 1. Women who experience sexual assault, including rape, may retaliate violently; some may even choose suicide bombing as a last resort. After women were raped in Iraq, Samira Ahmad Jassim, dubbed the "mother" of suicide bombers, was accused of encouraging rape victims to commit honour suicide and conducting 28 suicide attacks, according to the Die Welt article..[53] 2. During the Chechen War, Russian soldiers sexually assaulted many Chechen women. According to estimates from Doctors Without Borders, 85 percent of Chechen women experienced sexual assault at the hands of law enforcement and military during the Chechen War. Journalist Svetlana Makunina claims that after being drugged and raped, Chechen women were left with no choice but to commit suicide bombing.On the evening of May 21, 1991, LTTE suicide bomber Dhanu killed former Indian Prime Minister Rajiv Gandhi at an election rally in Sriperumbudur, Tamil Nadu. She clarified that she took this action after being gang-raped by Indian peacekeeping troops. 3. Another crucial element that encourages women to join terrorist groups is relationships. Family members and relatives, who are important in the recruitment process, could function as a conduit between the terror group and women. Sidney Jones claims that while some women freely choose to wed male terrorists, others are coerced by their relatives.[54] Many women join ISIS for a variety of reasons, including a desire to contribute to the caliphate, a desire for friendship with like-minded individuals, or direct pressure by family members and acquaintances.[55] For e.g., Shamima Begum was influenced by her friend Sharmena to join IS. Barbara Victor, Army of Roses: Inside the World of Palestinian Women Suicide Bombers stated that instead of acting on their own initiative, female Palestinian suicide bombers are “at the mercy of, or in love with, their handlers.”[56] (women join terrorist organisations because they are forced by male) 4. Guillermo Galdos, and “Eliana Gonzales,” points out that male influence is not an essential prerequisite for recruiting women into violent organizations. In order to join revolutionary movements, women have reported willingly leaving their boyfriends, husbands, and kids. The oldest woman in Columbia's Fuerzas Armadas Revolucionarias de Colombia (FARC), Eliana Gonzales Acosta, for instance, abandoned her husband, sister, and daughter to join the group.[57] 5. Many people who have been directly impacted by the acts of another group resort to terrorism. The revenge theory is the name given to this. An individual is more inclined to engage in terrorism if they have lost a friend or loved one to a terrorist organisation or the military.[58] Additionally, according to Jacques and Taylor, revenge influences people's decision to join terrorist groups.[59] In literature and art, the stereotype that women are more revengeful than males is mirrored. According to William Cosgrove's The Mourning Bride, "Heaven is furious, like love turned to hate, and Hell is furious, like a woman scorned.”[60]Russian negotiator suggests the difference between men and women is that “[Chechen women] are ‘zombified’ by their own sorrow and grief.[61] The Russian and international press called Chechen women bombers "Black Widows" as it was revealed that many were acting in retribution for the deaths of their husbands, kids, and brothers.[62]Since the takeover of the Dubrovka Theatre in October 2002, nineteen female bombers have appeared in black mourning garments with bombs attached to their bodies. They held 850 people hostage for two and a half days. Until Russian forces imposed persecution on the people and executed the terrorist. While these motivations were not limited to revenge or family difficulties, they were also gender specific. There are more men killed in these battles, resulting in an imbalance of women battling for retribution. Furthermore, women constitute the majority of rape victims in these communities, which motivates them to join. Gender Equality: According to Vetter and Perlstein, one of the reasons why women join terrorist organisations is because of gender equality. However, Jacques and Taylor disagree with this notion.[63]FARC, or Revolutionary Armed Forces of Colombia, was established to combat societal inequality and provide women with opportunities for advancement. Despite being predominantly dominated by women, the organization offers women's rights, sexual freedom, and opportunities for advancement in a patriarchal society.[64] FARC recruits in rural areas, where women often have fewer opportunities, highlighting the organization's societal focus on women's rights.[65]A woman who had spent many years of her life in the FARC (Fuerzas Armadas Revolucionarias de Colombia—Ejército del Pueblo, or Revolutionary Armed Forces of Colombia—People's Army) was interviewed by Anne Phillips in 2012.[66]For the numerous reasons mentioned above, this woman, code-named "Athena," joined the FARC before turning thirteen. She explains why she joined this group  as it provides gender equality. She had economic reasons because she was from a rural area and lacked access to economic and educational opportunities. Women in Colombia's rural communities face a lack of opportunities, which leads to prostitution. Many women turn to the FARC as a viable alternative to prostitution. The FARC gives women a stable income. Women turn to the FARC because they are guaranteed food and other requirements. They are given the same opportunities as males and are able to support themselves. Also, by women joining terrorist organizations they are challenging gender stereotypes in their societies. O’Rourke says that women dislike these gender norms and rise out against them in opposition of the stereotyped female in their culture.[67]The LTTE gives women the same incentive to advance gender equality. According to LTTE women, they felt liberated and empowered within the organisation. By establishing sexual limitations and providing equal training chances, the LTTE established an environment that was equal for men and women. Women held leadership roles inside the LTTE and believed they were on par with the men themselves. Often, women join these groups to either learn about or escape gender inequality. CONCLUSION: The primary goal of this article was to examine the primary motivator for women to join terrorist organisations. For more than a century, women have been participating in terrorist activities, but only in recent decades have studies of terrorism examined female terrorists. Political, religious, personal, and gender equality are some of the motivations for women to join terrorist groups and participate in liberation movements. Since the 19th century, women have joined a variety of terrorist organisations; some conduct these horrible deeds to defend their beliefs or territory. Religion is another reason these women wish to sacrifice themselves in the name of Islam. They act in this way because they believe that, despite their crimes, they will be admitted to heaven if they commit murder for Islam. Women's terrorist operations might occasionally be motivated by personal issues. Although forced marriage, family issues, rape, the death of a loved one, and defiance of the patriarchal society are some of the main causes, other traumas could also influence their choices. However, each of the four factors has a major impact on women's decision to participate in terrorism. Al-Qaeda and Islamic State, for example, are heavily influenced by religion. The Tamil Tigers and FARC, on the other hand, are primarily driven by personal motives and gender equality. Furthermore, the political cause of Red Brigade and the National Liberation Front has been their main source of motivation. "Personal, political, and religious motivations are the main cause behind women's involvement in terrorism," claim Cunningham and Bloom. In order to curb terrorists' actions in the modern world, it is critical to comprehend their objectives and the reason behind their organisation. Furthermore, since many highly educated women have joined terrorist organisations, we cannot claim that education may have a major influence. There is extremely little research on gender and terrorism, particularly on women's participation in terrorist actions. To determine the primary reason women, participate in terrorism, we must conduct additional research in this field. Due to the fact that the information offered is highly generalised. What steps should the government take to prevent women from joining terrorist organisations? What other variables might encourage women to join terrorist organisations? Researchers from all social science fields should conduct some research on these pressing concerns as political scientists alone are unable to provide these answers. Bibliography[1] Jessica Shepherd, “The Rise and Rise of Terrorism Studies,” last modified July 3, 2007, accessed December 10, 2024, https://www.theguardian.com/education/2007/jul/03/highereducation.research.[2] Jessica Shepherd, “The Rise and Rise of Terrorism Studies,” last modified July 3, 2007, accessed December 10, 2024, https://www.theguardian.com/education/2007/jul/03/highereducation.research.[3] Ariel Merari, Driven to Death: Psychological and Social Aspects of Suicide Terrorism, 1st ed. (NewYork: Oxford University Press, 2010).[4]Zeynep Bayar, “The Role of Women in Terrorism,” City University of New York (CUNY) , accessed December 15, 2024, https://academicworks.cuny.edu/cgi/viewcontent.cgi?article=4346&context=gc_etds.[5] David Rapoport, The Four Waves of Modern Terrorism (Washington DC: Georgetown University Press, 2004), 46–73.[6] “Women and Terrorist Radicalization Final Report,” Organization for Security and Co-Operation in Europe (Organization for Security and Co-operation in Europe, January 1, 2013), last modified January 1, 2013, accessed December 13, 2024, https://www.osce.org/files/f/documents/4/a/99919.pdf.[7] LindseyA O’Rourke, “What’s Special about Female Suicide Terrorism?,” Security Studies 18, no. 4 (December 2, 2009): 682.[8] Mia Bloom, “What’s Special about Female Suicide Terrorism,” Gender Studies 28, no. 1–2 (June 1, 2011): 682.[9] David Rapopart, The Four Waves of Modern Terrorism (Washington DC: Georgetown University, 2004).[10] Leonard Weinberg and William L Eubank, “Women’s Involvement in Terrorism,” Gender Studies 28, no. 2 (June 2011): 22–49.[11] Anat Berko, “Gender Palestinian Women, and Terrorism: Women’s Liberation or Oppression?,” ed. Edna Erez, Studies in Conflict and Terrorism 30, no. 6 (April 27, 2007): 493–519.[12] Mia Bloom, Bombshell: Women and Terrorism (Philadelphia: University of Pennsylvania Press, 2011).[13] Karen Jacques and Paul J. Taylor, “Male and Female Suicide Bombers: Different Sexes, Different Reasons?,” Studies in Conflict and Terrorism 31, no. 4 (April 10, 2008).[14] Rosemarie Skaine , Female Suicide Bombers (United Kingdom: McFarland, 2006).[15] Graham Bird, Brock Blomberg, and Gregory Hess, “International Terrorism: Causes, Consequences and Cures,” World Economy 31 (2008): 259.[16] Rosemarie Skaine , Female Suicide Bombers (United Kingdom: McFarland, 2006), 12.[17] Ibn al Bukhari, Sahih Al- Bukhari. Trans Muhammad Muhsin Khan (United States: Islamic University, 1979).[18] Muhammad Khayr Haykal, Jihad and Fighting according to the Shar‘ia Policy (Beirut: Dar al-Barayiq, 1993).[19] Robert A. Pape, Dying to Win: The Strategic Logic of Suicide Terror (NewYork: Random House Books, 2005).[20] Rosemarie Skaine , Female Suicide Bombers (United Kingdom: McFarland, 2006).[21] Erin Marie Saltman and Melanie Smith, Till Martyrdom Do Us Part’: Gender and the ISIS Phenomenon (Institute for Strategic Dialogue, May 22, 2015).[22] Zeynep Bayar, “The Role of Women in Terrorism,” City University of New York (CUNY) , accessed December 15, 2024, https://academicworks.cuny.edu/cgi/viewcontent.cgi?article=4346&context=gc_etds.[23] Nelly Lahoud, “The Neglected Sex: The Jihadis’ Exclusion of Women from Jihad,” Terrorism and Political Violence 26, no. 5 (February 20, 2014).[24] Nelly Lahoud, “Umayma Al-Zawahiri on Women’s Role in Jihad,” Jihadica, last modified February 26, 2010, https://commons.lib.jmu.edu/cgi/viewcontent.cgi?article=1422&context=honors201019.[25] Mia Bloom, “What’s Special about Female Suicide Terrorism,” Gender Studies 28, no. 1–2 (June 1, 2011).[26] “Woman Suicide Bomber Strikes Iraq,” BB, last modified September 28, 2005, http://news.bbc.co.uk/2/hi/middle_east/4289168.stm. [27]Ibid[28] Aqeel Hussein and Damien McElroy, “Mother of All Suicide Bombers’ Warns of Rise in Attacks,” The Telegraph, last modified November 15, 2008, https://www.telegraph.co.uk/news/worldnews/middleeast/iraq/3464411/Mother-of-all-suicide-bombers-warns-of-rise-in-attacks.html.[29] Joana Cook and Gina Vale, From Daesh to “Diaspora”: Tracing the Women and Minors of Islamic State (International Centre for the Study of Radicalisation, 2018).[30] Zeynep Bayar, “The Role of Women in Terrorism,” City University of New York (CUNY) , accessed December 15, 2024, https://academicworks.cuny.edu/cgi/viewcontent.cgi?article=4346&context=gc_etds.[31] Mia Bloom, Bombshell: Women and Terrorism (Philadelphia: University of Pennsylvania Press, 2011).[32] Susan Swarbrick, “Scots ‘Jihadi Bride’ Talks of ‘Revenge’ in Hate-Filled Blog,” The Herald, last modified July 6, 2015, https://www.heraldscotland.com/news/13415875.scots-jihadi-bride-talks-of-revenge-in-hate-filled-blog/.[33] W. Andy Knight and Tanya Narozhna, “Social Contagion and the Female Face of Terror: New Trends in the Culture of Political Violence,” Canadian Foreign Policy Journal 12, no. 1 (March 14, 2011).[34] Ibid.,33[35] Ibid.,33[36] LindseyA O’Rourke, “What’s Special about Female Suicide Terrorism?,” Security Studies 18, no. 4 (December 2, 2009): 690.[37] Gus Martin , Understanding Terrorism: Challenges, Perspectives, and Issues , 8th ed. (SAGE Publications, Inc, 2024), 60.[38] Maha Butt, “Feminist IR Theory and Terrorism,” International Affairs Forum, accessed December 16, 2024, https://www.ia-forum.org/Content/ViewInternal_Document.cfm?contenttype_id=0&ContentID=9152#:~:text=Analyzing%20terrorism%20from%20a%20feminist's,female%20terrorists%20as%20'women%20terrorists..[39] David Rapoport, The Four Waves of Modern Terrorism (Washington DC: Georgetown University Press, 2004), 46–73.[40] Elena Gapova, “Gender Equality vs. Difference and What Post-Socialism Can Teach Us,” Womens Studies International Forum 59 (November 1, 2016).[41] “Vera Zasulich,” Wikipedia, https://en.wikipedia.org/wiki/Vera_Zasulich#cite_note-5.[42]Elena Gapova, “Gender Equality vs. Difference and What Post-Socialism Can Teach Us,” Womens Studies International Forum 59 (November 1, 2016).[43] James Crossland, “The Women Who Ended an Emperor,” History Workshop, last modified April 21, 2021, https://www.mybib.com/#/projects/39m8D0/citations/new/webpage.[44] Zeynep Bayar, “The Role of Women in Terrorism,” City University of New York (CUNY) , accessed December 15, 2024, https://academicworks.cuny.edu/cgi/viewcontent.cgi?article=4346&context=gc_etds.[45] Ruth Glynn , Approaching Women, Terror, and Trauma in Cultural Perspective, 2013.[46] “Andreas Baader and Ulrike Meinhof,” Encyclopedia.com, accessed January 2, 2025, https://www.encyclopedia.com/history/encyclopedias-almanacs-transcripts-and-maps/andreas-baader-and-ulrike-meinhof.[47] Anne Speckhard and Khapta Akhmedova, “Black Widows: The Chechen Female Suicide Terrorists,” The Institute for National Security Studies, last modified August 2006, https://www.inss.org.il/wp-content/uploads/2017/08/Female-Suicide-Bombers-63-80.pdf.[48] Anne Speckhard and Khapta Ahkmedova, “The Making of a Martyr: Chechen Suicide Terrorism,” Studies in Conflict & Terrorism 29, no. 5 (September 22, 2006).[49]Peng Wang, “Women in the LTTE: Birds of Freedom or Cogs in the Wheel?,” Journal of Politics and Law 4, no. 1 (2011).[50] Karla J. Cunningham, “Cross-Regional Trends in Female Terrorism,” Studies in Conflict and Terrorism 26, no. 3 (May 2003).[51]“Liberation Tigers of Tamil Eelam (LTTE),” South Asia Terrorism Portal, https://www.satp.org/satporgtp/countries/srilanka/terroristoutfits/ltte.htm.[52] Karen Jacques and Paul J. Taylor, “Male and Female Suicide Bombers: Different Sexes, Different Reasons?,” Studies in Conflict & Terrorism 31, no. 4 (2008).[53]Mia Bloom, “What’s Special about Female Suicide Terrorism,” Gender Studies 28, no. 1–2 (June 1, 2011).[54] Sidney Jones, “Inherited Jihadism: Like Father, like Son,” International Crisis Group, last modified July 4, 2007, https://www.crisisgroup.org/asia/south-east-asia/indonesia/inherited-jihadism-father-son.[55] Daniel Milton and Brian Dodwell, “Jihadi Brides? Examining a Female Guesthouse Registry from the Islamic State’s Caliphate,” Combating Terrorism Center 11, no. 5 (May 2018).[56]Edward E. Azar, “Protracted International Conflicts: Ten Propositions,” International Interaction 12, no. 1 (January 9, 2008).[57]“GENDER and TERRORISM: MOTIVATIONS of FEMALE TERRORISTS ,” DNI.gov, https://www.dni.gov/files/documents/FOIA/DF-2023-00139-Gender_and_Terrorism_Thesis.pdf.[58]LindseyA O’Rourke, “What’s Special about Female Suicide Terrorism?,” Security Studies 18, no. 4 (December 2, 2009): 710.[59]Karen Jacques and Paul J. Taylor, “Male and Female Suicide Bombers: Different Sexes, Different Reasons?,” Studies in Conflict & Terrorism 31, no. 4 (2008): 322[60] “GENDER and TERRORISM: MOTIVATIONS of FEMALE TERRORISTS ,” DNI.gov, https://www.dni.gov/files/documents/FOIA/DF-2023-00139-Gender_and_Terrorism_Thesis.pdf.[61]Ibid.,63[62] Anne Speckhard and Khapta Ahkmedova, “The Making of a Martyr: Chechen Suicide Terrorism,” Studies in Conflict & Terrorism 29, no. 5 (September 22, 2006).[63]Karen Jacques and Paul J. Taylor, “Male and Female Suicide Bombers: Different Sexes, Different Reasons?,” Studies in Conflict & Terrorism 31, no. 4 (2008).[64]Natalia Herrera and Douglas Porch, “‘Like Going to a Fiesta’ – the Role of Female Fighters in Colombia’s FARC-EP,” Small Wars & Insurgencies 19, no. 4 (January 26, 2009).[65]Mia Kazman, “Women of the FARC,” William J.Perry Center, accessed December 23, 2024, https://wjpcenter.org/wp-content/uploads/2023/09/Women-of-the-FARC.pdf[66]Christine Balling, “Why Women Turn to the FARC -- and How the FARC Turns on Them,” Foreign Affairs, last modified June 1, 2012, accessed December 23, 2024, https://www.foreignaffairs.com/articles/colombia/2012-06-01/fighting-mad.[67]LindseyA O’Rourke, “What’s Special about Female Suicide Terrorism?,” Security Studies 18, no. 4 (December 2, 2009): 702

