Subscribe to our weekly newsletters for free

Subscribe to an email

If you want to subscribe to World & New World Newsletter, please enter
your e-mail

Defense & Security
Missiles in front EU flag. Air defense systems European Union. Cruise missiles in Europe. Concept weapons development in Europe. Stockpiles strategic missiles. Concrete wall in foreground. 3d image

Nuclear Sharing Between the U.S. and the EU. Benefits and Challenges.

by Krzysztof Śliwiński

Abstract This paper examines the NATO nuclear sharing arrangement, focusing on its benefits and challenges within the U.S.-EU security framework. Nuclear sharing involves the U.S. deploying B61 nuclear bombs in select European NATO countries, with host nations providing delivery systems and infrastructure while the U.S. retains full control, ensuring compliance with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The arrangement strengthens NATO's deterrence posture, promotes alliance cohesion, and supports non-proliferation by dissuading the development of independent nuclear arsenals. Recent geopolitical tensions, especially Russia's invasion of Ukraine, have intensified calls for expanding sharing to countries like Poland, enhancing deterrence on NATO's eastern flank. Exercises such as Steadfast Noon validate operational readiness and signal resolve. Critics, however, highlight legal and escalation risks, potential NPT violations, and domestic opposition in host countries. Despite these issues, nuclear sharing remains a crucial component of Euro-Atlantic security, adapting to evolving threats while balancing deterrence, alliance unity, and non-proliferation goals.  Key Words: International Security, Weapons of Mass Destruction, Nuclear Sharing, Alliances Introduction Nuclear sharing is a cornerstone of NATO's deterrence strategy, designed to distribute the benefits, responsibilities, and risks of nuclear deterrence across the Alliance. Under these arrangements, the United States deploys a limited number of B61 nuclear gravity bombs at bases in several European NATO member states. At the same time, those host countries provide the necessary infrastructure, security, and dual-capable aircraft (DCAs) to deliver weapons in a crisis. The weapons remain under full U.S. custody and control at all times, in compliance with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). A nuclear mission can only be authorised after explicit political approval from NATO's Nuclear Planning Group (NPG), which includes all NATO members, and the U.S. President (and potentially the UK Prime Minister). This setup ensures collective decision-making and underscores the U.S.'s extended deterrence commitments to its allies, helping prevent nuclear proliferation by giving non-nuclear states a stake in the Alliance's nuclear posture without independent arsenals.[1] The arrangements originated in the Cold War era, with the first U.S. atomic weapons arriving in Europe in 1954. By the 1960s, they were formalised through the NPG to allow non-nuclear allies input on nuclear policy. Today, approximately 100 B61 bombs are forward-deployed in Europe, hosted by five NATO countries: Belgium, Germany, Italy, the Netherlands, and Turkey. Seven NATO allies contribute DCA, including F-16s and F-35s, which serve dual roles in conventional operations and as potential nuclear delivery platforms. France and the UK maintain independent nuclear forces that complement the US-led sharing but operate outside the formal NATO structure. While the question references the EU, nuclear sharing is strictly a NATO framework; all host countries are EU members except Turkey, creating significant overlap but no direct EU-level involvement.[2] These arrangements serve multiple purposes: they enhance Alliance cohesion, provide tools for managing escalations in conflicts, and signal resolve to adversaries, such as Russia. Recent geopolitical tensions, including Russia's invasion of Ukraine, have prompted discussions about expanding sharing to strengthen deterrence on NATO's eastern flank.[3] Poland, a NATO member since 1999, has long advocated for a stronger role in the Alliance's nuclear mission amid heightened Russian threats, particularly following the 2022 invasion of Ukraine. In June 2023, Polish Prime Minister Mateusz Morawiecki first publicly expressed interest in hosting U.S. nuclear weapons under NATO's sharing policy, arguing it would bolster deterrence without violating the NPT. This push intensified in early 2025, driven by concerns over U.S. reliability under the second Trump administration and Russia's aggressive posture.[4]   On March 13, 2025, President Andrzej Duda explicitly urged the U.S. to deploy nuclear warheads on Polish territory, stating in interviews that NATO infrastructure—including nuclear assets — should "shift east" to match the eastward expansion of the Alliance's borders since 1999. He emphasised that such a move would enhance security guarantees and deter future Russian aggression, while also praising France's potential extension of its "atomic umbrella" as a complementary option. Duda's proposal carried domestic political weight, positioning Poland's conservative opposition as pro-U.S. ahead of the May 2025 presidential election, where candidates debated transatlantic ties versus European autonomy.[5] Proponents argue Poland is an ideal candidate: it spends 4.7% of GDP on defence (exceeding NATO's 2% target), has built one of Europe's strongest militaries, and hosts significant U.S. rotational forces. Analysts suggest that deployment could involve adapting Polish F-35s for DCA roles or constructing secure storage facilities. However, logistical and political hurdles remain, including a potential Russian backlash and the need for NPG consensus.[6] As of October 2025, however, no U.S. nuclear weapons have been deployed to Poland, and the proposal remains under discussion without a formal U.S. commitment. Instead, Poland has deepened integration through participation in NATO's annual Steadfast Noon nuclear exercise, which began on October 13, 2025, across Belgium, the Netherlands, and the North Sea — testing procedures for credibility and safety. Poland joined as a full participant alongside Finland, Germany, and the U.S., signalling growing involvement in nuclear planning but stopping short of hosting assets. Alternatives like a dedicated U.S. "nuclear umbrella" declaration for Poland have been floated to avoid escalation without physical deployment.[7] What academics say Academic experts agree that Nuclear sharing is a cornerstone of NATO's defence strategy. This arrangement refers to an agreement according to which the United States deploys non-strategic nuclear weapons on allied territory while maintaining ownership and peacetime custody.[8]This allows selected NATO members to participate in nuclear planning and provide delivery systems, creating a framework that extends American nuclear deterrence across the Alliance. The operational structure of nuclear sharing involves dual-key arrangements in which both U.S. and host-nation authorisation are required for weapon employment. The United States maintains absolute control and custody of its nuclear weapons forward-deployed in Europe, while Allies provide military support for the DCA mission with conventional forces and capabilities. Nuclear sharing arrangements play a vital role in the Alliance's interconnection and remain a key component of security guarantees and the indivisibility of security across the entire Euro-Atlantic area.[9] These arrangements are coordinated through NATO's Nuclear Planning Group, ensuring multilateral consultation on nuclear policy and targeting decisions. Currently, only five European NATO members have signed bilateral nuclear-sharing agreements with the U.S. These are: Belgium, Germany, Italy, the Netherlands, and Turkey, under which the U.S. stores B61 nuclear gravity bombs at their airbases and their dual-capable aircraft can deliver them in a NATO context. These arrangements, dating back to the Cold War and reaffirmed in subsequent treaties, involve approximately 100 U.S. warheads as of 2025.[10] Nuclear sharing serves multiple strategic purposes within the alliance framework. It strengthens extended deterrence by visibly integrating allied forces into NATO's nuclear posture, thereby reassuring front-line states of American commitment.[11] Experts claim that these arrangements helped prevent nuclear proliferation by reducing incentives for European allies to develop independent arsenals during the Cold War.[12] Additionally, nuclear sharing distributes the political and operational burdens of nuclear responsibility across participating members rather than concentrating them solely with the United States. However, nuclear sharing faces significant criticisms. Legal scholars argue that forward-deploying U.S. weapons on non-nuclear states potentially contravenes the Non-Proliferation Treaty's spirit, creating ongoing diplomatic tensions with Russia and other nations.[13] Domestic opposition within host countries and concerns about the escalation of crises further complicate these arrangements.[14] Despite these challenges, nuclear sharing remains integral to NATO's deterrence strategy, particularly as renewed great-power competition has reinforced alliance solidarity and commitment to collective defence in the contemporary security environment. Benefits of Nuclear Sharing Firstly, official sources from NATO and the U.S. government consistently highlight the benefits of their efforts in preserving peace, deterring aggression, fostering unity, and aligning with global non-proliferation norms. The primary official argument for nuclear sharing is its role in bolstering NATO's deterrence posture against evolving threats, particularly from nuclear-armed adversaries like Russia. NATO's 2022 Strategic Concept and related documents emphasise that the Alliance's nuclear capabilities, including U.S. forward-deployed weapons, serve to "preserve peace, prevent coercion and deter aggression". [15] The 2024 Washington Summit Declaration reaffirms this, stating that "nuclear deterrence is the cornerstone of Alliance security" and that NATO's capabilities provide the "supreme guarantee" for all members.[16] By integrating U.S. nuclear assets with European contributions, such as DCA from seven Allies, these arrangements complicate adversaries' planning and enhance crisis management. As noted in NATO's factsheet, "nuclear sharing provides military and political tools for deterrence and can be used to manage escalation in a crisis," with DCA serving as a "visible and valuable instrument for strategic communications" to signal resolve.[17] Accordingly, in a security environment marked by Russia's integration of nuclear forces into its military strategy and threats against Allies, nuclear sharing ensures credible deterrence without provoking conflict. NATO’s former Secretary General Jens Stoltenberg argued that "the purpose of NATO's nuclear weapons is not to provoke a conflict but to preserve peace, deter aggression and prevent coercion," underscoring that arrangements like those involving Germany are vital for the "security of the whole alliance".[18] The U.S. State Department echoes this rationale, claiming that with NATO "numerically outgunned on the central front," nuclear sharing maintains a "nuclear deterrent posture sufficient to deter the Soviet aggression," a logic that persists against modern threats.[19] Against this backdrop, exercises like Steadfast Noon[1] Further strengthen this by simulating nuclear scenarios, ensuring "the credibility, effectiveness, safety and security of the nuclear deterrent mission".[20] Overall, according to official sources, these mechanisms help preserve stability in the Euro-Atlantic area, reduce reliance on nuclear weapons, and adapt to challenges posed by actors such as China and North Korea. Secondly, nuclear sharing fosters unity and shared responsibility among NATO members, distributing the benefits, risks, and political burdens of deterrence more evenly among them. NATO's publications explicitly state that these arrangements "ensure that the benefits, responsibilities and risks of nuclear deterrence are shared across the Alliance," demonstrating "unity and cohesion amongst all Allies" through joint decision-making in the Nuclear Planning Group (NPG).[21] This shared approach, as NATO sources claim, reinforces the indivisibility of security, as outlined in NATO's nuclear policy: "Nuclear sharing arrangements play a vital role in the interconnection of the Alliance and remain one of the main components of security guarantees and the indivisibility of security of the whole Euro-Atlantic area".[22] The 2024 Summit Declaration commits to "modernising its nuclear capabilities" and "strengthening its nuclear planning capability," ensuring broader participation to "demonstrate Alliance unity and resolve".[23] By involving European Allies in Allied dual-capable aircraft (DCA) missions and infrastructure, nuclear sharing is intended to help mitigate disparities in capabilities, promote equitable burden-sharing, and prevent fragmentation within the Alliance. Thirdly, NATO posits that nuclear sharing supports non-proliferation efforts. Contrary to criticisms, official sources argue that nuclear sharing advances non-proliferation by reducing incentives for Allies to pursue independent nuclear programs. NATO's review of the NPT at 50 years notes that these arrangements "have contributed to security in Europe and non-proliferation as Allies under the U.S. nuclear umbrella have not felt pressure to develop their own weapons".[24] Codified during the 1960s negotiations, they comply fully with the Treaty, as both the U.S. and the USSR ensured that no prohibitions were placed on such setups.[25] The U.S. State Department details this compromise, which allowed for "wartime nuclear sharing" without requiring peacetime transfer, thereby reassuring allies like West Germany and dissuading proliferation.[26] Post-Cold War reductions — over 90% in NATO's nuclear stockpile — align with NPT Article VI disarmament goals while maintaining deterrence.[27] This balance facilitates peaceful nuclear cooperation under the IAEA (International Atomic Energy Agency) safeguards, thereby strengthening the global nuclear non-proliferation regime.[28] Finally, according to the U.S. State Department, nuclear sharing underscores the U.S. commitment to European security, countering fears of "decoupling" where allies doubt American resolve. The State Department describes it as addressing whether the U.S. would "sacrifice Chicago to save Hamburg," by making nuclear weapons available for Europe's defence.[29] NATO's policy affirms that U.S. strategic forces, supplemented by forward-deployed assets, provide the "supreme guarantee," with Allies contributing to ensure integration across domains.[30] To sum up, official arguments portray nuclear sharing as indispensable for deterrence, cohesion, non-proliferation, and transatlantic solidarity. These arrangements, according to Western policy-makers and experts, have sustained European stability for decades, with ongoing modernisation ensuring their relevance in an unpredictable world. Nuclear Sharing in the Face of an Ongoing War in Ukraine Nuclear sharing has allegedly bolstered NATO's overall deterrence posture, helping to prevent Russian escalation in Ukraine, including potential nuclear use. NATO's nuclear capabilities, including U.S. forward-deployed weapons in Europe, are described as essential to "preserve peace, prevent coercion and deter aggression" in the face of Russia's nuclear threats and integration of nuclear forces into its strategy.[31] This has indirectly supported Ukraine by signalling to Russia that any significant escalation — such as nuclear strikes or attacks on NATO territory — would invoke a collective response, thereby limiting Russia's options in the conflict. Russia's invasion has been accompanied by nuclear sabre-rattling to deter Western intervention, but nuclear sharing has helped counter this by maintaining credible deterrence without direct NATO involvement in Ukraine.[32] In that sense, the already mentioned exercises like Steadfast Noon simulate nuclear scenarios, reinforcing the "credibility, effectiveness, safety and security" of the deterrent, which has been crucial amid threats from Russia, China, and North Korea. Analysts note that this has made Russian nuclear signalling less credible over time, allowing the West to provide advanced weapons to Ukraine that were initially considered taboo.[33] However, Russia's threats have still delayed and limited the scale of Western aid, such as restrictions on long-range strikes into Russia, due to fears of crossing "red lines".[34] As mentioned before, nuclear sharing agreements have arguably fostered greater unity among NATO allies, enabling sustained military and economic support for Ukraine. By sharing the "benefits, responsibilities and risks of nuclear deterrence," nuclear sharing demonstrates Alliance solidarity and the "indivisibility of security" in the Euro-Atlantic area.[35] This has reassured European allies, particularly those near Russia, allowing them to commit resources to Ukraine without fearing abandonment. For example, Poland's push to join nuclear sharing reflects heightened threat perceptions from the war, aiming to strengthen deterrence and defence in a hostile environment. NATO's support, including intelligence sharing and strategic communications, has, at least in the eyes of Western policy-makers, deterred Russian use of chemical, biological, or nuclear weapons in Ukraine.[36] Without reassurance from nuclear sharing of U.S. commitment — countering fears of "decoupling" — it might have been harder for Europe to maintain this level of involvement.[37] From Russia's perspective, nuclear sharing exacerbates tensions, viewing it as part of NATO's eastward expansion that provoked the invasion.[38] Putin has used this to support claims behind "Russia's Special Military Operation" in Ukraine, framing Ukraine's potential NATO integration as a threat that could place U.S. nuclear weapons near Russia's borders, similar to the Cuban Missile Crisis in reverse. This rationale has fueled Russian nuclear threats, which aim to limit Western aid and prolong the conflict by raising escalation fears.[39] The war has heightened nuclear risks, with some analysts arguing it presents greater dangers than the Cuban Missile Crisis due to the potential for miscalculation.[40] Russia's deployment of tactical nuclear weapons in Belarus as a counter to NATO's sharing arrangements has further escalated postures.[41] Recent decisions by the U.S., UK, and France to allow Ukraine to use long-range missiles against Russian targets have prompted Putin to warn of a direct NATO-Russia war, indirectly tying into nuclear sharing's role in deterrence dynamics.[42] This has possibly complicated peace efforts, as Russia perceives Western escalation as existential, making negotiations harder. As mentioned earlier, nuclear sharing has arguably helped mitigate proliferation risks during the war. By providing a shared nuclear umbrella, it reduces the incentives for allies like Poland and Germany to pursue independent nuclear programs, thereby supporting the NPT.[43] Possibly then, the invasion has not sparked widespread proliferation, partly because NATO's deterrent reassures members. Interestingly, however, the debates over a "European nuclear deterrent" independent of the U.S. — spurred by uncertainties such as potential shifts in U.S. policy under Trump — could undermine this if not managed effectively.[44] The war has also renewed focus on modernising nuclear sharing, with NATO committing to enhancing capabilities at the 2024 Washington Summit.[45] This has indirectly affected Ukraine by diverting Russian resources and attention, though some argue it prolongs the stalemate without a decisive victory. In summary, nuclear sharing has possibly acted as a stabilising force for NATO, enabling robust support for Ukraine and deterring Russian nuclear escalation. However, it has also contributed to heightened tensions and Russian intransigence, complicating pathways to peace. As the war persists into 2025, proposals to expand sharing (e.g., to Poland) reflect its evolving role in countering ongoing threats. Conclusion The "Steadfast Noon" exercises are arguably a clear signal to any potential adversary, including Russia, that NATO is prepared to defend all its members against any threats, including nuclear ones. Such exercises involve the use of American non-strategic nuclear weapons stationed in Europe, although no real combat weapons are used during the drills. The exercises serve not only to practice deterrence against possible nuclear attacks but also to prepare for the potential use of nuclear weapons by NATO if necessary. The fact that these exercises involve nuclear deterrence indicates that NATO's defence strategy includes readiness to escalate to a nuclear response if provoked by a nuclear attack. The locations of these nuclear weapons are not publicly disclosed. Still, there is speculation about their presence in countries like Poland, particularly in light of recent secret agreements that allow foreign troops to enter Polish territory. On the other hand, one should also consider potential downsides, especially for countries in Central and Eastern Europe. Nuclear sharing for potential allied use in wartime poses significant risks despite its deterrence aims. One major downside is its incompatibility with the NPT, which violates Articles I and II.[2] Enabling the indirect transfer of control to non-nuclear states undermines global non-proliferation efforts and draws criticism from states such as China. This arrangement also heightens proliferation risks, as peacetime training and exercises normalise nuclear readiness, potentially inspiring similar setups in Asia-Pacific regions like Japan and South Korea, escalating regional tensions.[46] Security concerns include increased escalation dangers, where limited nuclear use could spiral into full-scale war, especially amid vulnerabilities at host bases like Incirlik in Türkiye during political instability. Expanding sharing, such as to Poland, fuels arms races with Russia and exposes more European sites to attacks, without adding credible deterrence given NATO's conventional superiority. Politically, it breeds divisiveness within NATO, fostering resentment among allies and diverting resources from conventional forces, while eroding U.S. control and complicating disarmament. Domestically, host nations face public backlash and moral burdens from anti-nuclear norms, straining alliance cohesion. Russia's objections in NPT forums further highlight how sharing provokes international backlash, risking broader conflicts. Notes [1] On Monday (October 13 2025), NATO began its annual nuclear deterrence exercise Steadfast Noon. The exercise is a long-planned, routine training activity and part of NATO’s broader efforts to maintain readiness and ensure transparency around its nuclear posture. It is not linked to any current world events, and no live weapons are used.[2] Article I - Each nuclear-weapon State Party to the Treaty undertakes not to transfer to any recipient whatsoever nuclear weapons or other nuclear explosive devices or control over such weapons or explosive devices directly, or indirectly; and not in any way to assist, encourage, or induce any non-nuclear-weapon State to manufacture or otherwise acquire nuclear weapons or other nuclear explosive devices, or control over such weapons or explosive devices. Article II - Each non-nuclear-weapon State Party to the Treaty undertakes not to receive the transfer from any transferor whatsoever of nuclear weapons or other nuclear explosive devices or of control over such weapons or explosive devices directly, or indirectly; not to manufacture or otherwise acquire nuclear weapons or other nuclear explosive devices; and not to seek or receive any assistance in the manufacture of nuclear weapons or other nuclear explosive devices. See more at: https://www.un.org/en/conf/npt/2005/npttreaty.html References [1] NATO’s Nuclear Sharing Arrangements. (2022, February). NATO. https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[2] Kristensen, H. M., Korda, M., Johns, E., & Knight-Boyle, M. (2023, November 8). Nuclear weapons sharing, 2023. Bulletin of the Atomic Scientists. https://thebulletin.org/premium/2023-11/nuclear-weapons-sharing-2023/[3] Johns, E. (2025, October 10). Incomplete Upgrades at RAF Lakenheath Raise Questions About Suspected US Nuclear Deployment. Federation of American Scientists. https://fas.org/publication/incomplete-upgrades-lakenheath-questions-nuclear/[4] Johns, E. (n.d.). Poland’s bid to participate in NATO nuclear sharing. IISS. Retrieved October 14, 2025, from https://fas.org/publication/incomplete-upgrades-lakenheath-questions-nuclear/[5] Poland’s president urges U.S. to move nuclear warheads to Polish territory, FT reports. (2025, March 13). Reuters. https://www.reuters.com/world/polands-president-urges-us-move-nuclear-warheads-polish-territory-ft-reports-2025-03-13/[6] Poland’s president vows to spend 4.7% of GDP on defence this year. (2025, February 5). Euronews. https://www.euronews.com/my-europe/2025/02/05/polands-president-vows-to-spend-47-of-gdp-on-defence-this-year[7] NATO’s annual nuclear exercise Steadfast Noon begins. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/news_238367.htm[8] von Hlatky, S., & Lambert-Deslandes, É. (2024). The Ukraine war and nuclear sharing in NATO. International Affairs, 100(2), 467-485. https://academic.oup.com/ia/article-abstract/100/2/509/7617216?redirectedFrom=fulltext[9] NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/fr/natohq/topics_50068.htm?selectedLocale=en#:~:text=Nuclear%20consultation,are%20members%20of%20the%20NPG[10] NATO’s Nuclear Sharing Arrangements. (2022, February). NATO. https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[11] von Hlatky, S., & Lambert-Deslandes, É. (2024). The Ukraine war and nuclear sharing in NATO. International Affairs, 100(2), 467-485. https://academic.oup.com/ia/article-abstract/100/2/509/7617216?redirectedFrom=fulltext[12] Khalessi, D. (2015). Strategic ambiguity: Nuclear sharing and the secret strategy for drafting articles I and II of the nonproliferation treaty. The Nonproliferation Review, 23(1-2), 81-103. https://doi.org/10.1080/10736700.2016.1155865 [13] Park, K. C., & Choo, J. (2022). NATO's nuclear sharing strategy and its implications for establishing a new strategy for strengthening extended deterrence on the Korean Peninsula. International Area Studies Review, 26(1), 51-78. https://doi.org/10.18327/jias.2022.1.26.1.51 [14] Smith, M. A. (2004). To neither use them nor lose them: NATO and nuclear weapons since the cold war. Contemporary Security Policy, 25(3), 485-514. https://doi.org/10.1080/1352326042000330637[15] NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/topics_50068.htm[16] Washington Summit Declaration. (2024, July 10). NATO. https://www.nato.int/cps/en/natohq/official_texts_227678.htm[17] NATO’s Nuclear Sharing Arrangements. (n.d.). NATO. Retrieved October 20, 2025, from https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[18] Germany’s support for nuclear sharing is vital to protect peace and freedom. (2020, May 11). NATO. https://www.nato.int/cps/en/natohq/opinions_175663.htm[19] Ford, C. A. (2019, December 9). Challenges of Policymaking in Responsible Nuclear Weapons Stewardship. US Department of State. https://2017-2021.state.gov/challenges-of-policymaking-in-responsible-nuclear-weapons-stewardship/[20] NATO’s annual nuclear exercise Steadfast Noon begins. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/news_238367.htm[21] NATO’s Nuclear Sharing Arrangements. (n.d.). NATO. Retrieved October 20, 2025, from https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[22] NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/topics_50068.htm[23] Washington Summit Declaration. (2024, July 10). NATO. https://www.nato.int/cps/en/natohq/official_texts_227678.htm[24] Durkalec, J. (2018, June 29). The Nuclear Non-proliferation Treaty at fifty: a midlife crisis. NATO. https://www.nato.int/docu/review/articles/2018/06/29/the-nuclear-non-proliferation-treaty-at-fifty-a-midlife-crisis/index.html[25] NATO’s Nuclear Sharing Arrangements. (n.d.). NATO. Retrieved October 20, 2025, from https://www.nato.int/nato_static_fl2014/assets/pdf/2022/2/pdf/220204-factsheet-nuclear-sharing-arrange.pdf[26] Ford, C. A. (2019, December 9). Challenges of Policymaking in Responsible Nuclear Weapons Stewardship. US Department of State. https://2017-2021.state.gov/challenges-of-policymaking-in-responsible-nuclear-weapons-stewardship/[27] See more at: https://www.iaea.org/sites/default/files/publications/documents/infcircs/1970/infcirc140.pdf[28] See more at: https://www.iaea.org/[29] Ford, C. A. (2019, December 9). Challenges of Policymaking in Responsible Nuclear Weapons Stewardship. US Department of State. https://2017-2021.state.gov/challenges-of-policymaking-in-responsible-nuclear-weapons-stewardship/[30]NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/topics_50068.htm[31] NATO’s nuclear deterrence policy and forces. (2025, October 13). NATO. https://www.nato.int/cps/en/natohq/topics_50068.htm [32] Nuclear Stability and Escalation Risks in Europe. (2023, September 1). Foreign Policy Research Institute. https://www.fpri.org/article/2023/09/nuclear-stability-and-escalation-risks-in-europe/[33] Ibidem.[34] Kimball, D., & Bugos, S. (2022, February 28). Russia’s War on Ukraine and the Risk of Nuclear Escalation: Answers to Frequently Asked Questions. Arms Control Association. https://www.armscontrol.org/issue-briefs/2022-02/FAQ-russia-ukraine[35] NATO’s support for Ukraine. (2025, October 14). NATO. https://www.nato.int/cps/en/natohq/topics_192648.htm[36] Dickinson, P., Arick, R., & Lander Finch, N. (2025, October 15). How the US and Europe can deter and respond to Russia’s chemical, biological, and nuclear threats. Atlantic Council. https://www.atlanticcouncil.org/in-depth-research-reports/report/how-the-us-and-europe-can-deter-and-respond-to-russias-chemical-biological-and-nuclear-threats/[37] Dalton, T. (2022, April 8). Nuclear Nonproliferation After the Russia-Ukraine War. Georgetown Journal of International Affairs. https://gjia.georgetown.edu/2022/04/08/nuclear-nonproliferation-after-the-russia-ukraine-war/[38] Magnier, E. J. POST. X. Retrieved October 21, 2025, from https://x.com/ejmalrai/status/1796511588465201374[39] Ukraine: how nuclear weapons continue to increase the risks, two years on. (n.d.). ICAN (International Campaign to Abolish Nuclear Weapons). Retrieved October 21, 2025, from https://www.icanw.org/ukraine_two_years_how_nuclear_weapons_increase_the_risks[40] Kimballl, D., & Bugos, S. (2022, February 28). Russia’s War on Ukraine and the Risk of Nuclear Escalation: Answers to Frequently Asked Questions. Arms Control Association. https://www.armscontrol.org/issue-briefs/2022-02/FAQ-russia-ukraine [41] Kayali, L., Jungholt, T., & Fritz, P. (2024, July 4). Europe Is Quietly Debating a Nuclear Future Without the US. POLITICO. https://www.politico.com/news/magazine/2024/07/04/europe-us-nuclear-weapons-00166070[42] Katchanovski, I. (n.d.). POST. X. Retrieved October 21, 2025, from https://x.com/I_Katchanovski/status/1858244090909127000[43] Dalton, T. (2022, April 8). Nuclear Nonproliferation After the Russia-Ukraine War. Georgetown Journal of International Affairs. https://gjia.georgetown.edu/2022/04/08/nuclear-nonproliferation-after-the-russia-ukraine-war/[44] Samuelki, O. (2025, March 11). Europe going nuclear would be a catastrophic mistake. https://www.aljazeera.com/opinions/2025/3/11/europe-going-nuclear-would-be-a-catastrophic-mistake[45] NATO’s support for Ukraine. (2025, October 14). NATO. https://www.nato.int/cps/en/natohq/topics_192648.htm[46] Analysis of the Incompatibility of NATO’s Nuclear Sharing Arrangements with the Treaty on the Non-Proliferation of Nuclear Weapons. (2024). China Arms Control and Disarmament Association China Institute of Nuclear Industry Strategy. https://www.cinis.com.cn/zhzlghyjzy/yjbg/1446912/2024072914514738359.pdf 

Defense & Security
USA and China competing in AI supremacy, represented by chess pieces on a world map highlighting technological rivalry. AI wars between USA and china concept.