Diplomacy
President of Russia Vladimir Putin meeting with North Korean leader Kim Jong-un (2025)

Why Xi, Putin and Kim on One Stage Matters

by Roie Yellinek

Beijing’s Victory Day parade in Tiananmen Square was designed to dazzle: ranks of uniformed troops, formations of aircraft, and an arsenal of new systems meant to underscore China’s rapid military modernization. But the most consequential image was not a missile or a stealth jet. It was a tableau of three leaders—Xi Jinping at the center, flanked by Vladimir Putin and Kim Jong Un—watching the spectacle together. The scene, widely broadcast and photographed, turned a commemorative event into a geopolitical marker. It was less a snapshot than a signal: the public normalization of a deepening alignment among China, Russia, and North Korea, at a moment when Western democracies are struggling to sustain cohesion on core strategic questions. The parade itself offered the familiar mixture of hardware and narrative. Coverage highlighted the unveiling or public confirmation of advanced systems across domains: upgraded intercontinental missiles, new submarine-launched ballistic missiles, hypersonic and anti-ship capabilities, long-range bombers, early warning aircraft, and a broad stable of unmanned platforms, including undersea vehicles and “loyal wingman” drones. Chinese media presented these developments as evidence of a “world-class” People’s Liberation Army (PLA) moving beyond legacy constraints and into truly multi-domain operations, with information, space, and cyber now integrated alongside land, sea, and air. Independent reporting catalogued the breadth of systems and emphasized a narrative of credible deterrence and strategic depth rather than mere choreography. Yet the more instructive message was political. The presence of Putin and Kim, alongside other leaders, was not a mere ceremonial occurrence. Each leader arrived with clear incentives to be seen at Xi’s side, and each gained by lending visual weight to Beijing’s story. For Moscow, the image reinforced the claim that Russia is not isolated, that it retains powerful partners and is embedded in a wider non-Western coalition. For Pyongyang, the moment was even more significant: an opportunity to step out of diplomatic isolation and be recognized publicly as a member of a consequential strategic grouping. For Beijing, hosting both leaders signaled that China can convene and coordinate—projecting status, reassuring sympathetic governments, and unsettling adversaries by hinting at a tighter web of cooperation among U.S. rivals. The convergence behind the optics has been building for years, and could have happened only on Chinese soil. China and Russia have expanded their coordination across energy, defense, and diplomatic, even as they preserve maneuvering room on sensitive issues. North Korea’s accelerating exchanges with Russia, alongside growing political warmth with Beijing, provide a third leg to this emerging tripod. None of this amounts to a formal alliance with mutual defense obligations. But it does resemble a strategic alignment held together by shared interests: resisting a U.S.-led order, blunting sanctions pressure, reducing vulnerability to Western technology restrictions, and demonstrating that alternatives exist to dollar-centric finance and Western supply chains. The choreography on the rostrum did not create this alignment; it made it more legible and clear. Memory politics is a key component of that legibility. Beijing’s decision to anchor the parade in the commemoration of victory over Japan allows contemporary power projection to be cloaked in a unifying moral narrative. China increasingly leverages World War II memory in diplomacy—shaping a “memory war” that reframes the post-1945 order and what is seen from China as its rightful place within it. Russia’s long-standing use of the “Great Patriotic War” plays a parallel role, justifying current policies through selective historical continuity. North Korea’s revolutionary mythology fits easily into this narrative architecture. By standing together at an anniversary of anti-fascist victory, the three leaders signaled an ideational convergence that complements their material cooperation: a claim to moral legitimacy as guardians of an alternative international vision. The military dimension of the parade, while not the core of this argument, still matters. Displays of a maturing triad—land-based ICBMs, submarine-launched systems, and an air-launched nuclear component—aim to convey survivable second-strike capacity. The public presentation of hypersonic and anti-ship systems is meant to complicate adversary planning in the Western Pacific. The range of unmanned platforms suggests an intent to saturate domains with relatively low-cost, attritable assets, improving persistence and compressing the sensor-to-shooter loop. It is prudent to treat parades cautiously: not all showcased systems are fully operational or fielded at scale, and performance claims are difficult to validate. But as an indicator, the breadth and integration of platforms reflect a planning culture committed to joint operations and “intelligentized” warfare, where AI-enabled targeting and decision support are not theoretical ambitions but programmatic priorities What, then, does the image of Xi–Putin–Kim actually change? First, it clarifies expectations. Observers no longer need to infer the trajectory of this triangular relationship from scattered bilateral overtures. The three leaders have chosen to make their alignment visible. Visibility creates deterrent value, raising the perceived costs of coercing any one member, and it can also facilitate practical cooperation: intelligence sharing, diplomatic coordination at the UN and other fora, synchronized signaling during regional crises, and mutually reinforcing sanctions-evasion practices. Second, it complicates Western planning. Even if Beijing keeps caution around direct military assistance in Europe or the Korean Peninsula, diplomatic top-cover, economic buffering, and technology flows short of lethal aid can still alter the correlation of forces over time. Finally, it resonates across the Global South. Many governments seek strategic autonomy and resist being forced into binary choices. The parade’s optics supplied a ready-made narrative for those who argue that the international system is already multipolar and that non-Western coalitions can deliver security and development without Western tutelage. The contrast with Western coordination was strikingly evident. In the transatlantic community, support for Ukraine remains substantial; however, debates about resource levels, war aims, and timelines have intensified. In the Indo-Pacific, there is a growing alignment on deterring coercion in the Taiwan Strait and the South China Sea; however, national economic interests and differing risk tolerances result in uneven policies toward China. Across Europe and North America, electoral politics continue to inject volatility into foreign policy, complicating efforts to sustain long-term, bipartisan strategies. None of these frictions amounts to collapse, and there are genuine Western successes in coalition-building—from NATO enlargement to evolving minilateral formats in the Indo-Pacific. However, an analytically honest reading of the moment acknowledges that the authoritarian trio in Beijing has projected a unity of purpose that Western capitals currently struggle to match consistently. Three implications follow. The first is narrative competition. If Beijing, Moscow, and Pyongyang can turn a commemorative event into a global story about legitimacy and resilience, they will continue to use history as a strategic resource. The appropriate Western response is not to cede the narrative field but to invest in historically grounded, forward-looking messaging that explains the link between rules-based order and practical benefits—trade reliability, crisis management, and sovereignty protection—for diverse audiences. The second is coalition maintenance. Western policymakers will need to prioritize “coalition hygiene”: aligning export controls and investment screening where it matters most; building redundancy into critical supply chains; closing divergences in sanctions enforcement; and coordinating messaging so that tactical differences do not obscure strategic alignment. This requires political discipline more than new institutions. The third is theater integration. As the Beijing image suggested a cross-regional understanding among three adversarial capitals, allied planning must better account for cross-theater linkages—how actions in Europe affect deterrence in Asia, and vice versa—and ensure that resource allocations and industrial policies reflect genuinely global prioritization. It is important not to overstate. The emerging alignment among China, Russia, and North Korea is asymmetric and interest-based, not a tightly binding alliance. Beijing’s global economic integration imposes constraints that Moscow and Pyongyang do not share. Russia and North Korea each bring liabilities that China will manage carefully. Frictions—over technology, pricing, and regional equities—will persist. But the threshold crossed in Beijing is nonetheless meaningful. These governments judged that the benefits of public proximity now outweigh the costs. That judgment, once made, is difficult to reverse quickly; it tends to generate its own momentum through bureaucratic follow-through and sunk reputational costs. One image cannot rewrite the balance of power. It can, however, crystallize a trend and concentrate minds. The sight of Xi, Putin, and Kim standing together did exactly that. It captured an authoritarian convergence rooted in shared grievances and converging strategies, and it highlighted the challenge facing democracies that wish to preserve an open and stable order: maintaining the patience, unity, and policy discipline to act together. The test for the West is less whether it recognizes the signal—most capitals do—than whether it can convert recognition into sustained, collective action. If Beijing’s parade was a demonstration of choreography and intent, the appropriate answer is not a counter-parade, but the quieter work of alignment: aligning narratives with interests, interests with instruments, and instruments with partners. That work is not glamorous. It is, however, what turns a photo into policy.

Diplomacy
Kim and Trump shaking hands at the red carpet during the DPRK–USA Singapore Summit 2018

Democratic People's Republic of Korea and Trump 2.0: Another cycle with new attributes?