Emerging global AI order: a comparative analysis of US and China's AI strategic vision

by Hammad Gillani

Introduction   The 21st century global politics has now taken a new shape with the advent of artificial intelligence (AI). The traditional nature of great power rivalry revolves around military maneuvers, defensive-offensive moves, and weapons deployment to challenge each other, maintaining their respective hegemony over the international arena. The revival of artificial intelligence has reshaped the conventional great power game.(Feijóo et al. 2020) From now onwards, whenever the strategic circles discuss the security paradigm, AI has to be its part and parcel. The emergence of AI has altered the status quo, where major powers are now shifting towards AI-based technology. As the most basic function of AI is to create such machines and platforms that can perform tasks more proficiently than humans, it has the ability to enhance decision-making, increase efficiency, and reduce the likely risk of human errors. But at the same time, risks are also lingering.   The United States (US) and the People's Republic of China (PRC) are considered to be the main players of great power politics. Their rivalry has long been centered around territorial conflicts and maritime contests. With the PRC claiming most of the territories in the South China Sea and East China Sea, the US, under its Indo-Pacific Strategy (2022), has challenged the Chinese assertion.(Hassan and Ali 2025) But what the world has witnessed is that both economic hegemons have been avoiding any direct military conflict with each other. The most prominent area where both the US and the PRC are now in a continuous competition is the technological domain. China has always maintained an edge over the US in the respective field due to the fact that it holds most of the world’s known rare earth minerals—a key to technological superiority. Through trade barriers, i.e., tariffs, quotas, etc., and restricting trade with prominent Chinese companies, the US has always tried to contain technological developments in China.(Wang and Chen 2018)   “The reality is that both China and the United States are focused on getting the infrastructure necessary to win the so-called AI race. Now, whether it’s actually a race is a separate question, but data, energy, and human capital are all critical inputs to this. The massive investment infrastructure is top of mind for leaders in both countries as they seek to do it. China’s access to the advanced technology and semiconductors is going to be a key cornerstone in this regard.”(Sacks, 2025) US and China have placed AI at the center of their national policies and global strategies. Both have been introducing various policy papers, strategies, and action plans for the advancements in the field of artificial intelligence and how to counter the side. Now, the international arena is witnessing two parallel AI setups: one created by the US and the other by China. As both are tremendously investing in research, development, and innovation in artificial intelligence, their national narratives and global plans are competing with each other, further exacerbating the international AI landscape.   This paper aims to critically analyze key policies highlighted under the national action plans and strategies launched by the US and the PRC, respectively. Applying the theoretical lens of constructivism, which deals with the role of ideas, norms, and values in shaping the international system, the paper will demonstrate key differences between the AI strategies of the US and China and how their ideological beliefs shape their respective AI policies. Moreover, the analysis will provide expert views on the future landscape of the AI race, its relation to the Great Game, and its political, economic, and military repercussions for the rest of the world. Furthermore, the analysis will mostly rely on expert interviews, key excerpts from official administrative documents, and research findings. This study will also provide insights into the Trump 2.0 administration’s policy outlooks vis-à-vis Beijing’s National AI policy.   America’s AI Action Plan 2025   President Trump unveiled his administration’s national strategy on artificial intelligence on 23rd July 2025. Entitled as “Winning the Race: America’s AI Action Plan”, this strategy is a long-term road map to counter and contain China’s growing profile in the tech world, in particular the AI.(White House, 2025) The title of the strategy explicitly announces that the US has entered into the global AI race. Under this strategy, the United States does not want to eliminate China, rather the US desires to lead the AI world as a core nation, while the PRC should operate as a periphery nation. On July 15 2025, while addressing the AI Summit in Pittsburgh, President Donald Trump stated, “The PRC is coming at par with us and we would not let it happen. We have the great chips and we have everything great. And, we will be fighting them in a friendly fashion. I have a great relationship with President Xi and we smile at the back and forth, but we are leading…...”(AFP, 2025)   America’s AI Action Plan: Key Pillars   A. Accelerate AI Innovation   This first pillar of the AI national strategy by the US deals with the fact that AI should be integrated into every sector of American lives. From the grassroots level to the national or international level, the US should be a leading AI power. AI innovation states that any type of barrier, i.e., legal, regulatory, or domestic constraints, must be eradicated at first to promote, enhance, and boost AI innovation in the US. The strategy clearly states the innovation in artificial intelligence to be the fundamental step towards AI global dominance. The American beliefs, values and norms hold much significance in this regard. This strategy laid down the framework where AI platforms and models should have to align with the US democratic principles, including free speech, equality, transparency, and recognition. This means that the US AI action plan will operate under the umbrella of capitalist ideology.(White House, 2025)   Another most important feature in the field of AI innovation is the conglomeration of public-private ventures. Both the governmental authorities and public institutions are provided with such policies and frameworks to integrate AI platforms into their day-to-day operations. Creating an AI ecosystem is the cornerstone of this strategy.(White House, 2025) It aims to build an American workforce mastered in AI capabilities, defense forces and their key platforms integrated with AI, and provide a secure and safe environment to national and international investors, thus encouraging them to increase their investments in the US. Last but not least, the development of various departments countering the unethical use of AI, i.e., deep fakes, thus securing the national sovereignty and integrity of the homeland.   Principal Deputy Director of the Office of Science and Technology Policy (OSTP), Lynne Parker, while highlighting the significance of the US 2025 AI Action Plan, stated, “The Trump Administration is committed to ensuring the United States is the undeniable leader in AI technology. This plan of action is our first move to enhance and preserve the US AI interest, and we are eager to receive our public perception and viewpoints in this regard.”(House, 2025) The AI innovation drive is indicative of the US being a liberal-democratic and entrepreneurial society. It has an innovation culture that focuses on open research, leadership in the private sector, and ethics based on its national myth of freedom, individualism and technological optimism.   B. Building the AI Infrastructure   This is the most crucial pillar of the US AI Action Plan 2025. From propagating the idea of AI innovation, the next step is to build a strong, secure, and renowned infrastructure to streamline the policy guidelines highlighted in the national AI strategy. This includes the development of indigenous AI factories, companies, data facilities, and their integration into the American energy infrastructure. The most significant step highlighted in this pillar is the construction of indigenous American semiconductor manufacturing units.(White House, 2025) Now what does it mean? As of today, China is considered to be the center of semiconductor manufacturing. Semiconductors are the basic units of any technology, i.e., weapons, aircraft, smartphones, etc. The US has long been importing semiconductor chips from China. Integration of the US energy infrastructure with that of the AI facilities is the ultimate objective of this strategy. Immense energy-producing units, i.e., electricity, under the ‘National Energy Emergency Act’ would be established to provide a continuous supply of electricity to AI data centers and facilities without any hindrance.(House, 2025)   But the Trump 2.0 administration, under its protectionist policies, aspires to restrict imports from China and build a domestic semiconductor processing unit. Highlighting the American dependence on Chinese chips, the American chemist and politician John Moolenaar stated, “The Trump administration has made one thing abundantly clear: we must reassert control over our own economic destiny. That’s not isolationism; that’s common sense. The Chip Security Act, outbound investment restrictions, and stronger export controls—those aren’t closing ourselves off. They are about ensuring America isn’t subsidizing or facilitating our own decline. The Chinese Communist Party (CCP) is using American capital to fund aircraft carriers, fighter jets, and AI systems that target our allies and threaten our freedoms.”(Moolenaar, 2025)   The norm of decentralized innovation is applied in developing the infrastructure, and it empowers universities, startups, and private corporations. This is an expression of confidence in market mechanisms and civil liberties, which is in line with its social values of open innovation and competition.   C. AI Diplomacy and Security   The last pillar of the US AI national action plan is to collaborate with international partners and allies. This simply means to export American AI technology to strategic partners and those with common interests. This will, as a result, give rise to new types of groupings known as ‘AI Alliances.”(White House, 2025) The Global Partnership on AI (GPAI), QUAI AI Mechanism, and US-EU Trade and Technology Council are some of its best manifestations. Like the security and defense partnerships, the AI alliances will enable the US and the West to encircle the PRC in the tech world, where strong western collaborations and partnerships would hinder the PRC from becoming the tech giant or from excelling in AI production. It Encourages responsible AI governance and a democratic form of AI standards of the US, which are based on its self-perception as a global governor of the liberal values.   Thus, in order to enhance AI-related exports to allies, the US has established various institutions, including the US International Development Finance Corporation (DFC). The US AI diplomacy aims to counter China’s growing footprints in the international bodies and institutions.(State 2023) As these global bodies are a key to spreading particular norms and values, shaping the public perception, and framing the global order, the US wants to challenge Chinese entrenchments in these organizations through political and diplomatic coalitions and groupings. Doing this, the West will be able to propagate their version of the global AI order. This means capitalism vs. communism will now be clearly visible in the global AI race between the economic hegemons.   The US Vice President J.D. Vance, while addressing the European Union (EU) leaders in Paris explicitly stated, “The US really wants to work with its European allies. And we wish to start the AI revolution with an attitude of cooperation and transparency. However, international regulatory frameworks that encourage rather than stifle the development of AI technology are necessary to establish that kind of trust. In particular, we need our European allies to view this new frontier with hope rather than fear.”(Sanger 2025) In case of security, the strategy aims to establish various AI Safety Institutes (AISIs) to reduce or eliminate the risk of AI-related accidents, which include errors in AI platforms, most specifically in the AI-operated weapon systems, and the unethical use of AI programs, i.e., generative AI or LLMs. Similarly, the strategy emphasized the danger posed by the non-state actors. These violent actors must be restrained from acquiring such advanced yet sophisticated technology.(White House, 2025)   China’s New Generation Artificial Intelligence Development Plan   For the first time in July 2017, the PRC launched its long-term national AI vision 2030, entitled “New Generation Artificial Intelligence Development Plan,” which is comprised of all the policies, guidelines, and measures to be taken by the Chinese Communist Party (CCP) to foster its AI developments.(Council 2017) China’s AI 2030 vision is none other than the extension of the idea that President Xi Jinping circulated in 2012 regarding China’s future role in the field of Artificial Intelligence (AI). This strategy aims to strengthen China’s AI footprints in the international arena. Ranging from investments to infrastructure, this plan of action explicitly declared to develop the PRC into the hub of AI innovation and investment by 2030. This plan of action is determined to bring about a profit of $160 billion by 2030.(O’Meara 2024) While addressing the Politburo Study Session on 25th April 2025, the Chinese President Xi Jinping noted, “To gain a head start and secure a competitive edge in AI, it is a must to achieve breakthroughs in basic theories, methodologies, and tools. By leveraging AI to drive the transformation of scientific research paradigms, we can speed up achieving breakthroughs in scientific and technological innovation in all sectors.”(Agency 2025)   China’s AI Vision 2030: Key Objectives   A. AI Leadership (2020)   The PRC has successfully accomplished this objective. Under this pillar, China has established significant AI infrastructure, including key facilities and data centers, coming at par with the US. Within this, the CCP urged the academic institutions to promote, enhance, and foster research in the AI domain, which resulted in the major developments in the sectors of big data, swarm intelligence, and super artificial intelligence.(Council 2017) China has successfully established its domestic AI industrial complex worth $22 billion. Various educational institutions, i.e., Tsinghua, Peking, etc., and major companies, i.e., Baidu, iFlyTek, etc., have now completely transformed into AI hubs where research, innovation, and practices are conducted through highly advanced AI platforms.   Commenting on the US-China AI leadership contest, Dr. Yasar Ayaz, the Chairman and Central Project Director of the National Center for AI at NUST, Islamabad, explicitly remarked, “Efficiency is the new name of the game now. Chinese AI inventions and developments clarify the fact that even with the smaller number of parameters, you could achieve the same kind of efficiency that others with an economic edge are achieving.”(Ayaz 2025) The AI leadership symbolically builds the socially constructed narrative of the Chinese Dream and national rejuvenation into the need to overcome the century of humiliation and take its place in the world order. Here, AI leadership is not just a technical objective but a discursive portrayal of the Chinese self-concept of being a technologically independent and morally oriented civilization.   B. AI Technology (2025)   The second most important objective of China’s AI Vision 2030 is to reach a level of tech supremacy in the international arena by 2025. Major work areas include localization of chip industries, advancements in semiconductors and robot manufacturing, etc. The first phase of 2020 basically laid the infrastructural foundation of the plan, while this phase deals with the development and innovation of key AI-operated platforms, including robots, health equipment, and quantum technology.(Council 2017) Another most crucial feature of the 2025 phase is to establish various AI labs throughout mainland China. This would result in the integration of AI into different public-private sectors, i.e., finance, medical, politics, agriculture, etc. Last but not least, a civil-military collaboration is described to be a cornerstone in this regard.   The AI-operated platforms would be utilized by both civil and military institutions, thus preserving the PRC’s national security and safety. Giving remarks over China’s technological edge, Syed Mustafa Bilal, a technology enthusiast and research assistant at the Centre for Aerospace and Security Studies (CASS), added, “China, which for the longest time has been criticized for having a technologically closed-off ecosystem, is now opting for an open-source approach. That was evident by the speeches of Chinese officials at the Global AI Action Summit, in which they tried to frame China’s AI strategy as being much more inclusive as compared to the West. And one illustration of that is the ironic way in which deep search is currently furthering OpenAI's initial selfless objective of increasing AI adoption worldwide.”(Bilal 2025) Thus, the AI vision of China reflects ideational promises of social order, central coordination, and a moral government, ideals that are based on its political culture and civilization background.   C. AI Innovation Hub (2030)   By 2030, China aims to be at the epicenter of global AI innovations, development, and investments. The PRC’s political, economic, and defense institutions will be governed under AI overhang. The most significant feature of this phase is to counter the US-led AI order by challenging the US and the West in various international bodies like the International Telecommunication Union (ITU). The main tenet of China’s 2030 vision is to transform it into a completely AI-driven economy—an AI economic giant.(Council 2017) As the PRC is ruled by the communist regime of President Xi Jinping, China aspires to counter the Western-led AI order through instigating its communist values, including high surveillance, strict national policies, and population control. By avoiding a completely liberal, free speech AI environment in mainland China, the CCP aims to come on par with the US by having authoritative control over its people, thus maintaining its doctrine of ‘techno self-reliance.’   Giving his insights on the new global AI order and the ideological rift between the US and China, Dr. Wajahat Mehmood Qazi, advisor on AI and digital transformation to the private tech companies and faculty member at the COMSATS University, Lahore, explicated, “Yes, there is a digital divide, but the interesting part over here is this: the world is evolving, so this big divide is no more about the decentralization or the centralization. If we look at how China is promoting openness by releasing its foundation models, at the same time the ecosystem of their LM models or AI is still in close proximity. Whereas, the western world is having a different narrative. They are talking about the openness of the models, but at the same time it’s more market-driven. In my view, we are entering into a world where innovation requires openness and closed methods simultaneously.”(Qazi 2025)   The concept of innovation with Chinese features is used to describe a socially constructed attempt to exemplify another approach to technological modernity, which combines dictatorial rule and developmental prosperity. It is a mirror image of self-concept in China as a norm entrepreneur that wants to legitimize its system of governance and impact the moral and technological discourse of AI at the global scale.   Conclusion   The constructivist perspective informs us that the competition between Washington and Beijing is not predetermined; it is being conditioned by the perceptions, suspicion, and competing versions that can be rebuilt through dialogue and mutual rules. The ideological divide can be overcome by creating inclusive tools of AI governance, with transparency, ethical principles, and shared responsibility in their focus. The common ground created through the establishment of a mutual conception of the threats and the ethical aspects of AI will enable the United States and China to leave the zero-sum game on AI and enter into a model of normative convergence and accountable innovation. Constructivism thereby teaches us that cooperation in AI is not just a strategic requirement but also a social option, which is constructed on shifting identities and the recognition of global interdependence with each other.   The great power competition is now in its transformative phase, bypassing the traditional arms race for a more nascent yet powerful AI race. In the context of the US-China contest, administrations on both sides are trying their utmost to launch, implement, and conclude critical national strategies and formulations in the field of artificial intelligence. Both are moving forward at a much greater pace, thus developing advanced technologies in the political, economic, and military domains. Be it China’s Deep Seek or the Western Chat GPT, be it Trump’s Stargate project or Xi’s AgiBot, both are investing heavily into the tech-AI sector. Despite this contest, both economic giants also need joint efforts and collaborations in various matters of concern. Until now, it’s been very difficult to declare which will lead the global AI order. The chances of a global AI standoff are there.ReferencesAFP. 2025. “Trump Vows to Keep US Ahead in AI Race with China.” The News International. Accessed July 24, 2025. https://www.thenews.com.pk/latest/1328672-trump-vows-to-keep-us-ahead-in-ai-race-with-china.Agency, Xinhua News. 2025. “20th Collective Study Session of the CCP Central Committee Politburo.” Center for Security and Emerging Technology, 1–3.Ayaz, Dr. Yasar. 2025. “Global AI Rivalry: U.S vs China.” PTV. Accessed July 24, 2025. https://www.youtube.com/watch?v=_82MMzI_g2c&t.Bilal, Syed Mustafa. 2025. “Global AI Rivalry: U.S vs China.” PTV. Accessed July 24, 2025. https://www.youtube.com/watch?v=_82MMzI_g2c&t.Council, State. 2017. “Next Generation Artificial Intelligence Development Plan.https://digichina.stanford.edu/work/full-translation-chinas-new-generation-artificial-intelligence-development-plan-2017/.Feijóo, Claudio, Youngsun Kwon, Johannes M. Bauer, Erik Bohlin, Bronwyn Howell, Rekha Jain, Petrus Potgieter, Khuong Vu, Jason Whalley, and Jun Xia. 2020. “Harnessing Artificial Intelligence (AI) to Increase Wellbeing for All: The Case for a New Technology Diplomacy.” Telecommunications Policy 44 (6). https://doi.org/10.1016/j.telpol.2020.101988.Hassan, Abid, and Syed Hammad Ali. 2025. “Evolving US Indo-Pacific Posture and Strategic Competition with China.” Policy Perspectives 22 (1). https://doi.org/10.13169/polipers.22.1.ra4.House, White. 2025. “Declaring a National Energy Emergency – The White House.” Accessed July 24, 2025. https://www.whitehouse.gov/presidential-actions/2025/01/declaring-a-national-energy-emergency/.House, White. 2025. “Public Comment Invited on Artificial Intelligence Action Plan – The White House.” Accessed July 24, 2025. https://www.whitehouse.gov/briefings-statements/2025/02/public-comment-invited-on-artificial-intelligence-action-plan/.Moolenaar, John. 2025. “The 2025 B.C. Lee Lecture Featuring Congressman John Moolenaar.” Accessed July 24, 2025. https://www.youtube.com/watch?v=QIIUZlaKofU.O’Meara, Sean. 2024. “China Ramps Up AI Push, Eyes $1.4tn Industry By 2030.” Asia Financial. Accessed July 24, 2025. https://www.asiafinancial.com/china-ramps-up-ai-push-eyes-1-4tn-industry-by-2030-xinhua.Qazi, Dr. Wajahat Mehmood. 2025. “Global AI Rivalry: U.S vs China.” PTV. Accessed July 24, 2025. https://www.youtube.com/watch?v=_82MMzI_g2c&t=.Sacks, Samm. 2025. “China’s Race for AI Supremacy - YouTube.” Accessed July 24, 2025. https://www.youtube.com/watch?v=xaccSxP8pOQ&t=8s.Sanger, David E. 2025. “Vance, in First Foreign Speech, Tells Europe That U.S. Will Dominate A.I.” THe NewYork Times. Accessed July 24, 2025. https://www.nytimes.com/2025/02/11/world/europe/vance-speech-paris-ai-summit.html.State, US Department of. 2023. “Enterprise Artificial Intelligence Strategy,” no. October, 103–13. https://www.state.gov/wp-content/uploads/2023/11/Department-of-State-Enterprise-Artificial-Intelligence-Strategy.pdfWang, You, and Dingding Chen. 2018. “Rising Sino-U.S. Competition in Artificial Intelligence.” China Quarterly of International Strategic Studies 4 (2): 241–58. https://doi.org/10.1142/S2377740018500148.White House. 2025. “Winning the Race: America’s AI Action Plan.” https://www.whitehouse.gov/wp-content/uploads/2025/07/Americas-AI-Action-Plan.pdf

Defense & Security
Soldier, CPU computer (central processing unit) US and Chinese flag on white background. US vs China chip war or tech war, semiconductor industry concept. US restrict and control chip export to China.

Superpowers Without Soldiers: Can Technology Replace Traditional Hegemony?

by Syeda Farani Fatima

Introduction Hegemony is the core principle in International Relations. It has been conceptualized through military strength, economic influence, and ideological control. The theory of cultural hegemony by Antonio Gramsci is based on assuming control but not necessarily through force, whereas realist theorists such as John Mearsheimer stress the relevance of military strength for ensuring global dominance (Mearsheimer 2001). The 21st century, though, brought into being a different era of transformation and technological breakthroughs that turned the existing arrangements on their head. With the advent of Artificial Intelligence (AI), cyber war, and space technology, great powers are transforming from traditional soldiers to cyberspace warriors. AI and other cyber tools are altering the strategic equation between major powers, providing avenues for countries like China and Russia to undermine US hegemony (Rooney et al. 2022). Hegemony in the past had been founded on military superiority, but at present, academics have discovered that technological hegemony is leading the way. Lethal Autonomous Weapons (LAWs) and AI have captivated researchers because they can transform war. Cyberspace has become the new battleground of power. The US and China are competing for cyber hegemony (Akdaǧ 2025). Space is increasingly regarded as a new battleground in geopolitics. The US Space Force and China’s BeiDou system illustrate how nations weave surveillance and communication in their strategic decision-making (O’Hanlon 2020). Thus, new technologies are reshaping the China-US rivalry. To counter this, countries are investing in tech-based industries, which will change the way human thinks. The analysis will explore whether emerging technologies can efficiently replace traditional tools of hegemony or not. Joseph Nye’s concept of smart power provides a critical framework in this modern era, where influence may flow from military boots to silicon chips. Global powers are moving towards influence and deterrence-based tech models, supplementing hard power. However, this transition has its risks, such as overdependence and ethical concerns. The paper argues that a complete transformation is not happening, but there will be dual-track hegemony where military and technology will coordinate to dominate. Policy implications of this shift are profound. Global powers must collaborate to draft international norms for AI and cyberwarfare, developing nations must develop their technology rather than dependency on global powers, as it will be easier for them to surveil and dominate, and international institutions must proactively govern the techno-political landscape to prevent destabilization. This study will use a qualitative approach, and it will be a case-based methodology combining theoretical perspectives of philosophers. This analysis is important as it delves into the transformation of the mechanics of global power from military hegemony to technology-oriented hegemony. It uses secondary sources like policy briefs, think tank reports, books, etc. Finally, this analysis concludes that soldiers may never be the first line of every fight, but the battle for global supremacy is firmly human-hinged in decisions on technology, ethics, and governance. Hegemony is a core concept in International Relations, grounded in military capacity, economic influence, and institutional influence. Historically, great civilizations like the Roman and British empires attained hegemony by dominating in naval power, making alliances and expanding their territories. In the post-World War II era, the US built dominance through overseas military bases and nuclear deterrence. Historical Foundations of Traditional Hegemony The Roman Empire, a classic example of past hegemony, attained this power by constructing roads, forts, and legions in the world's islands. Later, the British Empire sustained its dominance by modernizing the Royal Navy and the global trade network. The post-World War II era saw the hegemony of the United States with overseas military bases and security alliances. John Mearsheimer, in his book The Tragedy of Great Power Politics, says that according to great powers, hegemony is the best way to ensure their security (Mearsheimer 2001). Limitations of Traditional Hegemony The primary limitation of the traditional hegemonic model is the risk of overreach, entering into too many overseas agreements that become economically and politically unsustainable. Imperial overstretch, a model proposed by Paul Kennedy, explains the collapse of empires when they are unable to maintain their economy due to huge global aims (Kennedy 1988). Concurrently, we can see that after so many years have passed in the Vietnam, Afghanistan, and Iraq wars, the US is spending trillions. Approximately $3.68 trillion was spent on Iraq and Afghanistan (Costs of War | Brown University 2025). This highlights that military dominance can be costly and unsustainable. Mearsheimer, in an interview at the New York Times, claimed that ‘the United States is responsible for causing the Ukraine crisis’. Lack of legitimacy and local resistance is another great flaw in the traditional hegemonic pattern. For example, in Vietnam, soldiers used their knowledge of geography to push back against America's advanced weapons. Similarly, in Afghanistan and Iraq, foreign-led missions struggled with local insurgents. The New Tools of Technological Hegemony Cyber Power Cyber power has rapidly become a strategic field where states project their influence far beyond the geographic borders, often without soldiers. Cyber operations are dominating in this digital age, and the SolarWinds hack shows how states can achieve global influence through an Information Technology (IT) infrastructure breach. In March 2020, Russian hackers placed a secret backdoor in SolarWinds’ Orion software. This infected around 18000 users, including US major government departments (Cybersecurity 2021). The cyberattacks went undetected for several months, revealing vulnerabilities in the digital network. It was the worst cyber-espionage attack ever, an analyst described. Iran's 2019 cyberattack on the oil infrastructure of Saudi Arabia shows that the acquisition of digital superiority can help influence norms, command the critical infrastructure, and set global political narratives without foreign boots on the ground. To address this vulnerability, it is essential to know cyber deterrence theory. It discusses capability, attribution, and resolution. States should advance digital tools, modify their tracking system and enhance communication and transparency. The most lethal weapon today may not fire a projectile-it fires packets. This metaphor illustrates that state actors can erode adversary national infrastructure, banks and election systems without traditional warfare. The US Secretary of Defense Lloyd J. Austin III described the integrated Deterrence that integrates cyber with land, sea, and space under a unified strategy (Masitoh, Perwita, and Rudy 2025). Cybersecurity experts say that cyberpower is now a geopolitical power. And cyber warfare is not a sideshow; it’s a frontline strategy. Artificial Intelligence (AI) and Big Data AI’s strategic significance for national security has been emphasized by leaders like Jason Matheny, CEO of RAND Corporation. He warns that AI could make it easier to make harmful weapons and dangerous technologies (Matheny 2024). The 2023 report of RAND on AI and Geopolitics argues that AI may be the next frontier in US-China rivalry (Pavel et al. 2023). ChatGPT and Bard, like generative AI models, have humanitarian strategic applications, which makes fake news so believable that it feels like fact. This capability of AI can transform propaganda into scalable digital warfare. Beyond surveillance, AI has transformed military operations tactics. Military applications like drone swarming, algorithmic targeting, and predictive ISR create scenarios where the frontline shifts from kinetic zones to data centers. AI diplomacy is becoming the new foreign aid. Financial Times article notes that tech giants are deploying AI mechanisms in Africa not only for development but for their advantage as an influence tool. Thus, AI and big data are a new form of informational hegemony. Space Militarization and Satellite Dominance Space militarization emerged during the Cold War. States like the US, China, Russia, India, and Japan have developed anti-satellite (ASAT) capabilities (Samson and Cesari 2025). General John Jay Raymond at the US Space Command Launch said that, “Outer space is now recognized as a domain of military operations” (Raymond 2021). China’s 2007 ASAT test, which destroyed its own Fengyun-1C weather satellite, is still a thorn in the eyes of major powers. Russia has also launched missions like Kosmos-2553. Evolution from GPS to GNSS (Global Navigation Satellite Systems) reflects strategic change. The US has GPS, China has BeiDou, Elon Musk’s Starlink satellite constellation, and Europe has Galileo; each system highlights the sovereignty in digital positioning. China’s counterpart doctrine states in its 2021 Space White Paper that space-based assets are not crucial for renaissance only but for strategic deterrence without deploying soldiers or causing deaths of your military men (The State Council Information Office of the People’s Republic of China 2022). Undersea Cables and Digital Infrastructure Control Undersea cables carry over 95% of global data transmission (Sherman 2021). Disruption or surveillance of these cables can impact the worldwide flow of data and diplomatic communications. In developing countries like Pakistan, Kenya, and Ecuador, Huawei-funded infrastructure provides smart city services. Cable route is not just wiring undersea, it is influenced by encryption. The US and EU have Amazon Web Services (AWS), Microsoft Azure, and Google Cloud, like surveillance platforms. Cable-Landing zones (CLZs) are the chokepoints used for manipulation, Cloud interconnection policies allow control of traffic flow, and Surveillance software and firmware installed at data centers can be remotely controlled, bypassing local safeguards. Blocking connections can slow or disrupt foreign economic leverage. Digital infrastructure has become a domain for hegemony that is more insidious in strategic potential. This map exposes the physical foundations of digital power. Nations with greater cable landing nodes, like the U.S. and China, wield asymmetric influence, not through soldiers, but through network control. Disruption or surveillance of these cables can cripple economies or governance. Regional chokepoints also reflect strategic leverage in geo-economics and cyber diplomacy, making this infrastructure as consequential as traditional military bases. Figure 1: This map shows the physical foundations of digital power, nations with greater cable landing nodes, like the U.S. and China, wield asymmetric influence, not through soldiers, but through network control.Superpowers’ Technological Footprint United States Silicon Valley is the heart of US technological hegemony, and some other government agencies, like Defense Advanced Research Projects Agency (DARPA), are contributing to maintaining US technological hegemony. Lethal Autonomous Weapons (LAWs), drones, and defense-grade AI-powered decision-support systems are a tech-military hybrid force. Furthermore, the US controls major pillars of technology like operating systems (Microsoft, Apple, Google dominate desktops and mobile devices), and Satellites. Advanced technologies have enabled remote force projection like drone strikes, executing surgical operations, Cyber Command operations from SolarWinds retaliation, deployment of Overhead Persistent Infrared (OPIR) and Space Based Kill Assessment (SKA), enhancing deterrence. China Made in China 2025 vision aims to displace US techno-hegemony. China’s centralized Social Credit System reflects a template of techno-surveillance hegemony. Beijing is now selling surveillance systems to developing countries, highlighting its tech supremacy. China is controlling telecommunications architecture by promoting Huawei’s 5G worldwide. China’s cyber army, the People’s Liberation Army Strategic Support Force (PLASSF), specializes in offensive and defensive cybertech warfare (The State Council Information Office of the People’s Republic of China 2019). China’s Digital Silk Road links infrastructure investments in Asia and Africa with national encryption systems and cloud data centers. Ethiopian Prime Minister Abiy Ahmed, in a bilateral dialogue, said that ‘our fiber networks and data exchanges are now integrated with Beijing’s national infrastructure policy’. Thus, acquiring such a position in technology will prove China’s hegemony and can make it a superpower, making the world again a bipolar one. China’s strategic doctrine focuses on autonomous systems and digital authoritarian export over occupancy and geopolitical projection, respectively. Russia Russia’s global strategy remains rooted in a hybrid doctrine that combines cyber tools, space capabilities and disinformation operations. The Gerasimov Doctrine, Vladimir Putin’s strategic vision, emphasizes the blend of political, cyber, and economic tools to achieve strategic goals without casualties. The Ukraine conflict is a great example of cyber dominance. Russia has cyber units such as APT28 (Fancy Bears), Satellite Spoofing and Jamming, and the Internet Research Agency (IRA), which have executed targeted hacks against North Atlantic Treaty Organization (NATO), disrupted Global Positioning System (GPS) signals, and led disinformation campaigns. Russia’s power formula centers on dense cyber capacity, economic coercion, and unpredictability (making deterrence harder). Risks and Criticism of Tech-Based Hegemony Technology provides tools for security and influence, but overdependence causes strategic vulnerability, which leads to ethical dilemmas and raises questions about digital sovereignty. Overdependence and System Vulnerability A fundamental flaw of technological hegemony is its fragility. Systems are dependent on infrastructure (cloud servers, AI control nodes, etc.). The UN Group of Governmental Experts (GGE) says that lethal autonomous weapons are the cause of escalation in conflicts (CCW 2022). Take the SolarWinds breach of 2020, in which an update exposed thousands of sensitive pieces of information. Ethical Concerns China, Ethiopia, and some other states have AI-powered surveillance regimes. China exports networked camera systems and facial recognition tools to states that use them to suppress dissent. A senior researcher at Amnesty noted that, ‘delegating life and death decisions to software is ethically unjustifiable’. Global South Dependency and Digital Colonialism Due to technological influence, digital dependency has increased in the Global South. Digital dependency without regulatory safeguards leads to digital colonialism. Countries lacking advanced technology are reliant on digital ecosystems developed by superpowers. It is said by Dr Ruha Benjamin that ‘when code becomes law, and pipelines become policy enforcers, sovereignty is outsourced’. Hegemony Without Consent Soldiers are a visible force, but technology imposes itself quietly via platforms, which results in domination without democracy. Tech-enabled coercion doesn’t need tanks; it needs standards embedded in devices, laws baked into algorithms. This contradicts liberal norms of International Relations (IR), where hegemony should rest on consent for international legitimacy (Sakumar, Broeders, and Kello 2024). Future Power Projections: Domain-wise Breakdown There are five interconnected domains of future power projections: land, air, sea, cyber, and space. Land Domain In traditional combat, troops were used to counter enemy force, but now in the third digital era, surveillance grids, AI-powered motion detection systems, and autonomous land robots are replacing soldiers. The Israeli military is testing unmanned ground vehicles (UGVs), which they have named Jaguar, to patrol borders, and this will reduce human casualties. The diagram illustrates the interaction or the coordination between a human coordinator and an autonomous weapon system (AWS), and the target within a given environment. At first, the operator gives a high-level command which activates the controller, and the system provides feedback to the operator, such as mission success or failure. The controller is the brain of this system. It monitors the environment, processes data and controls the weapons. It operates in loops, evaluating the environment and updating the decision. Once the target is detected autonomously, the gun acts, which includes missile launch or gunfire. This entire process takes place in a dynamic environment. Figure 2: The coordination between a human coordinator and an autonomous weapon system (AWS) Air Domain Traditional manned fighter jets were dominating in aerial combat. Now, aerial dominance is shifted towards hypersonic weapons and AI-enabled drone swarms. Russia’s Zircon and China’s DF-ZF are hypersonic missiles that can travel at Mach 5+ speeds. AI drone swarms are rendering conventional missile defense systems obsolete. The US Air Force’s “Golden Horde” project and China’s GJ-11 stealth drone exemplifies this shift. Sea Domain Sea powers used to refer to blue-water navies and submarine fleets. They remain the core of maritime protection, but unmanned underwater vehicles (UUVs) are quickly supplanting aircraft carriers. UUVs are being used to surveil for months on their own, and they will not be detected. Subsea data cables, which transport 95% of internet traffic, are a strategic resource; such cables are undersea digital arteries. Securing the sea in the 21st century means controlling what is beneath it. The diagram illustrates major elements of an autonomous underwater vehicle (AUV). It is an important element in current naval battles and marine monitoring. The GPS/RF module is situated at the top of the AUV, through which the vehicle can position itself beneath the water. The propeller motor is the mobility unit of an AUV, driven by lithium-ion batteries. It provides thrust and directional movements. An electronic aid container serves as a housing store; it includes an onboard computer, a mission processor, a power distribution unit, and communication interfaces. AUVs have sensors which detect how deep the AUV is in the water column by measuring hydrostatic pressure. Acoustic Doppler Current Profile (ADCP), is a sonar device that uses Doppler shift in acoustic signals to measure the speed of water currents. An AUV manage its vertical position with a buoyancy tank. AUVs use an inertial navigation system; they determine the position of the AUV based on prior data. AUVs also contain forward-looking (Sound Navigation and Ranging) SONARs and Altimeters that scan and detect any obstacles in front of them and maintain a safe height from the seabed, respectively. Transducers are the mouth and ears of AUVs; they transmit and receive acoustic signals. They are crucial for clandestine communication and sensing of the environment. These AUVs are extremely crucial in contested sea areas such as the South China Sea or the Arctic. Therefore, AUVs are revolutionizing maritime operations by enlarging surveillance, exploration, and undersea warfighting capabilities. As technology evolves, AUVs will define the future of naval strategy and oceanographic study. Figure 3: Major elements of an autonomous underwater vehicle (AUV). Cyber Domain Cyberspace has no borders. Global powers like the US, China and Russia have developed cyber command units to disrupt the power grids of the opposite side. Russia’s cyber interference in the 2016 U.S. elections, China’s alleged breach of U.S. personnel databases (OPM hack), and the Stuxnet worm targeting Iran’s nuclear program exemplify how software has become a strategic weapon. According to NATO’s 2025 Cyber Doctrine, ‘A cyberattack triggering Article 5 [mutual defense] is not just theoretical—it’s a matter of time.’ Space Domain Traditionally, space power was limited to spy satellites, but now anti-satellite weapons (ASAT), Starlink and military satellite systems have transformed into a combat zone. The US created its Space Force in 2019 to dominate in space militarization. In the Ukraine war, SpaceX’s Starlink became crucial for Ukrainian battlefield communication, prompting Elon Musk to limit military use to avoid escalation. Table 1 (figure 4): Old model versus new model comparison in each domain of future power projection. Done by the author. Domain Old Model New Model Land Troop deployment - Armored divisions - Occupation warfare AI-enabled surveillance grids - Unmanned Ground Vehicles (UGVs) - Real-time satellite + sensor networks Air Fighter jets - Airbases - Strategic bombers Hypersonic missiles (e.g., DF-ZF, Zircon) - Drone swarms with AI autonomy - Human-out-of-loop air dominance Sea Naval fleets - Aircraft carriers Submarines Unmanned Underwater Vehicles (ORCA UUV) - Seafloor cable warfare - Autonomous maritime surveillance Cyber (No traditional equivalent) State-sponsored hacking - Data theft & disinformation ops - Cyber jamming, spoofing in kinetic war Space Reconnaissance satellites Missile early-warning systems ASAT weapons (China, Russia tests) - Satellite internet constellations (Starlink) - Real-time warfighting integration (JADC2) Can Technology Fully Replace Military Power? The emergence of advanced technologies like AI, autonomous weapons and space militarization has sparked the debate about whether technology can replace military power, wholly or not? Strategic autonomy, in which a nation’s ability to defend its interests independently requires both technology and military. Technology acts as a critical enabler but not a substitute. AI can analyze satellite data in seconds, but only trained personnel can conduct peacekeeping missions in fragile regions. Modern warfare is shifting towards grey zone conflicts that fall below the threshold of open combat. Russian operations in Crimea in 2014 blended cyberattacks and physical deployments of troops, due to which the line between technology and military became blurry. This incident shows that technology without boots is of no advantage. In addition, technology needs regular upgrades and educated users, and excessive reliance upon these systems may cause interruptions such as electronic warfare (EW) and electromagnetic pulse (EMP) attacks. In a time of humanitarian crisis, disaster response, and counterinsurgency, forces are indispensable. To defeat an enemy or to dominate, one must employ both technology and an educated military. Unmanned aerial vehicles (drones) have altered the character of air war. Great powers are investing heavily in military AI and quantum communication to improve battlefield awareness, minimize human loss of life, and enhance decision-making, but note that international decisions do not depend on a machine. They don't aim to replace the military, but they want to develop their technology. Thus, the emerging model of global power is not soldiering versus technology, but it is soldiers plus technology. It is known as dual-track hegemony, and a nation that acquires it will dominate shortly. A tech-savvy soldier, supported by AI and robotics, is the face of tomorrow’s war. Conclusion The United States, China and the EU are global powers of the modern era. These states possess the technological capital and military infrastructure that shape the regulation of engagement in cyberspace and AI. Firstly, they must strengthen international norms for cyber operations and AI governance. UNGGE has made some progress relevant to this, but this needs a broader enforcement mechanism like the Geneva Conventions. Secondly, global powers must invest in ethical and auditable technology. As AI is dangerous due to biased surveillance systems, facial recognition abuses, and it is also used in predicting policies, which is a major ethical concern. Algorithmic transparency, data protection, and privacy rights must be enforced as soon as possible. Lastly, multilateralism must extend to outer space. As space is becoming a battlefield, complicating geopolitical rivalry, to counter it, multilateralism must be encouraged. For developing countries like Pakistan, Indonesia, or Nigeria, the emergence of technological hegemony is both a threat and an opportunity. These countries should enforce digital sovereignty policies. These nations should avoid digital dependency, as it will be easier for global powers to surveil and dominate. Emerging powers should build defensive cyber infrastructure instead of offensive. They should build secure networks and legal protection against espionage on their own. Defensive strategy will serve as a strategic safeguard and can be used as a pawn in great power rivalries. Emerging powers should pursue a multilateral coalition among Muslim majority states to enhance their connectivity and ties. South-south cooperation must be promoted. The UN, G20 and other international bodies must move towards digital governance mechanisms instead of vague declarations. UN should form a Global Charter on Tech Governance, similar to a Digital Magna Carta. The charter should have ethical limits on the establishment and use of Artificial Intelligence and Lethal Autonomous Weapons. They should increase their coordination with the G20 to amplify these efforts. G20 should create a Tech and Ethics working Group, which can bridge the trust gap between Developed and developing countries in the digital arena. Global order continues to evolve in the 21st century, and the foundations of power projection are rewritten. There is a paradigm shift from boots to bots. This research demonstrates that while technology has transformed, it cannot entirely replace traditional modes of combat. Technology can only help the military to dominate in a region or conflict, but cannot fully replace it. There will be dual track hegemony, and the one who will acquire this hegemony will control world islands, and controlling world islands means ruling the world. However, this transformation comes with serious risks like AI miscalculations, vulnerabilities of digital infrastructure and ethical concerns. But we should keep in mind that military power is no longer sufficient, nor is technology alone a guarantee of dominance, in post-silo, where military, technological, and normative tools must function together to sustain leadership.ReferencesAkdaǧ, Yavuz. 2025. “Great Power Cyberpolitics and Global Cyberhegemony.” Perspectives on Politics. doi:10.1017/S1537592725000040.CCW. 2022. “Document Viewer.” : 16. https://docs.un.org/en/CCW/GGE.1/2021/3 (October 18, 2025).“Costs of War | Brown University.” https://costsofwar.watson.brown.edu/ (October 18, 2025).Cybersecurity, Centre for. 2021. SolarWinds: State-Sponsored Global Software Supply Chain Attack. https://www.cfcs.dk/globalassets/cfcs/dokumenter/rapporter/en/CFCS-solarwinds-report-EN.pdf.Kennedy, Paul. 1988. “Paul-Kennedy-the-Rise-and-Fall-of-the-Great-Powers-19891.” : 704. https://cheirif.wordpress.com/wp-content/uploads/2015/08/paul-kennedy-the-rise-and-fall-of-the-great-powers-19891.pdf.Masitoh, Yuniar Tri, Anak Agung Banyu Perwita, and Elphis Rudy. 2025. “Integrated Deterrence in Practice: The 2022 United States National Defense Strategy Towards the Russia-Ukraine War.” International Journal of Humanities, Education, and Social Sciences 3(3): 1030–48. doi:10.58578/ijhess.v3i3.7317.Matheny, Jason. 2024. “A National Security Insider Does the Math on the Dangers of AI | WIRED.” https://www.wired.com/story/jason-matheny-national-security-insider-dangers-of-ai/ (October 18, 2025).Mearsheimer, John. 2001. “S2-Mearsheimer-2001.” file:///C:/Users/sh/Downloads/s2-mearsheimer-2001.pdf.O’Hanlon, Michael. 2020. “Forecasting Change in Military Technology, 2020-2040 - Joint Air Power Competence Centre.” https://www.japcc.org/essays/forecasting-change-in-military-technology-2020-2040/ (October 18, 2025).Pavel, Barry, Ivana Ke, Michael Spirtas, James Ryseff, Lea Sabbag, Gregory Smith, Keller Scholl, and Domenique Lumpkin. 2023. “AI and Geopolitics: How Might AI Affect the Rise and Fall of Nations? | RAND.” https://www.rand.org/pubs/perspectives/PEA3034-1.html (October 18, 2025).Raymond, John W. 2021. “U.S. Leadership in Space: A Conversation With General John Raymond | Council on Foreign Relations.” https://www.cfr.org/event/us-leadership-space-conversation-general-john-raymond (October 18, 2025).Rooney, Bryan, Grant Johnson, Tobias Sytsma, and Miranda Priebe. 2022. Does the U.S. Economy Benefit from U.S. Alliances and Forward Military Presence? RAND Corporation. https://www.rand.org/content/dam/rand/pubs/research_reports/RRA700/RRA739-5/RAND_RRA739-5.pdf.Sakumar, Arun, Dennis Broeders, and Monica Kello. 2024. “Full Article: The Pervasive Informality of the International Cybersecurity Regime: Geopolitics, Non-State Actors and Diplomacy.” https://www.tandfonline.com/doi/full/10.1080/13523260.2023.2296739 (October 18, 2025).Samson, Victoria, and Laetitia Cesari. 2025. “Secure World Foundation: 2025 Global Counterspace Capabilities Report.” https://www.swfound.org/publications-and-reports/2025-global-counterspace-capabilities-report (October 18, 2025).Sherman, Justin. 2021. Cyber Defense across the Ocean Floor : The Geopolitics of Submarine Cable Security. Atlantic Council, Scowcroft Center for Strategy and Security.The State Council Information Office of the People’s Republic of China. 2019. China’s National Defense in the New Era. Foreign Languages Press. https://english.www.gov.cn/archive/whitepaper/201907/24/content_WS5d3941ddc6d08408f502283d.html.The State Council Information Office of the People’s Republic of China. 2022. “Full Text: China’s Space Program: A 2021 Perspective.” https://english.www.gov.cn/archive/whitepaper/202201/28/content_WS61f35b3dc6d09c94e48a467a.html (October 18, 2025)

Defense & Security
Two special forces soldiers close-up, military anti-terrorism operations concept