by Jesús de los Ángeles Aise Sotolongo

Abstract Never before had a sitting U.S. president managed relations with the DPRK as Donald Trump did, nor had any leader from Pyongyang sat face-to-face with a sitting U.S. president during their term as Kim Jong Un did. With Trump’s potential return, could there be another cycle of rapprochement? This paper seeks to address this question. The failure of the previous negotiating cycle, the DPRK’s advances in deterrence, and shifts in peninsular, regional, and global circumstances suggest that both leaders might bring new attributes to their interactions, potentially yielding surprising outcomes Introduction Except for a few moments of rapprochement, since the founding of the Democratic People’s Republic of Korea (DPRK), U.S. administrations have maneuvered with various forms and methods to destabilize its political and economic system. And since Pyongyang decided to develop nuclear weapons, Washington has labeled them illegal, demanding that they be abandoned, sponsoring United Nations Security Council (UNSC) sanctions, and implementing strict unilateral penalties. Meanwhile, successive DPRK leaders have persevered in a military doctrine based on the development of nuclear deterrence to guarantee national defense and security. Nevertheless, an unprecedented moment that broke with that persistent circumstance took place during Donald Trump’s previous term, when the relationship shifted from “fire and fury” to successive summits with Kim Jong Un in 2018 and 2019, in Singapore, Hanoi, and Panmunjom. The exchange of insults — Trump calling Kim “little rocket man” and Kim referring to Trump as a “dotard” — mutated into their approaching one another as “pen pals.” This surprising shift in U.S. policy toward the DPRK temporarily, though without the expected results, loosened the “Korean Gordian knot.” No U.S. president has managed relations with the DPRK as Donald Trump did, and in history, no North Korean leader had ever stood face-to-face, on equal footing, with a sitting U.S. president as Kim Jong Un did. Former President Barack Obama delivered several appealing speeches, but he seemed weak to many countries in East Asia, including U.S. allies and partners. For eight years, he did nothing about North Korea, calling it “strategic patience.” This eroded deterrence and allowed Pyongyang to advance its weapons and nuclear programs (Kausikan, 2025). For his part, at the beginning of his term, Joe Biden announced a “new strategy” toward the DPRK that never materialized; he pleaded for dialogue with Kim Jong Un while simultaneously increasing war threats; he grouped China, Russia, Iran, and North Korea into an ideological category that resurrected the Bush-era notion of the “axis of evil.” Biden’s simplistic binary categorization was not a policy. It ignored the differences in how these four countries define their interests, the degree of integration into the global economy, and the scope of their ambitions. These differences should be the starting point for U.S. diplomacy toward North Korea (Kausikan, 2025). The purpose of this article is to examine the circumstances, obstacles, and expectations for a new cycle of negotiations between Washington and Pyongyang with Donald Trump’s return to the U.S. presidency. Development This second term of President Donald Trump, more transactional and less predictable, seems to be raising expectations of reducing confrontational stress on the Korean Peninsula, and everything indicates that it brings with it a modification of Washington’s policy toward the DPRK. This is conditioned by the following radical changes in strategic circumstances compared to his previous term: DPRK’s nuclear and missile programs have undergone new and sophisticated advances. The DPRK has broken all ties and symbols of its relations with the Republic of Korea, which it classifies as its “principal and unchanging enemy.” Declaring that it has no intention of avoiding war, it has instructed the Korean People’s Army to accelerate preparations to “occupy, subdue, and completely reclaim” South Korea. There has been a tightening of ties between Pyongyang and Moscow. The two Kim Jong Un–Vladimir Putin summits, and Kim’s reference to Putin as his “closest comrade,” have shown the very high level of understanding and commitment between the parties. This is reflected in the DPRK’s unrestricted support for Russia’s special military operation in Ukraine and the signing of a Comprehensive Strategic Partnership Treaty, ratified by both legislatures, which includes a “mutual military assistance” clause. Meanwhile, Russia supports the DPRK diplomatically and economically, opposing multilateral and unilateral sanctions, and expanding its exports — essentially oil, raw materials, and food — as well as providing assistance in various fields. An emerging anti-U.S. and anti-Western axis has been taking shape among China, Russia, the DPRK, and Iran, which has become so significant that Washington and its allies describe it as a “new axis.” Within this interconnection, the DPRK holds important advantages in three strategic dimensions: economic, military, and diplomatic. The removal of President Yoon Suk Yeol over his irresponsible Martial Law is reinforcing the possibility of a new government led by the Democratic Party, with Lee Jae Myung as the clear favorite and, as of today, more likely to win. [1] This would open the door to a revival of North–South détente reminiscent of the Moon Jae In era. Trump’s foreign policy objectives are based on his “Make America Great Again” (MAGA) vision — now reinforced — which prioritizes U.S. strategic and economic interests over traditional alliance commitments (e.g., South Korea and Japan). At least these six factors seem to be significantly influencing Donald Trump’s decision to return to diplomacy with Kim Jong Un. While the DPRK occupies a relatively lower position on Trump’s list of priorities (with China and the Russia–Ukraine conflict taking precedence), and dialogue does not appear imminent, he has made it clear that he would like to reconnect with Kim Jong Un, seems willing to reopen negotiations, and is evaluating and discussing possible avenues of interaction that could lay the groundwork for a potential summit. It is said that Washington has been holding discreet conversations with Pyongyang, consulting external experts, and considering options to potentially restart dialogue. Meanwhile, Kim Jong Un — clearly more assertive and militarily more powerful in Washington’s eyes — has not publicly shown any willingness to renew his earlier offers related to denuclearization. In his own words: “the DPRK’s nuclearization is non-negotiable,” and he continues to exert pressure by showcasing the country’s missile–nuclear power. This has been illustrated unequivocally and consistently when Kim Jong Un visited nuclear material production facilities and the Nuclear Weapons Institute (NWI) in September 2024 and January 2025. For the DPRK, survival is an existential matter, and Pyongyang considers its nuclear–missile programs absolutely indispensable to secure it; there is nothing we can see that would persuade or force it to renounce them, as that would imply regime change. Everything indicates that the U.S. president is aware that his counterpart has not yet overcome the discouragement caused by the failure of the previous negotiation process, and for that reason, he is sending increasingly precise messages about the possibility of renewed talks, while boasting of his personal relationship with Kim Jong Un. At the same time, however, Pyongyang continues to issue contradictory signals of distrust toward Washington, in response to the confrontational attitude and the increasingly close military and intelligence ties with the DPRK’s immediate neighbors. It is worth noting that, this past February, the U.S. sent a nuclear submarine and several B-1B bombers to South Korea; U.S. military forces carried out multiple war exercises, including live-fire drills along the Demilitarized Zone, as well as heavy bombing maneuvers and even space force operations. In March, a large-scale scheduled exercise took place—70 percent larger than the one held the previous year. Nevertheless, it appears that by the end of 2024 the DPRK leadership decided to create a certain margin of diplomatic maneuver in anticipation of the incoming Trump administration. The coverage given to Trump’s inauguration on January 22 marked a shift from Pyongyang’s initial decision to remain silent on the outcome of the U.S. presidential elections in November. Moreover, this information was published in media outlets aimed at both domestic and international audiences, suggesting that North Korea has begun preparing its people for a new approach to Trump, when appropriate. Despite the steady flow of official statements and media commentary criticizing the United States, anti-American rhetoric has become somewhat less intense. Notably, the use of the expression “U.S. imperialists” has significantly decreased since then. This is also true of Kim’s public statements, which are considered the most authoritative in North Korea. For example, Kim’s speech at the Ministry of Defence on February 8 was the harshest and most detailed on the United States since his speech at a national defence exhibition in November 2024. However, unlike in many of his previous speeches at defence-related venues or events, he did not use derogatory terms such as “U.S. imperialists.” In fact, the last reported use by Kim of the term “U.S. imperialists” was in his defence exhibition speech last November. While there has been a rise in criticism of the United States since early February, as demonstrated by a series of “KCNA commentaries,” the broader trend since December still holds. The media have refrained from mentioning Trump by name, even when criticizing U.S. statements or actions. When issuing criticism, they have only referred to “the new U.S. administration,” “the current administration,” or the “U.S. ruler.” KCNA’s commentary on February 12 regarding the Gaza Strip, for example, blamed the “current U.S. administration” for the plan to take control of Gaza, omitting Trump’s name. All these articles were published in outlets aimed at domestic audiences, likely because they addressed foreign policy issues not directly relevant to North Korea. In contrast, the North Korean Ministry of Foreign Affairs’ criticism of Rubio’s statement about the “rogue state” was only published on external websites and not disseminated to the domestic audience. This allowed Pyongyang to register its rejection of the statement to external audiences while controlling the narrative about the Trump administration at home. Pyongyang also appears to be creating diplomatic space by attempting to influence Washington’s thinking while it awaits the new Trump administration’s policy toward North Korea. Its Ministry of Defence stated that the United States was “openly ignoring the DPRK’s security concerns” in reference to a U.S. nuclear-powered submarine that entered a South Korean port — an unusually direct accusation that the United States “ignores” its security concerns. If we consider the reverse side of this message (do not ignore North Korea’s security concerns), it is in fact a call from Pyongyang to the new administration to take its “security concerns” into account in its policy toward North Korea (Minyoung Lee, 2025). We can therefore see some Trumpist signals that could prove attractive to Pyongyang’s leadership: Repeated references by the U.S. president, describing the DPRK as a “nuclear power,” a concept recently reinforced when he qualified it as a “great nuclear power.” It is noteworthy that very recently U.S. Secretary of State Marco Rubio used the expression “nuclear-armed state” to refer to the DPRK, implicitly admitting Pyongyang’s possession of nuclear weapons. This comment suggests that the U.S. is unofficially considering the DPRK as a nuclear-armed nation, just as it does with India, Pakistan, and Israel. There are signs of a strategic shift aimed at overcoming deadlock and building trust by moving from denuclearization as the priority toward nuclear security. In other words, instead of demanding denuclearization, the focus would be on improving the safety of nuclear facilities — such as preventing accidents, leaks, or proliferation risks to third countries — through active bilateral technical cooperation that aligns reciprocal interests. The decisions that have shaken the peninsular geopolitical context and the Washington–Seoul alliance, when the U.S. classified South Korea as a “sensitive country,” as well as the so-called “strategic flexibility” that “modifies the mission of U.S. Forces Korea (USFK).” It is true that many officials in the Trump administration continue to officially reiterate their commitment to the DPRK’s denuclearization. However, statements by the U.S. president and his Secretary of State suggest that they recognize North Korea as a nuclear-armed state, generating a dual reaction: on one hand, surprise at an abrupt shift in policy toward the DPRK’s nuclearization, and on the other, uncertainty about what would happen to the security concerns of its allies — South Korea and Japan — as well as those of the U.S. itself. It should be noted that Trump stated — no less than in front of NATO Secretary General Mark Rutte — that he intended to re-establish relations with Kim Jong Un, that “he would do it,” that he has “…an excellent relationship with Kim Jong Un and we’ll see what happens.” And he declared: “But without a doubt, it is a nuclear power.” In that same setting, Trump also mentioned that India and Pakistan possessed nuclear weapons, effectively recognizing them as de facto nuclear-armed states, adding that Kim Jong Un “possesses numerous nuclear weapons” and that “others possess them as well.” Therefore, the statements by Trump and Rubio that tacitly recognize the DPRK as a “nuclear power” indicate a shift in Washington’s policy toward Pyongyang. It seems that interactions between the DPRK and the U.S. are moving toward a turning point: from denuclearization as the priority to nuclear security — a strategic change in U.S. policy aimed at overcoming deadlock and establishing trust, as a preliminary step toward a possible peace treaty. The repeated reference by U.S. President Donald Trump to the DPRK as a nuclear power could be an effort to draw Pyongyang back to the negotiating table, since North Korea seeks de facto recognition by the U.S. as a nuclear-armed state. Trump seems to be maintaining the perspective that the next negotiation should focus on reducing threats rather than denuclearization, despite his stated pursuit of “complete denuclearization.” Everything suggests that Trump is emphasizing the evident reality of Pyongyang’s progress in its nuclear program. It can also be considered that Trump’s remarks may imply that, as a result of the failure of his summit efforts to reach an agreement with Kim Jong Un to halt North Korea’s nuclear program, he may now be encouraging the consideration of an alternative strategy. However, Pyongyang is publicly and incessantly rejecting Trump’s attempts to restart dialogue; this stance has much to do with the recent history of U.S. negotiations and the president’s insufficient reciprocity to the concrete measures proposed by Kim Jong Un. In addition to the above, it is worth highlighting the latest developments that have shaken the peninsular geopolitical context and the Washington–Seoul alliance, which could, to some extent, influence a shift in Pyongyang’s perception and lead it to accept talks with Washington. We refer to the classification of South Korea as a “sensitive country” and the idea of “modifying the mission of U.S. Forces Korea (USFK).” The U.S. Department of Energy (DOE) designated South Korea as a “sensitive country,” a classification that significantly restricts collaboration in areas of advanced technology, including nuclear energy, artificial intelligence, quantum science, and advanced computing. This measure, which took effect on April 15, subjects South Korean researchers to stricter controls for collaborating or participating in research at DOE facilities or research centers and marks the first time South Korea has received such a designation from the U.S. government. In this regard, the “sensitive country” classification is based on unilateral criteria such as national security, nuclear non-proliferation, regional instability, threats to economic security, and alleged support for terrorism. This list, maintained by the DOE’s Office of Intelligence and Counterintelligence (OICI) along with the National Nuclear Security Administration (NNSA), already included countries such as India, Israel, Pakistan, Saudi Arabia, and Taiwan. Additionally, North Korea and Iran are designated as “state sponsors of terrorism,” while China and Russia are considered “countries of concern.” Such a designation suggests that the U.S. has growing concerns about the increasing voices among South Korean academics, politicians, and citizens who support the development of domestic nuclear weapons. Recent surveys reveal that popular support for nuclear armament has reached between 60% and 70%, apparently stemming from the belief that South Korea must take a bold defensive measure against North Korea’s growing nuclear threats. Although some who favor this idea believe that President Donald Trump’s skeptical view of alliances — focused on reducing the financial burden of protecting U.S. allies — might allow Seoul to develop nuclear weapons and thus reduce Washington’s responsibilities on the Korean Peninsula, the likelihood of this happening remains slim. However, the debate will not disappear in the short term due to growing skepticism about the so-called U.S. “extended deterrence,” which relies only on the deployment of strategic assets in the South of the peninsula. In the meantime, the DPRK is very likely to feel satisfied, as it sees its long-standing desire fulfilled: to witness cracks in the Washington–Seoul alliance. Another decision that would benefit the DPRK under the so-called “strategic flexibility” is the projection that the Trump administration may deploy U.S. troops stationed in South Korea in the event of a conflict in the Taiwan Strait, following the circulation of a purported Pentagon memorandum detailing its objective of deterring China from occupying Taiwan. As is well known, the primary mission of the 28,500 U.S. troops in South Korea is to deter threats from the DPRK. Should this decision materialize, their mission would then shift to countering China, considered a key component of the current administration’s foreign policy. This would create a security vacuum for Seoul and further strain its relations with Beijing. In such a circumstance, the Trump administration could pressure South Korea to handle conventional military actions from the DPRK independently, with the U.S. intervening only in the case of nuclear threats. Therefore, the best option for Seoul is to significantly strengthen its defensive capabilities, preparing for a scenario in which U.S. troops are not involved in a conventional war with the DPRK. The notion of “strategic flexibility” for the USFK reflects a shift in the main mission of U.S. forces abroad, moving from the defense of nations through their permanent presence to rapid deployment in other parts of the world where conflicts arise. As expected, unease is growing in Seoul in the face of Pyongyang’s increasing assertiveness, while the latter shows greater defiance. First, due to the possibility that Trump’s second administration may divert part of the USFK’s resources to a conflict in the Taiwan Strait, which would leave South Korea more vulnerable. Second, because South Korea is currently in open political turmoil over the impeachment of President Yoon Suk Yeol, and everything seems to indicate that the so-called South Korean democracy has failed to demonstrate itself as reliable in the eyes of Trump and his team. It is worth mentioning what Moon Chung In, emeritus professor at Yonsei University, stated in his most recent book, titled “Why American Diplomacy Fails”. The expert describes North Korea’s nuclear problem as an illustrative failure of U.S. diplomacy. His remarks are eloquent when he says: “In my conversations with members of the Trump administration during my trip to America, I had the impression that they firmly feel that Korea [South Korea] has been getting a free ride [on U.S. security] for far too long. South Korea’s excessive dependence on the United States could have serious consequences. The Korean government needs to develop autonomous strategic thinking. It needs to explore creative contingency plans for the worst-case scenario of a U.S. absence from the Korean peninsula.” We can see that Trump’s return is testing diplomatic limits and fueling a key question: Will Trump’s return to the White House open another cycle of engagement with Kim Jong Un, but with new attributes? The U.S. president always highlights his good personal relationship with the DPRK leader, something that, undoubtedly, could have a positive effect. But, as of today, Pyongyang seems to lack incentives to negotiate with Washington for four essential reasons: Military, it has achieved significant advances in its conventional weapons programs, strategic missiles, and nuclear arms, which provide it with a high deterrent capability. Economically, even under heavy sanctions, it is experiencing moments of economic expansion, it has made progress in import substitution, its local industry is reviving, and infrastructure construction is in full development. This makes negotiating the lifting of sanctions, in general and with Washington in particular, less urgent for Pyongyang. Its willingness to take political risks in exchange for economic benefits has clearly diminished. Geostrategically, its military alliance with Russia may generate new revenues, transfers of military technology, practical experience in modern warfare, and weaken the international sanctions regime. Geopolitically, the world is entering a period of dynamic geopolitical realignment that could eventually result in a multipolar order. The DPRK seems well positioned due to its ties with two key actors in the multipolarization process: Russia and China. At the same time, it observes the disruption of the traditional alliance structure with the United States and sees Washington distancing itself from its main allies, who are also DPRK’s adversaries in East Asia. Therefore, it appears willing to watch the evolution of events and their outcome. Donald Trump has stated that his administration has opened a line of communication with the DPRK and considered that, at some point, “something will probably happen,” emphasizing: “There is communication. I have a very good relationship with Kim Jong Un… I get along wonderfully with him… I think it is very important. It is a ‘great nuclear nation,’ and he is a ‘very smart guy.’ I got to know him very well… We will probably do something at some point.” It cannot be ruled out in this analysis that the DPRK is doubly leveraged. On one hand, with stable trade with China; on the other, with Russia’s reciprocity for its declared and materially sustained support for Russia’s special military operation in Ukraine. Therefore, additional incentives directly linked to DPRK’s comprehensive security must emerge. If the U.S. were to formally recognize the DPRK as a “de facto nuclear power,” which would represent a radical change in U.S. strategy, the prospect of future negotiations focused on threat reduction rather than denuclearization would open up. Despite Trump’s flattering words and the expectations they raise, it is not clear whether the U.S. president would be able to secure internal consensus within his administration to make such a decision without major obstacles, and, at the same time, manage to mitigate the suspicion and animosity of Kim Jong Un and the leadership around him. Conclusions The viability of negotiations between the U.S. and the DPRK under Trump’s new government remains uncertain, but it is possible that Trump will pursue a new “diplomatic victory” — similar to his 2018 Singapore summit with Kim Jong Un — through an alternative strategy that bilaterally satisfies Pyongyang’s aspiration to be recognized as a de facto nuclear state. However, it is unlikely that the international community would accept the U.S. unilaterally recognizing the DPRK as a nuclear-armed state. According to the Nuclear Non-Proliferation Treaty (NPT), a vote by the UN Security Council would be required, where the United Kingdom and France would surely veto it; and if it were brought to the General Assembly as a resolution, the number of opposing votes would probably be a majority. It is worth noting that the DPRK is doubly leveraged: it has stable trade with China and reciprocity from Russia for its material support, in addition to enjoying the diplomatic backing of both powers. Given its persistent distrust of Washington, it is to be expected that Pyongyang will maintain its close coordination with Beijing and Moscow and use it to strengthen its position vis-à-vis Washington. Thus, for the time being, it is not clear whether the U.S. president will be able to mitigate the suspicion and animosity of Kim Jong Un and the leadership surrounding him. Notes[1] Lee Jae Myung was elected as president of the Republic of Korea after the June 3rd, 2025 elections. References Aise Sotolongo, J. (2025). Return of Donald Trump: Continuity or change with the DPRK? World and New World Journal. https://worldnewworld.com/page/content.php?no=4082Chan-kyong, P. (2025, 12 de marzo). Kim Jong Un seeks negotiating leverage over Trump's new nuclear demands, analysts say. South China Morning Post. https://www.scmp.com/week-asia/politics/article/3296722/kim-jong-un-seeks-negotiating-leverage-over-trump-new-nuclear-demands-analystsChung-in, M. (2025, 15 de febrero). It's time Korea prepares itself for a peninsula without the US, expert advises. The Korea Herald. https://m.koreaherald.com/article/10455463Depetris, D. R. (2025, 9 de abril). Kim Jong Un is watching Trump's Ukraine diplomacy with interest. 38 North. https://www.38north.org/2025/04/kim-jong-un-iswatching-trump-ukranie-diplomacy-with-interestEFE. (2025a, 10 de enero). Pionyang dice que sus armas nucleares no son moneda de cambio para negociar. Swissinfo. https://www.swissinfo.ch/spa/pionyangdice-que-sus-armas-nucleares-no-son-moneda-decambio-para-negociar/88844909EFE. (2025b, 22 de marzo). Washington, Seúl y Tokio reafirman su compromiso para desnuclearizar a Corea del Norte. Swissinfo. https://www.swissinfo.ch/spa/washington%2C-se%C3%BAl-y-tokio-reafirman-su-compromiso-para-desnuclearizar-a-corea-del-norte/88881832EM Redacción. (2025, 12 de marzo). Estados Unidos califica a Corea del Sur como un "país sensible", limitando la cooperación en tecnología avanzada. Escenario Mundial. https://www.escenariomundial.com/2025/03/12/estados-unidos-califica-a-corea-del-sur-como-un-pais-sensible-limitando-la-cooperacion-en-tecnologia-avanzada/KBS WORLD. (2025, 5 de febrero). Seúl y Washington acuerdan limitar el término "desnuclearización" a Corea del Norte y no a toda la península. http://world.kbs.co.kr/service/news_view.htm?lang=s&Seq_Code=92262Kipiahov, O. (2025, 9 de febrero). Rossiian vstrechaiut s ulybkami posol RF v KNDR rasskazal kak zhivet severnaia koreia. Rossiyskaya Gazeta. https://rg.ru/2025/02/09/rossiian-vstrechaiut-s-ulybkami-posol-rf-v-kndr-rasskazal-kak-zhivet-severnaia-koreia.htmlKYODO NEWS. (2025, 18 de marzo). China eyes teaming up with Japan, South Korea to denuclearize N. Korea. https://english.kyodonews.net/news/2025/03/c5e26b7d5347-htmlLankov, A. (2025, 9 de febrero). Trump’s North Korea nuclear diplomacy: Between bad and worse. Asialink Diplomacy. https://asialink.unimelb.edu.au/diplomacy/article/trump-north-korea-diplomacy-between-bab-and-worse/McCartney, M. (2025, 17 de abril). Trump plans to disarm North Korea, but Kim wants more nuclear weapons. Newsweek. https://www.newsweek.com/us-north-korea-kim-jong-un-donald-trump-nuclear-weapons-2022678Minyoung Lee, R. (2025, 25 de abril). North Korea leaving maneuvering room with the US while preparing for long-term confrontation. 38 North. https://www.38north.org/2025/04/noth-koreas-acknowledgement-of-war-participation/Reddy, S. (2025, 9 de febrero). Russian envoy to DPRK says Moscow welcomes talks between US and North Korea. NK News. https://www.nknews.org/2025/02/russian-envoy-to-dprk-says-moscow-welcomestalks-between-us-and-north-korea/Sneider, D. (2025, 3 de abril). Is North Korea the next target of Trump’s search for a deal? Keia. https://wwwkeia.org/2025/04/north-korea-the-netx-target-oftrmps-search-for-a-deal/Sputnik. (2025, 31 de marzo). Trump valora su relación con líder norcoreano Kim Jong Un y planea un eventual contacto. El País CR. https://www.elpais.cr/2025/03/31/trump-valora-su-relacion-con-lidernorcoreano-kim-jong-un-y-planea-un-eventual-contacto/YONHAP. (2025, 8 de marzo). Trump appears to use 'nuclear power' label to lure N. Korea to dialogue: US expert. The Korea Times. https://m.koreatimes.co.kr/pages/article.asp?newsIdx=394200

Energy & Economics
Global business connection concept. Double exposure world map on capital financial city and trading graph background. Elements of this image furnished by NASA

Liaison countries as foreign trade bridge builders in the geo-economic turnaround

by Eva Willer

Introduction Geopolitical tensions are making global trade increasingly difficult. In order to reduce the associated risk of default, companies are shifting their trade relations to trading partners that are politically similar to them. In the course of the beginnings of geo-economic fragmentation, politically and economically like-minded countries are also gaining in importance for German and European decision-makers. Liaison countries1 in particular can form a counterforce to the trend towards polarization in foreign trade - especially between the USA and China: they are characterized by a pronounced economic and trade policy openness that overrides differences between geopolitical or ideological camps. Consequently, the question arises: How can relevant connecting countries for Germany and Europe be identified? What opportunities and risks do closer trade relations with these countries offer in order to strengthen foreign trade resilience in geopolitically uncertain times?  With a high degree of openness - defined as the sum of imports and exports in relation to gross domestic product - of over 80 percent2 , the German economy is strongly integrated into global trade. Accordingly, the disruptive effect of geo-economic fragmentation on the German economy would be above average. The defensive strategy to strengthen Germany's economic security by pushing for trade policy independence would only reinforce geo-economic fragmentation. Against the backdrop of comparatively high economic vulnerability, it is necessary to focus on those potential partner countries with which German and European foreign trade could be developed and expanded even under the condition of increasing fragmentation.  Geoeconomic Fragmentation  The term "geo-economic fragmentation" is used to describe the politically motivated reorganization of global goods and financial flows, in which strategic, economic and political interests primarily determine the choice of countries of origin and destination for trade flows.3 In the scenario of geo-economic fragmentation, the result would be the formation of a bloc within the global community of states, which would fundamentally change the regulatory structure of global economic networking. In this case, trade and investment would probably concentrate from a previously diverse range of economic partner countries - prior to the formation of the bloc - on those countries that now - since the formation of the bloc - belong to the same bloc.  The likelihood of this scenario occurring and leading to an increased fragmentation of the global economic order has increased again in the recent past. For example, Donald Trump's second term as US president is causing increasing geopolitical uncertainty worldwide.  Statements on the concrete form of a possible demarcation of potential blocs are subject to a great deal of uncertainty. However, the division of a large part of the global economy into a "US bloc" and a "China bloc" is a conceivable scenario for which German politics and business should prepare.  Data already shows that, at a global level, foreign trade openness has decreased in the recent past. Data from the World Trade Organization (WTO) illustrates the increasing hurdles in global trade in goods. While 3.1% of global imports were still affected by tariff or non-tariff barriers to trade in 2016 - including under WTO rules - this figure rose to 11.8% in 2024 over the following years.4 This development goes hand in hand with a noticeable loss of importance and enforcement of the WTO since the 2010s, which previously played a central role as the guardian of the rules-based global economic order.  Studies by the International Monetary Fund (IMF) have already found indications of an incipient geo-economic fragmentation along potential bloc borders. It shows that trade in goods and foreign direct investment between countries that would belong to the opposing camp in the event of a bloc formation declined on average in 2022 and 2023 - in contrast to foreign trade between countries that are geopolitically close.5  In this initial phase of geo-economic fragmentation, liaison countries are beginning to establish themselves as a counterforce, holding the fragmenting global community of states together with new trade and investment routes.  Identification of liaison countries Specifically, liaison countries have the following characteristics: a pronounced openness to foreign trade in the form of a high foreign trade quota and low tariff and non-tariff trade barriers, as well as pronounced economic relations with partner countries from different geopolitical camps. The geopolitical orientation of countries can be examined using data on voting behavior within the United Nations.6 This involves analyzing whether a country can be assigned to the US or Chinese camp - or whether there is no pronounced proximity and therefore political neutrality or "non-alignment" in the sense of ideological independence. The data-based identification of connecting countries is relatively new. Empirical analyses are also limited to connecting countries in the context of US-Chinese foreign trade - specifically US imports from China. In this case, the characteristics of a connecting country can be broken down into (1) "non-alignment" - i.e. a geopolitical distance to both a Western and an Eastern bloc - as well as (2) an increase in imports and foreign investment from China and (3) a simultaneous increase in exports to the United States. In a narrower sense, this is an evasive reaction to trade restrictions, i.e. circumventing trade. If the foreign trade indicators - specifically the trade and investment data relating to the US and China - of "non-aligned" countries for the period from 2017 to 2020 show corresponding characteristic-related changes compared to previous years, these can be identified as countries connecting the US and China.  The analysis of trade data shows that the value of direct exports from China to the USA fell during Donald Trump's first term in office. At the same time, both Chinese exports to some of the "non-aligned" countries and exports from these countries to the USA have increased significantly. These countries have presumably stepped in as a link on the export route from China to the US after the previously direct trade flow was interrupted by trade barriers and had to find a new route. Companies producing in China are therefore likely to have sought new, indirect ways to maintain access to the US sales market.  A certain statistical inaccuracy in the foreign trade data makes it difficult to draw a definitive conclusion in this context. It should be noted: No single commodity can be tracked across national borders in trade data collection. Whether the additional goods imported from China actually found their way to the United States can only be assumed approximately. However, if the trade flows are aggregated, a clearer picture emerges and the circumvention trade via selected connecting countries - including Vietnam and Mexico - becomes visible.  Data on foreign direct investment rounds off the analysis.7 "Non-aligned" countries in which an increase in Chinese investment can be seen between 2016 and 2020 in addition to trade flows can be identified as connecting countries. Here, too, available data suggests that the companies concerned either exported their goods to the United States via a stopover or even outsourced parts of their production destined for the US market to connecting countries. Five connecting countries between the US and China Based on the 2017-2020 study period, various connecting countries can be empirically identified that were used to indirectly maintain access to the US market. In terms of foreign trade volume, the economically most important connecting countries include Mexico, Vietnam, Poland, Morocco and Indonesia.8 All five countries are characterized by the fact that both their exports of goods to the US and their imports of goods from China increased significantly between 2017 and 2020. In addition, greenfield investments (foreign direct investment to set up a new production facility) have risen significantly compared to the period before 2017.  However, the five countries show different priorities in their development, which differentiate them in their role as connecting countries between the USA and China. In Vietnam, exports to the USA in particular have risen sharply. China has been the most important procurement market for Vietnamese companies for years. Poland, Mexico and Indonesia are characterized as connecting countries primarily by the significant increase in imports from China. Morocco, in turn, was able to attract more Chinese foreign investment in particular. Greenfield investments have almost tripled here since 2017. However, Poland - a rather surprising candidate for the role of liaison country, as it is intuitively assigned to the US-oriented bloc - is positioned fairly centrally between the US and China according to the analysis of voting behavior within the United Nations9. In addition, Poland qualifies primarily due to the sharp rise in greenfield investments from China, primarily in the expansion of domestic battery production.10  It cannot be concluded from the previous studies on the USA and China whether German companies are also circumventing trade barriers from the USA via the countries identified. As the trade policy conflicts between the US and China differ significantly from those between the EU and China, there has been a lack of comparable empirical data to analyze connecting countries in the EU context. Opportunities and challenges As the German economy is strongly oriented towards foreign trade and is closely networked with both the USA and China, German companies play a particularly exposed role in the area of tension between the USA and China. Increased economic exchange with potential connecting countries would offer German companies an opportunity to mitigate the expected shock of a geopolitical bloc. They could at least maintain international trade to a certain extent and thus secure some of the endangered sales and procurement markets. On the other hand, there are also costs associated with expanding foreign trade relations with potential connecting countries. The greater complexity also increases the risk in the value chains. Companies that position themselves wisely within this trade-off buy themselves valuable time in the event of a shock to reorganize themselves against the backdrop of changed foreign trade conditions.  From the perspective of foreign trade policy, it is also possible to examine the extent to which stronger foreign trade cooperation with (potential) connecting countries could have advantages. The trade-off between resilience and complexity must then be assessed at a macroeconomic level, beyond individual company interests. In order to make it easier for companies to connect to potential connecting countries and to create appropriate framework conditions, German and European policy can build on existing comprehensive strategies at national and European level. Both the China Strategy11 and the National Security Strategy12 focus foreign policy on connecting countries as part of a stronger economic and political risk diversification. There is also a similar framework at European level with the EU's Strategic Compass13 . Following on from this, the German government could create targeted incentives to open up new markets in liaison countries, which would diversify critical supply chains and reduce one-sided dependencies.  At the same time, connecting countries pose a challenge. These can be used to circumvent foreign trade measures such as sanctions if flows of goods can find alternative routes via connecting countries more easily than before.  In order to realize opportunities and overcome challenges, close cooperation between science, politics and companies is required. This first requires the identification of a selection of potential connecting countries through scientifically sound analysis. This creates the basis for the subsequent steps in which European and German policymakers work closely with companies to create attractive framework conditions for trade with potential connecting countries - for example through bilateral trade agreements.  Attractive foreign trade framework conditions can create the necessary incentive to actually expand trade relations with potential connecting countries. Companies need to weigh up individual cases and make forward-looking decisions: To what extent is there a risk of a loss of production triggered by geopolitical conflicts? And how much would the complexity of the value chain increase if more potential connecting countries were included? Ultimately, the actual choice of preferred sales and procurement markets lies with the individual companies. LicenseThis work is licensed under CC BY 4.0 References1. Verbindungsländer werden im Sinne von Connectors verstanden, vgl. Gita Gopinath/Pierre-Olivier Gourinchas/Andrea F Presbitero/Petia Topalova, Changing Global Linkages: A New Cold War?, Washington, D.C.: IMF, April 2024 (IMF Working Paper) <https://www.imf.org/en/Publications/WP/Issues/2024/04/05/Changing-Global-Linkages-A-New-ColdWar-547357/>. 2. Statistisches Bundesamt (Destatis), Außenwirtschaft. 2025, <https://www.destatis.de/DE/Themen/Wirtschaft/Globalisierungsindikatoren/aussenwirtschaft.html#246 078/>.  3. Shekahar Aiyar/Franziska Ohnsorge, Geoeconomic Fragmentation and ‚Connector’ Countries, Online verfügbar unter:  <https://mpra.ub.uni-muenchen.de/121726/1/MPRA_paper_121726.pdf>.4. WTO, WTO Trade Monitoring Report, Genf, November 2024, <https://www.wto.org/english/tratop_e/tpr_e/factsheet_dec24_e.pdf/>. 5. Gita Gopinath/Pierre-Olivier Gourinchas/Andrea F Presbitero/Petia Topalova, Changing Global Linkages: A New Cold War?, Washington, D.C.: IMF, April 2024 (IMF Working Paper) <https://www.imf.org/en/Publications/WP/Issues/2024/04/05/Changing-Global-Linkages-A-New-ColdWar-547357/>.  6. Michael A. Bailey/Anton Strezhnev/Erik Voeten, »Estimating Dynamic State Preferences from United Nations Voting Data«, Journal of Conflict Resolution, 61 (2017) 2, S. 430-456, <https://journals.sagepub.com/doi/10.1177/0022002715595700/>.7. Gita Gopinath/Pierre-Olivier Gourinchas/Andrea F Presbitero/Petia Topalova, Changing Global Linkages: A New Cold War?, Washington, D.C.: IMF, April 2024 (IMF Working Paper) <https://www.imf.org/en/Publications/WP/Issues/2024/04/05/Changing-Global-Linkages-A-New-ColdWar-547357/>. War-547357. 8. Enda Curran/Shawn Donnan/Maeva Cousin, »These Five Countries are Key Economic ‚Connectors‘ in a Fragmenting World«, in Bloomberg (online), 1.11.2023, <https://www.bloomberg.com/news/articles/2023-1102/vietnam-poland-mexico-morocco-benefit-from-us-china-tensions/>.9. Michael A. Bailey/Anton Strezhnev/Erik Voeten, »Estimating Dynamic State Preferences from United Nations Voting Data«, Journal of Conflict Resolution, 61 (2017) 2, S. 430-456, <https://journals.sagepub.com/doi/10.1177/0022002715595700/>.  10. Enda Curran/Shawn Donnan/Maeva Cousin, »These Five Countries are Key Economic ‚Connectors‘ in a Fragmenting World«, in Bloomberg (online), 1.11.2023, <https://www.bloomberg.com/news/articles/202311-02/vietnam-poland-mexico-morocco-benefit-from-us-china-tensions/>.11. Auswärtiges Amt, China‐Strategie der Bundesregierung, Berlin, Juli 2023, <https://www.auswaertigesamt.de/resource/blob/2608578/810fdade376b1467f20bdb697b2acd58/china-strategie-data.pdf/>.  12. Auswärtiges Amt, Integrierte Sicherheit für Deutschland: Nationale Sicherheitsstrategie, Berlin, Juni 2023, <https://www.bmvg.de/resource/blob/5636374/38287252c5442b786ac5d0036ebb237b/nationalesicherheitsstrategie-data.pdf/>.  13. Rat der Europäischen Union, Ein Strategischer Kompass für Sicherheit und Verteidigung, Brüssel, März 2022, <https://data.consilium.europa.eu/doc/document/ST-7371-2022-INIT/de/pdf/>.

Diplomacy
Flag of USA and China on a processor, CPU or GPU microchip on a motherboard. US companies have become the latest collateral damage in US - China tech war. US limits, restricts AI chips sales to China.

AI’s Great Power Paradox: Cooperation and Competition in the US-China Tech Rivalry

by Emmie Hine

As AI accelerates, the US and China shape the global governance landscape through parallel ambitions and contrasting ideologies. Understanding their policy trajectories reveals key inflection points for potential engagement. The United States and China are the world’s leading powers in artificial intelligence (AI)—and each has global ambitions. As AI development accelerates, so too do calls to regulate it responsibly. Both countries have the capacity to shape the future of AI governance. But understanding where cooperation might be possible requires understanding how each country’s approach has evolved. While their methods and ideologies differ, and their leadership aspirations often appear at odds, two underexamined forces—infrastructure and philosophy—may create unexpected space for mutual engagement. In the US, AI governance has long been shaped by the mythology of the free market. Under President Barack Obama, that mythology was tempered by calls for pipeline diversity. President Donald Trump discarded these in favour of rhetoric about “American values,” an ill-defined phrase deployed more as a competitive cudgel against China than a coherent policy vision. President Joe Biden attempted to resurrect some of Obama’s normative commitments—launching the Blueprint for an AI Bill of Rights, Executive Order 14110 on “safe, secure, and trustworthy AI,” and initiatives like the National AI Research Resource—but the foundations of his administration’s policies remained countering China’s influence through increased export controls and other measures. Trump’s second administration has once again changed focus away from equity and community-centredness, but the continued focus on competing with China and ensuring US “victory” in the “AI race” shows there’s more continuity than often assumed between different administrations’ AI approaches. China, for its part, has been more consistent in its governance strategy, even as it experiments at the margins. Its 2017 New Generation AI Development Plan cast AI as a pillar of national strength, and subsequent regulations on algorithms, deepfakes, generative AI, and facial recognition underscore a clear priority: balancing the “twin miracles” of economic development and social stability. Though early days of “fragmented authoritarianism” have given way to a more centralised approach with specific vertical laws, this logic remains embedded throughout the governance system. China is generally less explicit in its rhetoric than the US, with fewer exhortations about race dynamics and countering the US. In fact, it frequently invokes ideas of ethical pluralism and the language of international cooperation. This framing likely reflects a blend of genuine ideological positioning and diplomatic strategy, but it presents a challenge to US policymakers who continue to frame AI governance in moralising binaries. This is evident in two parallel AI Action Plans released in July 2025. The US released a guiding document—indicatively titled “Winning the Race: America’s AI Action Plan”—with an epigraph from President Trump stating: “As our global competitors race to exploit these technologies, it is a national security imperative for the United States to achieve and maintain unquestioned and unchallenged global technological dominance.” Though the Action Plan itself contains only three substantive references to China, it is built on the premise that global AI is an inherently competitive “race,” and China is clearly the US’s main competitor. A few days after the US AI Action Plan was released, China released its “Global AI Governance Action Plan.” It builds on the 2023 Global AI Governance Initiative, which seeks to portray China as a leader in the global pursuit of AI for the good of humanity and a “champion of the Global South.” The Global AI Governance Action Plan contains fewer specifics than the US AI Action Plan, but calls for “strengthening international cooperation on AI capacity building,” including supporting developing countries to design, implement, and govern AI. It also calls for building a global AI governance system through the UN and again shows the key balance of economic development and social stability: while it acknowledges the need to “jointly push for innovation breakthroughs,” it also advocates for strengthening “policy and regulatory coordination” and building an international AI safety governance framework. The US, on the other hand, is determined to cut “bureaucratic red tape and onerous regulation” while working primarily with its allies. However, recent events have called into question the feasibility of this approach. Notably, despite calls to increase export controls—and mobilise allies to do the same—the US announced shortly before the release of the AI Action Plan that it would again permit Nvidia to export H20 chips to China after previously restricting them. This was part of a trade deal in which China agreed to lighten restrictions on rare earth exports. Though seemingly counterintuitive, this deal reflects a fundamental reality of the modern AI ecosystem: the resources and supply chains enabling it are inextricably intertwined. China mines roughly 70 percent and processes 90 percent of rare earth minerals. US-based Nvidia has 92 percent of the GPU market. Both of these are critical for progress in AI. Both countries are attempting infrastructure decoupling, but the US may have to compromise on its fundamentalism to maintain access to the critical resources it needs. Meanwhile, its advanced chip dominance in turn provides leverage over China. Will this lead to broader cooperation? Geopolitical issues are likely too entrenched for each country to join hands and promote harmonious global AI governance. However, each country’s primary goal is the same: to benefit the “people.” China is claiming that its definition of “the people” is the global community—though this comes with the noted exclusion of domestic critics, including the Uighurs of Xinjiang, who are subject to AI-enabled surveillance and detention. The US’s definition of “the people” has changed from administration to administration, but currently seems to include the American people and potentially allied nations. It’s doubtful that the current administration will agree to substantive global AI governance discussions. But through its Action Plan, China has thrown down the gauntlet—engage with global AI governance or be an obstructionist. What the US will choose remains to be seen. Emmie Hine is a Research Associate at the Yale Digital Ethics Center and a PhD candidate in Law, Science, and Technology at the University of Bologna and KU Leuven. She researches the ethics and governance of emerging technologies, including AI. You can also find her byline in her weekly tech-focused newsletter, the Ethical Reckoner. Emmie holds degrees from Williams College and the University of Oxford, and previously worked as a software engineer. She’s on Bluesky here and X here. This article is published under a Creative Commons License and may be republished with attribution.

Diplomacy
US dollar and Chinese yuan on the map of Brazil. Economic competition between the China and USA in Latin America countries

China Advances and the US Retreats in Latin America and the Caribbean

by Hyeran Jo , Nathalie Mendez

The BRICS meeting in Rio on July 6th and 7th gives a snapshot of the great power competition between China and the United States in different regions around the world, including Latin America. China has become the largest trading partner for many countries in Latin America, investing heavily in infrastructure and forging political alliances that further its strategic objectives. For its part, the Trump Administration of the United States issued the statement that those participating countries will face increased tariffs. The statement was the continuation of exercise and assertion of its authority for the past and present century. The positioning of various BRICS members and participating countries is particularly telling of what the great power competition means in the region and also globally. Brazil’s Lula hosted the meeting aiming to showcase its foreign policy leadership, not necessarily antagonizing the West. Russia is still going through the war in Ukraine, and Putin attended only online. India’s Modi was present as well as Ramaphosa from South Africa. No show of Xi Jinping was notable, although Premier Li Qiang was attending. Besides the BRICS core, other countries also showed promotion of their interests. Iran, for one, joined the group in 2024 and sent a ministerial level delegation to rebuke recent strikes on Iran. As the United States appears to be pulling back from its traditional leadership role in the world, China is seizing the opportunity to expand its influence and reshape global dynamics. Through a combination of state-driven development policies and active international engagement, Beijing has positioned itself as a major player in the Global South, extending its reach beyond Asia to regions such as Africa and Latin America. China’s increasing presence in the region has been mainly driven by the Belt and Road Initiative (BRI) and a surge in trade volumes, marking a major shift in the region’s economic landscape. Many experts point to China’s use of “infrastructure diplomacy”—financing ambitious, strategic infrastructure projects across the region—as a key factor in this rise. The numbers tell a compelling story. Trade data from the World Bank (Figure 1) shows that in the past ten years, China has overtaken the United States as the leading trading partner for much of the region, upending a dynamic that had held steady since the early 2000s. Beyond trade, China’s influence deepens through the 22 countries in Latin America and the Caribbean that have joined the Belt and Road Initiative. Chinese loans have poured in, funding major energy, infrastructure, and development projects that have reshaped local economies. China’s push isn’t just economic—it’s political too. Beijing has taken steps to strengthen cultural ties, increase academic exchanges and boost tourism in Latin America, including waiving visa requirements for travelers from some countries. This multi-faceted approach highlights China’s pragmatic mix of economic self-interest and strategic diplomacy as it works to secure resources, expand markets, and bolster its global standing. On the other hand, the United States has long been a strategic ally and key trading partner for Latin America. Agencies like USAID have funneled millions of dollars into economic and military initiatives across the region. With the recent changes in the aid policy, immigration policy, and tariff policy, Washington’s recalibration of its foreign policy are transforming the geopolitical balance in Latin America and the Caribbean. As both powers deploy their strategies — from deepening economic ties to defending national interests — the decisions of Latin American states remain critical in shaping their alignments with global powers. The ultimate outcome is still up in the air, but one thing is clear: power in the region is actively being renegotiated. The diverging approaches from China and the US have set the stage for a broader reconfiguration of power in Latin America and the Caribbean. Yet, it’s essential to recognize that each country’s internal decisions and policies also play a critical role in shaping this shifting landscape. Colombia provides a case in point. Historically, it has maintained close diplomatic ties with the United States while keeping China at arm’s length. Unlike countries like Brazil, Argentina, and Peru, Colombia has received relatively little Chinese infrastructure investment. However, with the election of president Gustavo Petro—the first left-wing president in the country’s history—Colombia has taken decisive steps to strengthen its relationship with China, presenting new challenges for the United States to maintain its strategic foothold in the country. We observe – both on political and economic dimensions – that the changes in China’s strategy, coupled with Colombia’s domestic policies, have reduced the country’s dependence on the US while increasing its desire to integrate with China. Politically, Colombia and the United States have long enjoyed a strong diplomatic relationship, as reflected in their shared memberships in international organizations, high-level dialogues, and multiple bilateral agreements. However, diplomatic tensions have emerged in recent years. Disputes between the two leaders, the change of course of USAID, and a significant drop in new bilateral agreements over the past four years have contributed to a shift in this traditionally stable partnership. Against this backdrop, diplomatic ties between China and Colombia have strengthened. In 2023 alone, both countries signed 12 cooperation agreements in trade, technology, and economic development, upgraded their relationship to a strategic partnership, and Colombia’s entry into the Belt and Road Initiative during recent China – CELAC Forum in May. Colombia also joined the BRICS New Development Bank a few weeks after that Forum. Economically, the US has traditionally been Colombia’s largest trading partner, backed by a free trade agreement and significant investment. Yet, in recent years, the share of US trade has steadily declined, while China’s footprint has grown (see figure 1). Although there’s no formal trade agreement, ties have strengthened during the current administration, including the opening of a Buenaventura-Shanghai trade route in 2025. Additionally, China’s “infrastructural diplomacy” has significantly grown: over 100 Chinese companies now operate in Colombia, and major infrastructure projects like Bogotá’s Metro Line 1 and the Regiotram are underway, along with investments in mobility, technology, and health. Latin America, and Colombia in particular, finds itself at the center of a geopolitical tug-of-war with China’s calculated investments and the US’s shifting policies. While Beijing leverages trade, infrastructure, and cultural diplomacy to expand its influence, Washington’s recalibration of its foreign policy leaves room for new alliances and opportunities. Our analysis shows that power reconfiguration is not merely a product of external rivalry. It is driven by the choices each Latin American nation makes. As Colombia’s case demonstrates, the region’s destiny hinges not just on global superpowers, but on its own internal political decisions and developments. The coming years will test how Latin America navigates these shifting currents. Disclaimer This article was made possible in part by a grant from the Carnegie Corporation of New York (G-PS-24-62004, Small State Statecraft and Realignment). The statements made and views expressed are solely the responsibility of the authors. Figure 1: China vs. US Import and Export TrendsDrawn by the authors using data from the World Bank.  