The Utilitarian paradox of the War on Terror: Afghanistan and beyond

by Tabinda Sabah

Abstract The War on Terror (WOT) initiated after the September 11, 2001, attacks has been one of the most consequential and complex military and political campaigns in modern history. Looking back it dignifies the idea that the global war on terrorism was an aggression frustration response of US towards the 9/11 attack of 2001. As it not only created a dense overlapping financial burden on the US but also the cost of the invasion was never in favor with US peace and conflict policies. Many scholars argue about the utility of WOT with other ethics of war and conflict mediating techniques along with using the paradigms of realist and liberal theories. But now when the NATO alliances withdrawal enacted the end of a 20-year constitutive war. As the NATO withdrawal marked end of WOT without a remediate response, it enacts a dispersed or iconic philosophical thought that was the WOT was a success or utter failure? This article will foreshadow the events of WOT, NATOs withdrawal and human rights violation that emerge exploring this issue through primary lens of utilitarian paradox in international political theory. Introduction Afghanistan is a multi-diverse state situated in the central south Asia. Its borders are tied by mountain ranges and trading ports submerge in southern and eastern parts of Asia, Europe & the Middle East. The geography of Afghanistan has been a frontier for colonial reign for centuries. From being occupied by the from the USA – USSR post -cold war struggles till the US invasion in Afghanistan in the WOT. Afghanistan has struggled to maintain a monopoly of economy, governance, infrastructural and parental isolation of Taliban within their own boundaries. The WOT was launched by the United States in the aftermath of September 11, 2001. The attack became one of the most contentious military and foreign policy actions in contemporary history. The war which initially aimed to dismantle terrorist organization such as al-Qaeda eliminate the Taliban regime in Afghanistan and secure global peace has lasted over two decades involving not only the USA but also the NATO forces. The centrality of military intervention and counter terrorism efforts in Afghanistan, Iraq and other regions has been met with both support and intense criticism particularly regarding its humanitarian consequences, effectiveness and long –term strategic outcomes. The complex history between the United States and Afghanistan, particularly form the Soviet- Afghan War 1979-1989 to the 9/11 attacks, offers a case study of how international relations, realpolitik, and the principle of utility (central to utilitarianism) can guide state behavior. By examining the role of foreign of U.S. policy in terms of net benefit or harm to global security and human welfare, especially when applying the principle of utility, which aims to maximize well-being and minimize suffering for the greatest number. This article seeks to explore the WOT through the principle of utility, a central concept in utilitarian philosophy. The principle of utility rooted in the works of philosophers like Jeremy Bentham and John Stuart Mill, posits that actions should be judged based on their ability to produce the greatest happiness for the greatest number of people [1]. By applying this principle, the review critically examines the ethical dimensions of the WOT, NATOs involvement and the humanitarian violations that have occurred throughout the conflict. The article is organized into the following sections: 1. Theoretical foundation of utilitarianism along with US and USSR influence in Afghanistan 2. US foreign policy and military strategies during the WOT. 3. NATOs overall assessment of the WOT under the principle of utility. In each section, the analysis will assess the actions taken by the US, NATO and other actors exploring whether the outcomes align with the utilitarian ideal of maximizing overall well-being. 1. Theoretical foundations: the principle of utility in war Utilitarianism is a consequentialist ethical theory that holds that the right course of action is the one that maximizes overall happiness or wellbeing. It evaluates actions based on their outcomes rather than their intrinsic moral qualities. This framework is particularly useful in the context of WOT. The principle of utility can be applied to assess whether the human, financial and political cost of the War were justified by the benefit of greater security, freedom from terrorism and regional stability. While NATO withdrawal from Afghanistan in 2021 has been framed as strategic realignment, it has also triggered a range of human rights violation, most notably the treatment of civilians, the resurgence of the Taliban and plight of women and minorities. This research will critically examine the interplay between the WOT, NATO withdrawal and human rights violation that emerge exploring this issue through primary lens of utilitarian paradox in international political theory. Utilitarian calculus in war: US relations in Afghanistan (1950-1970) The utilitarian calculus involves comparing the benefits of military intervention (such as the defeat of terrorist organizations the promotion of security and the establishment of stable democratic government) against it cost (including civilian causalities, economics expenditure and long-term social destabilization). As the WOT unfolded, the decision –making process in the US and NATO appeared to prioritize short -term security gains over long term humanitarian outcomes. For instances, the US began engaging with Afghanistan as part of its boarder strategy to contain Soviet expansion during the Cold War. The Helmand Valley Project aimed at modernizing the Afghan agriculture, and US aid under King Zahir Shah and Muhammad Dauod Khan government were early manifestation of US interest in Afghanistan. However, Soviet influence also grew particularly through infrastructure projects like the Salang Tunnel. The competition between the US and Soviet Union for influences in Afghanistan explains the context of utility of benefits in a realist perspective where states act primarily acts to protect and expand their own power for the greater benefit of good for the greater number of people. (Morgenthau, 1948). Also, the key challenges in applying the principle of utility to the WOT is determining who benefits and who suffers. for instance, the US and NATO countries may have gained security by weaking terrorist groups, but the Afghan and Iraqi population have borne significant cost in term of civilian causalities, displacement and economic destabilization of the Middle East and growth of radicalization, complicates any simplistic utilitarian evaluation. Under the presumptive analysis of utility: Any war or WOT occurs where there is an imbalance in the collapse of the monopoly of the inter-state relations among the rivalry. Furthermore, from a utilitarian perspective, the US & USSR interventions aimed to protect national security and detain the expansion of the rival superpower. However, the long-term consequences of such competition particularly the US focus on the military aid and covert actions led to the instability, civil war and the eventual Soviet invasion of Afghanistan in 1979. The overall outcome – while achieving short term strategic gains in containing the Soviet influence ultimately disrupted Afghan society, leading to the widespread maximizing welfare for the Afghan people or for the global peace in the long run, as they contributed to a power struggle that further destabilized Afghanistan. Utilitarian critique of preemptive war Utilitarianism also directly critiques the preemptive war doctrine espoused by the George W. Bush administration. The Invasion of Iraq in 2003, based on the belief that Saddam Hussein possessed weapons of mass destruction (WMDs) illustrated a problematic application of utilitarian reasoning. Critics argue that the invasion was not only morally unjustifiable but also inefficient as it caused massive human suffering without achieving its purported goals. According to the utilitarian philosophy such as Peter Singer’s the catastrophic outcomes of the Iraq War – millions of displaced, the loss of thousands of lives and destabilization of regions – far outweighed by any potential benefits in term of preventing future threats to US security. Also, the US influence deterred the rise of the People Democratic Party of Afghanistan which was aligned with the soviet interest. This led to the soviet invasion of Afghanistan in December 1979 intended to prop up the PDPA government. The US response was to support the Mujahedeen Rebels providing them with military aid (including stinger missiles) & funding through intermediaries like Pakistan and Saudi Arabia. Thus, this covert operation was seen as a part of broader Cold War strategy to undermine Soviet influence in the region. In the long run, the intervention was a justified action and response to Soviet expansionism. According to Hans Morgenthau’s principles of international politics states act based on their national interest which in this case was to counter Soviet influence. The US built alliances with the Islamism groups in Afghanistan which while supporting US geopolitical goals led to the creation of radicalized Islamist network, contributing global terrorism. The creation of this network, with groups like Taliban and Al-Qaeda exemplifies the unintended consequences for foreign intervention that may maximize short term strategic benefits but lead to a long–term instability and suffering. The soviet withdrawal left Afghanistan in a state of chaos. The Mujahedeen factions, funded by the US turned against each other, leading to the rise of the Taliban in 1996. Meanwhile, Osama bin Laden, who had been in Afghanistan during the Soviet conflict, founded Al-Qaeda. Al-Qaeda’s rise the Taliban support for them would set the stage for 9/11 attacks. While on September 11, 2001, Al-Qaeda under the leadership of Osama bin Laden, orchestrated the terrorist attack on the United States. The attacks killed nearly 3,000 people and led to the Taliban regime that harbored it and prevent further attacks. Utilitarianism and long-term consequences From a utilitarian viewpoint the US role in fostering Islamic Militancy in Afghanistan can be seen as contributing to a greater global harm in the form of terrorism. The short-term goal of defeating the Soviet Union led to the rise of extremist group that would go on to inflict severe harm globally, culminating in the 9/11 attacks. The utilitarian perspective here emphasizes that although the US successfully countered Soviet expansion, the long–term consequences – including the development of Al-Qaeda and its attacks on the US and other countries – created a greater global security threat. These consequences starkly illustrate the limits of the principle of utility raises important ethical concerns about the methods used and their long–term impacts where interventions create unforeseen global risks. Also, the immediate benefits of the US invasion were clear: the removal of Taliban and the disruption of Al-Qaeda’s operation in Afghanistan reduced the immediate threat of global security. However, the long-term consequences – including the loss of civilian lives, economic costs, and the rise of new insurgencies – raised questions about whether the intervention truly maximized global well-being. The humanitarian cost of War, including the deaths of thousands of Afghan civilians, the destabilization of the country and the ongoing conflict must be weighed against the benefits of preventing further terrorist attacks Moreover, the prolonged US military presence in Afghanistan until their withdrawal in 2021 led to the significant economic and social costs that have yet to be fully realized in terms of global welfare. 2. US Foreign policy and military strategies during the WOT The US action during the WOT was justified under the assumption that eradicating terrorism and ensuring national security would promote greater good, both domestically and internationally. However, the application of the principle of utility raises important ethical concerns about the methods used and their long-term impacts. The WOT initiated by the United States in the aftermaths of September 11, 2001 attacks, fundamentally reshaped international relations and military strategy, particularly in Afghanistan. These interventions, characterized by the use of military force, under the Authorization for Use of Military Force (AUMF) aimed to eliminate Al-Qaeda and dismantle the Taliban regime that harbored them. The US was soon joined by NATO allies in what was labeled operation enduring freedom and later operation led to significant human, political, and humanitarian costs. The Bush administration’s approach to security The Bush administration response to the 9/11 attacks was fundamentally shaped by realist principles of international relations, which emphasize the pursuit of national interest, power, and security in an anarchic international system. Under a realist paradigm, states must act in their own self-interest, often using force to ensure their survival and dominance. This is especially evident in offensive realism, as articulated by scholars like John Mearsheimer, which suggest that great powers seek to maximize their influence and security, often through coercion and military intervention. Under President George W. Bush the primary rationale for the WOT was the principle of self-defense and the protection of citizens from the threat of terrorism. The US government invoking the Bush Doctrine adopted a policy of preemptive military strikes, aimed to maximize the safety for the greatest number of Americans by neutralizing terrorist organization like Al-Qaeda and dismantling the Taliban support for such groups. However, the application of preemptive military force led to significant civilian casualties in Afghanistan and Iraq. According to Amnesty International the US military use of air strikes drone attacks and ground operation led to thousands of civilian deaths raising questions about whether the benefits of eliminating immediate terrorist threats justified the loss of innocent lives. Noam Chomsky and other scholars had argued in the past that the Iraq War, in particular, was a costly endeavor that not only failed to eliminate terrorism but also contributed to the rise of groups like ISIS exacerbating the global security threat in the long-term. This outcome from a utilitarian standpoint challenges the initial justification for the WOT as the human cost seemed disproportionate to the benefits achieved. According to UN reports and media outlets like Al-Jazeera, the conflict resulted in the loss of over 100,000 lives, including both civilians and military personnel. These humanitarian issues, however, were often sidelined in favor of military objectives and maintaining control over Afghanistan’s strategic importance. The principle of utility in military intervention: benefits and harm The principle of utility, central to utilitarianism, seeks to maximize overall well-being and minimize harm. From a utilitarian perspective the effectiveness of military intervention like the WOT can be evaluated by examining whether the benefits – such as the elimination of terrorist threats outweigh the harm caused to civilians, the humanitarian crises and regional instability. In the immediate aftermath of 9/11 attacks the US & NATO military actions were justified on the grounds of protecting the lives of American citizens and global security by dismantling Al-Qaeda and ousting the Talban, in utilitarian terms these goals seemed to promise a net benefit: by limiting al-Qaeda safe haven the intervention could potentially prevent future terrorist attacks on the US and its allies thereby protecting millions of lives. The humanitarian costs and the questions of net utility However, from a utilitarian viewpoint, the long-term harm caused by the intervention, including civilian deaths, displacement, and the destabilization of Afghanistan, must also be factored into the equations. According to various reports including the United Nations and Human Rights Watch, NATO’s military operations in Afghanistan caused widespread civilians being killed or injured. Additionally, the war exacerbated poverty, displacement, and psychological trauma for millions of Afghans. These humanitarian factors, especially when weighed against the limited gains in terms of security, question the net utility. Furthermore, the war led to prolonged instability in Afghanistan, which has seen a resurgent Taliban and the growth of new extremist groups like ISIS-K. This indicates that the intervention did not lead to long-term stability and may have contributed to further global security. The continued suffering of the Afghan people and the rise of new threats to global security (such as the Taliban’s return to power in 2021) suggests that the long-term consequences of the intervention might outweigh its initial benefits, thus failing the utilitarian criterion of maximizing overall well-being. State-building efforts and the decline of utility The US and NATO also pursued the strategy of state-building in Afghanistan which was intended to create a stable democratic government. The hope was that a New Afghan Government would prevent the country from becoming a heaven of terrorists, however, despite significant investment in democratic institutions human rights and social justice the central goal of security remained elusive. The inability to create a functioning state in Afghanistan, coupled with the increase of violence and corruption, indicated that the state-building efforts were not successful in improving the long-term welfare of Afghan population. While the US & NATO intervention in Afghanistan may have been justified through the lens of realism – to secure national interest and protect against terrorism – the utilitarian evaluation of the intervention reveals that the human and geopolitical cost likely outweighed the benefits, calling into question the true utility of the war and its outcomes. Further interventions must weigh these long-term consequences more carefully and seek to maximize the well–being of both local populations and global security. Obama’s counterterrorism strategy: drone warfare The Obama administrations sought to reduce ground troop deployment and shift to a strategy of targeted killings, particularly through the drone strikes, while distancing itself from the controversial Iraq War. This approach not only aimed to minimize US causalities while addressing threat posed by the groups like Al-Qaeda and Taliban. While drone strikes targeted high valued terrorists, like ISIS, Al-Qaeda and Taliban, they also crated collateral damage along with deaths of civilian in Pakistan, Yemen and Somalia while achieving the primary interest of assonating Osama bin laden. The approach of Obama’s administration emphasized the pursuit of national interest, security and state sovereignty in an anarchical international system. Realism often holds the ideal that a state acts in their self-interest, often through military force to ensure their survival and to maintain power relative to other states. Under Obama the core objective of the US foreign policy remained the same: to eliminate terrorist threat to the US and its allies particularly from Al-Qaeda. Also, the decision to continue the Afghanistan War while pulling back from Iraq was largely framed as a more focused, efficient approach to combat terrorism by selective military actions and intelligence, instead of fugitive prolonged war. This principle prioritized the effectiveness of military power over ideological or humanitarian goals. A key feature of the Obama’s realist approach was the unilateral actions the US took to pursue its objectives, particularly in the case of Operation Neptune Spear – the Navy Seal Operation that killed Osama bin Laden in 2011. The operation, conducted in Abbottabad, Pakistan, was not coordinated with Pakistani authorities which led to significant tension between the US and Pakistan. From a realistic standpoint the unilateral actions can be understood as a pragmatic use of military power to neutralize a direct threat to US security. In a world of anarchy, where no global authority can enforce laws, the state must often take matters into their own hands. By conducting a covert operation without seeking Pakistan’s approval, the US acted out perceived self –interest taking actions to eliminate a high valued target who posed an ongoing threat to American citizens and interests. However, Pakistan's sovereignty was violated in this instance, which raised significant international law concerns. Under Article 2(4) of the UN Charter, the use of force by one state on another is prohibited, except in cases of self-defense. The U.S. justified the operation as a self-defense measure, arguing that Bin Laden’s presence in Pakistan was a direct threat to U.S. security, and that the operation was an act of preemptive self-defense against terrorism. From a realist perspective, this is a reasonable justification for intervention, as the preservation of national security often supersedes concerns about sovereignty. From a utilitarian perspective, Obama’s drone strategy presents a moral paradox. While it may have successfully neutralized terrorist leaders and prevented attacks on US soil it also caused significant harm to local populations, violated international law and arguably contributed to anti-American sentiment in affected regions. In this case the benefits to US security were weighed against the moral and human cost of innocent lives lost raising question about whether the outcomes were truly in the service of the greater good. Utilitarian analysis of the Obama administration’s WOT: maximizing security and minimizing harm. The Obama administration’s approach to WOT can also be observed by its ability to maximize overall security and minimize harm both to the US and to civilians of Pakistan and Afghanistan. The idea is to assess whether the benefit of military actions, such as the elimination of high valued targets, outweighs the costs including civilian casualties, displacement of population and the destabilization of the region. One of the key successes of the Obama’s administration was the target killing of Osama bin Laden. The operation provided a sense of closure to the 9/11 attack, which is benefit from the perspective of US public security and national pride. The death of Bin Laden was framed as a symbolic victory over Al-Qaeda, and this may be seen as a positive outcome because it removed a key figure head of terrorism, which could reduce the perceived threat to global security. However, the humanitarian cost of the broader WOT – which included the use of drone strikes and special force operations – were substantial. While drone strikes allowed precise targeting of terrorist operatives, they also led to numerous civilian causalities in Afghanistan, Pakistan, Yemen and Somalia. Drone warfare has been heavily criticized for the lack of transparency, the risk of collateral damage, and the psychological impact on local populations. In the case of Pakistan, the unilateral nature of the Bin Laden’s operation not only undermined Pakistan’s sovereignty but also caused political fallout that weakened the US-Pakistan relationship. The operation demonstrated that US actions even when taken in interest of self–defense could have serious long-term geopolitical consequences, such as the erosion of trust and cooperation between states. From a utilitarian perspective, the broader costs – including the destabilization of US relations with Pakistan particularly when it comes to larger goal of regional stability – outweigh the perceived benefits of the operation. The ethics of targeted killings The increasing use of targeted killing, especially through drone strikes also raised significant ethical concern from a utilitarian perspective. While these operations may have been effective in neutralizing specific terrorist threats, the long-term consequences, including the moral hazard of using covert killings without oversight, can lead to escalations of violence and increased instability in the regions already plagued by a conflict. The principle of utility requires a careful balance of costs and benefits. In many instances, targeted killings have resulted in collateral damage, including the deaths of innocent civilians, which diminishes the overall moral benefit of these actions. Ultimately while the Obama administration efforts had eliminated specific threats and achieved short term gains, the long-term impact of the regional stability and international relations suggest that the utilitarian cost benefits analysis of the WOT points to a more complex legacy. Further interventions must carefully consider both the military objectives and humanitarian cost, to better align actions with the ultimate goal of global security and human flourishing. Trump’s “America First” approach and the cost of withdrawal Donald Trump’s first administration continued the WOT with a focus on unilateralism and reducing US military involvement aboard. The Doha Agreement (2020) negotiated between the Trump administration and the Taliban was a significant shift in the US policy, aiming for the withdrawal of American troops from Afghanistan. While this decision aligned with Trump “American First” philosophy, which prioritized US interest over global obligation, the execution of the withdrawal was chaotic, leading to the rapid resurgence of the Taliban significant humanitarian crises. From a utilitarian perspective the withdrawal decision can be seen as an effort to end a costly and unproductive military engagement that was producing diminishing returns. However, the aftermath of the Taliban returns to power accompanied by the collapse of Afghan government and widespread humanitarian suffering – raises significant doubts whether this decision ultimately maximized the welfare of the Afghan population or the global community. The decision to abandon NATO allies and the Afghan government, left a power vacuum, creating conditions for renewed conflict and humanitarian suffering thus failing to achieve the greater good in the long run. Paradoxically, Trump sought to reduce US involvement in long standing conflicts like Afghanistan which he viewed as a dent on American resources with minimal return in terms of national security. His decision to withdraw NATO forces from Afghanistan reflects this approach, emphasized the reduction of military expenditures and prioritizing domestic issues over international commitments. Trump’s decision to withdraw NATO forces can be viewed as an attempt to minimize the costs of prolonged military engagement while attempting to safeguard American lives. The moral benefit of withdrawal lies in the relief of American soldiers from the ongoing conflict and allowing the US to refocus its attention on the issues perceived as more pressing like economic revitalization & domestic infrastructure. However, the humanitarian consequences of such a move were severe. The Doha Agreement signed in 2020, aimed to facilitate the US withdrawal in exchange for Taliban assurances failed to deliver on key promises such as the protection of human rights and the creation of legitimate Afghan government. The agreement, while offering the possibility of peace did little to address the internal division in Afghanistan or to ensure the long-term stability of the country. The Taliban’s return to power in August 2021 resulted in a swift collapse of the Afghan movement, marking a humanitarian disaster as the Taliban took over Kabul, triggering widespread violence displacement and violation of human rights, particularly women rights. The decision to withdraw without securing a lasting peace agreement resulted in a net negative outcome for Afghanistan civilian population. While the US may have minimized its military risk the benefits of withdrawal were offset by the harm inflicted on the Afghan people. The Doha Agreement and peace talks. The Doha Agreement (February 2020) reflected Trump’s aims of ending the “forever war” in Afghanistan. The agreement led to US-troop reduction in exchange for Taliban promises not to harbor terrorist organization and a commitment to negotiating with the Afghan government. From a utilitarian perspective, the promise of peace talks was intended to maximize overall stability by ending the cycle of violence. However, the exclusion of the Afghan government from the peace talks and the continued violence by the Taliban during that period – undermined the utility of the agreement. The lack of inclusivity in the talks created a perception that US was abandoning its Afghan allies and supporting a regime that had a long history of human rights violation. The net benefit of the Doha Agreement therefore can be seen as limited, as it failed to bring about the desired peace or long-term stability in Afghanistan, while the Taliban rapidly retook the power once the US troops began their withdrawal. Biden’s commitment to ending the WOT Biden decision to proceed with the US withdrawal was framed as a continuation of a long-standing policy of ending the war. Biden argued that the US mission had evolved from counter terrorism to nation-building and that the Afghan government was not capable of holding power without US military support. In his view, the war had become a strategic quagmire, consuming trillions of dollars and thousands of lives without clear, sustainable outcomes. Biden’s decision to withdraw aimed at minimizing the harm to American soldiers and the financial burden of the war. However, the immediate humanitarian impact of the withdrawal was catastrophic. The rapid fall of Kabul in August 2021, months ahead of the scheduled withdrawal, led to scenes of chaos and desperation. The human cost of the disorganized withdrawal, the Taliban resurgences and the human right abuses that followed outweigh the short-term benefits of US troop withdrawals. From a utilitarian perspective, Biden decision to withdraw aimed at minimizing the harm to American soldiers and the financial burden of the war. However, the immediate humanitarian impact of the withdrawal was catastrophic. The rapid fall of Kabul in August 2021, months ahead of the scheduled withdrawal, led to scenes of chaos and desperation, as thousands of Afghan Civilians – including those who had assisted US troop withdrawals. While Biden justified the pullout as a necessary step for ending the war, the immediate aftermath suggested that the overall utility of the withdrawal was minimal, as the Taliban’s return marked a return to an authoritarian rule, with increased repression of women, journalist and other civil society groups. Biden’s foreign policy and NATO’s role Biden’s administration faced significant criticism for its handling of NATO’s withdrawal from Afghanistan. The collapsing Afghan government left NATO allies in a difficult position, as they were forced to evacuated personnel and citizen alongside US forces. The dis-orderly nature of the withdrawal strained NATO alliances, as many European countries felt sidelined by the US decision–making process. From a utilitarian viewpoint, the US withdrawal had a dual impact on NATO. On one hand, it removed NATO forces from an increasingly unpopular and costly conflict, thereby reducing the risk for Western nations. On the other hand, it undermined the credibility of NATO as a security alliance, casting doubt in US commitment to collective defense under Article 5 of the NATO Treaty and creating a vacuum within the EU and NATO that was quickly filled by the resurgence of the Taliban. 3. NATO’s role and withdrawal from Afghanistan NATO roles in Afghanistan were to assist in stabilizing the country after the initial US invasion and to ensure that Taliban could not regain power. However, NATO efforts through significant in terms of resources and manpower were ultimately undermined by the persistent instability corruption and a lack of clear political resolution in Afghanistan. However, the Biden administration faced significant criticism for its handling of NATO withdrawal from Afghanistan. The collapsing Afghan government left NATO allies in a difficult position as they were forced to evacuate personnel and citizens alongside US forces. The disorderly nature of the withdrawal strained NATO alliances as many European countries felt sidelined by the US decision-making process. From a utilitarian viewpoint the US withdrawal had a dual impact on NATO. As it undermined the credibility of collective defense under article 5 of the NATO Treaty, the EU and NATO allies faced the challenge of reassessing their own defense strategies as they were left to cope with the vacuum created by the US pullout and the resurgence of the Taliban. The Utility of NATO’s Intervention was framed as a collective security mission aimed preventing terrorism and fostering a stable democratic Afghanistan. From a utilitarian perspective NATO goal was to promote peace and security for the Afghan people while supporting the broader international community fight against terrorism. NATO actions contributed to civilian casualties raising ethical concern about the cost-benefit ratio of the intervention. The chaotic withdrawal in 2021 mirrored under President Biden was another critical juncture in the WOT. The sudden collapse of the Afghan government and the Taliban swifts return to power raised questions about the utility of NATO long-term involvement in Afghanistan. The withdrawal did not produce a greater good as the human cost of Taliban resurgence, and the subsequent humanitarian crisis significantly outweighed the benefits of the mission. Regional geopolitics and the Taliban’s return to power The Taliban’s rapid rise to power was followed by international recognition from China, Russia, and Pakistan, all of whom were keen engage diplomatically with the new regime. China’s BRI initiative showed interest in Afghanistan’s strategic location, while Russia and Pakistan sought to maintain their regional influenced. From a utilitarian perspective, this shift in regional power dynamics presents mixed outcomes. On the positive side, the Taliban’s reassertion of control over Afghanistan could potentially reduce terrorist activities within the region if the Taliban adheres to the assurances it made to foreign powers regarding counter-terrorism efforts. However, the humanitarian costs, especially for the Afghan population – remain severe. The Taliban’s treatment of women, freedom of speech and other fundamental rights represent a serious human cost that undermines the utilitarian justification for withdrawal. For neighboring countries like Pakistan, the Taliban rise creates a security dilemma as it may embolden domestic insurgents like the Tehreek-e-Pakistan (TTP). This could lead to spiral of violence that destabilizes the entire region, potentially leading to further refugee flows, terrorist activities, and cross conflict. The US withdrawal from Afghanistan, under both Trump and Biden was driven by the goal of minimizing the costs of prolonged military engagement, which from a realist perspective, could be justified as a necessary step in re-orienting US foreign policy. However, from a utilitarian standpoint the humanitarian consequences of the withdrawal including civilian suffering, regional instability, and the empowerment of the Taliban, have largely outweighed the short-term benefits. 4. Humanitarian consequences and civilian casualties and the use of force One of the most striking aspects of the WOT and particularly the US and NATO actions in Afghanistan and Iraq is the humanitarian violations that have accompanied military operations, the principle of utility demands that the human cost of war be carefully considered and yet civilian casualties during the WOT have been significant. According to estimates, more than 200,000 civilians have been killed in Afghanistan alone with additional fatalities in Iraq and other regions affected by the conflict. The extensive use of drone strikes air raids and ground operation against the Taliban’s Al-Qaeda targets has resulted in numerous instances where civilians were killed in the process. While these actions may be justified as targeting terrorist the humanitarian consequences raise question about whether the WOT strategic objective were worth the cost incurred. Utilitarian philosophers like Rosa Brooks argue that this violation which may have been undertaken in the name of security failed to maximize the well-being of those affected, particularly the victims of torture. The collateral damage in terms of civilian suffering and the loss of moral credibility further diminishes the utilitarian justification of these actions. Bush administration: the use of force without legal protection The Bush administration’s labeling of Al- Qaeda as a terrorist organization allowed for the indefinite detention of suspected terrorists with many denied the rights of prisoners of war (POWs) as outlined in Geneva Convention article 3. The US government’s treatment of captured militants, including the decision to not grant them POW status, was a direct violation of international law. The lack of judicial trial, along with the use of military commission to try detainees, highlighted the absences of fair trial guarantees and violated basic principles of justice. Detention and torture: Guantanamo Bay The detention of suspects at Guantanamo Bay and the torture inflicted on prisoners there, became a significant violation of international human rights law. Detainees held in indefinite detention without trial were often subjected to enhance interrogation techniques, which included waterboarding, stress positions and other forms of psychological and physical abuse. These actions violated international conventions, including the Geneva Conventions and the Convention Against Torture (CAT), both of which prohibit torture and inhumane treatment. From a utilitarian perspective, these actions fail to justify the moral harm they caused. The human suffering of detainees at Guantanamo, along with the damage to the US international reputation, cannot be outweighed by the perceived benefits of gathering intelligence. While some argue that torture may have produced vital information, the overall harm caused to human dignity, individual rights and the rule of law suggest a net negative utility. Drone strikes and civilian casualties Drone strikes, particularly in Pakistan, and Afghanistan have been another controversial aspect of the WOT. These strikes, which were often conducted with minimal oversight and without regard for sovereignty of countries, resulted in the deaths of thousands of civilians. In many cases non-combatants, including women and children were killed in mistaken strikes or when their proximity to a target was deemed insufficient to prevent harm. From a utilitarian standpoint, drone strikes can be seen as a high–risk, high-reward strategy. The argument made by proponents of drone warfare is that it minimizes American causalities and prevents terrorist attacks, therefore maximizing American causalities and prevents terrorist attacks, therefore maximizing national security. However, collateral damage and the disruption of communities in targeted countries can lead to the problem. This creates a vicious cycle, while the US attempts to reduce the immediate threat the long-term harm to global stability and human lives is profound. For instance, the 2010 incident in which 23 civilians were mistakenly killed in a drone strike is a clear example of this negative utility. The mistaken targeting of civilian buses underlines the lack of precision and accountability in the US strategy, which when weighed against the loss of innocent lives, cannot be justified under the utilitarian principle of minimizing harm. Obama administration and violation of IHL Under Obama’s administration, the drone strikes campaign intensified with the goal of targeting high valued terrorist and leadership figures within Al- Qaeda and the Taliban. While the strikes may have helped eliminate specific threats, they were often conducted without proper regard for international humanitarian law, particularly distinction (the principle that combatants and civilians must be distinguished) and proportionality (the requirement that military actions must not cause excessive civilian harm in relation to the anticipated military advantage). For instance, Obama’s Operation Neptune Spear, which targeted Osama bin laden in Pakistan, while celebrates as a success in eliminating a key terrorist figure, raised significant legal questions. The operation violated Pakistan’s sovereignty and was conducted without prior consent, in clear breach of the UN Charters provisions against the use of force on foreign soil without permission. A utilitarian may argue that the elimination of bin Laden may have offered short-term benefits in terms of counterterrorism, the long-term consequences – the violation of international law, the deterioration of US-Pakistan relations and the potential for escalated conflict – suggest that the operation caused more harm than good. 5. The economic and social cost of the WOT The financial cost of the WOT was astronomical. According to the US Department of Defense, the total military expenditure in Afghanistan from 2001 until 2020 was around $ 955 billion with estimates that the total cost of the WOT, including related costs, could reach $2 trillion by 2024. This enormous expenditure, while it supported military and intelligence operations, could arguably have been better utilized from a utilitarian argument, for domestic priorities like health care, education, and infrastructure. Furthermore, the opportunity cost, the benefits that could have been derived from using the resources elsewhere, undermines the utilitarian arguments for continuing the war, particularly given the lack of tangible success in achieving long-term peace and stability in the regions affected by the war. The human cost The human cost of the WOT was profound. Thousands of US soldiers, tens of thousands of Afghan civilians and hundreds of thousands of people in the broader region lost their lives. Many others faced psychological trauma and displacement. The US military emphasizes on counter insurgency and drone strikes, while designed to protect American lives, resulted in widespread civilian casualties and displacement in the countries like Afghanistan and Pakistan, further destabilizing the region. Discussion The WOT initiated after September 11, 2001, attacks have been one of the most consequential and complex military and political campaigns in modern history. Looking back there are several key reconditions and conflict mediation on how it could have been handled differently to achieve better outcome, reduced unintended consequences, and hold international law and human rights Applying the principle of utility to assess the overall effectiveness and morality of the WOT reveals a complex picture. While the US and NATO achieved some military successes, including the eliminations of key terrorist leader and the weakening of organizations like Al-Qaeda, these gains were accompanied by profound humanitarian costs. From a short- term utilitarian perspective the WOT may have been justified in terms of protecting US national security and neutralizing immediate threats forms of terrorism. However, when considered from a long-term perspective the human, financial, and strategic costs - especially the rise of radical groups like ISIS, the displacement of millions, and the destruction of entire societies - raised serious doubts about whether the WOT truly maximized global well-being. The ethical implications of the civilian casualties, torture and human rights violation further complicate the utilitarian evaluation. From a utilitarian perspective the WOT appears to have been a failure , the short term benefits such as eliminating terrorist leaders like Osama bin Laden – do not outweigh the long-term harm caused by the war including: humanitarian violation (torture, extra-judicial killing, drone attacks), financial burden (trillions of dollars spent, with little to show in terms of lasting peace or security), social and psychological costs (widespread of causalities in Afghanistan and Pakistan), and erosion of international norms (the violations of the Geneva Conventions, particularly the treatment of prisoners, contributed to the decline of international humanitarian standards). Conclusion The WOT and NATO involvement in Afghanistan and the humanitarian violations that accounted for the military intervention provided a rich case to evaluate the effectiveness of foreign policy through the lens of utility. While the WOT was initially justified on the grounds of maximizing security and protecting national interest in the long-term, consequences including civilian causalities, regional instability and the erosion of human rights suggest that the ultimate outcome were far more ideal. Although the utilitarian studies enacted some tactical victories in the WOT, the overall utility in terms of human rights, financial cost and global stability was negative. As a result, the strategy failed to create sustainable peace and instead resulted in a cycle of violence that ultimately undermined the very values it aimed to protect. Consequently, NATO may have failed to achieve greater good, causing more harm than benefit to both the people in the regions affected and the broader international community. In retrospect, instead of heavy reliance on military interventions the US and its allies could have focused more on intelligence gathering, law enforcement and international cooperation to disrupt terrorist cells before they could act. In short, focused on intelligence and law enforcement, not just military force Moreover, engaging more deeply with moderate Muslim –majority countries and regional allies to counter extremist ideologies and promote development and political stability in the Middle East and beyond would be a good idea. The WOT often alienated large segments of Muslims worlds furling resentment and contribution to the efforts of groups like Al-Qaeda and ISIS. A focus on diplomacy, addressing underlying grievances, and building local political and economic structures would have been more sustainable. Similarly, avoiding overuse of force in Afghanistan and Iraq would have helped. The US-NATO forces could have employed more targeted operations including special forces counter insurgency tactics and precision air strikes, rather than large-scale military invasions and occupations, because these onset of wars accounted for the increase of causalities, which allotted disruption to the laws of wars amendments Furthermore, to ensure lasting peace, it was essential to promote nation building and reconstruction. Military intervention efforts should have focused more on this aspect. Equally important was better adherence to Human Rights and International Law. The WOT should have adhered more strictly to international laws, including the Geneva Conventions and upheld human rights standards to prevent practices like torture, indefinite detention and extraordinary renditions. Actions and unlawful detentions tarnished rage moral authority of the US and its allies and violated human rights standards. This approach not only harmed individuals but also damaged global support for the WOT, leading to accusations of hypocrisy and fueling anti-Western sentiment. The WOT should have been framed as a global problem involving broad cooperation with international organizations like the United Nations and regional coalitions. Finally, addressing the root causes of terrorism - poverty, education, and political grievances -was crucial. Public diplomacy and soft power should have been used more effectively; the US should have relied more on cultural programs and soft power to counter extremist narratives and build goodwill in Muslim-majority countries. References 1. Amanullah Haidary Azadany. 2016. How Would a Realist Explain the Civil War in Afghanistan? Vol 12. European Scientific Journal file:///C:/U s ers /admin/D ow nloads /7171 -A rticle%20Text - 20870 - 1 -10 -20160330%20(1).pdf 2. Emily Stewart. (2021). the history of US intervention in Afghanistan, from the Cold War to 9/11. https://www.vox.com/world/22634008/us-troops-afghanistan-cold-war-bush- bin-laden 3. Mohammed Ahsan Zia. (2000). An Analysis of Peace-building Approaches in Afghanistan. https://asiasociety.org/analysis-peacebuilding-approaches-afghanistan 4. Trevor Blond in. (2015). Soviet Intervention in Afghanistan, the Saur Revolution, and the Cold War. Volume 2, (2). The Undergraduate Historical Journal at UC Merced. https://escholarship.org/uc/item/5qx01820 5. Julie Lowenstein. (2016). US Foreign Policy and the Soviet-Afghan War: A Revisionist History. https://elischolar.library.yale.edu/cgi/viewcontent.cgi?article=1045&context=applebaum_award 6. Sergey Kyree. (2004). G George Lisa Gee Liska's Realist Alliance Theory s Realist Alliance Theory, and The, And the Transformation of Nato. file:///C:/Users/admin/Desktop/George%20Liskas%20Realist%20Alliance%20Theory%20And%20The%20Transformation%20Of.pdf 7. The U.S. War in Afghanistan. (1991-2021). https://www.cfr.org/timeline/us-war- afghanistan 8. Prabhash K Dutta. (2021). “20 years of 9/11: From Terror to WOT to Return of Terror”. https://www.indiatoday.in/world/story/20-years-of-9-11-from-terror-to-war-on-terror-to-return-of-terror-1851656-2021-09-11 9. Bill Calcutt. (2011). “just war theory and the WOT”. Journal of Policing, Intelligence, and Counter-Terrorism. Research gate publishers. file:///C:/Users/admin/Downloads/Justwartheory-JPICTV6N2-Oct11.pdf 10. Ruairidh Wood. 2020 “Promoting democracy or pursuing hegemony? An analysis of U.S. involvement in the Middle East”. Vol. 6, No. 2. Journal of Global Faultlines’ pp. 166-185. Published by: Pluto Journals. https://www.jstor.org/stable/pdf/10.13169/jglobfaul.6.2.0166.pdf?refreqid=excelsior%3A7b9ad0d28602a07b5febbc678c780c26 11. Md. Mizanur Rahman. (2018). “The US State-building in Afghanistan: An Offshore Balance?” Vol. 23(1). Pp: 81_104.Jadavpur Journal of International Relations. https://journals.sagepub.com/doi/pdf/10.1177/0973598418804292 12. Timothy Hoffman. (2015). “Realism in Action: Obama Foreign Policy in Afghanistan”. Political analysis Vol.16. article 6 https://scholarship.shu.edu/cgi/viewcontent.cgi?article=1019&context=pa 13. Brett Campbell. (2014). “Realist or Liberal? Theoretical Interpretations of the Obama Administration’s Counterterrorism Strategy”. file:///C:/Users/admin/Downloads/B_Campbell%20(2).pdf 14. Luis E. Chiesa & Alexander K.A. Greenawalt. (2012). “Beyond War: Bin Laden, Escobar, and the Justification of Targeted Killing”. https://digitalcommons.law.buffalo.edu/cgi/viewcontent.cgi?article=1343&context=journal_articles 15. Alexander J. (2013)."The Killing of Osama Bin Laden" Law School Student Scholarship. 308. https://scholarship.shu.edu/student_scholarship/308 16. Meghan McGee. (2020).” Europe Needs to Push Back against Trump: Disastrous and erratic policies demand a stronger response. https://foreignpolicy.com/2020/07/10/trump-europe-nato-transatlantic-push-back/ 17. Grant Farr. (2020).” The Afghan Peace Agreement and Its Problems”. Published at International Relations. https://www.e-ir.info/2020/04/06/the-afghan-peace-agreement-and-its-problems/ 18. Aljazeera. (2021). “Inside Story: How will US troop withdrawal affect Afghanistan?” https://www.aljazeera.com/program/inside-story/2021/4/14/how-will-us-troop- withdrawal-affect-afghanistan 19. Furqan Khan. (2021).” The Afghan Conundrum: Taliban’s Takeover and the Way Forward”. https://www.airuniversity.af.edu/JIPA/Display/Article/2759350/the-afghan- conundrum-talibans-takeover-and-the-way-forward/ 20. Vilde Skorpen Wikan. (2015). “How Has the Human Rights Regime Been Affected by 9/11 and the ‘WOT?”. https://www.e-ir.info/2015/08/30/how-has-the-human- rights-regime-been-affected-by-911-and-the-war-on-terror/ 21. Human Rights Watch. (2004). “Enduring Freedom”: bourses by U.S. Forces in Afghanistan”. Vol. 16, No. 3(C). https://www.hrw.org/sites/default/files/reports/afghanistan0304.pdf 22. Jean-Marc Piret. (2008).” The war against terrorism », international law and the growth of unchecked executive power in the U.S.” carin. Info. Vol: 60. https://www.cairn.info/revue-interdisciplinaire-d-etudes-juridiques-2008-1-page-59.html 23. Hilde Eliassen Restad. “The WOT from Bush to Obama: On Power and Path Dependency”. https://www.files.ethz.ch/isn/142735/NUPI-WP-798-Restad.pdf 24. Christopher Paul Kailani Medeiros. (2013). “Neither Legal nor Justiciable: Targeted Killings and De Facto Immunity within the War on Terror”. https://gsj.global.ucsb.edu/sites/secure.lsit.ucsb.edu.gisp.d7_gs-2/files/sitefiles/Medeiros.pdf 25. Afghanistan Independent Human Rights Commission: “Violations of International Humanitarian Law in Afghanistan Practices of Concern and Example Cases”. https://www.refworld.org/pdfid/471f4a500.pdf BBC news. (2021).” Afghanistan: What has the conflict cost the US and its allies? https://www.bbc.com/news/world-47391821

Defense & Security
The United States faces deepening political polarization, institutional clashes, and rising acceptance of violence, raising fears of a potential civil war that could destabilize global power dynamics and open opportunities for BRICS nations to reshape the

The polarization of the United States and the risks of a civil war

by Daniel Seguel

The United States is facing a political polarization that has been increasing over time. Every event in the country ends up highlighting the opposing poles in politics — that is, between the Republican and Democratic parties. Consequently, supporters of each side further divide the country to the point of validating violence as a method of political action. The social tension and polarized environment have become so evident that former Russian Prime Minister Dmitry Medvedev stated that sanctions against Russia could last forever, or until the United States collapses during an imminent civil war (Venegas, 2024). The reflection of this polarization was evident when right-wing political activist Charlie Kirk was assassinated, and some left-wing sympathizers reacted by celebrating his death. For his part, President Donald Trump stated that “the problem of violence lies with the left” (The White House, 2025). Similarly, Elon Musk posted on his X account: “The left is the party of murder” (Musk, 2025). Right-wing influencer Andrew Tate wrote on X: “Civil war” (Tate, 2025). However, even before Kirk’s assassination, political polarization in the United States and the perception of a possible civil war were already on the rise. A study published in 2024 found that approximately 1 in every 20 respondents strongly agreed that “in the coming years, there will be a civil war in the United States.” Furthermore, “1 in 25 of those who strongly agreed that a civil war was coming also agreed that ‘the United States needs a civil war to set things right’” (Wintemute et al., 2024). Another study confirmed that one in five Americans believes that violence motivated by political reasons is at least sometimes justified. Consequently, nearly half expect a civil war, and many say they would trade democracy for a strong leader (Pérez, 2022). A recent PBS survey indicates that 30% of Americans are considering resorting to violence to get the country back on track. This shows an increase in support for violence, as 18 months ago only 19% had given the same response (Loffman, 2025). When Barbara Walter joined the U.S. government’s Political Instability Task Force, they identified two factors that predict where political instability and a potential civil war are likely to erupt. First, it depends on whether the country is an anocracy — a government that is neither fully democratic nor autocratic, but something in between. Countries most at risk of civil wars are those that move rapidly from one end of the political spectrum to the other. For example, when the United States entered Iraq, overthrew Saddam Hussein, and tried to establish a democracy, it did not take long for a civil war to break out in that country. However, it can also happen in the opposite direction — that is, when a country transitions from a democracy to something less democratic (Walter, 2022). Secondly, if citizens have mobilized around identity — along ethnic, religious, or racial lines. If a country exhibits these two factors, it is considered at high risk of political violence. What surprised Barbara was realizing that both factors were emerging in the United States at a very rapid pace. Democracy was affected when President Trump refused to accept the 2020 election defeat, and thousands of people took to the streets to protest against the certification of the vote, challenging the election results. Then came the assault on the Capitol by Trump supporters (Mounk, 2021). Consequently, the U.S. was classified as an anocracy. And when a country falls into that category, Walter argues, the risk of political violence reaches its peak and, therefore, it is more likely to face a civil war. Parallels can be seen with Trump’s measures in his current administration. An analysis by The Associated Press showed that 30 of Trump’s 150 executive orders have cited some form of emergency power or authority — a rate far exceeding that of his recent predecessors. In this way, Trump used emergency powers to override Congress’s authority and push forward his political agenda (Tau et al., 2025). However, a U.S. Court of Appeals ruled that most of the tariffs imposed by Donald Trump are “invalid for being contrary to the law” and do not fall within presidential authority. On the contrary, establishing tariffs is “an essential power of Congress” (Matza & Zurcher, 2025). In response, the president wrote on his Truth Social account: “Today, a highly partisan appeals court incorrectly ruled that our tariffs should be removed, but it knows that the United States of America will win in the end” (Matza & Zurcher, 2025). In this way, Trump not only clashes with Congress but also with the Court of Appeals, as both conflict with the interests of his America First foreign policy. In addition, Justice Elena Kagan warned that the conservative majority of the U.S. Supreme Court allowed Donald Trump to carry out one of his policies without taking the usual time to review its legality. Since his return to a second term, the Court has acted in 23 emergency cases related to his policies, favoring him wholly or partially 21 times (Chung, 2025). In this way, the executive branch has been allowed to move forward with its measures without obstacles before their legality is determined. Consequently, this implies an increase in presidential power that could undermine Congress and the various federal judges who have ruled against him (Chung, 2025). When protests erupted in Los Angeles over the enforcement of immigration laws, Trump sent 2,000 National Guard troops. This measure heightened tensions with California Governor Gavin Newsom, who disagreed with Trump’s decision. “This isn’t about public safety,” said Newsom. “It’s about stroking the ego of a dangerous president” (Dearen et al., 2025). For his part, Trump stated that he would arrest Newsom if he was the “border czar.” The governor responded, “This is a line we cannot cross as a nation — this is an unequivocal step toward authoritarianism” (Hutzler, 2025). Later, on his X account, Newsom referred to Trump’s actions and wrote: “Inciting and provoking violence. Creating massive chaos. Militarizing cities. Arresting opponents. These are the acts of a dictator, not of a president” (Newsom, 2025). This dispute and exchange between the two political authorities further inflamed the conflict and division within California, clearly highlighting the difference between the state and federal approaches. In 2017, Keith Mines noted that if large-scale violence were to erupt in the United States and the National Guard were required to intervene, the chances of a civil war would be 60%. He considered factors such as deep national polarization among citizens, violence as a method for resolving disputes, the weakness of institutions, the press, and the judiciary. In such an environment, only one or a few events would be needed to trigger a large-scale civil conflict. Mines listed possible catalysts: the impeachment or removal of the president from office; a major terrorist attack coupled with a sense that the establishment cannot manage national security; an economic recession in which the president and his allies blame certain groups; or a war gone wrong that polarizes the country, with blame distributed in such a way that factions begin to turn against each other (Ricks, 2017). In 2019, historian Nina Silber pointed out that one of the signs of a possible civil war is the willingness of the masses to engage in violence against their political enemies. “That’s what happened in the 1860s,” she said. “People viewed their political opponents in extreme terms and found it impossible to reach common ground” (BU Today, 2019). In this line, the possibility of a civil war looms over the events that occur before an armed confrontation, as the actors involved use the threat of violence against their previously identified political adversaries. Thus, the triggering event would involve the sudden outbreak of large-scale violence intended to provoke reactions driven by fear, anger, or a desire for revenge. The actors and divisions of the eventual civil war would be a continuation of the political landscape that existed before its outbreak. While the war itself may generate new actors, its emergence only occurs after the escalation toward total conflict (Lacher, 2022). Therefore, considering this background, it can be inferred that while a civil war in the United States is not an inevitable outcome, there is a real possibility that it could occur if the growing political and social polarization persists, along with the normalization of violence as a means of resolving conflicts. Consequently, in a context of geopolitical tensions, this would affect other nations, since the dollar remains the world’s reserve currency and, as the leading global power, the United States continues to play a key role in the international system. As a result, political instability and institutional division within the U.S. could trigger another domino effect — but on a global scale. If the United States were to face a civil war, it would be weakened to the point of leaving a power vacuum in the world, which the BRICS bloc — led by China and Russia — would likely seek to exploit to reconfigure the international order. References BU Today. (2019). BU Historian Answers: Are We Headed for Another Civil War? Boston University. https://www.bu.edu/articles/2019/are-we-headed-for-another-civil-war/Chung, A. (2025). US Supreme Court expands its 'emergency' docket - and Trump's power too. Reuters. https://www.reuters.com/legal/government/us-supreme-court-expands-its-emergency-docket-trumps-power-too-2025-10-02/Hutzler, A. (2025). 'Acts of a dictator': Newsom lashes out at Trump after arrest threat. ABC News. https://abcnews.go.com/Politics/war-words-trump-newsom-la-protests-escalates-arrest/story?id=122662589Lacher, W. (2022). How does civil war begin? The role of escalatory processes. Violence: An International Journal, 3(2), 139-161.  https://doi.org/10.1177/26330024221130364Loffman, M. (2025). There’s a growing number of Americans who think violence might be necessary to get the country back on track. PBS. https://www.pbs.org/newshour/politics/theres-a-growing-number-of-americans-who-think-violence-might-be-necessary-to-get-the-country-back-on-trackMatza, M. y Zurcher, A. (2025). Un tribunal de EE.UU. dictamina que la mayoría de los aranceles globales de Trump son ilegales. BBC News Mundo. https://www.bbc.com/mundo/articles/c0j90d5pe19oMounk, Y. (2021). After Trump, Is American Democracy Doomed by Populism? Council on Foreign Relations. https://www.cfr.org/in-brief/after-trump-american-democracy-doomed-populismMusk, E. (2025). [@elonmusk]. The left is the party of murder. X. https://x.com/elonmusk/status/1965859343351558352Newsom, G. (2025). [@GavinNewsom]. X. https://x.com/GavinNewsom/status/1931848215802028394Pérez, R. (2022). Half of Americans anticipate a U.S. civil war soon, survey finds. Science. https://www.science.org/content/article/half-of-americans-anticipate-a-us-civil-war-soon-survey-findsRicks, T. (2017). Will we have a civil war? A SF officer turned diplomat estimates chances at 60 percent. Foreign Policy. https://foreignpolicy.com/2017/03/10/will-we-have-a-civil-war-a-sf-officer-turned-diplomat-estimates-chances-at-60-percent/Tate, A. [@Cobratate]. (2025). Civil war. X. https://x.com/Cobratate/status/1965866748512780686Tau et al. (2025). The 911 presidency: Trump flexes emergency powers in his second term. AP. https://apnews.com/article/trump-emergency-powers-tariffs-immigration-5cbe386d8f2cc4a374a5d005e618d76aThe White House. (2025). President Trump Isn’t Backing Down from Crushing Radical Left Violence. https://www.whitehouse.gov/articles/2025/09/president-trump-isnt-backing-down-from-crushing-radical-left-violence/Venegas, N. (2024). Putin Ally Predicts US Will Collapse in ‘Imminent New Civil War’. Newsweek. https://www.newsweek.com/putin-ally-dmitry-medvedev-predicts-us-collapse-imminent-civil-war-1950276Walter, B. (2022). Is the US headed toward civil war? Political violence at a glace. https://politicalviolenceataglance.org/2022/01/06/is-the-us-headed-toward-civil-war/Wintemute et al. (2024). Expectations of and perceived need for civil war in the USA: findings from a 2023 nationally representative survey. Injury Epidemiology. 11(40). https://doi.org/10.1186/s40621-024-00521-5