Defense & Security
China Cyber Security Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured. 3d illustration

Chinese cyberespionage: The Invisible War That Threatens the West

by Gabriele Iuvinale

On March 4, the U.S. Department of Justice charged ten Chinese nationals with carrying out massive hacks against government agencies, media outlets, and dissidents in the United States and around the world. They allegedly acted on behalf of the Chinese company i-Soon, under contract from the Beijing government. Two officials from China’s Ministry of Public Security (MPS) were also indicted, identified as the ones “directing the attacks.” According to documents held by the U.S. justice system, China’s domestic intelligence services (MPS) and foreign intelligence (Ministry of State Security, MSS) relied on a vast network of private companies and domestic contractors to hack and steal information, thereby masking the Chinese government’s direct involvement. In some cases, the MPS and MSS paid private hackers to target specific victims. In many others, the attacks were speculative: hackers identified vulnerable computers, breached them, and extracted information that was later sold — either directly or indirectly — to the Chinese government. The Growth of Chinese Cyberespionage and Its Main Areas of Operation This is not an isolated case. Over the past decade, the People’s Republic of China’s (PRC) hacking program has expanded rapidly. In 2023, then-FBI Director Christopher Wray stated that it was larger than that of all other world powers combined. This increase in power and sophistication has led to success in three key areas: political interference, sabotage of critical infrastructure, and large-scale intellectual property theft. Beijing integrates computer networks, electronic warfare, economic, diplomatic, legal, military, intelligence, psychological, and military deception resources, along with security operations, to weaken states, make them economically dependent on China, and more receptive to a “new authoritarian world order with Chinese characteristics.” For this reason, unlike traditional interpretations, Chinese state-sponsored hacking should be understood within a broader context — where control over technology, strategic infrastructure, and global supply chains is part of “trans-military” and “non-military” warfare operations, as described by two People’s Liberation Army (PLA) colonels in the 1999 book “Unrestricted Warfare”. This approach is known as liminal warfare — an escalating conflict in which the spectrum of competition and confrontation with the West is so wide that the battlefield is, quite literally, everywhere. Cyberespionage as a Tool of Electronic Warfare In electronic warfare, hacking is used for sabotage during times of crisis or conflict. These actions are led by the People’s Liberation Army (PLA), the armed wing of the Chinese Communist Party. In 2023, it was discovered that a hacker group linked to the PLA, known as “Volt Typhoon”, had infiltrated a wide range of critical infrastructure in the U.S. for years, including ports, factories, and water treatment plants — both on the mainland and in strategic locations like Guam. “Volt Typhoon is a military operation with political and potentially military strategic purposes,” explained Ciaran Martin, former director of the UK’s cybersecurity agency. Led by the PLA’s cyber unit, the operation involved installing readiness capabilities — “digital traps,” as some call them — within critical U.S. infrastructure. In addition to a sustained attack in 2023 on a power company in Massachusetts, which aimed to extract sensitive data about its operational technology (OT) infrastructure, “Volt Typhoon” gained notoriety for multiple attacks on telecommunications systems in the U.S. and other critical infrastructures globally. One of its subunits, “Voltzite”, targeted the Littleton Electric and Water Departments, prompting the FBI and cybersecurity firm Dragos to respond jointly and publish a detailed report on the attack and its mitigation. Intellectual Property Theft Through Cyberespionage The most damaging channel for intellectual property theft is cyberespionage. These intrusions allow Chinese companies — sometimes with direct support from the Communist Party or the state — to access information on operations, projects, and technology from foreign firms. China has used state-backed and coordinated cyberespionage campaigns to steal information from companies in strategic sectors such as oil, energy, steel, and aviation. These actions serve both to acquire science and technology and to gather intelligence useful for future attacks on military, government, or technical systems. In the United States, there have been numerous precedents: • In 2014, five PLA hackers were indicted for economic espionage.• In 2017, three hackers linked to the Chinese firm Boyusec were charged with stealing confidential business information.• In 2018, two Chinese nationals were indicted for intellectual property theft.• In 2020, two hackers connected to the MSS were charged with targeting COVID-19 research. Among these, the 2018 indictment stands out as part of a broader U.S. effort to raise awareness about Chinese cyberespionage. On that occasion, Chinese hackers carried out a campaign known as “Cloud Hopper”, which involved a supply chain attack on service providers like Hewlett Packard and IBM. The defendants worked for Huaying Haitai and collaborated with the Tianjin State Security Bureau of the MSS. In 2017, the U.S. Commission on the Theft of American Intellectual Property estimated that such crimes cost the U.S. economy up to $600 billion annually — a figure comparable to the Pentagon’s defense budget and greater than the combined profits of the 50 largest companies in the Fortune 500. Beyond the United States: The Global Impact of Chinese Cyberespionage In June 2024, Dutch military intelligence (MIVD) warned that Chinese cyberespionage was broader than previously believed, affecting Western governments and defense companies. A 2023 cyberattack on the Dutch Ministry of Defense reportedly affected at least 20,000 people within a few months. In 2018, the Czech Republic’s National Cyber and Information Security Agency (NUKIB) issued a warning about risks linked to China. Since then, the country has strengthened its capabilities and controls against Beijing and has worked on mechanisms to counter foreign information manipulation. According to U.S. prosecutors, dozens of European parliamentarians have been targeted by Chinese attacks. In March 2024, the U.S. Department of Justice indicted hackers linked to the MSS for attacking “all EU members” of the Inter-Parliamentary Alliance on China (IPAC), a coalition critical of Beijing. In 2021, the hackers sent over a thousand emails to around 400 accounts linked to IPAC, attempting to spy on their internet activity and devices. In addition, ASML, the Dutch leader in semiconductor lithography, suffers “thousands of security incidents per year,” including several successful infiltration attempts by Chinese actors. Research centers like Imec (Belgium) are also frequent targets. Belgium has expelled Chinese researchers suspected of espionage. The European Union has reinforced security and identified advanced semiconductors as one of four critical technologies requiring risk assessments and enhanced protection. Notably, APT41 is one of the most active and sophisticated Chinese cyberespionage groups, based in the PRC and linked to the MSS. According to Google’s Threat Intelligence Group, APT41 combines state espionage with ransomware attacks — malicious programs that encrypt files and demand financial ransom to restore them — making attribution more difficult. Unlike other PLA-aligned groups whose operations are region-specific, APT41 acts globally, attacking strategic sectors in the U.S., Europe, Latin America, and the Caribbean. It also carries out financially motivated operations, particularly in the gaming industry. Mandiant, a global cybersecurity leader, highlights APT41’s technical capabilities: it frequently exploits zero-day and n-day vulnerabilities and uses techniques like phishing, social engineering, and SQL injections. Since 2020, APT41 has conducted large-scale campaigns against over 75 companies in more than 20 countries. It is responsible for compromising supply chains, such as in the “ShadowHammer” campaign targeting ASUS, which affected over 50,000 systems in 2018. APT41 is also linked to the use of “MESSAGETAP” malware in telecommunications networks. The Role of Chinese Universities in Cyberespionage Chinese universities also collaborate with the PLA and MSS in state-sponsored cyberespionage operations. Shanghai Jiao Tong University works directly with the Chinese military on such operations. Zhejiang University and the Harbin Institute of Technology are key centers for recruiting hackers. Xidian University offers students hands-on experience at provincial MSS offices and previously maintained ties with the Third Department of the PLA’s General Staff before its reorganization in 2015 into the Network Systems Department. One of its graduate programs is co-directed with the Guangdong Office of the Chinese Information Technology Security Evaluation Center (ITSEC), an MSS-run office that leads an active team of contractor hackers. Southeast University also maintains links with security services and co-manages the “Purple Mountain Lab” with the PLA’s Strategic Support Force. There, researchers collaborate on “critical strategic requirements,” operating systems, and interdisciplinary cybersecurity studies. The university also receives funding from the PLA and MSS to develop China’s cyber capabilities. The Cybersecurity undergraduate program at Shanghai Jiao Tong University (SJTU) is taught at a PLA information engineering base. Within this program, SJTU claims to work on “network and information systems testing and evaluation, security testing for connected smart networks, APT attack and defense testing, and key technologies for cyber ranges.” Universities associated with the MSS for talent recruitment include the University of Science and Technology of China, Shanghai Jiao Tong University, Xi’an Jiao Tong University, Beijing Institute of Technology, Nanjing University, and the Harbin Institute of Technology. In addition, some cybersecurity firms — such as Beijing TopSec — collaborate with the PLA in hacking campaigns, operator training, and developing future hackers. This article was originally published by Agenda Digitale and later by Expediente Abierto, who granted us permission for its translation and republication.

Energy & Economics
Commodity and alternative asset, gold bar and crypto currency Bitcoin on rising price graph as financial crisis or war safe haven, investment asset or wealth concept.

Assessing Bitcoin and Gold as Safe Havens Amid Global Uncertainties: A Rolling Window DCC-GARCH Analysis