Defense & Security
K2 Black Panther - South Korean basic tank. Hyundai Rotem concern has offered the Polish army a K2 model adapted to its needs along with full technology transfer

Development of South Korea’s Tanks and the Global Competitiveness of the K2 Black Panther

by World and New World Journal

1. Introduction Since the Korean War, South Korea had long relied on U.S.-made tanks, but in the 1970s it launched a full-scale domestic tank development program under the principle of self-reliant national defense. As a result, beginning with the K1 tank, the country gradually increased its localization rate, and today it has fielded the highly advanced K2 Black Panther, placing itself among the world’s leading tank powers. However, when compared to major tanks competing in the global defense market, a comprehensive analysis is still required not only in terms of performance, but also in cost-effectiveness and export competitiveness. This study examines the evolution and localization of South Korea’s tanks, and analyzes the performance of the K2 in comparison with other global competitors to highlight its export potential and strategic significance. 2. Early Background: The Korean War – Early 1970s During the Korean War 1950-1953, North Korean forces launched their invasion spearheaded by the Soviet Union’s best-selling tank, the T-34. In contrast, South Korea did not possess a single tank at the time. The power of the T-34 allowed the North Korean army to advance rapidly in the early stages of the war. However, the arrival of U.S. ground forces changed the situation. The M24 Chaffee light tank was the first to be deployed, followed by the M4 Sherman medium tank, the M26 Pershing heavy/medium tank, and the M46 Patton medium tank, all of which overwhelmed the North Korean forces. Thanks to this reinforcement, the Nakdong River defensive line was held, and the tide of the war shifted in favor of the UN forces. Additionally, by late 1950, the British Army had committed its renowned A41 Centurion tanks to the conflict. After the war, in 1959, South Korea received the M47 Patton tank from the United States as part of its allied support policy and broader equipment modernization program. After the war, South Korea relied on U.S. assistance until 1970 to accumulate experience in operating and maintaining tanks. In particular, in 1966, when the M48 Patton tanks were provided by the United States, South Korea also received a Technical Data Package (TDP), which included key technology transfers alongside major upgrades. Through this, South Korea acquired comprehensive expertise in armor casting and welding, production processes, precision manufacturing and assembly, as well as quality inspection and testing. This foundation became a crucial stepping stone for the subsequent development of the Korean tank industry. 3. Development of the K1 Indigenous Tank: 1970s–1980s Under President Park Chung-hee’s policy of self-reliant national defense, South Korea launched the Republic of Korea Indigenous Tank (ROKIT) program in 1975 in cooperation with the United States. Following the signing of a memorandum of understanding in 1978, full-scale development began. The design direction was set to base the new tank on the form and performance of the U.S. Army’s latest third-generation tank at the time, the M1 Abrams. Chrysler Defense (now GDLS), the manufacturer of the M1, participated in the project, while South Korea’s Agency for Defense Development and Hyundai Precision (now Hyundai Rotem) worked together to create a smaller, terrain-optimized “Little Abrams” for the Korean Peninsula. In April 1984, two prototypes were produced, and after passing a series of tests, mass production began in 1985. The production K1 tank was armed with a 105 mm rifled gun and equipped with a 1,200 horsepower German MTU-series diesel engine, built with General Dynamics technology. A key feature was the adoption of a hydropneumatic suspension system, allowing adjustable ground clearance suited for Korea’s mountainous terrain. The tank weighed 51.5 tons, carried a crew of four, and a total of 1,026 units were produced between 1985 and 1997. During its service, the upgraded K1A1 variant was developed, featuring a 120 mm smoothbore gun, improved fire-control systems, and enhanced armor protection. A total of 484 K1A1s were produced between 1996 and 2008. Subsequent modernized versions, the K1E1 and K1E2, have ensured that the K1 series continues to serve as a core component of the South Korean Army’s armored forces. 4. The K2 Black Panther: 2000s – Present Beginning in 1996, the Republic of Korea Armed Forces acquired 68 T-80U tanks from Russia as repayment for an economic cooperation loan. At the time, the T-80U was Russia’s latest main battle tank, and for South Korean engineers, who had previously only worked with U.S.-made tanks, it provided a valuable opportunity to gain direct experience with a new model. The lessons learned from operating the T-80U contributed significantly to the later development of the K2 tank. After the Ministry of National Defense announced its next-generation tank program in 1992, a system concept study was carried out in 1995, followed by exploratory development in 1998. In 2003, full-scale system development began. By 2007, three prototypes were unveiled for operational testing and evaluation, and mass production was initially scheduled to begin in 2012. However, issues arose during the development of the domestic powerpack (engine and transmission). These included an engine protection temperature setting error, which failed to safeguard the engine from overheating, and insufficient cooling fan speed in the transmission at maximum output, which led to inadequate cooling. Despite multiple redesigns, persistent problems in performance and reliability testing delayed deployment. As a result, the first production batch of 100 K2 tanks was equipped with Germany’s MTU engines and RENK transmissions instead of the domestic powerpack. These vehicles began delivery to the ROK Army in April 2014. By September 2014, the domestic engine had passed the Defense Acquisition Program Administration’s evaluation, and the second batch of 106 tanks and the third batch of 54 tanks were produced with a “hybrid powerpack”—a Korean-made engine combined with a German transmission. Starting with the fourth production batch, SNT Dynamics’ domestic transmission was successfully integrated, completing full localization of the K2 powerpack. Unlike its predecessor, the K1, which had been developed under the leadership of General Dynamics and relied heavily on U.S. components, the K2 Black Panther is a fully indigenous South Korean tank. With domestically developed engines and transmissions, it achieved a high localization rate, giving South Korea independence from U.S. and German export restrictions and allowing greater freedom in operating and exporting its tanks. As South Korea’s most advanced tank, the K2 incorporates cutting-edge technologies that set it apart from its predecessors. These include a 120 mm smoothbore gun, an active protection system (APS), an autoloader, and stealth features, delivering superior mobility, protection, and firepower. Today, it stands as a core asset of the South Korean Army. Specifications (K2 Black Panther):Crew: 3Weight: 55 tonsEngine: Doosan Infracore DV-27K diesel engineTransmission: SNT Dynamics EST15K automatic transmissionMain Gun: Hyundai WIA 120 mm smoothbore CN08Fire Control System: South Korean domestic technologyArmor: Korean-developed composite armor  5. Timeline of South Korea’s Tank Development: From U.S. Aid to the K2 The introduction and development of tanks in the ROK Army have been organized in a chronological timeline with images. This timeline is designed to provide a clear overview of the entire progression — from U.S. aid tanks, to tanks acquired from Russia, and finally to the development of indigenous Korean tanks.   6. K2 vs. Regional Main Battle Tanks — Performance Comparison Tank performance can be compared across four key categories: Mobility, Firepower, Protection, and Sensors & C4I. MobilityComponents: engine & transmission (powerpack), suspension, roadwheels, sprockets, tracks, and fuel systems.Role: determines speed, acceleration, cross-country mobility, and operational range. Maintainability (ease of maintenance and access) is also included here. FirepowerComponents: main armament (gun) — barrel and mantlet, stabilization system, autoloading/manual loading systems, coaxial and anti-aircraft machine guns, ammunition stowage.Role: defines ability to defeat enemy armor and other targets, hit probability (integrated with the fire-control system), and ammunition variety (e.g., APFSDS, HE).ProtectionComponents: baseline composite/steel armor, explosive reactive armor (ERA), active protection systems (APS), smoke generation, fire suppression and NBC protection, and crew survivability compartments.Role: protects crew and systems from penetration, fragmentation, anti-tank weapons, and environmental threats.Sensors & C4I (Command, Control, Communications, Computers, and Intelligence)Components: fire-control system (FCS), thermal and night sights, laser rangefinder, communications suites, electronic warfare and laser warning receivers, and power-management systems.Role: responsible for target acquisition, firing accuracy, and networked combat — i.e., information sharing with friendly forces.Below is a comparison of the K2 and the region’s current main battle tanks.    The K2 Black Panther is regarded as a world-class main battle tank, demonstrating well-balanced excellence in mobility, firepower, protection, and electronic systems compared to neighboring countries’ tanks. 7. South Korea’s Tank Export Outlook and Key CasesWhile exports of the K1 tank were restricted due to U.S. technology regulations, the K2 tank—developed with fully indigenous Korean technology—became eligible for overseas sales. In 2022, South Korea successfully signed a contract with Poland, and negotiations are currently underway with countries in Europe, the Middle East, and Africa, signaling the expansion of Korean tanks into the global defense market. 7.1. Turkish Joint Development of the Altay Tank Based on the K2 (USD 540 million)In 2007, South Korea signed a design support and technology transfer contract with Turkey for the development of the Altay main battle tank. Under this agreement, South Korea transferred several core technologies derived from the K2 tank, including:- 120 mm CN08 smoothbore gun technology (Korean-produced main gun)Advanced armor and composite equipment design consultation and production support- Powerpack (engine + transmission) technology transfer and testing: the Altay successfully completed durability trials with the HD Hyundai Infracore engine and SNT Dynamics transmission The Altay is scheduled to enter full-scale mass production in 2025, with an initial production run of 250 units and a long-term goal of building up to 1,000 tanks. 7.2. K2 Export to Poland: First Batch of 180 Units (USD 3.4 billion), Second Batch of 180 Units (USD 6.5 billion) In 2022, the K2 tank was selected by Poland over strong competitors such as Germany’s Leopard 2A7 and the U.S. M1A2 Abrams. The key factors behind this successful export were as follows: - Rapid delivery and phased supply: South Korea demonstrated its ability to deliver tanks within a very short timeframe. Following the 2022 contract, the first batch of 10 units was delivered within the same year. By contrast, competitors faced production line bottlenecks, raising concerns over delivery delays. - Modern design with European upgrade potential: The K2 features a 120 mm 55-caliber smoothbore gun, an autoloader, an active protection system (APS), and hydropneumatic suspension—technologies equal to or in some cases more advanced than those found in Europe’s latest MBTs. Moreover, South Korea promised to develop a localized version, the K2PL, through joint development with Poland, tailored to Polish requirements. - Local production and technology transfer: South Korea offered local production of the K2PL, guaranteeing the participation of Polish defense industries, along with technology transfer, industrial cooperation, and the prospect of using Poland as a base for future exports. - Cost competitiveness: Despite being a state-of-the-art tank, the K2 is relatively more affordable than the M1A2 or Leopard 2A7. Maintenance and sustainment costs are also projected to be lower than those of European tanks, giving the K2 a strong reputation as a “cost-effective MBT” with excellent value for performance. - Tactical versatility and advanced systems: Equipped with an autoloader, hydropneumatic suspension, and advanced smart fire-control systems, the K2 offers outstanding adaptability across diverse operational environments, including mountainous terrain, urban warfare, and extreme cold.Through this deal, South Korea and Poland established a relationship that goes beyond a simple arms sale, building long-term defense industry partnership and mutual trust. Potential export destinations for the K2 include the Czech Republic, Slovakia, Romania, Saudi Arabia, Oman, Egypt, Morocco, and India. 8. Comparison of Tanks from Export Competitor Nations South Korea’s K2 tank has attracted global attention for its outstanding performance, but the international tank market is already dominated by several major players.This chapter analyzes and compares the leading tanks that compete with the K2, while also examining each country’s export competitiveness.   The K2 Black Panther, while incorporating cutting-edge technologies, is lighter than many Western main battle tanks, resulting in relatively lower sustainment costs. It is therefore widely regarded as a cost-effective, well-balanced tank. The cost of a tank varies greatly depending on its design and configuration, but if we break down the production cost (manufacturing, components, and assembly) into four categories, the estimated shares are as follows:- Protection: 30–40%- Firepower: 20–30%- Mobility: 15–25%- Electronics & C4I: 15–25% The actual share, however, depends on specific factors. For example, the use of advanced armor materials (composite/uranium) or the inclusion of an Active Protection System (APS) significantly increases protection costs. Similarly, specialized gun and ammunition systems (such as a 120mm smoothbore, autoloader, or advanced munitions) raise firepower costs. Integration, testing, and safety features greatly affect electronics costs, while options like autoloaders, high-performance thermal sights, and networked systems can heavily influence the final balance. Other important factor is Lifecycle Perspective (Unit Cost vs. Total Life-Cycle Cost), which can be defined as below.- Procurement: About 20–30% of total life-cycle cost (highly variable)- Operations & Support (O&S): 60–70% — dominated by fuel, maintenance, spare parts, and maintenance personnel costs- Upgrades & Depreciation: 10–20% In other words, the long-term operation and maintenance costs take up a much larger share than the initial procurement cost of a tank.Below is a comparison table of modern main battle tank costs: unit acquisition cost, annual sustainment cost, and 30-year life-cycle cost (procurement + sustainment).*The sustainment cost for China’s Type 99A and Russia’s T-90M is an estimate.   9. Conclusion This study has systematically examined the evolution and localization of South Korea’s tanks, and verified the level of their advancement through performance comparisons with leading global competitors. In particular, the K2 has demonstrated balanced capabilities in mobility, firepower, protection, and electronic command-and-control, supported by advanced technologies and a high degree of localization. At the same time, it offers superior cost-efficiency in sustainment and operational expenses compared to heavier Western MBTs. This makes the K2 not only a key asset for strengthening domestic defense, but also a competitive and cost-effective platform in the global arms market. Taken together, these findings suggest that South Korea’s tanks have progressed beyond being a mere symbol of self-reliant defense, and are now positioned to expand exports and build long-term strategic partnerships worldwide.

Defense & Security
Crisis in Venezuela

Venezuela: the attack shaking the hemisphere

by Sahasranshu Dash

The U.S. naval strike on Venezuela reveals the return of unilateral military coercion, exposing the decline of the liberal international order. On the 3rd of September, the United States launched a naval strike off the coast of Venezuela, killing eleven individuals whom Washington had identified as drug traffickers. Concurrently, President Donald Trump also announced a $50 million bounty on President Nicolás Maduro and ordered an additional naval surge in the region, presenting the move as part of an anti-narcotics campaign. But this framing conceals a much deeper reality: this is the most dramatic demonstration yet of Washington’s return to unilateral military coercion—occurring at a time when the liberal international order lies in disarray. This attack is not an isolated episode. It represents the culmination of overlapping trends: Venezuela’s internal collapse, the erosion of multilateral constraints on U.S. power, and the resurgence of a worldview that equates might with right. Indeed, it signals that the norms that shaped international politics after 1945 now hang by a thread. A Crisis of Venezuela’s Own Making To be sure, Venezuela’s situation is largely self-inflicted. Once a showcase of Latin American prosperity, the country fell victim to its own overdependence on hydrocarbons. When oil prices plummeted during the 2010s and production faltered under severe mismanagement, economic fundamentals collapsed. Hyperinflation reached astronomical levels, and essential goods vanished. The humanitarian consequences have been catastrophic. More than seven million Venezuelans have fled since 2015, and today, Venezuela remains in a twilight zone. Neither a failed state nor a functional one, it is a petrostate in freefall, caught between great power rivalries and criminal networks. Why Force Remains a Mirage In this context, Trump’s resort to military action may seem decisive, but history warns otherwise. Regime change by force has proven to be a dangerous illusion. From Iraq in 2003 to Libya in 2011, interventions launched with promises of quick success ended in state collapse and prolonged chaos. The lesson is unequivocal: dismantling regimes is far easier than rebuilding nation-states. Venezuela is no exception. Its dense forests, rugged terrain, and porous borders provide ideal ground for guerrilla warfare. Armed groups—from remnants of Colombia’s civil war to regime-aligned militias—would thrive in an insurgency, evoking the Vietnam analogy: a technologically superior power mired in the swamps of asymmetric conflict. Beyond battlefield risks lies a structural vacuum. Venezuela’s bureaucracy has been decimated. Technocrats and civil servants have fled. The opposition, fragmented and discredited, lacks both credibility and institutional capacity. Removing Maduro without a credible plan for postwar governance would ignite civil war, deepen anarchy and require prolonged foreign occupation—likely funded by Venezuela’s oil reserves—perpetuating the resource curse under a new guise. This is precisely the nightmare outlined by analysts such as Sean Burges and Fabrício Bastos, who warned back in 2018 that intervention would “waste valuable time” while worsening institutional fragility. They emphasized that Maduro’s survival rests on elite-military pacts—disrupting these could plunge Venezuela into even deeper violence. And even if regime change were to succeed, the absence of institutions implies that reconstruction would necessitate decades of sustained external control. The Sovereignty Taboo and Regional Backlash Moreover, Latin America’s diplomatic DNA is steeped in the principle of non-intervention. This is not an abstract ideal—it reflects a collective historical memory of U.S. occupations, from early 20th-century interventions in the Caribbean to covert operations throughout the Cold War. The Organization of American States (OAS) has repeatedly rejected endorsing regime change driven from abroad, to avoid setting a precedent that could justify interference elsewhere. Even if Washington sought to project a façade of regional leadership, the reality is clear—no Latin American state possesses the logistical depth or strategic expertise to spearhead a mission of that scale. The United States would retain operational control and bear responsibility for the inevitable quagmire. The Putin Parallel and Trump’s Contradictions Talk of military intervention also lays bare a glaring hypocrisy. Washington condemned Vladimir Putin’s 2022 invasion of Ukraine as a violation of national sovereignty, yet now replicates the same logic. The rhetorical parallels are inescapable—Trump frames Venezuela as an existential “narcoterrorist” threat—chillingly similar to Putin’s February 2022 speech describing Ukraine as an artificial entity and a danger to Russian security. Both narratives dress raw power and neo-imperialism in the garb of necessity. The irony deepens with Trump and Putin’s recent meeting in Alaska. Far from signaling firmness against authoritarian revanchism, the summit leaned towards a position of accommodation toward Moscow internationally. This, as Washington resorts to aggression in its own hemisphere. Trump’s flirtation with Putin in his first term—along with his attacks on NATO and delays in supplying military aid—cruelly undermined Ukraine. Today he risks imposing a Kremlin-dictated peace on Kyiv while violently intervening in Venezuela—and possibly soon, as he has ominously hinted at in recent months, in Panama. The Great Dismantling The belligerent strikes of the 3rd of September merely exemplify Trump’s systematic dismantling of liberal internationalism. Over two terms, multilateral partnerships have been destroyed, human rights offices shuttered and governance turned into a blunt instrument of coercion. Diplomacy has given way to arbitrary deals and tariffs. Persuasion, to open force. What emerges is a world unmoored from the normative anchors of the post-1945 order—a world where sovereignty is negotiable, law is malleable, and might is right. In this sense, Venezuela may now stand as the gravestone of that old order—an era in which the United States, once its chief architect, embraces the ethos of revisionism it once claimed to oppose. The future is not anarchic but hierarchical—a system of spheres of influence ruled by brute force, transactional bargains, and fading ideals of human rights and collective security. The art of the deal? No—an age of impunity.

Defense & Security
LNG plant based on gravity type with a gas carrier. The Arctic LNG-2 project. Utrennoye deposit, Yamalo-Nenets Autonomous Region, Russia. 3d rendering

Securing the ‘great white shield’? Climate change, Arctic security and the geopolitics of solar geoengineering