by Anoop S Kumar , Meera Mohan , P. S. Niveditha

Abstract We examine the roles of Gold and Bitcoin as a hedge, a safe haven, and a diversifier against the coronavirus disease 2019 (COVID-19) pandemic and the Ukraine War. Using a rolling window estimation of the dynamic conditional correlation (DCC)-based regression, we present a novel approach to examine the time-varying safe haven, hedge, and diversifier properties of Gold and Bitcoin for equities portfolios. This article uses daily returns of Gold, Bitcoin, S&P500, CAC 40, and NSE 50 from January 3, 2018, to October 15, 2022. Our results show that Gold is a better safe haven than the two, while Bitcoin exhibits weak properties as safe haven. Bitcoin can, however, be used as a diversifier and hedge. This study offers policy suggestions to investors to diversify their holdings during uncertain times. Introduction Financial markets and the diversity of financial products have risen in both volume and value, creating financial risk and establishing the demand for a safe haven for investors. The global financial markets have faced several blows in recent years. From the Global Financial Crisis (GFC) to the outbreak of the pandemic and uncertainty regarding economic policy measures of governments and central banks, the financial markets including equity markets around the world were faced with severe meltdowns. This similar behavior was observed in other markets including equity and commodity markets, resulting in overall uncertainty. In this scenario, the investors normally flock toward the safe-haven assets to protect their investment. In normal situations, investors seek to diversify or hedge their assets to protect their portfolios. However, the financial markets are negatively impacted when there are global uncertainties. Diversification and hedging methods fail to safeguard investors’ portfolios during instability because almost all sectors and assets are negatively affected (Hasan et al., 2021). As a result, investors typically look for safe-haven investments to safeguard their portfolios under extreme conditions (Ceylan, 2022). Baur and Lucey (2010) provide the following definitions of hedge, diversifier, and safe haven: Hedge: An asset that, on average, has no correlation or a negative correlation with another asset or portfolio. On average, a strict hedge has a (strictly) negative correlation with another asset or portfolio.Diversifier: An asset that, on average, has a positive correlation (but not perfect correlation) with another asset or portfolio. Safe haven: This is the asset that in times of market stress or volatility becomes uncorrelated or negatively associated with other assets or a portfolio. As was previously indicated, the significant market turbulence caused by a sharp decline in consumer spending, coupled with insufficient hedging opportunities, was a common feature of all markets during these times (Yousaf et al., 2022). Nakamoto (2008) suggested a remedy by introducing Bitcoin, a “digital currency,” as an alternative to traditional fiduciary currencies (Paule-Vianez et al., 2020). Bitcoin often described as “Digital Gold” has shown greater resilience during periods of crises and has highlighted the potential safe haven and hedging property against uncertainties (Mokni, 2021). According to Dyhrberg (2016), the GFC has eased the emergence of Bitcoin thereby strengthening its popularity. Bouri et al. (2017) in their study indicate that Bitcoin has been viewed as a shelter from global uncertainties caused by conventional banking and economic systems. Recent research has found that Bitcoin is a weak safe haven, particularly in periods of market uncertainty like the coronavirus disease 2019 (COVID-19) crisis (Conlon & McGee, 2020; Nagy & Benedek, 2021; Shahzad et al., 2019; Syuhada et al., 2022). In contrast to these findings, a study by Yan et al. (2022) indicates that it can function as a strong safe haven in favorable economic times and with low-risk aversion. Ustaoglu (2022) also supports the strong safe-haven characteristic of Bitcoin against most emerging stock market indices during the COVID-19 period. Umar et al. (2023) assert that Bitcoin and Gold are not reliable safe-havens. Singh et al. (2024) in their study reveal that Bitcoin is an effective hedge for investments in Nifty-50, Sensex, GBP–INR, and JPY–INR, at the same time a good diversifier for Gold. The study suggests that investors can incorporate Bitcoin in their portfolios as a good hedge against market volatility in equities and commodities markets. During the COVID-19 epidemic, Barbu et al. (2022) investigated if Ethereum and Bitcoin could serve as a short-term safe haven or diversifier against stock indices and bonds. The outcomes are consistent with the research conducted by Snene Manzli et al. (2024). Both act as hybrid roles for stock market returns, diversifiers for sustainable stock market indices, and safe havens for bond markets. Notably, Bhuiyan et al. (2023) found that Bitcoin provides relatively better diversification opportunities than Gold during times of crisis. To reduce risks, Bitcoin has demonstrated a strong potential to operate as a buffer against global uncertainty and may be a useful hedging tool in addition to Gold and similar assets (Baur & Lucey, 2010; Bouri et al., 2017; Capie et al., 2005; Dyhrberg, 2015). According to Huang et al. (2021), its independence from monetary policies and minimal association with conventional financial assets allow it to have a safe-haven quality. Bitcoins have a substantial speed advantage over other assets since they are traded at high and constant frequencies with no days when trading is closed (Selmi et al., 2018). Additionally, it has been demonstrated that the average monthly volatility of Bitcoin is higher than that of Gold or a group of international currencies expressed in US dollars; nevertheless, the lowest monthly volatility of Bitcoin is lower than the maximum monthly volatility of Gold and other foreign currencies (Dwyer, 2015). Leverage effects are also evident in Bitcoin returns, which show lower volatilities in high return periods and higher volatilities in low return times (Bouri et al., 2017; Liu et al., 2017). According to recent research, Bitcoins can be used to hedge S&P 500 stocks, which increases the likelihood that institutional and retail investors will build secure portfolios (Okorie, 2020). Bitcoin demonstrates strong hedging capabilities and can complement Gold in minimizing specific market risks (Baur & Lucey, 2010). Its high-frequency and continuous trading further enrich the range of available hedging tools (Dyhrberg, 2016). Moreover, Bitcoin spot and futures markets exhibit similarities to traditional financial markets. In the post-COVID-19 period, Zhang et al. (2021) found that Bitcoin futures outperform Gold futures.Gold, silver, palladium, and platinum were among the most common precious metals utilized as safe-haven investments. Gold is one such asset that is used extensively (Salisu et al., 2021). Their study tested the safe-haven property of Gold against the downside risk of portfolios during the pandemic. Empirical results have also shown that Gold functions as a safe haven for only 15 trading days, meaning that holding Gold for longer than this period would result in losses to investors. This explains why investors buy Gold on days of negative returns and sell it when market prospects turn positive and volatility decreases (Baur & Lucey, 2010). In their study, Kumar et al. (2023) tried to analyse the trends in volume throughout futures contracts and investigate the connection between open interest, volume, and price for bullion and base metal futures in India. Liu et al. (2016) in their study found that there is no negative association between Gold and the US stock market during times of extremely low or high volatility. Because of this, it is not a strong safe haven for the US stock market (Hood & Malik, 2013). Post-COVID-19, studies have provided mixed evidence on the safe-haven properties of Gold (Bouri et al., 2020; Cheema et al., 2022; Ji et al., 2020). According to Kumar and Padakandla (2022), Gold continuously demonstrates safe-haven qualities for all markets, except the NSE, both in the short and long term. During the COVID-19 episode, Gold’s effectiveness as a hedge and safe-haven instrument has been impacted (Akhtaruzzaman et al., 2021). Al-Nassar (2024) conducted a study on the hedge effectiveness of Gold and found that it is a strong hedge in the long run. Bhattacharjee et al. (2023) in their paper examined the symmetrical and asymmetrical linkage between Gold price levels and the Indian stock market returns by employing linear autoregressive distributed lag and nonlinear autoregressive distributed lag models. The results exhibit that the Indian stock market returns and Gold prices are cointegrated. According to the most recent study by Kaczmarek et al. (2022), Gold has no potential as a safe haven, despite some studies on the COVID-19 pandemic showing contradictory results. The co-movements of Bitcoin and the Chinese stock market have also normalized as a result of this epidemic (Belhassine & Karamti, 2021). Widjaja and Havidz (2023) verified that Gold was a safe haven asset during the COVID-19 pandemic, confirming the Gold’s safe-haven characteristic. As previously pointed out, investors value safe-haven investments in times of risk. Investors panic at these times when asset prices fall and move from less liquid (risky) securities to more liquid (safe) ones, such as cash, Gold, and government bonds. An asset must be bought and sold rapidly, at a known price, and for a reasonably modest cost to be considered truly safe (Smales, 2019). Therefore, we need to properly re-examine the safe-haven qualities of Gold and Bitcoin due to the mixed evidences regarding their safe-haven qualities and the impact of COVID-19 and the war in Ukraine on financial markets. This work contributes to and deviates from the body of existing literature in the following ways. We propose a novel approach in this work to evaluate an asset’s time-varying safe haven, hedge, and diversifier characteristics. This research examines the safe haven, hedging, and diversifying qualities of Gold and Bitcoin against the equity indices; S&P 500, CAC 40, and NSE 50. Through the use of rolling window estimation, we extend the methodology of Ratner and Chiu (2013) by estimating the aforementioned properties of the assets. Comparing rolling window estimation to other conventional techniques, the former will provide a more accurate representation of an asset’s time-varying feature. This study explores the conventional asset Gold’s time-varying safe haven, hedging, and diversifying qualities during crises like the COVID-19 pandemic and the conflict in Ukraine. We use Bitcoin, an unconventional safe-haven asset, for comparison. Data and Methodology We use the daily returns of three major equity indices; S&P500, CAC 40, and NSE 50 from January 3, 2018, to October 15, 2022. The equity indices were selected to represent three large and diverse markets namely the United States, France, and India in terms of geography and economic development. We assess safe-haven assets using the daily returns of Gold and Bitcoin over the same time. Equity data was collected from Yahoo Finance, Bitcoin data from coinmarketcap.com, and Gold data from the World Gold Council website. Engle (2002) developed the DCC (Dynamic Conditional Correlation)-GARCH model, which is frequently used to assess contagion amid pandemic uncertainty or crises. Time-varying variations in the conditional correlation of asset pairings can be captured using the DCC-GARCH model. Through employing this model, we can analyse the dynamic behavior of volatility spillovers. Engle’s (2002) DCC-GARCH model contains two phases; 1. Univariate GARCH model estimation2. Estimation of time-varying conditional correlation. For its explanation, mathematical characteristics, and theoretical development, see here [insert the next link in “the word here” https://journals.sagepub.com/doi/10.1177/09711023251322578] Results and Discussion The outcomes of the parameters under the DCC-GARCH model for each of the asset pairs selected for the investigation are shown in Table 1.   First, we look at the dynamical conditional correlation coefficient, ρ.The rho value is negative and insignificant for NSE 50/Gold, NSE 50 /BTC, S&P500/Gold, and S&P500/BTC indicating a negative and insignificant correlation between these asset pairs, showing Gold and Bitcoin as potential hedges and safe havens. The fact that ρ is negative and significant for CAC 40/Gold suggests that Gold can be a safe haven against CAC 40 swings. The asset pair CAC/BTC, on the other hand, has possible diversifier behavior with ρ being positive but statistically insignificant. Next, we examine the behavior of the DCC-GARCH parameters; α and β. We find that αDCC is statistically insignificant for all the asset pairs, while βDCC is statistically significant for all asset pairs. βDCC quantifies the persistence feature of the correlation and the extent of the impact of volatility spillover in a particular market’s volatility dynamics. A higher βDCC value implies that a major part of the volatility dynamics can be explained by the respective market’s own past volatility. For instance, the NSE 50/Gold’s βDCC value of 0.971 shows that there is a high degree of volatility spillover between these two assets, with about 97% of market volatility being explained by the assets’ own historical values and the remainder coming from spillover. Thus, we see that the volatility spillover is highly persistent (~0.8) for all the asset pairs except NSE 50/BTC. The results above show that the nature of the dynamic correlation between the stock markets, Bitcoin and Gold is largely negative, pointing toward the possibility of Gold and Bitcoin being hedge/safe haven. However, a detailed analysis is needed to confirm the same by employing rolling window analysis, and we present the results in the forthcoming section. We present the rolling window results for S&P500 first. We present the regression results for Gold in Figure 1 and Bitcoin in Figure 2   Figure 1. Rolling Window Regression Results for S&P500 and Gold.Note: Areas shaded under factor 1 represent significant regression coefficients. In Figure 1, we examine the behavior of β0 (intercept term), β1, β2, and β3 (partial correlation coefficients). The intercept term β0 will give an idea about whether the asset is behaving as a diversifier or hedge. Here, the intercept term shows significance most of the time. However, during 2018, the intercept was negative and significant, showing that it could serve as a hedge during geopolitical tensions and volatilities in the global stock market. However, during the early stages of COVID-19, we show that the intercept is negative and showing statistical significance, suggesting that Gold could serve as a hedge during the initial shocks of the pandemic. These findings are contrary to the results in the study by Tarchella et al. (2024) where they found hold as a good diversifier. Later, we find the intercept to be positive and significant, indicating that Gold could act as a potential diversifier. But during the Russia-Ukraine War, Gold exhibited hedge ability again. Looking into the behavior of β1, which is the partial correlation coefficient for the tenth percentile of return distribution shows negative and insignificant during 2018. Later, it was again negative and significant during the initial phases of COVID-19, and then negative in the aftermath, indicating that Gold could act as a weak safe haven during the COVID-19 pandemic. Gold could serve as a strong safe haven for the SP500 against volatility in the markets brought on by the war in Ukraine, as we see the coefficient to be negative and large during this time. From β2 and β3, the partial correlation coefficients of the fifth and first percentile, respectively, show that Gold possesses weak safe haven properties during COVID-19 and strong safe haven behavior during the Ukraine crisis. Next, we examine the characteristics of Bitcoin as a hedge/diversifier/safe haven against the S&P500 returns. We present the results in Figure 2.   Figure 2. Rolling Window Regression Results for S&P500 and Bitcoin.Note: Areas shaded under factor 1 represent significant regression coefficients. Like in the previous case, we begin by analysing the behavior of the intercept coefficient, which is β0. As mentioned earlier the intercept term will give a clear picture of the asset’s hedging and diversifier property. In the period 2018–2019, the intercept term is positive but insignificant. This could be due to the large volatility in Bitcoin price movements during the period. It continues to be minimal (but positive) and insignificant during 2019–2020, indicating toward weak diversification possibility. Post-COVID-19 period, the coefficient shows the significance and positive value, displaying the diversification potential. We see that the coefficient remains positive throughout the analysis, confirming Bitcoin’s potential as a diversifier. Looking into the behavior of β1 (the partial correlation coefficient at tenth percentile), it is positive but insignificant during 2018. The coefficient is having negative sign and showing statistical significance in 2019, suggesting that Bitcoin could be a good safe haven in that year. This year was characterized by a long list of corporate scandals, uncertainties around Brexit, and tensions in global trade. We can observe that throughout the COVID-19 period, the coefficient is showing negative sign and negligible during the March 2020 market meltdown, suggesting inadequate safe-haven qualities. However, Bitcoin will regain its safe-haven property in the coming periods, as the coefficient is negative and significant in the coming months. The coefficient is negative and shows statistical significance during the Ukrainian crisis, suggesting strong safe-haven property. Only during the Ukrainian crisis could Bitcoin serve as a safe haven, according to the behavior of β2, which displays the partial correlation coefficient at the fifth percentile. Bitcoin was a weak safe haven during COVID-19 and the Ukrainian crisis, according to β3, the partial correlation coefficient for the first percentile (coefficient negative and insignificant). According to the overall findings, Gold is a stronger safe haven against the S&P 500’s swings. This result is consistent with the previous studies of Triki and Maatoug (2021), Shakil et al. (2018), Będowska-Sójka and Kliber (2021), Drake (2022), and Ghazali et al. (2020), etc. The same analysis was conducted for the CAC 40 and the NSE 50; the full analysis can be found here [insert the next link in “the word here” https://journals.sagepub.com/doi/10.1177/09711023251322578]. However, it is important to highlight the respective results: In general, we may say that Gold has weak safe-haven properties considering CAC40. We can conclude that Bitcoin’s safe-haven qualities for CAC40 are weak. We can say that Gold showed weak safe-haven characteristics during the Ukraine crisis and good safe-haven characteristics for the NSE50 during COVID-19. We may say that Bitcoin exhibits weak safe haven, but strong hedging abilities to NSE50. Concluding Remarks In this study, we suggested a new method to evaluate an asset’s time-varying hedge, diversifier, and safe-haven characteristics. We propose a rolling window estimation of the DCC-based regression of Ratner and Chiu (2013). Based on this, we estimate the conventional asset’s time-varying safe haven, hedging, and diversifying properties during crises like the COVID-19 pandemic and the conflict in Ukraine. For comparison purposes, we include Bitcoin, a nonconventional safe-haven asset. We evaluate Gold and Bitcoin’s safe haven, hedging, and diversifier properties to the S&P 500, CAC 40, and NSE 50 variations. We use a rolling window of length 60 to estimate the regression. From the results, we find that Gold can be considered as a better safe haven against the fluctuations of the S&P 500. In the case of CAC 40, Gold and Bitcoin have weak safe-haven properties. While Bitcoin demonstrated strong safe-haven characteristics during the Ukraine crisis, Gold exhibited strong safe-haven characteristics during COVID-19 for the NSE 50. Overall, the findings indicate that Gold is the better safe haven. This outcome is consistent with earlier research (Będowska-Sójka & Kliber, 2021; Drake, 2022; Ghazali et al., 2020; Shakil et al., 2018; Triki & Maatoug, 2021). When it comes to Bitcoin, its safe-haven feature is weak. Bitcoin, however, works well as a diversifier and hedge. Therefore, from a policy perspective, investing in safe-haven instruments is crucial to lower the risks associated with asset ownership. Policymakers aiming to enhance the stability of financial portfolios might encourage institutional investors and other market players to incorporate Gold into their asset allocations. Gold’s strong safe-haven qualities, proven across various market conditions, make it a reliable choice. Gold’s performance during crises like COVID-19 highlights its potential to mitigate systemic risks effectively. Further, Bitcoin could also play a complementary role as a hedge and diversifier, especially during periods of significant volatility such as the Ukraine crisis. While Bitcoin’s safe-haven characteristics are relatively weaker, its inclusion in a diversified portfolio offers notable value and hence it should not be overlooked. Further, policymakers may consider how crucial it is to monitor dynamic correlations and periodically rebalance portfolios to account for shifts in the safe haven and hedging characteristics of certain assets. Such measures could help reduce the risks of over-reliance on a single asset type and create more resilient portfolios that can better withstand global economic shocks. For future research, studies can be conducted on the estimation of the rolling window with different widths. This is important to understand how the safe-haven property changes across different holding periods. Further, more equity markets would be included to account for the differences in market capitalization and index constituents. This study can be extended by testing these properties for multi-asset portfolios as well. We intend to take up this study in these directions in the future. Data Availability StatementNot applicable.Declaration of Conflicting InterestsThe authors declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.FundingThe authors received no financial support for the research, authorship, and/or publication of this article.ReferencesAkhtaruzzaman M., Boubaker S., Lucey B. M., & Sensoy A. (2021). Is gold a hedge or a safe-haven asset in the COVID-19 crisis? Economic Modelling, 102, 105588. Crossref. Web of Science.Al-Nassar N. S. (2024). Can gold hedge against inflation in the UAE? A nonlinear ARDL analysis in the presence of structural breaks. PSU Research Review, 8(1), 151–166. Crossref.Barbu T. C., Boitan I. A., & Cepoi C. O. (2022). Are cryptocurrencies safe havens during the COVID-19 pandemic? A threshold regression perspective with pandemic-related benchmarks. Economics and Business Review, 8(2), 29–49. Crossref.Baur D. G., & Lucey B. M. (2010). Is gold a hedge or a safe haven? An analysis of stocks, bonds and gold. Financial Review, 45(2), 217–229. Crossref.Będowska-Sójka B., & Kliber A. (2021). Is there one safe-haven for various turbulences? The evidence from gold, Bitcoin and Ether. The North American Journal of Economics and Finance, Elsevier, 56, 101390. Crossref.Belhassine O., & Karamti C. (2021). Contagion and portfolio management in times of COVID-19. Economic Analysis and Policy, 72, 73–86. Crossref. PubMed. Web of Science.Bhattacharjee A., Das J., & Kumar S. (2023). Evaluating the symmetrical and asymmetrical linkage between gold price and Indian stock market in the presence of structural change. NMIMS Management Review, 31(4), 288–297. Crossref. Web of Science.Bhuiyan R. A., Husain A., & Zhang C. (2023). Diversification evidence of Bitcoin and Gold from wavelet analysis. Financial Innovation, 9(1), 100. Crossref. PubMed. Web of Science.Bouri E., Azzi G., & Dyhrberg A. H. (2017). On the return-volatility relationship in the Bitcoin market around the price crash of 2013. Economics, 11(1), 2. Crossref.Bouri E., Gupta R., Tiwari A. K., & Roubaud D. (2017). Does Bitcoin hedge global uncertainty? Evidence from wavelet-based quantile-in-quantile regressions. Finance Research Letters, 23, 87–95. Crossref. Web of Science.Bouri E., Shahzad S. J. H., Roubaud D., Kristoufek L., & Lucey B. (2020). Bitcoin, gold, and commodities as safe havens for stocks: New insight through wavelet analysis. The Quarterly Review of Economics and Finance, 77, 156–164. Crossref. Web of Science.Brenner M., & Galai D. (1989). New financial instruments for hedge changes in volatility. Financial Analysts Journal, 45(4), 61–65. Crossref.Capie F., Mills T. C., & Wood G. (2005). Gold as a hedge against the dollar. Journal of International Financial Markets, Institutions and Money, 15(4), 343–352. Crossref.Ceylan Ö. (2022). Hedging Effectiveness of the VIX ETPs: An analysis of the time-varying performance of the VXX. In Handbook of research on new challenges and global outlooks in financial risk management (pp. 384–401). IGI Global. Crossref.Cheema M. A., Faff R., & Szulczyk K. R. (2022). The 2008 global financial crisis and COVID-19 pandemic: How safe are the safe haven assets? International Review of Financial Analysis, 83, 102316. Crossref. PubMed. Web of Science.Conlon T., & McGee R. (2020). Safe haven or risky hazard? Bitcoin during the COVID-19 bear market. Finance Research Letters, 35, 101607. Crossref. PubMed. Web of Science.Demir E., Gozgor G., Lau C. K. M., & Vigne S. A. (2018). Does economic policy uncertainty predict the Bitcoin returns? An empirical investigation. Finance Research Letters, 26, 145–149. Crossref. Web of Science.Drake P. P. (2022). The gold-stock market relationship during COVID-19. Finance Research Letters, 44, 102111. Crossref. PubMed. Web of Science.Dwyer G. P. (2015). The economics of Bitcoin and similar private digital currencies. Journal of Financial Stability, 17, 81–91. Crossref. Web of Science.Dyhrberg A. H. (2015). Hedging capabilities of bitcoin. Is it the virtual gold? Finance Research Letters, 1–6. https://doi.org/10.1016/j.frl.2015.10.025Dyhrberg A. H. (2016). Hedging capabilities of bitcoin. Is it the virtual gold? Finance Research Letters, 16, 139–144. https://doi.org/10.1016/j.frl.2015.10.025 Web of Science.Engle R. (2002). Dynamic conditional correlation: A simple class of multivariate generalized autoregressive conditional heteroskedasticity models. Journal of Business & Economic Statistics, 20(3), 339–350. Crossref. Web of Science.Ghazali M. F., Lean H. H., & Bahari Z. (2020). Does gold investment offer protection against stock market losses? Evidence from five countries. The Singapore Economic Review, 65(02), 275–301. Crossref.Hasan M. B., Hassan M. K., Rashid M. M., & Alhenawi Y. (2021). Are safe haven assets really safe during the 2008 global financial crisis and COVID-19 pandemic? Global Finance Journal, 50, 100668. Crossref. PubMed.Hood M., & Malik F. (2013). Is gold the best hedge and a safe haven under changing stock market volatility? Review of Financial Economics, 22(2), 47–52. Crossref.Huang Y., Duan K., & Mishra T. (2021). Is Bitcoin really more than a diversifier? A pre-and post-COVID-19 analysis. Finance Research Letters, 43, 102016. Crossref.Ji Q., Zhang D., & Zhao Y. (2020). Searching for safe-haven assets during the COVID-19 pandemic. International Review of Financial Analysis, 71, 101526. Crossref. PubMed. Web of Science.Kaczmarek T., Będowska-Sójka B., Grobelny P., & Perez K. (2022). False safe haven assets: Evidence from the target volatility strategy based on recurrent neural network. Research in International Business and Finance, 60, 101610. Crossref. Web of Science.Kumar A. S., & Padakandla S. R. (2022). Testing the safe-haven properties of gold and bitcoin in the backdrop of COVID-19: A wavelet quantile correlation approach. Finance Research Letters, 47, 102707. Crossref. PubMed. Web of Science.Kumar M. A., Swathi J., Pallavi T. A., & Bavana S. (2023). Volume progression and price–volume relationship of commodity futures: Case of bullion and base metals. NMIMS Management Review, 31(4), 265–274. https://doi.org/10.1177/09711023241230463 Web of Science.Liu C. S., Chang M. S., Wu X., & Chui C. M. (2016). Hedges or safe havens—Revisit the role of gold and USD against stock: A multivariate extended skew-t copula approach. Quantitative Finance, 16(11), 1763–1789. Crossref.Liu R., Zhichao S., Wei G., & Wang W. (2017). GARCH model with fat-tailed distributions and Bitcoin exchange rate returns. Journal of Accounting, Business and Finance Research, 1(1), 71–75. https://doi.org/10.2139/ssrn.3666106 Crossref.Mokni K. (2021). When, where, and how economic policy uncertainty predicts Bitcoin returns and volatility? A quantiles-based analysis. The Quarterly Review of Economics and Finance, 80, 65–73. Crossref.Nagy B. Z., & Benedek B. (2021). Higher co-moments and adjusted Sharpe ratios for cryptocurrencies. Finance Research Letters, 39, 101543. Crossref. Web of Science.Nakamoto S. (2008). Bitcoin: A peer-to-peer electronic cash system. Bitcoin. https://bitcoin.org/bitcoin.pdfOkorie D. I. (2020). Could stock hedge Bitcoin risk(s) and vice versa? Digital Finance, 2(1), 117–136. Crossref.Paule-Vianez J., Prado-Román C., & Gómez-Martínez R. (2020). Economic policy uncertainty and Bitcoin. Is Bitcoin a safe-haven asset? European Journal of Management and Business Economics, 29(3), 347–363. Crossref.Ratner M., & Chiu C. C. J. (2013). Hedging stock sector risk with credit default swaps. International Review of Financial Analysis, 30, 18–25. Crossref. Web of Science.Salisu A. A., Raheem I. D., & Vo X. V. (2021). Assessing the safe haven property of the gold market during COVID-19 pandemic. International Review of Financial Analysis, 74, 101666. Crossref. PubMed. Web of Science.Saxena S., & Villar A. (2008). Hedging instruments in emerging market economies. Financial globalisation and emerging market capital flows. BIS Papers, 44, 71–87.Selmi R., Mensi W., Hammoudeh S., & Bouoiyour J. (2018). Is Bitcoin a hedge, a safe haven or a diversifier for oil price movements? A comparison with gold. Energy Economics, 74, 787–801. Crossref. Web of Science.Shahzad S. J. H., Bouri E., Roubaud D., Kristoufek L., & Lucey B. (2019). Is Bitcoin a better safe-haven investment than gold and commodities? International Review of Financial Analysis, 63, 322–330. Crossref. Web of Science.Shakil M. H., Mustapha I. H. M., Tasnia M., & Saiti B. (2018). Is gold a hedge or a safe haven? An application of ARDL approach. Journal of Economics, Finance and Administrative Science, 23(44), 60–76. Crossref.Singh V. V., Singh H., & Ansari A. (2024). Bitcoin as a distinct asset class for hedging and portfolio diversification: A DCC-GARCH model analysis. NMIMS Management Review, 32(1), 7–13. Crossref. Web of Science.Smales L. A. (2019). Bitcoin as a safe haven: Is it even worth considering? Finance Research Letters, 30, 385–393. Crossref. Web of Science.Snene Manzli Y., Alnafisah H., & Jeribi A. (2024). Safe haven ability of energy and agricultural commodities against G7 stock markets and banking indices during COVID-19, Russia–Ukraine War, and SVB collapse: Evidence from the wavelet coherence approach. Discrete Dynamics in Nature and Society, 2024(1), 2587000. Crossref.Syuhada K., Suprijanto D., & Hakim A. (2022). Comparing gold’s and Bitcoin’s safe-haven roles against energy commodities during the COVID-19 outbreak: A vine copula approach. Finance Research Letters, 46, 102471. Crossref. PubMed. Web of Science.Tarchella S., Khalfaoui R., & Hammoudeh S. (2024). The safe haven, hedging, and diversification properties of oil, gold, and cryptocurrency for the G7 equity markets: Evidence from the pre-and post-COVID-19 periods. Research in International Business and Finance, 67, 102125. Crossref. Web of Science.Triki M. B., & Maatoug A. B. (2021). The GOLD market as a safe haven against the stock market uncertainty: Evidence from geopolitical risk. Resources Policy, 70, 101872. Crossref. Web of Science.Umar Z., Bossman A., Choi S. Y., & Teplova T. (2023). The relationship between global risk aversion and returns from safe-haven assets. Finance Research Letters, 51, 103444. Crossref. Web of Science.Ustaoglu E. (2022). Safe-haven properties and portfolio applications of cryptocurrencies: Evidence from the emerging markets. Finance Research Letters, 47, 102716. Crossref. Web of Science.Widjaja M., & Havidz S. A. H. (2023). Are gold and cryptocurrency a safe haven for stocks and bonds? Conventional vs Islamic markets during the COVID-19 pandemic. European Journal of Management and Business Economics (ahead-of-print).Yan Y., Lei Y., & Wang Y. (2022). Bitcoin is a safe-haven asset and a medium of exchange. Axioms, 11(8), 415. Crossref.Yousaf I., Plakandaras V., Bouri E., & Gupta R. (2022). Hedge and safe haven properties of gold, US Treasury, Bitcoin, and Dollar/CHF against the FAANA companies and S&P 500 (Department of Economics, Working Paper Series No. 2022–27). University of Pretoria.Zhang Y., Zhu P., & Xu Y. (2021). Has COVID-19 changed the hedge effectiveness of bitcoin? Frontiers in Public Health, 9. https://doi.org/10.3389/fpubh.2021.704900