by Nikolaj Kornbech , Olaf Corry , Duncan McLaren

Abstract The Arctic has been identified by scientists as a relatively promising venue for controversial ‘solar geoengineering’ – technical schemes to reflect more sunlight to counteract global warming. Yet contemporary regional security dynamics and the relative (in)significance of climate concerns among the key Arctic states suggest a different conclusion. By systematically juxtaposing recently published schemes for Arctic geoengineering with Arctic security strategies published by the littoral Arctic states and China, we reveal and detail two conflicting security imaginaries. Geoengineering schemes scientifically securitise (and seek to maintain) the Arctic’s ‘great white shield’ to protect ‘global’ humanity against climate tipping points and invoke a past era of Arctic ‘exceptionality’ to suggest greater political feasibility for research interventions here. Meanwhile, state security imaginaries understand the contemporary Arctic as an increasingly contested region of considerable geopolitical peril and economic opportunity as temperatures rise. Alongside the entangled history of science with geopolitics in the region, this suggests that geoengineering schemes in the Arctic are unlikely to follow scientific visions, and unless co-opted into competitive, extractivist state security imaginaries, may prove entirely infeasible. Moreover, if the Arctic is the ‘best-case’ for geoengineering politics, this places a huge question mark over the feasibility of other, more global prospects. Introduction ‘The Arctic region plays a key role in the global climate system acting as a carbon sink and a virtual mirror’ (Carnegie Climate Governance Initiative (C2G), 2021: 1) – thus reads a typical introduction to the rationale for solar geoengineering (SG) in the Arctic. To most, SG – any large-scale intervention that seeks to counteract anthropogenic global warming by reflecting sunlight – is still an obscure idea. However, it is quickly gaining traction among some groups of climate scientists, entrepreneurs and even some governments as climate impacts provoke an ever-increasing sense of alarm and urgency. Debates concerning potential governance of SG routinely acknowledge its potential international governance challenges, but have tended to leave security dimensions mostly unexamined (but see Nightingale and Cairns, 2014), usually by framing the challenge primarily in terms of coordinating efforts and dealing with potentially unwanted side effects (Corry et al., forthcoming). While climate change itself is often understood as a potential security threat, it has not yet motivated exceptional or decisive state action, but rather seems to produce a series of routine practices through which ‘climate change is rendered governable as an issue of human security’ (Oels, 2012: 201). Geoengineering could potentially change this situation. The potentially high-leverage, transboundary nature of large-scale SG has led to suggestions that it would involve disagreements over the methods and intensity of interventions (Ricke et al., 2013) and could lead to international conflicts, not least from uni- or ‘mini’-lateral deployment (Lockyer and Symons, 2019). In addition, with its potential to make climatic changes and catastrophes attributable to (or able to be blamed on) the direct and intentional actions of states, SG could also make the rest of climate politics a more conflictual field (Corry, 2017b). Other scholars have examined geoengineering itself through a human security frame – recently developed as ‘ecological security’ with ecosystems as the main referent object (McDonald, 2023), where the insecurity arising from climate change is seen to go beyond the particularity of state interests. This casts geoengineering as a potential ecological security measure, or even as a potentially ‘just’ one, if it would protect groups otherwise vulnerable to climate threats (Floyd, 2023). However, the entanglement of geoengineering, even if framed as an ‘ecological security’ measure, with national and international security dynamics, would remain a distinct risk, in similar ways to how humanitarian aid and development have become entangled with, and for some historically inseparable from, security (Duffield, 2007). In this article, we seek to move beyond theoretical speculation about the International Relations of geoengineering abstracted from historical or regional security dynamics, using a case study of the Arctic to investigate how geoengineering might (not) enter this political space and to derive conclusions of broader relevance to the international debate. We make use of the empirical richness revealed by schemes for Arctic geoengineering to identify how security imaginaries – ‘map[s] of social space’ (Pretorius, 2008: 112) reflecting common understandings and expectations about security – are already implicit in scientific and technical visions of geoengineering. We contrast these scientific security imaginaries with current state security imaginaries that play a dominant role in the anticipation of Arctic futures more generally. As we will show, scientific security imaginaries consider the Arctic as a best case for geoengineering in terms of political feasibility. This allows for analytical inference based on critical case selection (Flyvbjerg, 2006): if even in the Arctic these scientific security imaginaries have little compatibility with current state security imaginaries, geoengineering faces major obstacles of political feasibility in other regions and globally, unless deployed in pursuit of security rather than global environmental protection. Many different ideas for SG have been explored as ways to cool the Arctic. These include marine cloud brightening (MCB): spraying salts from sea vessels to make marine clouds more reflective (Latham et al., 2014) or covering ocean or ice surfaces with reflective materials (Field et al., 2018). Related ideas involve using wind power to pump water onto ice to help thicken it (Desch et al., 2017), underwater ‘curtains’ to protect ice from warmer water streams (Moore et al., 2018) or reintroducing large animals to graze and trample so that dark boreal forest is replaced by reflective snow-cover, protecting permafrost (Beer et al., 2020).1 The technique of stratospheric aerosol injection (SAI) – spraying reflective aerosols like sulphur or calcite into the stratosphere – is also included as an option by some organisations working with Arctic geoengineering2 or explored in simulations or other research (Jackson et al., 2015; Lane et al., 2007; Robock et al., 2008). In practice, however, aerosols distributed in or near the Arctic would likely spread over much of the Northern hemisphere, and model studies of Arctic-targeted SAI generally conclude that is it not a desirable option due to particularly severe negative side effects outside the Arctic (Duffey et al., 2023). While geoengineering scientists seek to distance their work from geopolitical concerns (Svensson and Pasgaard, 2019), scientific research in the Arctic – even that involving cooperation between Cold War adversaries – has long been deeply entangled with state security objectives and military interests (Doel et al., 2014; Goossen, 2020). Similarly, weather modification schemes have a history of (largely failed) entanglement with military purposes (Fleming, 2010), while climate modelling evolved partly through and with military scenario-making (Edwards, 2010). Climate modelling occupies a more civilian location in multilateral institutions now but still shares its particular way of seeing the climate – as a space of geophysical flows – with a military gaze (Allan, 2017). More importantly, the interrelated environmental, economic and geopolitical interests in opening up the Arctic that are emerging with global warming make for a particular set of contradictions and tensions in the region that we argue will be much more likely than global environmental concerns to determine what role (if any) geoengineering could or would play. Arctic SG ideas are emerging largely oblivious to this context, which is understandable, but makes for an interesting comparative analysis that, as will we show, raises questions concerning the overall feasibility of SG in the Arctic, especially deployment of it in line with scientific imaginaries. Since scientific literature tends to be central to governance-oriented assessments of SG (e.g. National Academies of Sciences, Engineering, and Medicine, 2021), a mismatch between assumptions has potentially serious policy implications, not least in terms of overall feasibility, which in turn augments risks of such schemes failing and contributing to mitigation deterrence (when they were hoped or planned for, delaying emissions reductions (McLaren, 2016)). Attention to the geopolitical complexities of Arctic geoengineering could prevent scientific work being translated into policy prescriptions in unintended ways or having unexpected effects – if the complexities can be foregrounded when interpreting such work and be considered in designing future research. Approach We analyse both Arctic geoengineering schemes and state strategies for the Arctic as security imaginaries. This concept draws on Charles Taylor’s (2004) notion of the social imaginary, ‘the ways people imagine their social existence, how they fit together with others, how things go on between them and their fellows, the expectations that are normally met, and the deeper normative notions and images that underlie these expectations’ (p. 23). Imaginaries, in this sense, are worldviews – sets of assumptions that may or may not correspond to social reality but affect it in significant and material ways. They are not simply subjective constructions to be weighed against some objective reality, but (often competing) ways of constructing and institutionalising the world. Following Pretorius (2008), a security imaginary is then ‘that part of the social imaginary as “a map of social space” that is specific to society’s common understanding and expectations about security and makes practices related to security possible’ (p. 112). Regrettably, social imaginaries are often theorised through ‘internalism’: as if a society is determined by factors originating within that society alone (Rosenberg, 2016).3 This makes it difficult to explain why different societies often have similar security imaginaries. By breaking with internalism, national imaginaries can be understood as inherently international in the sense that they are deeply affected by coexistence with other societies. For Pretorius (2008), ‘the security imaginary is . . . open to influence from perceptions, beliefs and understandings of other societies about security’ due to ‘trans-societal exchanges’ such as travel (p. 112). But in a deeper way, the mere existence of multiple societies is fundamental to the whole idea of (national) security (Rosenberg, 2016). In addition, if the Arctic is considered a ‘regional security complex’ (Lanteigne, 2016) such that the security imaginary of societies in a region ‘cannot be reasonably analysed or resolved independently of each other’ (Buzan and Wæver, 2003: 44), then relations between societies become constitutive, even, of security imaginaries of that region. Scientific communities – in this case geoengineering researchers – can produce a different ‘map of social space’ from national ones, since the groups (in one version ‘epistemic communities’ (Haas, 1992)) producing these are not necessarily national, and use different tools and concepts than national security communities. At the same time, scientists are rarely unaffected by their backgrounds, and their technical and conceptual tools for producing such a ‘map’ reflect traces from state priorities and international structures, including colonial legacies (Mahony and Hulme, 2018). State and scientific security imaginaries are thus distinct but not separate, and as we shall see, they can clash or draw upon each other, often implicitly. The security imaginary concept captures three important characteristics of our empirical materials. First, geoengineering ideas and state security strategies are performative (rather than purely descriptive) in their anticipation of (Arctic) futures (Anderson, 2010). Second, they are based on understandings of social order which merge factual and normative claims – what is and what should be (Taylor, 2004). Third, they construct threats and necessary responses in terms of the security of that social order, irrespective of whether those threats are of a military nature or otherwise (e.g. a climatic threat); in other words, they can securitise a variety of referent objects (Buzan et al., 1998). In investigating scientific and state security imaginaries, we focus on the difference in the construction of two objects: climate and the international order. We ask: how is the ‘Arctic climate’ articulated and made legible in relation to the planetary climate and other factors, and further, how is the Arctic climate problematised and related to concerns of desirable or undesirable futures? What political, economic and international infrastructures are presumed? In sum, what threatens and what defends Arctic and international order? To explore the security imaginaries of Arctic geoengineering, we gathered materials that construct Arctic futures through searches in the peer-reviewed literature with the search terms ‘Arctic’ and ‘geoengineering’ using , as well as search hits on the term ‘Arctic’ in the archive of the Climate Engineering Newsletter run by the Kiel Earth Institute,4 which also covers grey literature and press coverage on the topic.5 We manually excluded texts exclusively focused on carbon removal forms of geoengineering, except those with positive effects on the surface albedo. For the state security imaginaries of the Arctic, we consulted policy documents and other official government publications looking for the most recent policy statement in each of the littoral states: Canada, the United States, Russia, Norway and Denmark (which controls the security and foreign policy of Greenland) concerning their respective Arctic security strategy.6 Public documents are often used as data in security studies as testaments to state preferences or intentions, despite the often performative character of such documents. Such documents generally attempt to portray the institutions that produce them as competent and coherent – and of value to particular external audiences. As such they are potentially unreliable as sources for underlying intentions, levels of capacity and commitment behind policy goals. However, as documents set out to perform a future which is seen as desirable – either by the authors themselves or the audiences they appeal to – they are a useful guide to the underlying assumptions of social and international order guiding Arctic security politics – the state security imaginaries, in other words. We therefore study them for their performative content, with particular emphasis on the intended audiences and messages (Coffey, 2014). Similarly, geoengineering publications also perform a material and political Arctic future to advance scientific or research agendas, and we therefore analyse the underlying imaginary of their desired futures, without prejudice to the climatological or technical feasibility of the envisioned schemes. However, as the imaginaries of many researchers typically invoke global benefits from Arctic geoengineering, in particular through preventing tipping events, it bears mentioning that recent literature questions these benefits. Research indicates that that some techniques (ice restoration in particular) would have limited impacts on the global climate (Van Wijngaarden et al., 2024; Webster and Warren, 2022; Zampieri and Goessling, 2019), and a recent comprehensive review finds only limited support for the claim that Arctic sea ice is a tipping element in the climate system (Lenton et al., 2023: 58–60, 66–68). Even so, it should not be assumed that scientific considerations alone will drive decisions to geoengineer the Arctic, and the growing interest in these ideas makes it important to examine their political imaginaries. Finally, we must acknowledge the highly consequential difference in the power to securitise between the actors which produce the imaginaries. The state apparatuses producing the state security imaginaries are more aligned with, and therefore more likely to influence, actors with the power to securitise (Floyd, 2021). We read both sets of imaginaries in this light. The ‘great white shield’: scientific security imaginaries In geoengineering studies and policy papers, the Arctic is foremost understood as a part of the global climate system (Corry, 2017a), with focus placed on potential tipping points in terms of alarming above-average warming, the sea ice albedo feedback and the potential release of methane and carbon dioxide from thawing permafrost or undersea clathrates. These may push the Earth into feedback cycles of further warming. The Arctic is therefore seen as a ‘great white shield’ for the global climate, but a fragile one: ‘the weakest link in the chain of climate protection’ (Zaelke, 2019: 241). Many of those advocating exploration of Arctic geoengineering argue that emissions cannot be reduced in time to prevent tipping points. One paper contends that cryospheric tipping points ‘are essentially too late to address by standard political processes [for climate management]’ (Moore et al., 2021: 109). This pessimistic assessment spawns a complementary opposite: hopes that geoengineering might prove especially feasible and desirable in the Arctic, with associated aspirations for near-term experimentation and potential deployment. One researcher coined the term ‘Arctic Premium’, arguing that the particular climatic characteristics of the region will enable ‘a dividend for regionally based climate interventions that could be less expensive, more effective and achieve faster results than if they were targeted over the whole earth’ (Littlemore, 2021: 2) – the Arctic imagined as an effective and relatively accessible lever for operating on the global climate system as a whole.7 While regional benefits such as the preservation of ice-dependent Indigenous ways of life are sometimes mentioned (Moore et al., 2021: 110), this tends to occur when regional benefits align with what are understood as global climatic interests. This instrumental attitude can also be seen in proposals that, echoing some of the early literature on SG (Lane et al., 2007; Robock et al., 2008), see the Arctic as a testing ground. These include ‘SCoPEx’, which would have tested SAI equipment over Indigenous Sámi land, and the suggested use of the Sermeq Kujalleq glacier in Greenland – Inuit territory – as a prototype for more substantial glacial geoengineering in the Antarctic. The Sermeq Kujalleq proposal is justified on the basis of ‘fewer global environmental impacts’, despite the considerable amount of local socio-environmental impacts and acknowledgement that ‘the reactions of local people would be mixed’ (Moore et al., 2018: 304). In a quote that sums up the assessment of most researchers Bodansky and Hunt (2020) argue that ‘as bad as Arctic melting is for the Arctic itself, its global effects are more concerning’ (p. 601). The concern with global effects infuses scientific security imaginaries with urgency. The ostensible ‘speed’ (Zaelke, 2019: 244) of SG is contrasted with the slowness of politics, emissions reductions and large-scale carbon removal.8 In many cases, such invocations of urgency lead to claims that geoengineering is necessary: that ‘excluding polar ice restoration could make the 1.5° C goal impossible to achieve’ (Field et al., 2018: 883) or that ‘more and more people see geoengineering as a necessity more than an option, making it a matter of when rather than if’ (Barclay, 2021: 4). One proposal notes that ‘these are expensive propositions, but within the means of governments to carry out on a scale comparable to the Manhattan Project’ (Desch et al., 2017: 121); others also specify funding by rich states as the way to move forward on research and deployment (Moore et al., 2021). The urgent threat of Arctic climate change is seen as a job for decisive state action, and thus, it is argued to be salient in so far as it appears as a universal threat to state interests. At the same time, the causes of climate change are downplayed and depoliticised across the literature. Attributing climate change to emissions from ‘human societies’ (Beer et al., 2020: 1), the literature frames out the vastly unequal responsibility for climate change and the social and economic dynamics driving historical and continued emissions.9 One policy paper neglects social causes of climate change altogether, contrasting geoengineering only to ‘conventional mitigation policies’ (Bodansky and Hunt, 2020: 597) and ‘decarbonisation of the global economy’ (p. 616). In this way, Arctic climate change is constructed as a global security threat, seen as stemming from the ‘tight couplings within global systems, processes, and networks’ (Miller, 2015: 278) rather than the actions of any specific group of humans, and as a threat to global ‘human security’ and therefore not subject to the division and distrust of international politics. In this, the imaginary resembles much liberal environmentalism in International Relations, characterised by a ‘global cosmopolitanism’ which does not seriously engage with inequalities of power and intersocietal difference (Chandler et al., 2018: 200). This imaginary is probably adopted to construct scenarios for technical research, since it fits neatly with modelling tools that produce visions of geoengineering in purely technical Earth system terms. But the liberal imaginary also shapes assessments of political feasibility and could impinge on the technical design of geoengineering schemes, including in ways that can be hard to unpick when the research enters the political sphere. Most publications entirely omit considerations of state security, including some papers that focus on governance (Bodansky and Hunt, 2020; Moore et al., 2021). The mentions of security that do exist are brief and vague: C2G (2021) notes that ‘evidence suggests potential security issues may arise’ (p. 2) in the case of SAI. Another paper notes as an example of ‘geo-political . . . friction’ that ‘Arctic regions such as Russia, Alaska and the Canadian Yukon would be providing a global public good . . . which would add a major new dimension to international relations’ (Macias-Fauria et al., 2020: 10), suggesting that geoengineering can be adequately grasped through rationalist decision frameworks where global public goods offer non-rival and universal benefits, which is disputed (Gardiner, 2013). In the research, the omission of geopolitics is justified by relegating it as a problem which only concerns the ostensibly more controversial techniques such as SAI deployed globally. There is a hope that ‘Arctic interventions pose less of a governance challenge than global climate interventions’ (Bodansky and Hunt, 2020: 609). This rests on the twin claim that the physical effects of Arctic interventions will be more limited and therefore less risky and that the Arctic’s political environment is more conducive to geoengineering than the ‘global’ polity as a whole. In terms of physical effects, many Arctic interventions are argued to be ‘low-risk’ (Barclay, 2021: 4) due to fewer and less severe environmental side effects. What Zaelke (2019) calls ‘soft geoengineering’ (p. 243) approaches are presented as ‘more natural’ (Littlemore, 2021: 2) than the most commonly considered SG techniques such as SAI or MCB which involve physical and chemical manipulation of the atmosphere.10 In particular, efforts to restore sea ice without atmospheric interventions are promoted highlighting the ostensibly more ‘natural’ character of their intervention (Field et al., 2018: 899). ‘Unlike other [SG] methods, thickening sea ice is attractive because it merely enhances a naturally ongoing process in the Arctic’, claims one proponent (Desch et al., 2017: 112). Efforts at ecological intervention in ecosystems to halt permafrost thaw are also described as ‘a return to a more “natural state”’ (Moore et al., 2021: 111). ‘Soft’ geoengineering concepts are in many cases linked to discourses of conservation, with the sometimes-explicit expectation that this will make them more benign and less politically controversial: ‘Since it is rooted in the preservation of the existing state rather than introducing new and undeniably controversial elements into the atmosphere, it likely presents easier governance challenges’ (Moore et al., 2021: 116). Such distinctions between ‘natural’ and ‘unnatural’ interventions may well facilitate cooperation around some methods, but notions of ‘natural’ are also situated, making distinctions inevitably difficult to maintain in practice. While aiming to preserve select parts of the Arctic environment (such as land ice, sea ice or permafrost), geoengineering interventions will likely also introduce significant changes and risks to Arctic ecosystems (Miller et al., 2020; Van Wijngaarden et al., 2024).11 In this way, ostensibly ‘natural’ Arctic interventions would lead to unprecedented anthropogenic – and for others therefore ‘unnatural’ – impacts on ecosystems in the Arctic and possibly beyond, since remote impacts are plausible but not yet well understood.12 This reveals an imaginary prevalent among proponents of Arctic geoengineering, where a distinct construction of ‘natural’ emerges to bridge aspirations of technical manipulation of the climate with what scientists see as palatable to (or believe to be) social ideals of ‘nature’. In addition, the adjectives used to describe ‘soft’ geoengineering – ‘targeted’ (Moore et al., 2021: 108), ‘localized’ (Latham et al., 2014: 3), ‘reversible’ (Barclay, 2021: 4) and ‘intelligent’ (Field et al., 2018: 900), all point to an imaginary where aspirations towards the ‘natural’ are combined with expectations of fine-grained, scientifically calibrated control. As Zaelke (2019) explicitly suggests, ‘in other words, we have control over soft geoengineering’ (p. 243) – the ‘we’ here left ambiguous. The idea of having a relatively large degree of control originates in restraint vis-a-vis ‘global’ SG, in that it recognises large risks from attempting to control the global climate system as such. But this sense of fine-grained control may also encourage more Promethean dreams of a ‘designer climate’ (Oomen, 2021), as speculation over future possibilities of ‘fine-tun[ing] the flows of heat, air and water’ using localised MCB indicates (Latham et al., 2014: 10). In terms of the Arctic’s political environment, discourse on the feasibility of geoengineering reveals further elements of a liberal imaginary, relying on (existing or imagined) international law and institutions, distributive justice and consequentialist ethics (Baiman, 2021; Barclay, 2021), a focus on cost minimisation (Desch et al., 2017; Field et al., 2018) and market-based approaches such as payments for ecological services (Moore et al., 2021) or carbon credits (Macias-Fauria et al., 2020) in the implementation of geoengineering schemes. Taken together, such measures rather well resemble a ‘liberal cosmopolitan framework through the advocacy of managerialism rather than transformation; the top-down coercive approach of international law; and use of abstract modernist political categories’ (Chandler et al., 2018: 190). Distributive notions of justice and consequentialist ethics are arguably also at the root of claims that local populations in the Arctic, including its Indigenous peoples, may be uniquely receptive to geoengineering schemes. While many advocate public engagement (Desch et al., 2017; Macias-Fauria et al., 2020) and stress that ‘Northern people who use and depend upon the existing landscape need a strong voice’ (Littlemore, 2021: 3), there is a general expectation that such engagement will not be prohibitively conflictual. One policy scholar suggested that ‘given that Northern people are already seeing the effects of climate change, the North may be a place for a more pragmatic, constructive, and legitimate deliberative discussion on Arctic interventions’ (Ted Parson, quoted in Littlemore, 2021: 5). Other researchers have concluded that using SAI would conserve ‘indigenous habits and lifestyles’ in the Arctic (Chen et al., 2020: 1) as a direct consequence of reducing permafrost thaw. These assumptions were strained by the SCoPEx controversy, where the Sámi Council strongly opposed the experiment planned in their territory (Cooper, 2023). Equally, Arctic populations (Indigenous and non-Indigenous) have varied interests that cannot be assumed to be oriented to preventing or reversing Arctic climatic change, some seeing new opportunities for economic development and potentially political independence in the case of Greenland (Jacobsen, 2020). Political feasibility of geoengineering plans is often assessed through legal analyses that weigh up specific techniques and target environments in relation to existing treaties and other legal regimes (Barclay, 2021; Bodansky and Hunt, 2020). Some place hope in techniques such as permafrost/glacier preservation that may be deployed within the bounds of a single nation’s territory, which would, in their view, sidestep the need for international governance altogether: ‘for example, Russian and Canadian policies could change the carbon released from thawing permafrost. Similarly, Greenland’s ice sheet would be the primary responsibility of the Greenlanders’ (Moore et al., 2021: 109). While such techniques might be localised in effect, and only intended to slow climate feedback effects such as the rate of ice loss, inclusion of such measures in market credit schemes, as attempted by the Real Ice project,13 could prove controversial and under some conditions undermine any SG-based climate effect (Fearnehough et al., 2020: Chapter 3). For cross-border geoengineering schemes, the Arctic Council14 is in some cases highlighted as a favourable site for governance (Desch et al., 2017). One paper calls it an ‘obvious institution’ for international governance of Arctic geoengineering in general, contending that ‘because of its relatively small size, the Arctic Council has been a relatively effective forum to develop regional policies relating to the Arctic’ (Bodansky and Hunt, 2020: 610). However, in a later article, one of the authors described the Arctic Council as ‘an informal institution that lacks any regulatory powers and shows no signs of being up to the task of taking significant action’ on Arctic climate change (Bodansky and Pomerance, 2021: 2). Moore et al. (2021) similarly contend that ‘the Arctic Council is not a true international organization with rule-making power’ (p. 113). Yet Moore et al. (2021) still argue the Arctic is a politically tractable space for geoengineering due to the low number of states that would need to come to an agreement – in contrast to global SG which ‘would ideally need at least near-global consensus’ (p. 109). This reveals an important complexity in the concept of globality that permeates the geoengineering imaginaries. While the Arctic, as we showed above, is instrumentalised for a global community – operated on to mitigate climatic effects across the planet – it is also differentiated from ‘global interventions’ that take the global Earth system as their direct object of intervention (Bodansky and Hunt, 2020: 597). As Moore et al. (2021) state explicitly, ‘targeted geoengineering is done on regional scales but aims to conserve the various parts of the global climate and earth system’ (p. 109). The politically salient objects are imagined to be the methods of intervention, spatially bounded in the Arctic region while the intended global climatic effects are in effect rendered unproblematic and therefore without need for governance. Arguably this reflects a common assumption that governance is only relevant in the case of ‘adverse or unintended effects’ (Barclay, 2021: 5) – the intended effect of albedo modification implicitly understood as an unambiguous global public good. On a technical level, this assumption is questionable – since remote consequences of Arctic geoengineering are not yet well understood. But more crucially, the assumption projects exactly those liberal rationalist norms which are argued to be especially present in the Arctic on to the wider geopolitical context. The specific imaginary constructed to justify regional geoengineering interventions as politically feasible while still being part of a global solution to climate change cannot work without a general liberal imaginary of international politics. Otherwise, the global effects of regional interventions would threaten to undo the validity of the ‘regional feasibility’ argument. Arctic state security imaginaries The history of scientific research in the Arctic reveals the liberal security imaginaries underlying Arctic geoengineering to be a relatively recent phenomenon. Doel et al. (2014) describe the intertwinement of 20th-century Arctic research projects and three broad state goals, shared to varying degrees by all littoral states: national security, exploitation of natural resources and extension of territorial sovereignty to disputed areas. When intercontinental and submarine-launched ballistic nuclear missiles were introduced from the late 1950s, the Arctic became a ‘buffer zone’ between the Cold War powers, experiencing a continuous period with low military activity and absence of conflict that likely paved a way for increased cooperation after the Cold War, with Mikhail Gorbachev famously declaring the Arctic a ‘zone of peace’ (Gjørv and Hodgson, 2019: 2). The Arctic came to be seen as an ‘exceptional’ region in the post-Cold War period, where institutionalised multilateral cooperation on regional issues, particularly environmental and scientific activities, could blossom (Lackenbauer and Dean, 2020). In this section, we examine recent state strategies and developments in the Arctic to assess the contours of the current leading security imaginary among Arctic states. The key characteristic of Arctic exceptionalism is that geopolitical conflicts and tensions from outside the Arctic are excluded from affecting cooperation on internal Arctic issues and that, as a corollary, specifically ‘Arctic issues’ are compartmentalised: ‘Actors . . . can talk about everything except contentious issues, not least military security’ (Gjørv and Hodgson, 2019: 3, original emphasis). However, this compartmentalisation is hard to find in recent state assessments. The US emphasised in 2019 that ‘The Arctic remains vulnerable to “strategic spillover” from tensions, competition, or conflict arising in these other regions’ (United States Department of Defense (USDOD), 2019: 6). In 2020, the Danish Minister for Foreign Affairs spoke of ‘a new security-political dynamic in the region. Disagreements and conflicts originating in other areas of the world are also being expressed in the Arctic’ (Kofod, 2020: 1).15 For the four North Atlantic Treaty Organization (NATO) members in the Arctic littoral, such concerns were obviously directed at the only non-NATO state: Russia (even before the invasion of Ukraine). Denmark expressed concern over ‘the Russian build-up of military capabilities’ (Kofod, 2020: 2); Norway stated that ‘Russian build-up of forces and military modernisation can challenge the security of Norway and allied countries directly’ (Royal Ministry of Foreign Affairs (RMFA), 2020: 23) and cited the Russian annexation of Crimea as a key moment in increased tensions and deteriorating optimism regarding peaceful cooperation in the Arctic (RMFA, 2020: 10). Russia, for its part, described ‘military buildup by foreign states in the Arctic and an increase of the potential for conflict in the region’ as a ‘challenge’ (Office of the President of the Russian Federation (OPRF), 2020: 5). Among the NATO states, these assessments have for several years been accompanied by a call for deeper military cooperation. Denmark has pledged to ‘support NATO’s role in the Arctic and the North Atlantic’ (Ministry of Foreign Affairs of Denmark, 2022: 23), a change from previous strategy documents which stressed that ‘enforcement of the realm’s sovereignty is fundamentally the responsibility of the realm’s authorities’ (Ministry of Foreign Affairs of Denmark, Greenland and the Faroe Islands, 2011: 20). Canada aims to ‘increase surveillance and monitoring of the broader Arctic region’ in collaboration with the United States, Denmark and Norway (Government of Canada, 2019: 77), while Norway in 2021 negotiated a deal with the United States to allow it access to two Arctic military installations – the Ramsund Naval Base and the Evenes Airfield. Trust has only deteriorated further since Russia’s full-scale invasion of Ukraine in 2022. All Arctic Council member states except Russia announced they would suspend participation in council meetings because of the invasion, subsequently announcing a ‘limited resumption’ of projects without Russian participation (Global Affairs Canada, 2022). The recent US Arctic strategy describes ‘increasing strategic competition in the Arctic . . . exacerbated by Russia’s unprovoked war in Ukraine’ (The White House, 2022: 3) and claimed that ‘Russia’s war of aggression against Ukraine has rendered government-to-government cooperation with Russia in the Arctic virtually impossible at present’ (The White House, 2022: 14). Russia interprets Arctic politics on similar terms; the Arctic ambassador has stated that the Finnish and Swedish bids to join NATO ‘will of course lead to certain adjustments in the development of high altitude [sic] cooperation’ (quoted in Staalesen, 2022). This dynamic of de-exceptionalisation, where the Arctic is increasingly reintegrated into great power politics, is the contemporary context in which the littoral states interpret the region’s present and future climatic changes. The state goals associated with early and mid-20th century Arctic science are reappearing as a background for envisioning the impact of climate change. Of the three goals identified by Doel et al. (2014), assertion over disputed territories is