Diplomacy
iran and china flags on gears, gas rig model between them, gas transit from iran to china

China in the Middle East: Geoeconomic Challenges in a High-Tension Region, from Tehran to Tel Aviv

by Kambiz Zare

In the Middle East, China seeks to appear neutral by engaging in dialogue with all actors, from Tehran to Tel Aviv, including Riyadh. Beijing's objective is clear: to establish itself as a guarantor of stability to secure its energy and commercial interests. The People's Republic of China's (PRC) commitment to the Middle East reflects a carefully calibrated geostrategic approach, aiming to preserve regional stability, ensure uninterrupted access to energy resources, and promote its famous Belt and Road Initiative (BRI), also known as the 'New Silk Roads.' In this region, the Sino-Iranian relationship is most often highlighted due to its political weight and military dimension; however, whether in economic, diplomatic, or strategic terms, Beijing's presence in this area certainly extends beyond its ties with Tehran. As elsewhere in the world, in the Middle East, China divides its diplomatic partnerships into several types, listed here in descending order of intensity: "global strategic partnerships" (in the Middle East: Egypt, Iran, Saudi Arabia, United Arab Emirates, and Bahrain); "strategic partnerships" (Iraq, Jordan, Kuwait, Oman, Qatar, Syria, Turkey, and the Palestinian Authority); "friendly cooperation partnerships" (Lebanon and Yemen); and finally, "innovative global partnerships" (Israel). China is redefining its priorities in the Middle East  Energy dependence is one of the essential drivers of China's policy in the region. Gulf countries, particularly Saudi Arabia, the United Arab Emirates, and Kuwait, are among the main suppliers of crude oil to the PRC—well ahead of Iran in terms of volume, as well as reliability and investment opportunities. This economic reality compels China to invest much more heavily in the Gulf Cooperation Council (GCC) countries, where financial stability, political predictability, and institutional openness promote sustainable strategic partnerships and infrastructure development, unlike in Iran. For these reasons, the Gulf countries have indirectly become essential nodes in the architecture of the BRI through trade, receiving nearly six times more Chinese investments than Iran. Although Iran has geographical interest as a potential corridor between China and Europe, the persistent effect of international sanctions, poor economic management, and regional adventurism severely limit its ability to attract sustainable Chinese investments. In contrast, Israel offers a functioning and favorable environment for investors, making it a preferred destination for Chinese capital and infrastructure projects. Its economy is based on solid infrastructure and a dynamic technology sector. Despite geopolitical shocks, including the recent clashes with Iran – which will undoubtedly impact the country's business environment – Israel, as a member of the OECD, remains attractive in terms of business environment and investment, mainly because the foundations of its economic environment are stronger than those of Iran or Saudi Arabia. The Hebrew state occupies an increasing place within the BRI – not due to the volume of Chinese direct investments, but because of its strategic position and ambitious infrastructure agenda. Its geographical location – straddling Europe, Asia, and Africa via the Mediterranean – makes it a key land and maritime connectivity point that provides an alternative option to Iran for linking China to Europe. In this context, China and Israel have made progress in their negotiations for a free trade agreement that has been discussed since 2016. Although discussions have been suspended since 2023, there remains hope that an agreement could be signed once stability returns to the region. China's trade with Israel and Iran: divergent trajectories China's commercial relations with Israel and Iran reveal two distinct economic approaches.  With Israel, trade is increasingly marked by imports of high technologies - particularly in the semiconductor field - reflecting a growing technological interdependence.  In contrast, trade with Iran remains focused on industrial goods and natural resources, illustrating a more traditional partnership based on access to raw materials. These contrasting dynamics reflect China's strategic flexibility, which relies on Israeli innovation while securing its supplies from Iran.  Tensions in the Strait of Hormuz are testing China's strategy in Iran  For nearly fifty years, Iran has turned to China for economic support. However, despite 21 Chinese greenfield investment projects between 2003 and 2020 – mainly in the energy sector – Beijing has gradually begun to disengage due to international sanctions and ongoing regional instability. Large companies such as CNPC and Sinopec have reduced their stake, or even abandoned some projects, while tech companies like Huawei and Lenovo have also scaled back their presence in the Iranian market. Between 2017 and 2019, Iran reportedly saw an outflow of Chinese capital estimated at $990 million. China views instability in the Middle East, particularly the confrontation between Israel and Iran, as a direct threat to its economic and commercial interests. As the world's largest buyer of Iranian oil, China is especially concerned about potential disruptions in strategic maritime routes, particularly the Strait of Hormuz. In June 2025, Chinese oil imports from Iran significantly increased, reaching up to 1.8 million barrels per day – a surge that occurred just before the military escalation between Israel and Iran, which raised concerns about the security of the Strait of Hormuz. A sign of the weight of the PRC in this region: after the reciprocal airstrikes between Israel and Iran, and Tehran's threat to close this crucial passage, U.S. Secretary of State Marco Rubio urged Beijing to intervene, emphasizing China's heavy dependence on this oil route. China–United States: strategic tensions in a transitioning Middle East China and the United States recently signed a trade agreement and established a 90-day tariff truce, aiming to resolve some key disputes and stabilize economic relations. Furthermore, on the military front, Iran and China signed a military cooperation agreement as early as 2016, reflecting their mutual desire to counter American influence in the region and secure trade routes. Historically, China has supported Iran through arms sales, technology transfers, and training programs. Moreover, despite the official rhetoric, some reports suggest that Chinese technologies have contributed to the development of Iran's ballistic program. The Sino-Iranian relationship in defense illustrates a two-level diplomacy: China discreetly supports Iran's military autonomy while ensuring it does not compromise its strategic relationships with other important regional partners, including Israel, with whom it also maintains top-level security dialogues. This highlights Beijing's broader ambition: to avoid regional polarizations and maintain a balance of power favorable to its interests. China's strategy in the Middle East towards the United States is based on a principle of equidistance: to increase its influence without direct confrontation, while drawing strategic benefits from Saudi Arabia, Israel, Iran, and Egypt. In this perspective, the People's Republic of China does not seek to replace the United States as the dominant power in the region, but rather to offer a multipolar presence focused on preserving stability. Maintaining the status quo, avoiding direct conflicts, and building a parallel system of influence through infrastructure, trade, and diplomacy are the pillars of China's position in the Middle East. This approach ensures Beijing secure access to energy, trade corridors, and sustainable geopolitical influence from Tel Aviv to Tehran.

Defense & Security
Chess made from USA, EU and China flags on a white background. Chess made from China, Europe Union and United States of America flags. Trade, tariffs, duty and customs war

Europe’s transatlantic China challenge

by Gesine Weber

Abstract European states currently lack a clear joint strategy on China and a coordinated approach to US–China competition. This article offers a novel perspective on the challenges for European approaches to this issue due to an omnipresent transatlantic component and the risk of an alliance dilemma. Illustratively focusing on France, Germany and the UK, it demonstrates that Europeans are facing a transatlantic alliance dilemma with the risks of abandonment and entrapment. It argues that Europe needs to strike a balance between its dependence on Washington, especially with regard to European security, while fearing entrapment by the US approach towards Beijing as it aims to maintain economic ties with China. The article concludes that the ramifications of this dilemma can be mitigated through a distinctly European approach to China, strengthening European coordination on China and bolstering European strategic autonomy. As a conceptual piece rather than a full empirical analysis, this article therefore unpacks the strategic challenge and lays the groundwork for further empirical works on the topic. Introduction Strategic competition between the US and China plays out in many realms of international affairs, ranging from global trade to security in the Indo-Pacific. European states are directly affected by this dynamic as they maintain critical ties with both sides. Albeit allies of the US through NATO, Europeans have been reluctant to align with the US on its approach to the Indo-Pacific and China, which is currently characterised by the quest to win the strategic competition with Beijing in all areas of international affairs (see Leoni 2023). Furthermore, Europe maintains close economic ties with Beijing, and imports from China to the EU have most recently increased (Lovely and Yan 2024). European governments certainly do not pursue an approach of maintaining equidistance between the US and China: not only do they regularly emphasise their strategic proximity to Washington, but more recent events, such as the willingness of European allies to publicly adopt the wording of the communiqué from NATO’s Washington summit (NATO 2024) describing China as an ‘enabler of Russia’s war effort in Ukraine’, clearly demonstrate that the tone is changing in European capitals (Politi 2023). However, Europeans still tend to emphasise China’s role in global affairs and the importance of including it in multilateral cooperation formats. With the re-election of Donald Trump as US president, European policy on China and its approach to US–China competition will increasingly be a focus of the US administration. While the exact approach of the new US government still remains to be defined, there are good reasons to anticipate a more hawkish China policy from Washington, through which the US might seek not only to further compete with China, but to actually win this competition (see Pottinger and Gallagher 2023). When designing their approaches towards China—which, among the key European states, only Germany has done so far, with the publication of its China strategy in 2023—Europeans always face a transatlantic elephant in the room. US–China competition, a structuring feature of international relations shaping the global order today through the increasing emergence of geopolitical blocs (see Leoni and Tzinieris 2024), and China’s rising global influence in almost all areas of international affairs—ranging from climate to economics, the rules-based order and security—are forcing European states to reflect on their approach vis-à-vis Beijing (for a full discussion, see Oertel 2023; García-Herrero and Vasselier 2024). As NATO members, European states also need to adapt their strategy in light of the partnership with the US as their key ally. This article argues that European approaches towards China, as shown in the examples of France, Germany and the UK, have a distinctly transatlantic component. It illustrates how these three European states find themselves in an alliance dilemma with the US, and how the risks associated with alliances also define European approaches to China and US–China competition more broadly. As the US administration regularly refers to China as a ‘challenge’ (US Department of Defense 2022), this article alludes to this formulation through the coining of the term ‘transatlantic China challenge’ to describe the strategic challenges Europeans are facing with regard to defining their approach vis-à-vis China and US–China competition more broadly. It offers a conceptual understanding of the strategic challenges for Europe in this context and thereby constitutes a basis for a more thorough empirical analysis. The alliance dilemma and European strategy in US–China competition Originating in realist international relations theory, the alliance dilemma generally describes a situation in which states face risks resulting from joining an alliance. As demonstrated by Snyder (1984), smaller allies especially face a parallel risk of abandonment and entrapment by a hegemon, that is, the dominating power, after joining an alliance. Abandonment, in these circumstances, implies that the hegemon has no further interest in defending or supporting the smaller allies, whereas entrapment refers to a situation in which a state is ‘dragged into a conflict over an ally’s interests that [it] does not share, or shares only partially’ (see Snyder 1984, 466–8). In the context of alliances, a small state is ‘the weaker part in an asymmetric relationship, which is unable to change the nature or functioning of the relationship on its own’ (Wivel et al. 2014, 9), and hence has more limited space for action than the great powers (Wivel and Thorhallsson 2018, 267). This definition arguably applies to Europe in its partnership with the US, as demonstrated by the excessive military and economic dominance of the US as compared to the European states (see Stockholm International Peace Research Institute n.d.; International Monetary Fund 2025). The re-election of Trump as US president now presents the risk of an increased alliance dilemma for Europeans. On the one hand, Trump has announced several times that he does not value the alliance commitments within NATO and potentially would not defend European allies (Sullivan 2024), threatening Europe with abandonment. This scenario is being taken seriously in European capitals, and reflections on how ‘defending Europe with less America’ (Grand 2024) could shape up have gained traction, especially in 2024. Similarly, defence initiatives within the EU to enhance the European contribution to the continent’s security have leapt forward in recent years (see Scazzieri 2025). On the other hand, even the Biden administration had pushed Europe to align with the US approach on China (see Lynch et al. 2023). However, France and Germany in particular, as the big EU member states, have been hesitant to do so, as reflected in France’s opposition to the opening of a NATO liaison office in Tokyo (McCurry 2023) and Germany’s vote against tariffs on Chinese electric vehicles, fearing reprisals from Beijing (Demarais 2024). Trump’s foreign policy might be strongly characterised by issue linkage, which means that policies in one area will be linked to those in another area. Through this strategy, the new US administration might force Europeans into alignment and thereby entrap them, making them accept policies they are not eager to support (see Barkin and Kratz 2025). The exact policies of the Trump administration vis-à-vis European allies remain to be seen, but it is not hard to imagine a scenario in which abandonment and entrapment could emerge or increase, namely when the threat of abandonment is used to entrap allies and force them to support certain policy decisions. The alliance dilemma could play out for Europeans specifically when designing their approaches towards China (see Barkin and Kratz 2025) and formulating their response to US–China competition more generally. As noted above, among the big European states, only Germany has formally adopted a strategy on China, in 2023 (The Federal Government of Germany 2023). However, China and the response to US–China competition takes a prominent place in France’s Indo-Pacific Strategy and its strategy review (Government of France 2021; Secrétariat général de la défense et de la sécurité nationale 2022), and the UK systematically included the dimension of strategic competition in its Integrated Review and its refresh (Government of the United Kingdom 2021, 2023) and has announced an ‘audit’ of its China policy under the new government (Taylor 2024). While these strategies emphasise their individual approaches towards China and the risks stemming from US–China competition, the US has increasingly pressured Europe to align with its approach (Lynch et al. 2023) and can be expected to continue this pressure (Barkin and Kratz 2025). Through the potential issue linkage of security (openly questioned by President Trump) and China policy, Europe therefore finds itself in a new form of alliance security dilemma. European approaches to US–China competition: strategic hedging How can Europe respond to the alliance dilemma of the risks of abandonment and entrapment when it comes to its approaches to China? Reviewing the theoretical literature on the alliance dilemma, one can imagine different strategies. According to Snyder, members of alliances can choose between strategies that strengthen or weaken their commitment to the alliance. To demonstrate commitment, actions could include reassurances for the ally or demonstrations of loyalty, whereas actions to weaken the commitment to the alliance could consist of restraining the ally (mostly to reduce the risk of entrapment in a conflict), increasing bargaining power over the ally or preserving options for realignment outside the existing alliance (for a full discussion, see Snyder 1984, 466–9). Alternative strategies include hiding from cooperation, that is, ‘seeking to maximize autonomy by opting out of specific aspects of the cooperation or by setting up “bastions” in the cooperation’, or bandwagoning, through which states pursue strategies of adaptation ‘to the more powerful actors in the cooperation’ (Pedersen 2023, 442). At the moment, it seems that France, Germany and the UK ‘drive on sight’ rather than approaching the question holistically. The following analysis aims to unpack how the three European states see US–China competition, the risk of the alliance dilemma and how these reflections have played out so far in their strategies. The strategies of France, Germany and the UK on China demonstrate that their approaches are influenced by a distinctly transatlantic component and reflect the transatlantic alliance dilemma. This is visible in their (1) high awareness of the risks stemming from great power competition, (2) approaches to managing the risk of short-term abandonment, and (3) hedging to mitigate the medium- and long-term risks of abandonment and entrapment. The empirical evidence for this analysis was gathered through a qualitative analysis of European strategic documents, statements and policy decisions taken mostly during the period of the Biden administration. However, in light of the risk of a scaling-up of the alliance dilemma under the Trump administration, sources and evidence accessible by the end of January 2025 were included to illustrate the European approaches. In addition to publicly available documents and the sources mentioned above, this paper draws on conversations with policymakers and experts under the Chatham House rule. Mitigating risks from US–China competition: multilateralism instead of alignment That France, Germany and the UK are close allies with the US is clearly visible in their respective strategies on China, not least because of references they make to the importance of the alliance and their descriptions of their own positions between the two great powers. Overall, France, Germany and the UK share the perception of US–China competition and the emergence of blocs as potentially harmful to their interests. As a consequence, all three call for an inclusive multilateral order instead of falling into a logic of blocs, as the increasing competition is seen as a risk for Europe (Secrétariat général de la défense et de la sécurité nationale 2022, 9–15; The Federal Government of Germany 2020, 24–6; Government of the United Kingdom 2023, 22–6). The response of all three European powers to the emergence of blocs is multilateralism: instead of clearly aligning with the US, the French, German and British strategies call for building broader multilateral coalitions, which should, eventually, also include China (The Federal Government of Germany 2020, 23–6; Government of the United Kingdom 2023). The tone in Paris, Berlin and London towards Beijing has clearly changed over recent years; accordingly, the European capitals were also willing to support strong wording on China in the 2024 NATO summit declaration, which describes China as a ‘critical enabler’ of Russia’s ongoing war against Ukraine (NATO 2024). Albeit also recognised as a critical partner for key issues such as climate policy and trade, European states openly describe China as a ‘systemic rival’ and occasionally call out China’s behaviour, as they did, for example, in the case of a note verbale on the South China Sea (UN 2020). Nevertheless, Europe has not (yet) given in to US pressure to align with Washington’s more confrontational approach towards China (Etienne 2024). Even if European states and Washington have moved closer to each other, especially on economic security (Meyers and Reinsch 2023), the European positions on US–China competition demonstrate that Europeans are not willing to fully endorse or follow Washington’s approach—not least because European imports from China have increased in recent years (Lovely and Yan 2024). Managing the risk of short-term abandonment Since Trump’s election, the risk of abandonment by the US has been seen as increasingly high in Paris, Berlin and London.1 This is not least because Trump has openly questioned his willingness to adhere to Article 5 of the North Atlantic Treaty in the case of an armed attack on Europeans (Sullivan 2024). Europeans are especially concerned about issue linkage in this context, meaning that demands in a policy area other than security could be used as a condition. Concretely, Trump could use the threat of abandonment as leverage to compel Europe to align with the US on China policy.2 Barkin and Kratz (2025) suggest that Europe adopt a ‘carrot and stick’ approach, whereby Europe could start with an offer to the US: buying more liquified natural gas, defence goods and agricultural products from the US could mitigate the risk of abandonment. However, there is awareness among European states that coercion from the US to align on US–China policy, especially when linked to the threat of abandonment, might best be mitigated through enhancing European military capabilities—which would still leave the continent exposed to these threats, though to a lesser extent.3 Addressing the risk of medium- and long-term abandonment and entrapment: transatlantic hedging However, the risk of at least partial abandonment is not a new challenge for European strategy, and had already infused earlier strategic thinking. The shift of US strategic priorities away from Europe and to the Indo-Pacific has already been demonstrated in the allocation of resources to the different theatres. Moreover, European states have increasingly become aware that US forces will be withdrawn from their territories in the future and have concluded that they will have to step up their own commitment to European security (see Grand 2024). In parallel, there is an awareness in European capitals that showing more interest in the Indo-Pacific and giving more importance to policy on China is also a way for Europeans to demonstrate an understanding of their ally’s strategic priorities.4 Accordingly, the approaches of France, Germany and the UK to China and the Indo-Pacific also have to be understood as a commitment to the priorities of the US in order to keep this ally engaged in the European theatre and mitigate the risk of abandonment; however, European states abstain from fully aligning with the US approach, as their capabilities and strategic goals are perceived as diverging from those of the US. In this way, Europe aims to avoid entrapment over the medium term through slightly distancing itself from US policy. While all three European states also call for de-risking from China and diversification of their supply chains, maintaining strong economic ties with Beijing is a key component of their respective approaches—which contrasts with the US calls for decoupling. Furthermore, these states have never formally endorsed the US policy on China (Etienne 2024). Nevertheless, enhancing European capabilities would not only send a signal to Washington, but also qualify as hedging, understood as an ‘insurance policy’ to avoid a deterioration in US–Europe relations if the US opted for abandonment, or even as part of a move towards emancipation to reduce strategic dependencies on Washington (see Fiott 2018, 4–6). Conclusion: a transatlantic China challenge Designing their approaches to China and to US–China competition more broadly constitutes a complex strategic dilemma for European states. Paris, Berlin and London do not fully align with Washington’s approach, and it remains to be seen whether they will be willing to do so under the second Trump administration. To manage the risk of abandonment and entrapment, European states pursue different individual approaches to strategic hedging: their strategies on China and US–China competition are designed in a way that allows them to mitigate the risk of abandonment which might stem from significant transatlantic divergence, and to avoid automatic entrapment through their slight distancing from the US approach. From a theoretical perspective, this article has demonstrated that the alliance dilemma, along with the parallel fear of abandonment and entrapment by the US, is a major factor accounting for Europe’s limited strategies on China and its hedging behaviour. This article offers a conceptual analysis of the structural forces explaining European strategies, but other strategic cultures and relationships with the US could offer important complementary insights. To further analyse how individual European states design their strategies vis-à-vis China in light of the alliance dilemma and potential domestic constraints and specificities, neoclassical realism could offer an interesting analytical concept. This approach posits that structural forces set the parameters for foreign policy and treats domestic factors, including strategic culture, as intervening variables (see Rose 1998). Accordingly, it appears well suited for foreign policy analysis, and has indeed gained popularity in the field in recent years (see, for example, Martill and Sus 2024; Meibauer et al. 2021; Weber 2024). Empirically, this article constitutes a conceptual starting point rather than an exhaustive analysis of the strategy-making processes of European states with regard to China and US–China competition and makes a more comprehensive assessment desirable. The findings of this article have broader implications for policymaking. First, they demonstrate the necessity for Europe to determine its place in the increasing US–China competition. European coordination on the respective approaches vis-à-vis the US—especially in light of potential coercion to align—and China is of paramount importance to ensure that foreign policy strategies are mutually reinforcing and not undermining European objectives. Second, the article demonstrates that Europe currently responds to the ‘transatlantic China challenge’ through transatlantic hedging: while this strategy seems to be promising in the short term, it is questionable to what extent the strategy is sustainable and could help European states to navigate the parallel challenges of abandonment and entrapment. Unless Europe decides to fully align with the US—and it is questionable whether this decision would be in its interest—European states would be well advised to develop a sustainable long-term approach to China. A transatlantic dialogue on China, in which Europe and the US openly discuss synergies and divergences, could help prevent misunderstandings and decrease the risk of coercion or issue linkage due to a misreading of European approaches in Washington. Third, as the risks of (at least partial) abandonment and entrapment are systemic challenges due to the current composition of the transatlantic alliance, a logical step for European states to decrease their dependence on the US as the hegemon in the alliance would be to significantly strengthen European capabilities. Stronger military capabilities could help mitigate the ramifications of abandonment, and the aforementioned distinctly European strategy could allow Europe to avoid strategic entrapment in relation to China imposed by Washington. As Europe remains the junior partner in the transatlantic alliance, the parallel risks of abandonment and entrapment, as well as issue linkage, are highly likely to influence its approaches towards China in the long term, but there are certainly ways to render this ‘transatlantic China challenge’ less challenging. ORCID iDGesine Weber https://orcid.org/0009-0008-2643-0400Footnotes1. Conversation with French, German and British experts in Berlin, January 2025.2. Conversation with French, German and British experts in Berlin, January 2025.3. Conversation with French, German and British experts in Berlin, January 2025; conversation with European experts and officials in Paris, January 2025.4. Conversation with officials from Germany and France in Paris, November 2024; conversation with French, German and British experts in Berlin, January 2025.ReferencesBarkin N., Kratz A. (2025). Trump and the Europe–US–China Triangle. Rhodium Group, 16 January. https://rhg.com/research/trump-and-the-europe-us-china-triangle/. Accessed 18 January 2025.Demarais A. (2024). Divided we stand: The EU votes on Chinese electric vehicle tariffs. European Council on Foreign Relations, 9 October. https://ecfr.eu/article/divided-we-stand-the-eu-votes-on-chinese-electric-vehicle-tariffs/. Accessed 25 January 2025.Etienne P. (2024). The European Union between the United States and China: Should we choose between equidistance and following? Fondation Robert Schuman, 8 October. https://www.robert-schuman.eu/en/european-issues/763-the-european-union-between-the-united-states-and-china-should-we-choose-between-equidistance-and-following. Accessed 22 December 2024.Fiott D. (2018). Strategic autonomy and the defence of Europe. European Union Institute for Security Studies, Brief 12/2018. https://www.iss.europa.eu/sites/default/files/EUISSFiles/Brief%2012__Strategic%20Autonomy.pdf. Accessed 25 January 2025.García-Herrero A., Vasselier A. (2024). Updating EU strategy on China: Co-existence while de-risking through partnerships. Mercator Institute for China Studies. https://merics.org/en/external-publication/updating-eu-strategy-china-co-existence-while-de-risking-through-partnerships. Accessed 30 January 2025.Government of France. (2021). France’s Indo-Pacific strategy. https://www.diplomatie.gouv.fr/IMG/pdf/en_dcp_a4_indopacifique_022022_v1-4_web_cle878143.pdf. Accessed 31 January 2025.Government of the United Kingdom. (2021). Global Britain in a competitive age: The integrated review of security, defence, development and foreign policy. London: The Stationery Office. https://www.gov.uk/government/publications/global-britain-in-a-competitive-age-the-integrated-review-of-security-defence-development-and-foreign-policy. Accessed 18 January 2025.Government of the United Kingdom. (2023). Integrated review refresh 2023: Responding to a more contested and volatile world. London: The Stationery Office. https://www.gov.uk/government/publications/integrated-review-refresh-2023-responding-to-a-more-contested-and-volatile-world. Accessed 18 January 2025.Grand C. (2024). Defending Europe with less America. European Council on Foreign Relations, 3 July. https://ecfr.eu/publication/defending-europe-with-less-america/. Accessed 18 January 2025.International Monetary Fund. (2025). World economic outlook: GDP data mapper [Map]. https://www.imf.org/external/datamapper/NGDPD@WEO/OEMDC/ADVEC/WEOWORLD. Accessed 23 January 2025.Leoni Z. (2023). Grand strategy and the rise of China: Made in America. Agenda Publishing.Leoni Z., Tzinieris S. (2024). The return of geopolitical blocs. Survival, 66(2), 37–54.Lovely M. E., Yan J. (2024). As the US has relied less on imports from China, the EU has imported more. Pederson Institute for International Economics, 24 August. https://www.piie.com/research/piie-charts/2024/us-has-relied-less-imports-china-eu-has-imported-more. Accessed 22 December 2024.Lynch S., Toosi N., Moens B., Banco E. (2023). The U.S. wants Europe to stand up to China. Europe says: Not so fast. Politico, 3 August. https://www.politico.com/news/2023/03/08/us-europe-china-00086204. Accessed 18 January 2025.Martill B., Sus M. (2024). Winds of change? Neoclassical realism, foreign policy change, and European responses to the Russia-Ukraine War. British Journal of Politics & International Relations.McCurry J. (2023). France opposed to opening of Nato liaison office in Japan, official says. The Guardian, 7 June. https://www.theguardian.com/world/2023/jun/07/france-opposed-to-opening-of-nato-liaison-office-in-japan-official-says. Accessed 25 January 2025.Meibauer G., Desmaele L., Onea T., Kitchen N., Foulon M., Reichwein A., Sterling-Folker J. (2021). Forum: Rethinking neoclassical realism at theory’s end. International Studies Review, 23(1), 268–95.Meyers E., Reinsch W. A. (2023). The push for U.S.–EU convergence on economic security policy. Center for Strategic and International Studies, 7 July. https://www.csis.org/analysis/push-us-eu-convergence-economic-security-policy. Accessed 26 January 2025.NATO. (2024). Washington Summit declaration. https://www.nato.int/cps/cn/natohq/official_texts_227678.htm. Accessed 18 January 2025.Oertel J. (2023). Ende der China-Illusion: Wie wir mit Pekings Machtanspruch umgehen müssen. Munich: Piper Verlag.Pedersen R. B. (2023). Small states shelter diplomacy: Balancing costs of entrapment and abandonment in the alliance dilemma. Cooperation and Conflict, 58(4), 441–59.Politi A. (2023). The paradigm shift in EU–China relations and the limits of the EU’s current strategy towards China: A relational perspective. Asian Affairs 54(4), 670–93.Pottinger M., Gallagher M. (2024). No substitute for victory: America’s competition with China must be strategic and ideological. Foreign Affairs, 10 April. https://www.foreignaffairs.com/united-states/no-substitute-victory-pottinger-gallagher. Accessed 18 January 2025.Rose G. (1998). Neoclassical realism and theories of foreign policy. World Politics, 51(1), 144–72.Scazzieri L. (2025). Towards an EU ‘defence union’? Centre for European Reform, 30 January. https://www.cer.eu/publications/archive/policy-brief/2025/towards-eu-defence-union. Accessed 30 January 2025.Secrétariat général de la défense et de la sécurité nationale. (2022). Revue nationale stratégique 2022. https://www.sgdsn.gouv.fr/publications/revue-nationale-strategique-2022. Accessed 18 January 2025.Snyder G. H. (1984). The security dilemma in alliance politics. World Politics, 36(4), 461–95.Stockholm International Peace Research Institute. (n.d.). SIPRI Military Expenditure Database.Sullivan K. (2024). Trump says he would encourage Russia to ‘do whatever the hell they want’ to any NATO country that doesn’t pay enough. CNN, 11 February. https://edition.cnn.com/2024/02/10/politics/trump-russia-nato/index.html. Accessed 29 January 2025.Taylor R. (2024). UK government policy towards China. https://lordslibrary.parliament.uk/uk-government-policy-towards-china/. Accessed 18 January 2025.The Federal Government of Germany. (2020). Policy guidelines for the Indo-Pacific. www.auswaertiges-amt.de/blob/2380514/f9784f7e3b3fa1bd7c5446d274a4169e/200901-indo-pazifik-leitlinien–1–data.pdf. Accessed 21 December 2024.The Federal Government of Germany. (2023). China-Strategie der Bundesregierung. Berlin: Auswärtiges Amt. https://www.auswaertiges-amt.de/blueprint/servlet/resource/blob/2608578/810fdade376b1467f20bdb697b2acd58/china-strategie-data.pdf. Accessed 18 January 2025.UN (2020). Note verbale, UK NV No. 162/20, 16 September. https://www.un.org/Depts/los/clcs_new/submissions_files/mys_12_12_2019/2020_09_16_GBR_NV_UN_001.pdf. Accessed 25 January 2025.US Department of Defense. (2022). National Defense Strategy of the United States of America. https://media.defense.gov/2022/Oct/27/2003103845/-1/-1/1/2022-NATIONAL-DEFENSE-STRATEGY-NPR-MDR.pdf. Accessed 25 January 2025.Weber G. (2024). Zeitenwende à la française: Continuity and change in French foreign policy after Russia’s invasion of Ukraine. British Journal of Politics & International Relations.Wivel A., Bailes A. J. K., Archer C. (2014). Setting the scene: Small states and international security. In Archer C., Bailes A. J. K., Wivel A. (eds.), Small states and international security: Europe and beyond (pp. 3–25). London: Routledge.Wivel A., Thorhallsson B. (2018). Brexit and small states in Europe: Hedging, hiding or seeking shelter? In Rosamond B., Nedergaard P., Diamond P. (eds.), The Routledge handbook of the politics of Brexit, 1st edn. (pp. 266–77). Abingdon-on-Thames: Routledge.