arguably of lesser importance today. All states have indicated a willingness to settle territorial continental shelf disputes via international law, and such statements are generally accepted by commentators as genuine (Østhagen, 2018). But the goals of military national security and extraction of natural resources are growing in salience, and changing in character, as the ice melts and the permafrost thaws. In contrast to the geoengineering literature, climate change is rarely addressed as a primary threat in state policies but described in more restricted terms. Adaptation problems from ‘sea-ice loss, permafrost thaw and land erosion’ (Government of Canada, 2019: 63) are emphasised, and both Canada (Government of Canada, 2019: 18) and Norway (RMFA, 2020: 14) describe climate change as a cultural threat to Indigenous peoples. Nonetheless, the task of emission reductions does not figure as a specifically Arctic objective (e.g. RMFA, 2020: 14). In this way, climate change figures less as a problem that must urgently be dealt with and more as an unavoidable condition of Arctic politics. In the context of military security objectives, climate change is understood primarily as a driver of increased navigability and accessibility of the Arctic. The US Navy anticipates an increasingly ice-free ‘blue Arctic’, where ‘peace and prosperity will be increasingly challenged by Russia and China, whose interests and values differ dramatically from ours’ (United States Department of the Navy, 2021: 2). Cold War-era interpretations of the Arctic’s geographical significance are being reinvigorated: Canada stresses the importance of maintaining air and missile capabilities in its Arctic region due to its location along the shortest path from Russian to US territory (Government of Canada, 2019: 77). And as the region becomes more accessible, it rises in strategic importance. The US Department of Defense presents the Arctic as ‘a potential corridor – between the Indo-Pacific and Europe, and the U.S. homeland – for expanded strategic competitions’ (USDOD, 2019: 6) and stresses that ‘maintaining freedoms of navigation and overflight are critical to ensuring that . . . U.S. forces retain the global mobility guaranteed under international law’ (USDOD, 2019: 13). The increased accessibility of the Arctic also brings new hopes of further use of the region’s natural resources as a vehicle for economic growth (Keil, 2014). Such goals have become intertwined with development discourses and policies that focus on lack of modern infrastructure, low employment and population decline and, in this way, align the economic objectives of faraway capitals with local concerns. Canada aims to ‘close the gaps and divides that exist between this region, particularly in relation to its Indigenous peoples, and the rest of the country’ (Government of Canada, 2019: 36) and presents these gaps in a consumerist national imaginary where being ‘full participants in Canadian society’ means having ‘access to the same services, opportunities and standards of living as those enjoyed by other Canadians’ (Government of Canada, 2019: 36). The Russian government frames its Arctic policy goals in terms of avoiding a dystopia of a depopulated region lacking economic growth, and such fears are directly presented in security terms: ‘population decline’ and ‘insufficient development’ of infrastructure and business are named ‘primary threats to national security’ (OPRF, 2020: 4–5). In Norway, Northern depopulation is presented as a key concern to be addressed through investment in public education and business infrastructure (RMFA, 2020: 11). The emphasis in such ‘development’ is on natural resources such as fossil fuels and rare earth minerals, trans-Arctic shipping routes and tourism. Russia is particularly clear in its focus on fossil fuels; ‘increasing oil and gas extraction rates, advancing oil refining, and producing liquefied natural gas and gas-chemical products’ are considered ‘primary objectives for the economic development of the Arctic zone’ (OPRF, 2020: 7). The development of the Northern Sea Route as a ‘competitive national transportation passage in the world market’ is named a ‘primary’ Russian national interest (OPRF, 2020: 4). Other states also emphasise ‘new economic opportunities, for example in the form of new maritime routes and extraction of natural resources’ (Kofod, 2020: 1). In some states, the role of fossil fuels in extractive ambitions is arguably receding. In its previous Arctic strategy, the US anticipated the Arctic’s role in ‘future United States energy security’ through its ‘proved and potential oil and gas natural resources that will likely continue to provide valuable supplies to meet U.S. energy needs’ (The White House, 2013: 7). Now, ‘the Arctic’s significant deposits of in-demand minerals essential to key technology supply chains’ (The White House, 2022: 6) have ostensibly replaced fossil fuels as the main extractive interest. Yet such shifts leave intact visions of major extractive operations dependent on (or facilitated by) a warming Arctic. More generally, there is an assumption of compatibility between interests in extractivism and economic growth and climate and environmental policies. Imagined futures contain ‘safe and environmentally-responsible shipping’ (Government of Canada, 2019: 49), ‘the sustainable use of natural resources’ (OPRF, 2020: 9) and ‘sustainable tourism’ (Ministry of Foreign Affairs of Denmark, Greenland and the Faroe Islands, 2011: 24). Technological innovation is, unsurprisingly, anticipated as the main way to realise the sustainability of these activities. In contrast to this assumed compatibility with environmental objectives, the economic opportunities are portrayed as in need of protection against interests from other states. The US expresses commitment to protect ‘freedom of navigation’ in the Arctic against perceived Russian threats, alleging that Russia ‘is attempting to constrain freedom of navigation through its excessive maritime claims along the Northern Sea Route’ (The White House, 2022: 6). As described above, this interest in freedom of navigation is partly military, but also acts to protect an economic order. The US argues for ‘a shared interest in a peaceful and stable region that allows the Arctic nations to realise the potential benefits of greater access to the region’s resources’ (USDOD, 2019: 4), underpinned by US military power. Russia, for its part, has named ‘actions by foreign states and (or) international organizations to obstruct the Russian Federation’s legitimate economic or other activities in the Arctic’ a ‘primary challenge to national security’ (OPRF, 2020: 5). Here, China is also constructed by Western states as an economic security threat. While under the President Biden, the US threat perception in the Arctic appears to have shifted to an almost exclusive focus on Russia (The White House, 2022); the prior Trump administration indicated strong concerns that ‘China is attempting to gain a role in the Arctic in ways that may undermine international rules and norms, and there is a risk that its predatory economic behavior globally may be repeated in the Arctic’ (USDOD, 2019: 6), a sentiment shared by Denmark and Norway (Ministry of Foreign Affairs of Denmark, 2022: 23; RMFA, 2020: 11). China is certainly explicit about its ambitions in the Arctic, which it portrays as an increasingly ‘global’ space. It argues that due to the changing environment and increased accessibility, ‘the Arctic situation now goes beyond its original inter-Arctic States or regional nature’, and the stress on ‘global implications’ is used to justify China’s identification as a ‘Near-Arctic State’ and ‘important stakeholder in Arctic affairs’ (english.gov.cn, 2018). Yet contrary to the impression given by Western states, Chinese material and institutional visions for the future are strikingly similar to those of the littoral states: development of shipping routes, materials extraction and tourism under promises of sustainable development and governed by international law (english.gov.cn, 2018). Hence, the mistrust expressed by other states does not concern explicit differences in visions of Arctic futures. Rather, the imaginary of economic development is securitised along the lines of geopolitical blocs, with economic cooperation across these blocs rendered problematic. Implications for the security politics of solar geoengineering Our analysis has revealed stark differences between scientific security imaginaries in the geoengineering literature and the security imaginaries of Arctic states. First, climate change is constructed as a concern in different ways. In the scientific imaginaries, climate change, and especially the prospect of Arctic tipping points, are front and centre. The Arctic is primarily interpreted through its climate-restorative potential, as imagined through computational Earth system models that imagine futures of controlled Arctic climates – and by extension, controlled global climates. By contrast, state imaginaries of the Arctic are not oriented towards preventing climate change but anticipate a mixture of desirable and undesirable outcomes from rising temperatures, which are seen as an inevitable background for the region’s future. Responses to climate change – such as increased demand for rare earth minerals – are becoming issues of concern and questions of security, more so than climate change itself (cf. McLaren and Corry, 2023), which stands as an unquestioned precondition for other strategic decisions. Whether the Arctic should be a venue of increased activity is not in doubt. This stands in sharp contrast to ideas of geoengineering which presuppose that hindering accessibility in the region for economic and military purposes, for example, by restoring sea ice, would be acceptable to all states involved. Second, the scientific security imaginaries exhibit a liberal institutionalist understanding of international politics and rely on a view of the Arctic as a global commons to be leveraged for the needs of an ostensible global humanity. In this, imaginaries of Arctic geoengineering do not differ from their planet-scaled counterparts (McLaren and Corry, 2021), except perhaps in the immediacy of imagined experimentation and deployment. Yet the Arctic case contains a unique contradictory claim. Geoengineering in the Arctic is justified partly by claims that it would be more politically tractable, drawing on discourses of Arctic exceptionalism that see it as a special region where inter-state cooperation on common interests can be shielded from exterior geopolitical dynamics and conflicts. But while the envisaged methods of geoengineering are bounded in the Arctic, they still aim to achieve global climatic effects.16 Prospective geoengineers thus make two further assumptions: that effects outside the Arctic are overall benign and/or that governance is only relevant in the case of unfavourable effects. The latter relies on a liberal rationalist imaginary of world politics, where costs and benefits are readily identified and acted upon, coordinated by institutions if required, undermining the initial presumption that the Arctic can be shielded from global conflictual geopolitics. Especially with the Russian invasion of Ukraine, this idea of Arctic exceptionalism is also increasingly obsolete – the Arctic is undergoing de-exceptionalisation, as indicated by the de facto collapse of the flagship of Arctic multilateralism, the Arctic Council. Schemes that envision deployment of Arctic geoengineering as market-driven are also likely to be less immune to geopolitical obstacles than their developers imagine. Such interventions assume an international order governed by multilateral institutions including markets for carbon removals or ‘cooling credits’. But even for those states which subscribe to similar liberal aspirations, this order is subject to uncertainty, in the Arctic and elsewhere, and is consequently understood as something which must be secured. The mistrust from Western states about China’s interests in the Arctic, although ostensibly similar and compatible with Western aspirations of Arctic futures, highlights the current and increasing uncertainty over the future of such a Western-dominated liberal economic order. Taken together, these differences reveal a deep disjuncture between the security imaginaries of Arctic geoengineering and state strategies. Given the relative strength of state security actors and institutions compared to environmental ones, the political feasibility of Arctic geoengineering appears to preclude a purely environmental logic driving development and/or deployment. It raises the question of which rationales and scenarios would become subject to modification – or disappear completely – to take account of economic, geopolitical, security and other aims. In this light, it is notable that there is one point of convergence between the state and scientific security imaginaries: technological solutionism. States might conceivably adopt geoengineering to partly mitigate Arctic warming (or ice degradation) while still leaving the environment accessible enough for increased resource extraction, transcontinental shipping and tourism. However, such a scenario – a form of mitigation deterrence (McLaren, 2016) – is hardly an expression of the scientific security imaginary, which, having securitised Arctic tipping points as a threat to a global humanity, sees the protection and restoration of the Arctic climate as the overarching priority. Furthermore, far from prospective geoengineers’ expectations that envision the interventions as supported by local and Indigenous populations, this scenario would further instrumentalise the Arctic to the ends of interests outside the region, which clearly amounts to a continuation and intensification of the neo-colonialism that characterises many parts of the Arctic to this day (Greaves, 2016). As clearly indicated by Sámi-led opposition to SCoPEx and opposition to the Arctic Ice Project led by Arctic Indigenous organisations,17 many Arctic Indigenous persons consider SG incompatible with their understandings of sustainability. As a case study, the Arctic provides more general lessons for SG and security. The region has attracted the attention of geoengineering researchers in part because they understand it as a political best case, and the legacy of multilateralism and science diplomacy in the region might seem to support such an assessment. However, even in a such a best case, the underlying imaginaries of geoengineering clash directly with the political ambitions of the states which would need to support, if not implement, the geoengineering interventions. In other words, SG is unlikely to be implemented for the purposes envisioned in scientific circles, in the Arctic context or elsewhere, least of all in the kind of globally ‘optimal’ manner envisaged in computer model experiments. Should further climatological research reveal SG to be technically feasible and climatically desirable – a question not yet settled – the technology would enter the quagmire of an increasingly competitive and conflictual planetary geopolitics and would need to be integrated with state policies that, for the moment, show no signs of adopting climate change as a primary issue. Our conclusions also have implications for McDonald’s (2023) contemplation of geoengineering albeit only ‘in the service of ecological security: a concern with the resilience of ecosystems themselves’ (p. 566). While McDonald acknowledges the problem of finding political purchase for making nature itself the object of security, he does not explore in detail the particular form geoengineering would take as a security measure. Here, we have studied the work of researchers and others who, arguably, invoke ecological security through appeals to necessity or emergency with Arctic ecosystems as the referent object. Through their work to develop geoengineering from general principles into workable interventions (i.e. which technique would be used, how it would be designed, who would be deploying it and where and with what purpose), they appeal to particular understandings of international security. This demonstrates how even attempts to make nature itself the referent object of security in practice depends on understandings about human societies – here theorised as imaginaries. Importantly, these scientific security imaginaries do not appear to align with state security imaginaries. In drawing our conclusions, we do not suggest that state imaginaries alone will determine the future of Arctic geoengineering. We afford them more power relative to the scientific imaginaries, since the former are backed by considerably more institutional, material and discursive power. But imaginaries are dynamic entities subject to change in unpredictable ways. There are prior examples of scientific cooperation between nations under geopolitical strife, including in the Arctic during the Cold War (Bertelsen, 2020), and a scenario where technical cooperation on SG leads to ‘spillover effects’ inducing restorative and sustainable forms of peacebuilding has been suggested as a hypothesis to be investigated (Buck, 2022). Still, there is also a long and consistent history of science being a proxy for and entangled with geopolitics and economics in the region (Doel et al., 2014; Goossen, 2020), and our analysis of Arctic de-exceptionalisation suggests that ‘geoengineering peacebuilding’ is getting increasingly unlikely as tensions continue to rise. A different vein of uncertainty concerns the internal contradictions of state security imaginaries – between the willingness to seize new opportunities for resource extraction and shipping, and other policy goals of environmental protection and national security. How these contradictions are managed, and which aspects are ultimately prioritised, will play a key role in forming the future of the Arctic (cf. Albert and Vasilache, 2018) and in deciding the opportunities for and political desirability of geoengineering interventions. Therefore, while analysing imaginaries can only take us so far in anticipating the security implications of SG, they provide an important foundation for conceptualising the very problems at stake in this anticipation. As climate impacts intensify and the incentives for geoengineering deployment increase – whether as a technocratic ‘climate policy option’ (Irvine and Keith, 2021), as a way of defending empire (Surprise, 2020) or “fossil fuel-dependent ‘ways of life’” (McLaren and Corry, 2023: 1), the imaginaries outlined in this article will be increasingly likely to collide, in the Arctic and elsewhere. AcknowledgmentsThe research for this article was part of the International Security Politics and Climate Engineering (ISPACE) project hosted at the Department of Political Science, University of Copenhagen. The authors thank the three anonymous reviewers for their insightful comments and suggestions and are grateful for comments given to an initial presentation of the research idea at the International Congress of Arctic Social Sciences (ICASS X) in June 2021. N.K. thanks the Copenhagen Center for Disaster Research for hosting him while conducting the analysis for this article in 2022.FundingThe author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This research was carried out with funding from the Independent Research Fund Denmark (Danmarks Frie Forskningsfond).Footnotes1. The latter approaches may also be categorised as ‘nature-based solutions’ or adaptation. In this sense, they are hybrid measures, and we include them here because they also directly or indirectly affect the radiation balance.2. See Centre for Climate Repair. Available at: https://www.climaterepair.cam.ac.uk/refreeze (accessed 5 March 2024).3. For an influential example of internalism, see Jasanoff (2015).4. Now, the ‘carbondioxide-removal.eu’ newsletter. Available at: https://carbondioxide-removal.eu/news/ (accessed 1 August 2023).5. Searches were conducted in the spring of 2022.6. We later chose to include China’s Arctic policy for important additional context.7. In terms of technical effectiveness, some estimates in fact suggest interventions in the Arctic may be less effective than at lower latitudes (Duffey et al., 2023).8. For the latter, see Desch et al. (2017).9. There are some limited exceptions (Baiman, 2021; Moore et al., 2021).10. Although many invocations of soft geoengineering explicitly exclude SAI and MCB, arguments that employ the core distinction between global, risky approaches and more targeted benign ones have also been used to justify Arctic-specific MCB, due to the ‘vastly reduced levels of seeding’ making negative side effects ‘vastly reduced or eliminated’ (Latham et al., 2014: 9). The former UK Chief Scientific Advisor David King has also recently referred to MCB as ‘a biomimicry system’ (The Current, 2022). While much rarer, arguments about reduced side effects have also been applied to Arctic-targeted SAI (Lee et al., 2021).11. Van Wijngaarden et al.’s full review of environmental risks is found in their supplemental compendium (https://doi.org/10.5281/zenodo.10602506).12. We thank an anonymous reviewer for the insight on remote impacts. In the extreme case, strong Arctic cooling without proportional cooling of the Antarctic would create a change in hemispheric heat balance which would most likely shift the Intertropical Convergence Zone southwards, leading to severe decreases in rainfall across the Sahel, parts of the Amazon and Northern India; however, this risk is usually discussed as an outcome of SAI specifically, due to its higher cooling potential (Duffey et al., 2023).13. See https://fortomorrow.org/explore-solutions/real-ice (accessed 11 October 2023).14. Composed of the littoral states, Finland, Iceland, Sweden and six ‘permanent participants’ representing Indigenous groups: the Aleut, Athabaskan, Gwich’in, Inuit, Sámi and the Russian Association of Indigenous Peoples of the North.15. All quotes from Danish and Norwegian sources are authors’ translations.16. We stress again that this finding relates to the imaginary in the cited texts. As noted in section ‘Approach’, the global efficacy of bounded Arctic interventions is questionable.17. See https://www.ienearth.org/arctic-ice-project/ (accessed 31 July 2023).ReferencesAlbert M, Vasilache A (2018) Governmentality of the Arctic as an international region. Cooperation and Conflict 53(1): 3–22.Allan BB (2017) Producing the climate: States, scientists, and the constitution of global governance objects. International Organization 71(1): 131–162.Anderson B (2010) Preemption, precaution, preparedness: Anticipatory action and future geographies. Progress in Human Geography 34(6): 777–798.Baiman R (2021) In support of a renewable energy and materials economy: A global green new deal that includes Arctic sea ice triage and carbon cycle restoration. Review of Radical Political Economics 53(4): 611–622.Barclay J (2021) Geoengineering in the Canadian Arctic: Governance Challenges (8 January). Peterborough, ON, Canada: North American and Arctic Defence and Security Network (NAADSN). Available at: https://www.naadsn.ca/wp-content/uploads/2021/01/Barclay-geoengineering-policy-primer.pdf (accessed 3 October 2023).Beer C, Zimov N, Olofsson J, et al. (2020) Protection of permafrost soils from thawing by increasing herbivore density. Scientific Reports 10(1): 4170.Bertelsen RG (2020) Science diplomacy and the Arctic. In: Gjørv GH, Lanteigne M, Sam-Aggrey H (eds) Routledge Handbook of Arctic Security. London: Routledge, pp. 234–245.Bodansky D, Hunt H (2020) Arctic climate interventions. The International Journal of Marine and Coastal Law 35(3): 596–617.Bodansky D, Pomerance R (2021) Sustaining the Arctic in order to sustain the global climate system. Sustainability 13(19): 10622.Buck HJ (2022) Environmental peacebuilding and solar geoengineering. Frontiers in Climate 4: 869774.Buzan B, Wæver O (2003) Regions and Powers: The Structure of International Security. Cambridge: Cambridge University Press.Buzan B, Wæver O, De Wilde J (1998) Security: A New Framework for Analysis. London: Lynne Rienner.Carnegie Climate Governance Initiative (C2G) (2021) C2G Policy Brief: Climate-Altering Approaches and the Arctic (17 March, 2nd edn). New York: C2G.Chandler D, Cudworth E, Hobden S (2018) Anthropocene, capitalocene and liberal cosmopolitan IR: A response to Burke et al.’s ‘Planet Politics’. Millennium 46(2): 190–208.Chen Y, Liu A, Moore JC (2020) Mitigation of Arctic permafrost carbon loss through stratospheric aerosol geoengineering. Nature Communications 11(1): 2430.Coffey A (2014) Analysing documents. In: Flick U (ed.) The SAGE Handbook of Qualitative Data Analysis. London: SAGE, pp. 367–379.Cooper AM (2023) FPIC and geoengineering in the future of Scandinavia. In: Wood-Donnelly C, Ohlsson J (eds) Arctic Justice. Bristol: Bristol University Press, pp. 139–153.Corry O (2017a) Globalising the Arctic climate: Geoengineering and the emerging global polity. In: Keil K, Knecht S (eds) Governing Arctic Change. London: Palgrave Macmillan, pp. 59–78.Corry O (2017b) The international politics of geoengineering: The feasibility of Plan B for tackling climate change. Security Dialogue 48(4): 297–315.Corry O, McLaren D, Kornbech N (forthcoming) Scientific models vs. power politics: How security expertise reframes solar geoengineering. Review of International Studies.Desch SJ, Smith N, Groppi C, et al. (2017) Arctic ice management. Earth’s Future 5(1): 107–127.Doel RE, Friedman RM, Lajus J, et al. (2014) Strategic Arctic science: National interests in building natural knowledge – Interwar era through the Cold War. Journal of Historical Geography 44: 60–80.Duffey A, Irvine P, Tsamados M, et al. (2023) Solar geoengineering in the polar regions: A review. Earth’s Future 11(6): e2023EF003679.Duffield M (2007) Development, Security and Unending War: Governing the World of Peoples. Cambridge: Polity Press.Edwards PN (2010) A Vast Machine: Computer Models, Climate Data, and the Politics of Global Warming. Cambridge, MA: The MIT Press.english.gov.cn (2018) Full text: China’s Arctic Policy. Available at: http://english.www.gov.cn/archive/white_paper/2018/01/26/content_281476026660336.htm (accessed 26 January 2023).Fearnehough H, Kachi A, Mooldijk S, et al. (2020) Future role for voluntary carbon markets in the Paris era. Climate Change FB000420/ENG, 24 November. Dessau-Roßlau: German Environment Agency.Field L, Ivanova D, Bhattacharyya S, et al. (2018) Increasing Arctic sea ice albedo using localized reversible geoengineering. Earth’s Future 6(6): 882–901.Fleming JR (2010) Fixing the Sky: The Checkered History of Weather and Climate Control. New York: Columbia University Press.Floyd R (2021) Securitisation and the function of functional actors. Critical Studies on Security 9(2): 81–97.Floyd R (2023) Solar geoengineering: The view from just war/securitization theories. Journal of Global Security Studies 8(2): ogad012.Flyvbjerg B (2006) Five misunderstandings about case-study research. Qualitative Inquiry 12(2): 219–245.Gardiner SM (2013) Why geoengineering is not a ‘global public good’ and why it is ethically misleading to frame it as one. Climatic Change 121(3): 513–525.Gjørv GH, Hodgson KK (2019) ‘Arctic Exceptionalism’ or ‘comprehensive security’? Understanding security in the Arctic. Arctic Yearbook 2019: 218–230.Global Affairs Canada (2022) Joint statement on limited resumption of Arctic Council cooperation. Available at: https://www.canada.ca/en/global-affairs/news/2022/06/joint-statement-on-limited-resumption-of-arctic-council-cooperation.html (accessed 15 January 2023).Goossen BW (2020) A benchmark for the environment: Big science and ‘artificial’ geophysics in the global 1950s. Journal of Global History 15(1): 149–168.Government of Canada (2019) Canada’s Arctic and Northern Policy Framework. Ottawa, ON, Canada: Government of Canada. Available at: https://www.rcaanc-cirnac.gc.ca/eng/1560523306861/1560523330587 (accessed 3 October 2023).Greaves W (2016) Environment, identity, autonomy: Inuit perspectives on Arctic security. In: Hossain K, Petrétei A (eds) Understanding the Many Faces of Human Security. Leiden: Brill Nijhoff, pp. 35–55.Haas PM (1992) Introduction: Epistemic communities and international policy coordination. International Organization 46(1): 1–35.Irvine P, Keith D (2021) The US can’t go it alone on solar geoengineering. Environmental Affairs, 13 April. Policy Exchange. Available at: https://policyexchange.org.uk/wp-content/uploads/2022/10/Environmental-Affairs-the-Geopolitcs-of-Climate-Change.pdf (accessed 21 February 2024).Jackson LS, Crook JA, Jarvis A, et al. (2015) Assessing the controllability of Arctic sea ice extent by sulfate aerosol geoengineering. Geophysical Research Letters 42(4): 1223–1231.Jacobsen M (2020) Greenland’s Arctic advantage: Articulations, acts and appearances of sovereignty games. Cooperation and Conflict 55(2): 170–192.Jasanoff S (2015) Future imperfect: Science, technology and the imaginations of modernity. In: Jasanoff S, Kim S-H (eds) Dreamscapes of Modernity: Sociotechnical Imaginaries and the Fabrication of Power. Chicago, IL: The University of Chicago Press, pp. 1–33.Keil K (2014) The Arctic: A new region of conflict? The case of oil and gas. Cooperation and Conflict 49(2): 162–190.Kofod J (2020) Redegørelse af 7/10 20 om samarbejdet i Arktis. Document no. 2020-21 R 3 Tillæg G, 7 October. Copenhagen: Folketinget. Available at: https://www.folketingstidende.dk/samling/20201/redegoerelse/R3/index.htm (accessed 16 June 2022).Lackenbauer PW, Dean R (2020) Arctic exceptionalisms. In: Spohr K, Hamilton DS (eds) The Arctic and World Order. Washington, DC: Foreign Policy Institute (FPI), pp. 327–355.Lane L, Caldeira K, Chatfield R, et al. (2007) Workshop report on managing solar radiation. NASA/CP-2007-214558, 10 April. Washington, DC: National Aeronautics and Space Administration (NASA).Lanteigne M (2016) Ties That Bind: The Emerging Regional Security Complex in the Arctic. Policy Brief, Norwegian Institute for International Affairs (NUPI). Available at: https://www.jstor.org/stable/pdf/resrep08010.pdf (accessed 23 February 2024).Latham J, Gadian A, Fournier J, et al. (2014) Marine cloud brightening: Regional applications. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 372(2031): 20140053.Lee WR, MacMartin DG, Visioni D, et al. (2021) High-latitude stratospheric aerosol geoengineering can be more effective if injection is limited to spring. Geophysical Research Letters 48(9): e2021GL092696.Lenton TM, Armstrong McKay DI, Loriani S, et al. (eds) (2023) The Global Tipping Points Report 2023. Exeter: University of Exeter.Littlemore R (2021) Climate Geoengineering Options: Practical, Powerful, and to Be Avoided If Possible. Report on the 2nd Permafrost Carbon Feedback Intervention Roadmap Dialogue (March). Victoria, BC, Canada: Cascade Institute. Available at: https://cascadeinstitute.org/wp-content/uploads/2021/03/PCF-Dialogue-2-Summary.pdf (accessed 24 March 2022).Lockyer A, Symons J (2019) The national security implications of solar geoengineering: An Australian perspective. Australian Journal of International Affairs 73(5): 485–503.McDonald M (2023) Geoengineering, climate change and ecological security. Environmental Politics 32(4): 565–585.McLaren D (2016) Mitigation deterrence and the “moral hazard” of solar radiation management. Earth’s Future 4(12): 596–602.McLaren D, Corry O (2021) Clash of geofutures and the remaking of planetary order: Faultlines underlying conflicts over geoengineering governance. Global Policy 12(S1): 20–33.McLaren D, Corry O (2023) “Our way of life is not up for negotiation!”: Climate interventions in the shadow of ‘societal security’. Global Studies Quarterly 3(3): ksad037.Macias-Fauria M, Jepson P, Zimov N, et al. (2020) Pleistocene Arctic megafaunal ecological engineering as a natural climate solution? Philosophical Transactions of the Royal Society B: Biological Sciences 375(1794): 20190122.Mahony M, Hulme M (2018) Epistemic geographies of climate change: Science, space and politics. Progress in Human Geography 42(3): 395–424.Miller CA (2015) Globalizing security: Science and the transformation of contemporary political imagination. In: Jasanoff S, Kim S-H (eds) Dreamscapes of Modernity: Sociotechnical Imaginaries and the Fabrication of Power. Chicago, IL: The University of Chicago Press, pp. 277–299.Miller L, Fripiat F, Moreau S, et al. (2020) Implications of sea ice management for Arctic biogeochemistry. Eos. Available at: http://eos.org/opinions/implications-of-sea-ice-management-for-arctic-biogeochemistry (accessed 22 March 2022).Ministry of Foreign Affairs of Denmark (2022) Foreign and Security Policy Strategy (January). Copenhagen: Ministry of Foreign Affairs of Denmark. Available at: https://um.dk/en/-/media/websites/umen/foreign-policy/uss-2022/uss-en-web-220215-1-final-a.pdf (accessed 3 October 2023).Ministry of Foreign Affairs of Denmark, Greenland and the Faroe Islands (2011) Kongeriget Danmarks Strategi for Arktis 2011–2020 (August). Copenhagen: Ministry of Foreign Affairs of Denmark. Available at: https://www.ft.dk/samling/20101/almdel/upn/bilag/235/1025863.pdf (accessed 3 October 2023).Moore JC, Gladstone R, Zwinger T, et al. (2018) Geoengineer polar glaciers to slow sea-level rise. Nature 555(7696): 303–305.Moore JC, Mettiäinen I, Wolovick M, et al. (2021) Targeted geoengineering: Local interventions with global implications. Global Policy 12(S1): 108–118.National Academies of Sciences, Engineering, and Medicine (2021) Reflecting Sunlight: Recommendations for Solar Geoengineering Research and Research Governance (28 May). Washington, DC: National Academies Press.Nightingale P, Cairns R (2014) The security implications of geoengineering: Blame, imposed agreement and the security of critical infrastructure. Climate Geoengineering Governance Working paper series no. 18, 12 November. Brighton: University of Sussex.Oels A (2012) From ‘Securitization’ of climate change to ‘Climatization’ of the security field: Comparing three theoretical perspectives. In: Scheffran J, Brzoska M, Brauch HG, et al. (eds) Climate Change, Human Security and Violent Conflict: Challenges for Societal Stability. Berlin: Springer, pp. 185–205.Office of the President of the Russian Federation (OPRF) (2020) Foundations of the Russian Federation State Policy in the Arctic for the Period Up to 2035 (trans A Davis, R Vest from original by Office of the President of the Russian Federation, 5 March). Newport, RI: US Naval War College. Available at: https://digital-commons.usnwc.edu/rmsi_research/5/ (accessed 3 October 2023).Oomen J (2021) Imagining Climate Engineering: Dreaming of the Designer Climate. New York: Routledge.Østhagen A (2018) Geopolitics and security in the Arctic. In: Nuttall M, Christensen TR, Siegert M (eds) The Routledge Handbook of the Polar Regions. New York: Routledge, pp. 348–356.Pretorius J (2008) The security imaginary: Explaining military isomorphism. Security Dialogue 39(1): 99–120.Ricke KL, Moreno-Cruz JB, Caldeira K (2013) Strategic incentives for climate geoengineering coalitions to exclude broad participation. Environmental Research Letters 8(1): 014021.Robock A, Oman L, Stenchikov GL (2008) Regional climate responses to geoengineering with tropical and Arctic SO2 injections. Journal of Geophysical Research: Atmospheres 113(D16): 101.Rosenberg J (2016) International Relations in the prison of Political Science. International Relations 30(2): 127–153.Royal Ministry of Foreign Affairs (RMFA) (2020) Mennesker, Muligheter og Norske Interesser I Nord. Meld. St. 9 (2020-2021), 27 November. Oslo: RMFA. Available at: https://www.regjeringen.no/contentassets/268c112ec4ad4b1eb6e486b0280ff8a0/no/pdfs/stm202020210009000dddpdfs.pdf (accessed 4 June 2022).Staalesen A (2022) Arctic Council chairman warns against Nordic NATO expansion. ArcticToday, 20 May. Available at: https://www.arctictoday.com/arctic-council-chairman-warns-against-nordic-nato-expansion/ (accessed 15 January 2023).Surprise K (2020) Geopolitical ecology of solar geoengineering: From a ‘logic of multilateralism’ to logics of militarization. Journal of Political Ecology 27(1): 213–235.Svensson PC, Pasgaard M (2019) How geoengineering scientists perceive their role in climate security politics – From concern and unease to strategic positioning. Geografisk Tidsskrift-Danish Journal of Geography 119(1): 84–93.Taylor C (2004) Modern Social Imaginaries. Durham, NC: Duke University Press.The Current (2022) CBC Radio one, 17 November. Available at: https://www.cbc.ca/radio/thecurrent/tuesday-november-17-2022-full-transcript-1.6655847 (accessed 25 January 2023).The White House (2013) National Strategy for the Arctic Region (10 May). Washington, DC: The White House. Available at: https://obamawhitehouse.archives.gov/sites/default/files/docs/nat_arctic_strategy.pdf (accessed 4 June 2021).The White House (2022) National Strategy for the Arctic Region (October). Washington, DC: The White House. Available at: https://www.whitehouse.gov/wp-content/uploads/2022/10/National-Strategy-for-the-Arctic-Region.pdf (accessed 15 January 2023).United States Department of Defense (USDOD) (2019) Report to Congress: Department of Defense Arctic Strategy (June). Washington, DC: USDOD. Available at: https://media.defense.gov/2019/Jun/06/2002141657/-1/-1/1/2019-DOD-ARCTIC-STRATEGY.PDF (accessed 31 July 2023).United States Department of the Navy (2021) A Blue Arctic: A Strategic Blueprint for the Arctic (January). DON. Available at: https://media.defense.gov/2021/Jan/05/2002560338/-1/-1/0/ARCTIC%20BLUEPRINT%202021%20FINAL.PDF/ARCTIC%20BLUEPRINT%202021%20FINAL.PDF (accessed 10 June 2021).Van Wijngaarden A, Moore JC, Alfthan B, et al. (2024) A survey of interventions to actively conserve the frozen North. Climatic Change 177: 58.Webster MA, Warren SG (2022) Regional geoengineering using tiny glass bubbles would accelerate the loss of Arctic sea ice. Earth’s Future 10: e2022EF002815.Zaelke D (2019) What if the Arctic melts, and we lose the great white shield? Interview with environmental policy expert Durwood Zaelke. Interview by Dan Drollette Jr. Bulletin of the Atomic Scientists 75(5): 239–246.Zampieri L, Goessling HF (2019) Sea ice targeted geoengineering can delay Arctic sea ice decline but not global warming. Earth’s Future 7(12): 1296–1306.

Defense & Security
China Cyber Security Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured. 3d illustration

Chinese cyberespionage: The Invisible War That Threatens the West

by Gabriele Iuvinale

On March 4, the U.S. Department of Justice charged ten Chinese nationals with carrying out massive hacks against government agencies, media outlets, and dissidents in the United States and around the world. They allegedly acted on behalf of the Chinese company i-Soon, under contract from the Beijing government. Two officials from China’s Ministry of Public Security (MPS) were also indicted, identified as the ones “directing the attacks.” According to documents held by the U.S. justice system, China’s domestic intelligence services (MPS) and foreign intelligence (Ministry of State Security, MSS) relied on a vast network of private companies and domestic contractors to hack and steal information, thereby masking the Chinese government’s direct involvement. In some cases, the MPS and MSS paid private hackers to target specific victims. In many others, the attacks were speculative: hackers identified vulnerable computers, breached them, and extracted information that was later sold — either directly or indirectly — to the Chinese government. The Growth of Chinese Cyberespionage and Its Main Areas of Operation This is not an isolated case. Over the past decade, the People’s Republic of China’s (PRC) hacking program has expanded rapidly. In 2023, then-FBI Director Christopher Wray stated that it was larger than that of all other world powers combined. This increase in power and sophistication has led to success in three key areas: political interference, sabotage of critical infrastructure, and large-scale intellectual property theft. Beijing integrates computer networks, electronic warfare, economic, diplomatic, legal, military, intelligence, psychological, and military deception resources, along with security operations, to weaken states, make them economically dependent on China, and more receptive to a “new authoritarian world order with Chinese characteristics.” For this reason, unlike traditional interpretations, Chinese state-sponsored hacking should be understood within a broader context — where control over technology, strategic infrastructure, and global supply chains is part of “trans-military” and “non-military” warfare operations, as described by two People’s Liberation Army (PLA) colonels in the 1999 book “Unrestricted Warfare”. This approach is known as liminal warfare — an escalating conflict in which the spectrum of competition and confrontation with the West is so wide that the battlefield is, quite literally, everywhere. Cyberespionage as a Tool of Electronic Warfare In electronic warfare, hacking is used for sabotage during times of crisis or conflict. These actions are led by the People’s Liberation Army (PLA), the armed wing of the Chinese Communist Party. In 2023, it was discovered that a hacker group linked to the PLA, known as “Volt Typhoon”, had infiltrated a wide range of critical infrastructure in the U.S. for years, including ports, factories, and water treatment plants — both on the mainland and in strategic locations like Guam. “Volt Typhoon is a military operation with political and potentially military strategic purposes,” explained Ciaran Martin, former director of the UK’s cybersecurity agency. Led by the PLA’s cyber unit, the operation involved installing readiness capabilities — “digital traps,” as some call them — within critical U.S. infrastructure. In addition to a sustained attack in 2023 on a power company in Massachusetts, which aimed to extract sensitive data about its operational technology (OT) infrastructure, “Volt Typhoon” gained notoriety for multiple attacks on telecommunications systems in the U.S. and other critical infrastructures globally. One of its subunits, “Voltzite”, targeted the Littleton Electric and Water Departments, prompting the FBI and cybersecurity firm Dragos to respond jointly and publish a detailed report on the attack and its mitigation. Intellectual Property Theft Through Cyberespionage The most damaging channel for intellectual property theft is cyberespionage. These intrusions allow Chinese companies — sometimes with direct support from the Communist Party or the state — to access information on operations, projects, and technology from foreign firms. China has used state-backed and coordinated cyberespionage campaigns to steal information from companies in strategic sectors such as oil, energy, steel, and aviation. These actions serve both to acquire science and technology and to gather intelligence useful for future attacks on military, government, or technical systems. In the United States, there have been numerous precedents: • In 2014, five PLA hackers were indicted for economic espionage.• In 2017, three hackers linked to the Chinese firm Boyusec were charged with stealing confidential business information.• In 2018, two Chinese nationals were indicted for intellectual property theft.• In 2020, two hackers connected to the MSS were charged with targeting COVID-19 research. Among these, the 2018 indictment stands out as part of a broader U.S. effort to raise awareness about Chinese cyberespionage. On that occasion, Chinese hackers carried out a campaign known as “Cloud Hopper”, which involved a supply chain attack on service providers like Hewlett Packard and IBM. The defendants worked for Huaying Haitai and collaborated with the Tianjin State Security Bureau of the MSS. In 2017, the U.S. Commission on the Theft of American Intellectual Property estimated that such crimes cost the U.S. economy up to $600 billion annually — a figure comparable to the Pentagon’s defense budget and greater than the combined profits of the 50 largest companies in the Fortune 500. Beyond the United States: The Global Impact of Chinese Cyberespionage In June 2024, Dutch military intelligence (MIVD) warned that Chinese cyberespionage was broader than previously believed, affecting Western governments and defense companies. A 2023 cyberattack on the Dutch Ministry of Defense reportedly affected at least 20,000 people within a few months. In 2018, the Czech Republic’s National Cyber and Information Security Agency (NUKIB) issued a warning about risks linked to China. Since then, the country has strengthened its capabilities and controls against Beijing and has worked on mechanisms to counter foreign information manipulation. According to U.S. prosecutors, dozens of European parliamentarians have been targeted by Chinese attacks. In March 2024, the U.S. Department of Justice indicted hackers linked to the MSS for attacking “all EU members” of the Inter-Parliamentary Alliance on China (IPAC), a coalition critical of Beijing. In 2021, the hackers sent over a thousand emails to around 400 accounts linked to IPAC, attempting to spy on their internet activity and devices. In addition, ASML, the Dutch leader in semiconductor lithography, suffers “thousands of security incidents per year,” including several successful infiltration attempts by Chinese actors. Research centers like Imec (Belgium) are also frequent targets. Belgium has expelled Chinese researchers suspected of espionage. The European Union has reinforced security and identified advanced semiconductors as one of four critical technologies requiring risk assessments and enhanced protection. Notably, APT41 is one of the most active and sophisticated Chinese cyberespionage groups, based in the PRC and linked to the MSS. According to Google’s Threat Intelligence Group, APT41 combines state espionage with ransomware attacks — malicious programs that encrypt files and demand financial ransom to restore them — making attribution more difficult. Unlike other PLA-aligned groups whose operations are region-specific, APT41 acts globally, attacking strategic sectors in the U.S., Europe, Latin America, and the Caribbean. It also carries out financially motivated operations, particularly in the gaming industry. Mandiant, a global cybersecurity leader, highlights APT41’s technical capabilities: it frequently exploits zero-day and n-day vulnerabilities and uses techniques like phishing, social engineering, and SQL injections. Since 2020, APT41 has conducted large-scale campaigns against over 75 companies in more than 20 countries. It is responsible for compromising supply chains, such as in the “ShadowHammer” campaign targeting ASUS, which affected over 50,000 systems in 2018. APT41 is also linked to the use of “MESSAGETAP” malware in telecommunications networks. The Role of Chinese Universities in Cyberespionage Chinese universities also collaborate with the PLA and MSS in state-sponsored cyberespionage operations. Shanghai Jiao Tong University works directly with the Chinese military on such operations. Zhejiang University and the Harbin Institute of Technology are key centers for recruiting hackers. Xidian University offers students hands-on experience at provincial MSS offices and previously maintained ties with the Third Department of the PLA’s General Staff before its reorganization in 2015 into the Network Systems Department. One of its graduate programs is co-directed with the Guangdong Office of the Chinese Information Technology Security Evaluation Center (ITSEC), an MSS-run office that leads an active team of contractor hackers. Southeast University also maintains links with security services and co-manages the “Purple Mountain Lab” with the PLA’s Strategic Support Force. There, researchers collaborate on “critical strategic requirements,” operating systems, and interdisciplinary cybersecurity studies. The university also receives funding from the PLA and MSS to develop China’s cyber capabilities. The Cybersecurity undergraduate program at Shanghai Jiao Tong University (SJTU) is taught at a PLA information engineering base. Within this program, SJTU claims to work on “network and information systems testing and evaluation, security testing for connected smart networks, APT attack and defense testing, and key technologies for cyber ranges.” Universities associated with the MSS for talent recruitment include the University of Science and Technology of China, Shanghai Jiao Tong University, Xi’an Jiao Tong University, Beijing Institute of Technology, Nanjing University, and the Harbin Institute of Technology. In addition, some cybersecurity firms — such as Beijing TopSec — collaborate with the PLA in hacking campaigns, operator training, and developing future hackers. This article was originally published by Agenda Digitale and later by Expediente Abierto, who granted us permission for its translation and republication.

Defense & Security
Chess made from USA, EU and China flags on a white background. Chess made from China, Europe Union and United States of America flags. Trade, tariffs, duty and customs war

Europe’s transatlantic China challenge

by Gesine Weber

Abstract European states currently lack a clear joint strategy on China and a coordinated approach to US–China competition. This article offers a novel perspective on the challenges for European approaches to this issue due to an omnipresent transatlantic component and the risk of an alliance dilemma. Illustratively focusing on France, Germany and the UK, it demonstrates that Europeans are facing a transatlantic alliance dilemma with the risks of abandonment and entrapment. It argues that Europe needs to strike a balance between its dependence on Washington, especially with regard to European security, while fearing entrapment by the US approach towards Beijing as it aims to maintain economic ties with China. The article concludes that the ramifications of this dilemma can be mitigated through a distinctly European approach to China, strengthening European coordination on China and bolstering European strategic autonomy. As a conceptual piece rather than a full empirical analysis, this article therefore unpacks the strategic challenge and lays the groundwork for further empirical works on the topic. Introduction Strategic competition between the US and China plays out in many realms of international affairs, ranging from global trade to security in the Indo-Pacific. European states are directly affected by this dynamic as they maintain critical ties with both sides. Albeit allies of the US through NATO, Europeans have been reluctant to align with the US on its approach to the Indo-Pacific and China, which is currently characterised by the quest to win the strategic competition with Beijing in all areas of international affairs (see Leoni 2023). Furthermore, Europe maintains close economic ties with Beijing, and imports from China to the EU have most recently increased (Lovely and Yan 2024). European governments certainly do not pursue an approach of maintaining equidistance between the US and China: not only do they regularly emphasise their strategic proximity to Washington, but more recent events, such as the willingness of European allies to publicly adopt the wording of the communiqué from NATO’s Washington summit (NATO 2024) describing China as an ‘enabler of Russia’s war effort in Ukraine’, clearly demonstrate that the tone is changing in European capitals (Politi 2023). However, Europeans still tend to emphasise China’s role in global affairs and the importance of including it in multilateral cooperation formats. With the re-election of Donald Trump as US president, European policy on China and its approach to US–China competition will increasingly be a focus of the US administration. While the exact approach of the new US government still remains to be defined, there are good reasons to anticipate a more hawkish China policy from Washington, through which the US might seek not only to further compete with China, but to actually win this competition (see Pottinger and Gallagher 2023). When designing their approaches towards China—which, among the key European states, only Germany has done so far, with the publication of its China strategy in 2023—Europeans always face a transatlantic elephant in the room. US–China competition, a structuring feature of international relations shaping the global order today through the increasing emergence of geopolitical blocs (see Leoni and Tzinieris 2024), and China’s rising global influence in almost all areas of international affairs—ranging from climate to economics, the rules-based order and security—are forcing European states to reflect on their approach vis-à-vis Beijing (for a full discussion, see Oertel 2023; García-Herrero and Vasselier 2024). As NATO members, European states also need to adapt their strategy in light of the partnership with the US as their key ally. This article argues that European approaches towards China, as shown in the examples of France, Germany and the UK, have a distinctly transatlantic component. It illustrates how these three European states find themselves in an alliance dilemma with the US, and how the risks associated with alliances also define European approaches to China and US–China competition more broadly. As the US administration regularly refers to China as a ‘challenge’ (US Department of Defense 2022), this article alludes to this formulation through the coining of the term ‘transatlantic China challenge’ to describe the strategic challenges Europeans are facing with regard to defining their approach vis-à-vis China and US–China competition more broadly. It offers a conceptual understanding of the strategic challenges for Europe in this context and thereby constitutes a basis for a more thorough empirical analysis. The alliance dilemma and European strategy in US–China competition Originating in realist international relations theory, the alliance dilemma generally describes a situation in which states face risks resulting from joining an alliance. As demonstrated by Snyder (1984), smaller allies especially face a parallel risk of abandonment and entrapment by a hegemon, that is, the dominating power, after joining an alliance. Abandonment, in these circumstances, implies that the hegemon has no further interest in defending or supporting the smaller allies, whereas entrapment refers to a situation in which a state is ‘dragged into a conflict over an ally’s interests that [it] does not share, or shares only partially’ (see Snyder 1984, 466–8). In the context of alliances, a small state is ‘the weaker part in an asymmetric relationship, which is unable to change the nature or functioning of the relationship on its own’ (Wivel et al. 2014, 9), and hence has more limited space for action than the great powers (Wivel and Thorhallsson 2018, 267). This definition arguably applies to Europe in its partnership with the US, as demonstrated by the excessive military and economic dominance of the US as compared to the European states (see Stockholm International Peace Research Institute n.d.; International Monetary Fund 2025). The re-election of Trump as US president now presents the risk of an increased alliance dilemma for Europeans. On the one hand, Trump has announced several times that he does not value the alliance commitments within NATO and potentially would not defend European allies (Sullivan 2024), threatening Europe with abandonment. This scenario is being taken seriously in European capitals, and reflections on how ‘defending Europe with less America’ (Grand 2024) could shape up have gained traction, especially in 2024. Similarly, defence initiatives within the EU to enhance the European contribution to the continent’s security have leapt forward in recent years (see Scazzieri 2025). On the other hand, even the Biden administration had pushed Europe to align with the US approach on China (see Lynch et al. 2023). However, France and Germany in particular, as the big EU member states, have been hesitant to do so, as reflected in France’s opposition to the opening of a NATO liaison office in Tokyo (McCurry 2023) and Germany’s vote against tariffs on Chinese electric vehicles, fearing reprisals from Beijing (Demarais 2024). Trump’s foreign policy might be strongly characterised by issue linkage, which means that policies in one area will be linked to those in another area. Through this strategy, the new US administration might force Europeans into alignment and thereby entrap them, making them accept policies they are not eager to support (see Barkin and Kratz 2025). The exact policies of the Trump administration vis-à-vis European allies remain to be seen, but it is not hard to imagine a scenario in which abandonment and entrapment could emerge or increase, namely when the threat of abandonment is used to entrap allies and force them to support certain policy decisions. The alliance dilemma could play out for Europeans specifically when designing their approaches towards China (see Barkin and Kratz 2025) and formulating their response to US–China competition more generally. As noted above, among the big European states, only Germany has formally adopted a strategy on China, in 2023 (The Federal Government of Germany 2023). However, China and the response to US–China competition takes a prominent place in France’s Indo-Pacific Strategy and its strategy review (Government of France 2021; Secrétariat général de la défense et de la sécurité nationale 2022), and the UK systematically included the dimension of strategic competition in its Integrated Review and its refresh (Government of the United Kingdom 2021, 2023) and has announced an ‘audit’ of its China policy under the new government (Taylor 2024). While these strategies emphasise their individual approaches towards China and the risks stemming from US–China competition, the US has increasingly pressured Europe to align with its approach (Lynch et al. 2023) and can be expected to continue this pressure (Barkin and Kratz 2025). Through the potential issue linkage of security (openly questioned by President Trump) and China policy, Europe therefore finds itself in a new form of alliance security dilemma. European approaches to US–China competition: strategic hedging How can Europe respond to the alliance dilemma of the risks of abandonment and entrapment when it comes to its approaches to China? Reviewing the theoretical literature on the alliance dilemma, one can imagine different strategies. According to Snyder, members of alliances can choose between strategies that strengthen or weaken their commitment to the alliance. To demonstrate commitment, actions could include reassurances for the ally or demonstrations of loyalty, whereas actions to weaken the commitment to the alliance could consist of restraining the ally (mostly to reduce the risk of entrapment in a conflict), increasing bargaining power over the ally or preserving options for realignment outside the existing alliance (for a full discussion, see Snyder 1984, 466–9). Alternative strategies include hiding from cooperation, that is, ‘seeking to maximize autonomy by opting out of specific aspects of the cooperation or by setting up “bastions” in the cooperation’, or bandwagoning, through which states pursue strategies of adaptation ‘to the more powerful actors in the cooperation’ (Pedersen 2023, 442). At the moment, it seems that France, Germany and the UK ‘drive on sight’ rather than approaching the question holistically. The following analysis aims to unpack how the three European states see US–China competition, the risk of the alliance dilemma and how these reflections have played out so far in their strategies. The strategies of France, Germany and the UK on China demonstrate that their approaches are influenced by a distinctly transatlantic component and reflect the transatlantic alliance dilemma. This is visible in their (1) high awareness of the risks stemming from great power competition, (2) approaches to managing the risk of short-term abandonment, and (3) hedging to mitigate the medium- and long-term risks of abandonment and entrapment. The empirical evidence for this analysis was gathered through a qualitative analysis of European strategic documents, statements and policy decisions taken mostly during the period of the Biden administration. However, in light of the risk of a scaling-up of the alliance dilemma under the Trump administration, sources and evidence accessible by the end of January 2025 were included to illustrate the European approaches. In addition to publicly available documents and the sources mentioned above, this paper draws on conversations with policymakers and experts under the Chatham House rule. Mitigating risks from US–China competition: multilateralism instead of alignment That France, Germany and the UK are close allies with the US is clearly visible in their respective strategies on China, not least because of references they make to the importance of the alliance and their descriptions of their own positions between the two great powers. Overall, France, Germany and the UK share the perception of US–China competition and the emergence of blocs as potentially harmful to their interests. As a consequence, all three call for an inclusive multilateral order instead of falling into a logic of blocs, as the increasing competition is seen as a risk for Europe (Secrétariat général de la défense et de la sécurité nationale 2022, 9–15; The Federal Government of Germany 2020, 24–6; Government of the United Kingdom 2023, 22–6). The response of all three European powers to the emergence of blocs is multilateralism: instead of clearly aligning with the US, the French, German and British strategies call for building broader multilateral coalitions, which should, eventually, also include China (The Federal Government of Germany 2020, 23–6; Government of the United Kingdom 2023). The tone in Paris, Berlin and London towards Beijing has clearly changed over recent years; accordingly, the European capitals were also willing to support strong wording on China in the 2024 NATO summit declaration, which describes China as a ‘critical enabler’ of Russia’s ongoing war against Ukraine (NATO 2024). Albeit also recognised as a critical partner for key issues such as climate policy and trade, European states openly describe China as a ‘systemic rival’ and occasionally call out China’s behaviour, as they did, for example, in the case of a note verbale on the South China Sea (UN 2020). Nevertheless, Europe has not (yet) given in to US pressure to align with Washington’s more confrontational approach towards China (Etienne 2024). Even if European states and Washington have moved closer to each other, especially on economic security (Meyers and Reinsch 2023), the European positions on US–China competition demonstrate that Europeans are not willing to fully endorse or follow Washington’s approach—not least because European imports from China have increased in recent years (Lovely and Yan 2024). Managing the risk of short-term abandonment Since Trump’s election, the risk of abandonment by the US has been seen as increasingly high in Paris, Berlin and London.1 This is not least because Trump has openly questioned his willingness to adhere to Article 5 of the North Atlantic Treaty in the case of an armed attack on Europeans (Sullivan 2024). Europeans are especially concerned about issue linkage in this context, meaning that demands in a policy area other than security could be used as a condition. Concretely, Trump could use the threat of abandonment as leverage to compel Europe to align with the US on China policy.2 Barkin and Kratz (2025) suggest that Europe adopt a ‘carrot and stick’ approach, whereby Europe could start with an offer to the US: buying more liquified natural gas, defence goods and agricultural products from the US could mitigate the risk of abandonment. However, there is awareness among European states that coercion from the US to align on US–China policy, especially when linked to the threat of abandonment, might best be mitigated through enhancing European military capabilities—which would still leave the continent exposed to these threats, though to a lesser extent.3 Addressing the risk of medium- and long-term abandonment and entrapment: transatlantic hedging However, the risk of at least partial abandonment is not a new challenge for European strategy, and had already infused earlier strategic thinking. The shift of US strategic priorities away from Europe and to the Indo-Pacific has already been demonstrated in the allocation of resources to the different theatres. Moreover, European states have increasingly become aware that US forces will be withdrawn from their territories in the future and have concluded that they will have to step up their own commitment to European security (see Grand 2024). In parallel, there is an awareness in European capitals that showing more interest in the Indo-Pacific and giving more importance to policy on China is also a way for Europeans to demonstrate an understanding of their ally’s strategic priorities.4 Accordingly, the approaches of France, Germany and the UK to China and the Indo-Pacific also have to be understood as a commitment to the priorities of the US in order to keep this ally engaged in the European theatre and mitigate the risk of abandonment; however, European states abstain from fully aligning with the US approach, as their capabilities and strategic goals are perceived as diverging from those of the US. In this way, Europe aims to avoid entrapment over the medium term through slightly distancing itself from US policy. While all three European states also call for de-risking from China and diversification of their supply chains, maintaining strong economic ties with Beijing is a key component of their respective approaches—which contrasts with the US calls for decoupling. Furthermore, these states have never formally endorsed the US policy on China (Etienne 2024). Nevertheless, enhancing European capabilities would not only send a signal to Washington, but also qualify as hedging, understood as an ‘insurance policy’ to avoid a deterioration in US–Europe relations if the US opted for abandonment, or even as part of a move towards emancipation to reduce strategic dependencies on Washington (see Fiott 2018, 4–6). Conclusion: a transatlantic China challenge Designing their approaches to China and to US–China competition more broadly constitutes a complex strategic dilemma for European states. Paris, Berlin and London do not fully align with Washington’s approach, and it remains to be seen whether they will be willing to do so under the second Trump administration. To manage the risk of abandonment and entrapment, European states pursue different individual approaches to strategic hedging: their strategies on China and US–China competition are designed in a way that allows them to mitigate the risk of abandonment which might stem from significant transatlantic divergence, and to avoid automatic entrapment through their slight distancing from the US approach. From a theoretical perspective, this article has demonstrated that the alliance dilemma, along with the parallel fear of abandonment and entrapment by the US, is a major factor accounting for Europe’s limited strategies on China and its hedging behaviour. This article offers a conceptual analysis of the structural forces explaining European strategies, but other strategic cultures and relationships with the US could offer important complementary insights. To further analyse how individual European states design their strategies vis-à-vis China in light of the alliance dilemma and potential domestic constraints and specificities, neoclassical realism could offer an interesting analytical concept. This approach posits that structural forces set the parameters for foreign policy and treats domestic factors, including strategic culture, as intervening variables (see Rose 1998). Accordingly, it appears well suited for foreign policy analysis, and has indeed gained popularity in the field in recent years (see, for example, Martill and Sus 2024; Meibauer et al. 2021; Weber 2024). Empirically, this article constitutes a conceptual starting point rather than an exhaustive analysis of the strategy-making processes of European states with regard to China and US–China competition and makes a more comprehensive assessment desirable. The findings of this article have broader implications for policymaking. First, they demonstrate the necessity for Europe to determine its place in the increasing US–China competition. European coordination on the respective approaches vis-à-vis the US—especially in light of potential coercion to align—and China is of paramount importance to ensure that foreign policy strategies are mutually reinforcing and not undermining European objectives. Second, the article demonstrates that Europe currently responds to the ‘transatlantic China challenge’ through transatlantic hedging: while this strategy seems to be promising in the short term, it is questionable to what extent the strategy is sustainable and could help European states to navigate the parallel challenges of abandonment and entrapment. Unless Europe decides to fully align with the US—and it is questionable whether this decision would be in its interest—European states would be well advised to develop a sustainable long-term approach to China. A transatlantic dialogue on China, in which Europe and the US openly discuss synergies and divergences, could help prevent misunderstandings and decrease the risk of coercion or issue linkage due to a misreading of European approaches in Washington. Third, as the risks of (at least partial) abandonment and entrapment are systemic challenges due to the current composition of the transatlantic alliance, a logical step for European states to decrease their dependence on the US as the hegemon in the alliance would be to significantly strengthen European capabilities. Stronger military capabilities could help mitigate the ramifications of abandonment, and the aforementioned distinctly European strategy could allow Europe to avoid strategic entrapment in relation to China imposed by Washington. As Europe remains the junior partner in the transatlantic alliance, the parallel risks of abandonment and entrapment, as well as issue linkage, are highly likely to influence its approaches towards China in the long term, but there are certainly ways to render this ‘transatlantic China challenge’ less challenging. ORCID iDGesine Weber https://orcid.org/0009-0008-2643-0400Footnotes1. Conversation with French, German and British experts in Berlin, January 2025.2. Conversation with French, German and British experts in Berlin, January 2025.3. Conversation with French, German and British experts in Berlin, January 2025; conversation with European experts and officials in Paris, January 2025.4. Conversation with officials from Germany and France in Paris, November 2024; conversation with French, German and British experts in Berlin, January 2025.ReferencesBarkin N., Kratz A. (2025). Trump and the Europe–US–China Triangle. Rhodium Group, 16 January. https://rhg.com/research/trump-and-the-europe-us-china-triangle/. Accessed 18 January 2025.Demarais A. (2024). Divided we stand: The EU votes on Chinese electric vehicle tariffs. European Council on Foreign Relations, 9 October. https://ecfr.eu/article/divided-we-stand-the-eu-votes-on-chinese-electric-vehicle-tariffs/. Accessed 25 January 2025.Etienne P. (2024). The European Union between the United States and China: Should we choose between equidistance and following? Fondation Robert Schuman, 8 October. https://www.robert-schuman.eu/en/european-issues/763-the-european-union-between-the-united-states-and-china-should-we-choose-between-equidistance-and-following. Accessed 22 December 2024.Fiott D. (2018). Strategic autonomy and the defence of Europe. European Union Institute for Security Studies, Brief 12/2018. https://www.iss.europa.eu/sites/default/files/EUISSFiles/Brief%2012__Strategic%20Autonomy.pdf. Accessed 25 January 2025.García-Herrero A., Vasselier A. (2024). Updating EU strategy on China: Co-existence while de-risking through partnerships. Mercator Institute for China Studies. https://merics.org/en/external-publication/updating-eu-strategy-china-co-existence-while-de-risking-through-partnerships. Accessed 30 January 2025.Government of France. (2021). France’s Indo-Pacific strategy. https://www.diplomatie.gouv.fr/IMG/pdf/en_dcp_a4_indopacifique_022022_v1-4_web_cle878143.pdf. Accessed 31 January 2025.Government of the United Kingdom. (2021). Global Britain in a competitive age: The integrated review of security, defence, development and foreign policy. London: The Stationery Office. https://www.gov.uk/government/publications/global-britain-in-a-competitive-age-the-integrated-review-of-security-defence-development-and-foreign-policy. Accessed 18 January 2025.Government of the United Kingdom. (2023). Integrated review refresh 2023: Responding to a more contested and volatile world. London: The Stationery Office. https://www.gov.uk/government/publications/integrated-review-refresh-2023-responding-to-a-more-contested-and-volatile-world. Accessed 18 January 2025.Grand C. (2024). Defending Europe with less America. European Council on Foreign Relations, 3 July. https://ecfr.eu/publication/defending-europe-with-less-america/. Accessed 18 January 2025.International Monetary Fund. (2025). World economic outlook: GDP data mapper [Map]. https://www.imf.org/external/datamapper/NGDPD@WEO/OEMDC/ADVEC/WEOWORLD. Accessed 23 January 2025.Leoni Z. (2023). Grand strategy and the rise of China: Made in America. Agenda Publishing.Leoni Z., Tzinieris S. (2024). The return of geopolitical blocs. Survival, 66(2), 37–54.Lovely M. E., Yan J. (2024). As the US has relied less on imports from China, the EU has imported more. Pederson Institute for International Economics, 24 August. https://www.piie.com/research/piie-charts/2024/us-has-relied-less-imports-china-eu-has-imported-more. Accessed 22 December 2024.Lynch S., Toosi N., Moens B., Banco E. (2023). The U.S. wants Europe to stand up to China. Europe says: Not so fast. Politico, 3 August. https://www.politico.com/news/2023/03/08/us-europe-china-00086204. Accessed 18 January 2025.Martill B., Sus M. (2024). Winds of change? Neoclassical realism, foreign policy change, and European responses to the Russia-Ukraine War. British Journal of Politics & International Relations.McCurry J. (2023). France opposed to opening of Nato liaison office in Japan, official says. The Guardian, 7 June. https://www.theguardian.com/world/2023/jun/07/france-opposed-to-opening-of-nato-liaison-office-in-japan-official-says. Accessed 25 January 2025.Meibauer G., Desmaele L., Onea T., Kitchen N., Foulon M., Reichwein A., Sterling-Folker J. (2021). Forum: Rethinking neoclassical realism at theory’s end. International Studies Review, 23(1), 268–95.Meyers E., Reinsch W. A. (2023). The push for U.S.–EU convergence on economic security policy. Center for Strategic and International Studies, 7 July. https://www.csis.org/analysis/push-us-eu-convergence-economic-security-policy. Accessed 26 January 2025.NATO. (2024). Washington Summit declaration. https://www.nato.int/cps/cn/natohq/official_texts_227678.htm. Accessed 18 January 2025.Oertel J. (2023). Ende der China-Illusion: Wie wir mit Pekings Machtanspruch umgehen müssen. Munich: Piper Verlag.Pedersen R. B. (2023). Small states shelter diplomacy: Balancing costs of entrapment and abandonment in the alliance dilemma. Cooperation and Conflict, 58(4), 441–59.Politi A. (2023). The paradigm shift in EU–China relations and the limits of the EU’s current strategy towards China: A relational perspective. Asian Affairs 54(4), 670–93.Pottinger M., Gallagher M. (2024). No substitute for victory: America’s competition with China must be strategic and ideological. Foreign Affairs, 10 April. https://www.foreignaffairs.com/united-states/no-substitute-victory-pottinger-gallagher. Accessed 18 January 2025.Rose G. (1998). Neoclassical realism and theories of foreign policy. World Politics, 51(1), 144–72.Scazzieri L. (2025). Towards an EU ‘defence union’? Centre for European Reform, 30 January. https://www.cer.eu/publications/archive/policy-brief/2025/towards-eu-defence-union. Accessed 30 January 2025.Secrétariat général de la défense et de la sécurité nationale. (2022). Revue nationale stratégique 2022. https://www.sgdsn.gouv.fr/publications/revue-nationale-strategique-2022. Accessed 18 January 2025.Snyder G. H. (1984). The security dilemma in alliance politics. World Politics, 36(4), 461–95.Stockholm International Peace Research Institute. (n.d.). SIPRI Military Expenditure Database.Sullivan K. (2024). Trump says he would encourage Russia to ‘do whatever the hell they want’ to any NATO country that doesn’t pay enough. CNN, 11 February. https://edition.cnn.com/2024/02/10/politics/trump-russia-nato/index.html. Accessed 29 January 2025.Taylor R. (2024). UK government policy towards China. https://lordslibrary.parliament.uk/uk-government-policy-towards-china/. Accessed 18 January 2025.The Federal Government of Germany. (2020). Policy guidelines for the Indo-Pacific. www.auswaertiges-amt.de/blob/2380514/f9784f7e3b3fa1bd7c5446d274a4169e/200901-indo-pazifik-leitlinien–1–data.pdf. Accessed 21 December 2024.The Federal Government of Germany. (2023). China-Strategie der Bundesregierung. Berlin: Auswärtiges Amt. https://www.auswaertiges-amt.de/blueprint/servlet/resource/blob/2608578/810fdade376b1467f20bdb697b2acd58/china-strategie-data.pdf. Accessed 18 January 2025.UN (2020). Note verbale, UK NV No. 162/20, 16 September. https://www.un.org/Depts/los/clcs_new/submissions_files/mys_12_12_2019/2020_09_16_GBR_NV_UN_001.pdf. Accessed 25 January 2025.US Department of Defense. (2022). National Defense Strategy of the United States of America. https://media.defense.gov/2022/Oct/27/2003103845/-1/-1/1/2022-NATIONAL-DEFENSE-STRATEGY-NPR-MDR.pdf. Accessed 25 January 2025.Weber G. (2024). Zeitenwende à la française: Continuity and change in French foreign policy after Russia’s invasion of Ukraine. British Journal of Politics & International Relations.Wivel A., Bailes A. J. K., Archer C. (2014). Setting the scene: Small states and international security. In Archer C., Bailes A. J. K., Wivel A. (eds.), Small states and international security: Europe and beyond (pp. 3–25). London: Routledge.Wivel A., Thorhallsson B. (2018). Brexit and small states in Europe: Hedging, hiding or seeking shelter? In Rosamond B., Nedergaard P., Diamond P. (eds.), The Routledge handbook of the politics of Brexit, 1st edn. (pp. 266–77). Abingdon-on-Thames: Routledge.